Vertical Industries  >   Leisure Industry  >  

Hotel Industry

RSS Feed    Add to Google    Add to My Yahoo!
Hotel Industry Reports
 
Infrastructure Management Is Not Enough: The New IT Operations Imperative
sponsored by Mercury
WHITE PAPER: Infrastructure management is not enough to ensure enterprise applications are meeting business goals because users experience applications, NOT infrastructure.
Posted: 20 Dec 2005 | Published: 01 Dec 2005

Mercury

Information Security Breaches Survey 2013
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Security breaches cost large businesses an average of £850,000, the 2013 Information Security Breaches Survey reveals.
Posted: 29 Apr 2013 | Published: 29 Apr 2013

ComputerWeekly.com

Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007

Xtore

Rising Above the Competition as a Cloud Services Provider: Five Effective Steps for Claiming Your Share of the Pie
sponsored by CA Technologies.
WHITE PAPER: Learn how you can rise above the competition as a cloud provider, especially by using the five key steps outlined in this resource.
Posted: 06 Apr 2012 | Published: 06 Apr 2012

CA Technologies.

Managing and Securing Mobile Healthcare Data and Devices
sponsored by Fiberlink Communications
WHITE PAPER: Regulatory compliance tops the list of concerns among healthcare and life sciences IT professionals with 86% of healthcare IT decision-makers rating it as a high or critical priority over the course of the coming year. Check out this paper to find out more!
Posted: 17 Mar 2010 | Published: 17 Mar 2010

Fiberlink Communications

Webinar: Managing the Deployment Lifecycle
sponsored by RightScale
WEBCAST: In this webinar, RightScale presents typical lifecycle scenarios that you accomplish today in your datacenter – and show how you can execute them on the cloud in a more automated and repeatable manner.
Posted: 01 Mar 2010 | Premiered: Mar 1, 2010

RightScale

Measuring the Business Impacts of Effective Data: Chapter One of a Three-Part Study
sponsored by Sybase, an SAP company
WHITE PAPER: This study of over 150 Fortune 1000 firms from every major industry or vertical explores issues associated with the lifeblood of today’s enterprises: data. The findings demonstrate the often dramatic impacts that even marginal investments in information technology can have when that technology addresses data quality, usability, and intelligence.
Posted: 02 Nov 2010 | Published: 02 Nov 2010

Sybase, an SAP company

Mobile NFC in Transport
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This in-depth report from the GSMA explains the opportunities for NFC Mobile communications in transport.
Posted: 23 Nov 2012 | Published: 23 Nov 2012

ComputerWeekly.com

Deloitte Telecoms, Media, and Technology Predictions 2016
sponsored by ComputerWeekly.com
RESEARCH CONTENT: The technology, media and telecommunications (TMT) practice at Deloitte, the business advisory firm, gives its predictions for the technology sector in 2016.
Posted: 22 Jan 2016 | Published: 22 Jan 2016

ComputerWeekly.com

DigiWorld Yearbook
sponsored by ComputerWeekly.com
RESEARCH CONTENT: IDATE's DigiWorld Yearbook provides an annual analysis of the recent developments shaping the telecoms, internet and media markets, identifying major global trends and scenarios.
Posted: 18 Dec 2015 | Published: 18 Dec 2015

ComputerWeekly.com

Apps Revolution
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from CSC describes the Apps rEvolution: an evolution in technology that is creating revolutionary business and personal change.
Posted: 24 Feb 2014 | Published: 24 Feb 2014

ComputerWeekly.com

What You Need to Know About Real-Time Location Systems in Healthcare
sponsored by Ekahau, Inc.
WHITE PAPER: This white paper explores how real-time location systems (RTLS) can automate your inventory process by identifying and tracking the location of healthcare equipment in real time. Access now to learn how you can also enhance the safety of patients by keeping track of their whereabouts with RTLS.
Posted: 25 Jan 2016 | Published: 31 Dec 2015

Ekahau, Inc.

The Digital Enterprise
sponsored by ComputerWeekly.com
BOOK: Not every business is a digital business, but every business must become digital, writes Karl-Heinz Streibich in this book extract.
Posted: 17 Mar 2014 | Published: 17 Mar 2014

ComputerWeekly.com

CW Nordics February 2016: Saab's Leviathan Challenge
sponsored by ComputerWeekly.com
EZINE: The Nordic region is often described as a region that is leading the way in terms of the use of modern IT. The region needs IT to make up for factors such as having a small population, with many isolated communities. So IT both helps the region punch above its weight in business and enables its residents to receive services effectively.
Posted: 09 Feb 2016 | Published: 10 Feb 2016

ComputerWeekly.com

Airline IT Trends Survey
sponsored by ComputerWeekly.com
WHITE PAPER: For the 11th year in succession, the Airline IT Trends Survey tracks the key technology trends in the airline industry. It demonstrates the role that the survey’s global benchmarks play in underlining the importance of IT within the airline industry, while also stimulating debate in boardrooms worldwide about the way ahead.
Posted: 24 Oct 2011 | Published: 24 Jun 2010

ComputerWeekly.com

The First Six Steps to Securing Remote Locations
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: In this white paper you will discover how to distribute a quick, standardized security template for your remote offices to adopt.
Posted: 14 Jan 2016 | Published: 30 Dec 2015

WatchGuard Technologies, Inc.

The identity perimeter
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Bob Tarzey and Rob Bamforth, make the case for identity management and advanced single-sign-on (SSO) to help businesses and their customers and partners work in a more integrated way.
Posted: 05 Apr 2013 | Published: 05 Apr 2013

ComputerWeekly.com

The Global Risks Report 2016
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from the World Economic Forum identifies the most pressing global risks countries and organisations will face in 2016, including sections on technology and cyber crime.
Posted: 20 Jan 2016 | Published: 20 Jan 2016

ComputerWeekly.com

Cyber Vulnerability Index 2012
sponsored by ComputerWeekly.com
RESEARCH CONTENT: More than three-quarters of the Forbes 2000 companies leak potentially dangerous data that could be exploited by hackers, this research from KPMG reveals.  The report explains the risks and the actions companies need to take to protect themselves.
Posted: 31 Aug 2012 | Published: 05 Jul 2012

ComputerWeekly.com

Accenture Technology Vision 2014
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: The Accenture Technology Vision 2014 identifies six technology trends that are enabling enterprises to push the boundaries of innovation.
Posted: 27 Jan 2014 | Published: 27 Jan 2014

ComputerWeekly.com

The Top 100 Asian Stars in UK Tech
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: The Top 100 Asian Stars in UK Tech list regcognises the UK's top Asian digital influencers in 2015.
Posted: 22 Jun 2015 | Published: 22 Jun 2015

ComputerWeekly.com

Making the case for the cloud in common use airport technology
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from Amadeus looks at the business case for cloud computing in airports.
Posted: 04 Jul 2014 | Published: 04 Jul 2014

ComputerWeekly.com

February Technical Guide on Cloud Compliance
sponsored by SearchSecurity.com
EGUIDE: In this month’s Technical Guide from SearchCloudSecurity.com, gain a global perspective of today’s cloud compliance challenges. Explore key topics, including FedRAMP cloud computing standards, cloud security transparency, PCI in the cloud, Cloud Maturity Model (CMM) and more.
Posted: 27 Feb 2012 | Published: 24 Feb 2012

SearchSecurity.com

CW+: Quocirca Report: How to automate your expenses – a guide for higher education and universities
sponsored by ComputerWeekly.com
WHITE PAPER: Universities and other higher education establishments increasingly have to address the need for savings across the board. One area of focus has to be expenses from faculty members and others associated with the faculty.
Posted: 20 Oct 2011 | Published: 02 Nov 2010

ComputerWeekly.com

Hospitality and Cybercrime: How to Safeguard Sensitive Information
sponsored by SurfWatch Labs
WHITE PAPER: This white paper explores the many cyber-risks faced by the hospitality sector. Access it and discover just how much your business is at risk – and what you can do about it.
Posted: 06 Jan 2016 | Published: 06 Jan 2016

SurfWatch Labs

The state of email trust in 2014
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Email security improved in 2014 but most companies still haven't done enough to protect their customers from phishing attacks, this study from Agari reveals.
Posted: 26 Feb 2015 | Published: 26 Feb 2015

ComputerWeekly.com

Three simple steps to building a digital framework
sponsored by ComputerWeekly.com
PRESENTATION: Mark Thompson, Digital and IT Director for TUI Travel Specialist & Activity, discusses IT transformation in this PowerPoint presentation.
Posted: 10 Dec 2013 | Published: 10 Dec 2013

ComputerWeekly.com

Business leaders agenda 2012
sponsored by ComputerWeekly.com
RESOURCE: This report from KPMG identifies business priorities across a wide range of geographies and industries, and assesses the economic outlook.
Posted: 16 Mar 2012 | Published: 16 Mar 2012

ComputerWeekly.com

How One Airborne Wi-Fi Provider Issued Fake Google SSL Certificates, and Faced the Consequences
sponsored by Symantec Website Security
EGUIDE: This e-guide features a case study on how Gogo LLC issued fake Google SSL certificates. Learn how this incident caused ripples in the security industry, and uncover ways some vendors are increasingly observing encrypted traffic.
Posted: 09 Feb 2016 | Published: 04 Feb 2016

Symantec Website Security

Empowering E-Commerce Against Unpredictable Demand
sponsored by VMTurbo
WHITE PAPER: This white paper is your guide to the modern retail industry. Rely on this guide to learn how to power e-commerce platforms to handle unpredictable demand (even during the holiday rush).
Posted: 04 Dec 2015 | Published: 04 Dec 2015

VMTurbo

Unleashing IT: Integrated Infrastructure
sponsored by Cisco Systems, Inc.
WHITE PAPER: In this white paper, learn how a organizations in a variety of industries are leveraging pre-integrated, pre-validated infrastructure to get out of the best-of-breed world, give time back to the IT department, and more.
Posted: 11 Dec 2015 | Published: 11 Dec 2015

Cisco Systems, Inc.

Business Information E-Zine: New Talent Management Software Finds Hidden Talent
sponsored by SearchBusinessAnalytics
EZINE: New talent management software is lifting human resources out of its paper-pushing past -- and helping it become a strategic part of the business. Learn about the latest innovations from industry experts in this issue of Business Information e-zine.
Posted: 27 Jan 2016 | Published: 27 Jan 2016

SearchBusinessAnalytics
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement