Business of Information Technology  >   Business Management  >   Financial Management  >   Budgeting  >  

IT Spending

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Spending, Information Technology Spending, IT Budgeting and Spending
DEFINITION: What is expended for any type of resources in IT.
IT Spending Reports
1 - 25 of 193 Matches Previous Page  |  Next Page
Tivoli Workload Automation with Cloud: Automating Complex Applications and Worloads in the Cloud
sponsored by IBM
WHITE PAPER: Read this research report to learn how automating complex applications and workloads in the cloud can drive down costs and improve efficiency, productivity and usability.
Posted: 06 Jul 2015 | Published: 30 Apr 2013

IBM

Improve IT Agility and Efficiency: Analytics Deliver New Insights into Operational Big Data
sponsored by IBM
WHITE PAPER: In this white paper discover how IBM's IT analytics strategy stacks up to the research presented by EMA. Access now to learn why EMA remains optimistic that Netcool Operations Insight is the next step in a continuing set of leadership moves by the company.
Posted: 06 Jul 2015 | Published: 28 Feb 2014

IBM

How to Enable the Private Cloud and Disable Shadow IT
sponsored by Solidfire
WHITE PAPER: This white paper explores an IT as a Service (ITaaS) solution that enables the private cloud and disables shadow IT, allowing developers more room for innovation and project growth.
Posted: 16 Jun 2015 | Published: 17 Mar 2015

Solidfire

Modern Application Integration on Legacy Systems
sponsored by Open Legacy
WHITE PAPER: This white paper introduces an approach to application integration that merges legacy systems with modern IT needs.
Posted: 29 May 2015 | Published: 29 May 2015

Open Legacy

Gartner PPM & IT Governance Summit 2015
sponsored by Gartner
BROCHURE: To learn how you can adjust to the changing PPM and IT environment access this summit brochure.
Posted: 28 May 2015 | Published: 28 May 2015

Gartner

WaaS offers the ability to effectively and securely manage all end users, their devices, compliant workloads and more
sponsored by Matrix42
WHITE PAPER: This white paper provides evaluation criteria for workspace aggregators. Read now to learn how to effectively and securely manage all end users, their devices, compliant workloads, and more.
Posted: 26 May 2015 | Published: 26 May 2015

Matrix42

The cost of IT downtime calculator
sponsored by Databarracks
RESOURCE: View this resource to learn how you can improve the standard of business continuity planning around individual systems, and why investing in disaster recovery technologies is critical to protect your business.
Posted: 23 Apr 2015 | Published: 23 Apr 2015

Databarracks

How to Write a Compelling IT Budget Application
sponsored by Welldata
WHITE PAPER: This concise overview reveals a real-world example of how one IT manager was able to get his budget approved in just one day after weeks of failed attempts to convince his company's C-suite to approve additional funds.
Posted: 09 Apr 2015 | Published: 03 Apr 2015

Welldata

Generate ROI with IT and Business Intelligence
sponsored by Information Builders
WHITE PAPER: Access this informative white paper to learn how businesses are rethinking the IT infrastructure. Gain insights into strategies that significantly reduce costs and complexity of new initiatives by leveraging Business Intelligence (BI) platforms with IT expertise.
Posted: 08 Apr 2015 | Published: 30 Apr 2012

Information Builders

Staying the course as a CIO
sponsored by ComputerWeekly.com
BOOK: In this extract from his book, Staying the Course as a CIO, Jonathan M. Mitchell looks at the challenges of managing IT projects.
Posted: 27 Mar 2015 | Published: 27 Mar 2015

ComputerWeekly.com

Tech Trends 2015
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Deloitte's sixth Annual Tech Trends Report reveals the top macro technology developments that will disrupt businesses in the next 18-24 months.
Posted: 16 Mar 2015 | Published: 16 Mar 2015

ComputerWeekly.com

Tech Insights: The UK Digital Economy
sponsored by ComputerWeekly.com
RESEARCH CONTENT: The number of tech enterprises in the UK grew by 8% in the past 12 months, double the rate of industry as a whole, contributing more than £90bn to the UK economy, according to this report by the Tech Partnership.
Posted: 10 Mar 2015 | Published: 10 Mar 2015

ComputerWeekly.com

Avoid Paying Today for Systems You’ll Need Tomorrow
sponsored by HP India
WHITE PAPER: This white paper examines a flexible investment strategy IT strategy that can eliminate the need to front-load IT investments by aligning usage with payments.
Posted: 23 Feb 2015 | Published: 23 Feb 2015

HP India

The economy in 2015
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Deloitte chief economist Ian Stewart charts the prospects for the economy in 2015 in this presentation for the CW500 Club.
Posted: 20 Feb 2015 | Published: 20 Feb 2015

ComputerWeekly.com

Defending Against Rogue Users, Devices, and Applications
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: This white paper explains how NAC technologies help to ensure that only appropriate users, devices, and applications have access to your network resources, enabling you to support your users in a secure, efficient way.
Posted: 17 Feb 2015 | Published: 29 Aug 2014

ForeScout Technologies, Inc.

Enterprise Gamification: Playing to win
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Enterprise gamification is becoming increasingly important to delivering true business transformation, according to this report from Capgemini.
Posted: 11 Feb 2015 | Published: 11 Feb 2015

ComputerWeekly.com

IT Priorities 2015 – Germany, Austria & Switzerland
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Benchmark your IT spending plans, with our in-depth study of IT spending priorities in Germany, Austria & Switzerland.
Posted: 11 Feb 2015 | Published: 11 Feb 2015

ComputerWeekly.com

IT Priorities 2015 – France
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Benchmark your IT spending plans with our in-depth study of IT spending priorities in France.
Posted: 10 Feb 2015 | Published: 10 Feb 2015

ComputerWeekly.com

IT Priorities 2015 – UK
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Benchmark your IT spending plans with our in-depth study of IT spending priorities in the UK.
Posted: 10 Feb 2015 | Published: 10 Feb 2015

ComputerWeekly.com

Recognizing Five Sources of High-Profile Data Security Breaches
sponsored by Mimecast
WHITE PAPER: This white paper discusses the 5 major categories of vulnerabilities that IT and security professionals need to account for in their solutions planning.
Posted: 06 Feb 2015 | Published: 06 Feb 2015

Mimecast

Securing Microsoft Exchange 2010 with Symantec™ SSL Certificates
sponsored by Symantec Corporation
WHITE PAPER: This guide will help you take the guesswork out of implementing SSL for Exchange 2010, making it easier than ever to get the SSL certificate you need for a successful and secure Exchange implementation, and to take advantage of powerful capabilities such as Subject Alternative Names (SANs).
Posted: 12 Jan 2015 | Published: 02 Jul 2014

Symantec Corporation

Beginner's Guide to SSL Certificates: Making the Best Choice When Considering Your Online Security Options
sponsored by Symantec Corporation
WHITE PAPER: This helpful guide explains how the effective implementation of SSL certificates is critical to protecting your customers, earning their trust, and ensuring your success when it comes to conducting business online.
Posted: 08 Jan 2015 | Published: 10 Jun 2013

Symantec Corporation

Healthcare Email Management: Balancing Security, Compliance, and Cost
sponsored by Mimecast
WHITE PAPER: This white paper discusses a number of email management challenges facing healthcare CIOs, including HITECH and HIPAA compliance, budget constraints, cloud-based email and collaboration technologies, and data security.
Posted: 17 Dec 2014 | Published: 17 Dec 2014

Mimecast

Why Every CIO Should Consider Vulnerability Assessment a Necessity
sponsored by IBM
WHITE PAPER: In this resource, CIOs will learn why vulnerability assessment is so essential to enterprise security, and can discover a leading vulnerability assessment platform that scans targeted systems on a scheduled basis in order to increase your understanding of your organization's overall security posture.
Posted: 03 Feb 2015 | Published: 30 Apr 2014

IBM

Cloud Security: Enterprise Point of View
sponsored by Dimension Data
VIRTUAL SEMINAR: Access this webcast today to listen as Darren O'Loughlin, CSO for Dimension Data's global business enabling IT as a Service, shares strategic objectives for securing applications and workloads on an enterprise-class cloud.
Posted: 29 Jan 2015 | Premiered: 26 Nov 2014

Dimension Data
1 - 25 of 193 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement