Business of Information Technology  >   Business Management  >   Financial Management  >   Budgeting  >  

IT Spending

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Spending, Information Technology Spending, IT Budgeting and Spending
DEFINITION: What is expended for any type of resources in IT.
IT Spending Reports
1 - 25 of 196 Matches Previous Page  |  Next Page
Oracle Enterprise Manager 12c: From Zero to Cloud—Accelerated
sponsored by Oracle Corporation
WHITE PAPER: By transforming IT into a business-centric provider of services accessible from anywhere, you can have a more agile, efficient, and innovative enterprise.This white paper explains how you can transform IT into an agile, enterprise-class cloud.
Posted: 13 May 2015 | Published: 13 May 2015

Oracle Corporation

The cost of IT downtime calculator
sponsored by Databarracks
RESOURCE: View this resource to learn how you can improve the standard of business continuity planning around individual systems, and why investing in disaster recovery technologies is critical to protect your business.
Posted: 23 Apr 2015 | Published: 23 Apr 2015

Databarracks

PPM Software, Evolved: A Buyer's Guide for Today's Project Teams
sponsored by Workfront
WHITE PAPER: This resource discusses the 5 failings inherent in many Project Portfolio Management (PPM) tools that you need to watch out for when selecting a solution for your business.
Posted: 21 Apr 2015 | Published: 21 Apr 2015

Workfront

What to Do Once Windows Server 2003 Reaches Its End-of-Life
sponsored by Lenovo
WHITE PAPER: Check in with the experts at SearchWindowsServer to learn the less obvious issues surrounding commitment to Windows servers. Assess the alternatives, such as modern datacenter technologies.
Posted: 17 Apr 2015 | Published: 17 Apr 2015

Lenovo

How to Forge an ITSM Strategy That Generates Revenue
sponsored by FrontRange Solutions Inc.
EGUIDE: Access this e-guide to discover tips for ITIL certification and training, in addition to rich information regarding the adaptation of ITSM strategies to a mobile workforce. Learn how to unlock IT's fullest potential and drive revenue in your enterprise.
Posted: 09 Apr 2015 | Published: 09 Apr 2015

FrontRange Solutions Inc.

How to Write a Compelling IT Budget Application
sponsored by Welldata
WHITE PAPER: This concise overview reveals a real-world example of how one IT manager was able to get his budget approved in just one day after weeks of failed attempts to convince his company's C-suite to approve additional funds.
Posted: 09 Apr 2015 | Published: 03 Apr 2015

Welldata

Generate ROI with IT and Business Intelligence
sponsored by Information Builders
WHITE PAPER: Access this informative white paper to learn how businesses are rethinking the IT infrastructure. Gain insights into strategies that significantly reduce costs and complexity of new initiatives by leveraging Business Intelligence (BI) platforms with IT expertise.
Posted: 08 Apr 2015 | Published: 30 Apr 2012

Information Builders

The Hidden Costs of Open Source and Homegrown Applications
sponsored by SERENA Software, Inc.
WHITE PAPER: This white paper presents a cost-benefit analysis of open source software vs. commercial options.
Posted: 07 Apr 2015 | Published: 31 Dec 2014

SERENA Software, Inc.

Staying the course as a CIO
sponsored by ComputerWeekly.com
BOOK: In this extract from his book, Staying the Course as a CIO, Jonathan M. Mitchell looks at the challenges of managing IT projects.
Posted: 27 Mar 2015 | Published: 27 Mar 2015

ComputerWeekly.com

Tech Trends 2015
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Deloitte's sixth Annual Tech Trends Report reveals the top macro technology developments that will disrupt businesses in the next 18-24 months.
Posted: 16 Mar 2015 | Published: 16 Mar 2015

ComputerWeekly.com

Tech Insights: The UK Digital Economy
sponsored by ComputerWeekly.com
RESEARCH CONTENT: The number of tech enterprises in the UK grew by 8% in the past 12 months, double the rate of industry as a whole, contributing more than £90bn to the UK economy, according to this report by the Tech Partnership.
Posted: 10 Mar 2015 | Published: 10 Mar 2015

ComputerWeekly.com

Avoid Paying Today for Systems You’ll Need Tomorrow
sponsored by HP India
WHITE PAPER: This white paper examines a flexible investment strategy IT strategy that can eliminate the need to front-load IT investments by aligning usage with payments.
Posted: 23 Feb 2015 | Published: 23 Feb 2015

HP India

The economy in 2015
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Deloitte chief economist Ian Stewart charts the prospects for the economy in 2015 in this presentation for the CW500 Club.
Posted: 20 Feb 2015 | Published: 20 Feb 2015

ComputerWeekly.com

Enterprise Gamification: Playing to win
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Enterprise gamification is becoming increasingly important to delivering true business transformation, according to this report from Capgemini.
Posted: 11 Feb 2015 | Published: 11 Feb 2015

ComputerWeekly.com

IT Priorities 2015 – Germany, Austria & Switzerland
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Benchmark your IT spending plans, with our in-depth study of IT spending priorities in Germany, Austria & Switzerland.
Posted: 11 Feb 2015 | Published: 11 Feb 2015

ComputerWeekly.com

IT Priorities 2015 – France
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Benchmark your IT spending plans with our in-depth study of IT spending priorities in France.
Posted: 10 Feb 2015 | Published: 10 Feb 2015

ComputerWeekly.com

IT Priorities 2015 – UK
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Benchmark your IT spending plans with our in-depth study of IT spending priorities in the UK.
Posted: 10 Feb 2015 | Published: 10 Feb 2015

ComputerWeekly.com

Recognizing Five Sources of High-Profile Data Security Breaches
sponsored by Mimecast
WHITE PAPER: This white paper discusses the 5 major categories of vulnerabilities that IT and security professionals need to account for in their solutions planning.
Posted: 06 Feb 2015 | Published: 06 Feb 2015

Mimecast

Why Outsourcing CRM Doesn't Mean That You Can Outsource Data Protection
sponsored by BitGlass
WHITE PAPER: This white paper explains why enterprises utilizing cloud applications like Salesforce should consider investing in a cloud access security broker, which restores data protection and visibility to your IT team while respecting user privacy.
Posted: 05 Feb 2015 | Published: 05 Feb 2015

BitGlass

Healthcare Email Management: Balancing Security, Compliance, and Cost
sponsored by Mimecast
WHITE PAPER: This white paper discusses a number of email management challenges facing healthcare CIOs, including HITECH and HIPAA compliance, budget constraints, cloud-based email and collaboration technologies, and data security.
Posted: 17 Dec 2014 | Published: 17 Dec 2014

Mimecast

Multifactor Authentication Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: In this virtual security classroom, Michael Cobb, a renowned security author with over 20 years of experience in the IT industry, surveys the latest authentication methods and technologies coming onto the market.
Posted: 16 Dec 2014 | Premiered: 15 Dec 2014

SearchSecurity.com

Thrive, Survive or Perish - How the New Style of IT Changes Service Delivery
sponsored by Hewlett-Packard Company
VIDEO: View this webcast to learn about the new style of IT and how you can provide improved service delivery. Discover a converged console solution that automates every day maintenance tasks to liberate your admins to pursue innovative and transformative projects.
Posted: 08 Dec 2014 | Premiered: 05 Nov 2014

Hewlett-Packard Company

CIOs' Guide: Endpoint Data Protection for the Mobile World
sponsored by Druva Software
WHITE PAPER: This whitepaper addresses endpoint data protection challenges and offers solutions for meeting requirements.
Posted: 05 Dec 2014 | Published: 30 Nov 2014

Druva Software

Why Every CIO Should Consider Vulnerability Assessment a Necessity
sponsored by IBM
WHITE PAPER: In this resource, CIOs will learn why vulnerability assessment is so essential to enterprise security, and can discover a leading vulnerability assessment platform that scans targeted systems on a scheduled basis in order to increase your understanding of your organization's overall security posture.
Posted: 03 Feb 2015 | Published: 30 Apr 2014

IBM

Cloud Security: Enterprise Point of View
sponsored by Dimension Data
VIRTUAL SEMINAR: Access this webcast today to listen as Darren O'Loughlin, CSO for Dimension Data's global business enabling IT as a Service, shares strategic objectives for securing applications and workloads on an enterprise-class cloud.
Posted: 29 Jan 2015 | Premiered: 26 Nov 2014

Dimension Data
1 - 25 of 196 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement