Business of Information Technology  >   Business Management  >   Financial Management  >   Budgeting  >  

IT Spending

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Spending, Information Technology Spending, IT Budgeting and Spending
DEFINITION: What is expended for any type of resources in IT.
IT Spending Reports
1 - 25 of 202 Matches Previous Page  |  Next Page
The cost of IT downtime calculator
sponsored by Databarracks
RESOURCE: View this resource to learn how you can improve the standard of business continuity planning around individual systems, and why investing in disaster recovery technologies is critical to protect your business.
Posted: 23 Apr 2015 | Published: 23 Apr 2015

Databarracks

PPM Software, Evolved: A Buyer's Guide for Today's Project Teams
sponsored by Workfront
WHITE PAPER: This resource discusses the 5 failings inherent in many Project Portfolio Management (PPM) tools that you need to watch out for when selecting a solution for your business.
Posted: 21 Apr 2015 | Published: 21 Apr 2015

Workfront

What to Do Once Windows Server 2003 Reaches Its End-of-Life
sponsored by Lenovo
WHITE PAPER: Check in with the experts at SearchWindowsServer to learn the less obvious issues surrounding commitment to Windows servers. Assess the alternatives, such as modern datacenter technologies.
Posted: 17 Apr 2015 | Published: 17 Apr 2015

Lenovo

How to Forge an ITSM Strategy That Generates Revenue
sponsored by FrontRange Solutions Inc.
EGUIDE: Access this e-guide to discover tips for ITIL certification and training, in addition to rich information regarding the adaptation of ITSM strategies to a mobile workforce. Learn how to unlock IT's fullest potential and drive revenue in your enterprise.
Posted: 09 Apr 2015 | Published: 09 Apr 2015

FrontRange Solutions Inc.

How to Write a Compelling IT Budget Application
sponsored by Welldata
WHITE PAPER: This concise overview reveals a real-world example of how one IT manager was able to get his budget approved in just one day after weeks of failed attempts to convince his company's C-suite to approve additional funds.
Posted: 09 Apr 2015 | Published: 03 Apr 2015

Welldata

Generate ROI with IT and Business Intelligence
sponsored by Information Builders
WHITE PAPER: Access this informative white paper to learn how businesses are rethinking the IT infrastructure. Gain insights into strategies that significantly reduce costs and complexity of new initiatives by leveraging Business Intelligence (BI) platforms with IT expertise.
Posted: 08 Apr 2015 | Published: 30 Apr 2012

Information Builders

The Hidden Costs of Open Source and Homegrown Applications
sponsored by SERENA Software, Inc.
WHITE PAPER: This white paper presents a cost-benefit analysis of open source software vs. commercial options.
Posted: 07 Apr 2015 | Published: 31 Dec 2014

SERENA Software, Inc.

Staying the course as a CIO
sponsored by ComputerWeekly.com
BOOK: In this extract from his book, Staying the Course as a CIO, Jonathan M. Mitchell looks at the challenges of managing IT projects.
Posted: 27 Mar 2015 | Published: 27 Mar 2015

ComputerWeekly.com

Tech Trends 2015
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Deloitte's sixth Annual Tech Trends Report reveals the top macro technology developments that will disrupt businesses in the next 18-24 months.
Posted: 16 Mar 2015 | Published: 16 Mar 2015

ComputerWeekly.com

Tech Insights: The UK Digital Economy
sponsored by ComputerWeekly.com
RESEARCH CONTENT: The number of tech enterprises in the UK grew by 8% in the past 12 months, double the rate of industry as a whole, contributing more than £90bn to the UK economy, according to this report by the Tech Partnership.
Posted: 10 Mar 2015 | Published: 10 Mar 2015

ComputerWeekly.com

Avoid Paying Today for Systems You’ll Need Tomorrow
sponsored by HP India
WHITE PAPER: This white paper examines a flexible investment strategy IT strategy that can eliminate the need to front-load IT investments by aligning usage with payments.
Posted: 23 Feb 2015 | Published: 23 Feb 2015

HP India

The economy in 2015
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Deloitte chief economist Ian Stewart charts the prospects for the economy in 2015 in this presentation for the CW500 Club.
Posted: 20 Feb 2015 | Published: 20 Feb 2015

ComputerWeekly.com

Enterprise Gamification: Playing to win
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Enterprise gamification is becoming increasingly important to delivering true business transformation, according to this report from Capgemini.
Posted: 11 Feb 2015 | Published: 11 Feb 2015

ComputerWeekly.com

IT Priorities 2015 – Germany, Austria & Switzerland
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Benchmark your IT spending plans, with our in-depth study of IT spending priorities in Germany, Austria & Switzerland.
Posted: 11 Feb 2015 | Published: 11 Feb 2015

ComputerWeekly.com

IT Priorities 2015 – France
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Benchmark your IT spending plans with our in-depth study of IT spending priorities in France.
Posted: 10 Feb 2015 | Published: 10 Feb 2015

ComputerWeekly.com

IT Priorities 2015 – UK
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Benchmark your IT spending plans with our in-depth study of IT spending priorities in the UK.
Posted: 10 Feb 2015 | Published: 10 Feb 2015

ComputerWeekly.com

Recognizing Five Sources of High-Profile Data Security Breaches
sponsored by Mimecast
WHITE PAPER: This white paper discusses the 5 major categories of vulnerabilities that IT and security professionals need to account for in their solutions planning.
Posted: 06 Feb 2015 | Published: 06 Feb 2015

Mimecast

Why Outsourcing CRM Doesn't Mean That You Can Outsource Data Protection
sponsored by BitGlass
WHITE PAPER: This white paper explains why enterprises utilizing cloud applications like Salesforce should consider investing in a cloud access security broker, which restores data protection and visibility to your IT team while respecting user privacy.
Posted: 05 Feb 2015 | Published: 05 Feb 2015

BitGlass

Next-Generation Firewalls and IPS: Why You Need Both
sponsored by Hewlett-Packard Company
WHITE PAPER: This HP white paper shows how next-generation firewalls and next-generation intrusion prevention systems are complementary security solutions that work together to secure your network.
Posted: 01 Feb 2015 | Published: 11 Dec 2014

Hewlett-Packard Company

Enterprises Reveal Significant Room for Improvement In Their Security Defenses
sponsored by Hewlett-Packard Company
WHITE PAPER: This resource explores the results of a survey that depicts that lack of confidence that organizations have in their security defenses, and also presents an approach to detecting malware to prevent it from spreading throughout the network.
Posted: 01 Feb 2015 | Published: 01 Feb 2015

Hewlett-Packard Company

Why You Need a Next-Generation Firewall
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper explores the reasons why enterprises benefit from implementing next-generation firewalls (NGFWs) and lays out a path to success.
Posted: 01 Feb 2015 | Published: 01 Feb 2015

Hewlett-Packard Company

Four Simple Steps for Evaluating a DCIM Solution
sponsored by Emerson
WHITE PAPER: In this helpful white paper, discover the four simple steps to evaluate a DCIM platform for your organization. Read on to learn how to build your solution checklist.
Posted: 29 Jan 2015 | Published: 09 May 2012

Emerson

Securing Microsoft Exchange 2010 with Symantec™ SSL Certificates
sponsored by Symantec Corporation
WHITE PAPER: This guide will help you take the guesswork out of implementing SSL for Exchange 2010, making it easier than ever to get the SSL certificate you need for a successful and secure Exchange implementation, and to take advantage of powerful capabilities such as Subject Alternative Names (SANs).
Posted: 12 Jan 2015 | Published: 02 Jul 2014

Symantec Corporation

Why Every CIO Should Consider Vulnerability Assessment a Necessity
sponsored by IBM
WHITE PAPER: In this resource, CIOs will learn why vulnerability assessment is so essential to enterprise security, and can discover a leading vulnerability assessment platform that scans targeted systems on a scheduled basis in order to increase your understanding of your organization's overall security posture.
Posted: 03 Feb 2015 | Published: 30 Apr 2014

IBM

Cloud Security: Enterprise Point of View
sponsored by Dimension Data
VIRTUAL SEMINAR: Access this webcast today to listen as Darren O'Loughlin, CSO for Dimension Data's global business enabling IT as a Service, shares strategic objectives for securing applications and workloads on an enterprise-class cloud.
Posted: 29 Jan 2015 | Premiered: 26 Nov 2014

Dimension Data
1 - 25 of 202 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement