Business of Information Technology  >   Business Management  >   Financial Management  >   Budgeting  >  

IT Spending

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Spending, Information Technology Spending, IT Budgeting and Spending
DEFINITION: What is expended for any type of resources in IT.
IT Spending Reports
26 - 50 of 207 Matches Previous Page  |  Next Page
Unload the Burden of Legacy Infrastructure
sponsored by Red Hat
WHITE PAPER: In the following web book, learn what it takes to reduce infrastructure operational expenses. Read on to learn how you can significantly improve IT efficiency to give way to smaller budget allocation and ultimately, make monetary room for innovation.
Posted: 14 Jan 2016 | Published: 14 Jan 2016

Red Hat

CEB IT Budget Benchmark 2015 to 2016
sponsored by
RESEARCH CONTENT: Corporate IT budgets are expected to grow by just 2.0% in the coming year, with budgets for 'keeping the lights on' expected to surpass capital spending for the first time since 2009, this report from CEB reveals.
Posted: 15 Dec 2015 | Published: 15 Dec 2015

Infographic: The IT Capacity Dilemma
sponsored by Hewlett Packard Enterprise
WHITE PAPER: In this infographic, ask these 4 quick questions to determine if you're facing an IT capacity dilemma. Plus, read on to learn about a cloud strategy that can ensure you never run out of capacity, only pay for capacity you use, and more.
Posted: 01 Dec 2015 | Published: 01 Dec 2015

Hewlett Packard Enterprise

Architecting the Composable Enterprise
sponsored by MuleSoft
WHITE PAPER: This whitepaper dives into the world of composable IT, or the concept of modular, restructurable infrastructure. Access now to see how companies that leverage this mentality are keeping ahead of trends while remaining profitable, and what challenges they are facing.
Posted: 05 Nov 2015 | Published: 05 Nov 2015


IT Without Boundaries: Choosing Between Conventional or Agile IT?
sponsored by Red Hat
WHITE PAPER: Why should you have to choose between conventional and agile IT? News just in: you don't have to anymore. This white paper explains how organizations can operate more efficiently and become more agile at the same time. Access this research to see how you can balance conventional and agile IT.
Posted: 27 Aug 2015 | Published: 27 Aug 2015

Red Hat

Financing IT change
sponsored by
ANALYST REPORT: Companies that are embarking on big IT strategies have to seek out robust stable partners with the commitment to offer finance packages that will underpin and support the strategy to completion, argue analysts Rob Bamford and Clive Longbottom.
Posted: 11 Aug 2015 | Published: 11 Aug 2015

Generate ROI with IT and Business Intelligence
sponsored by Information Builders
WHITE PAPER: Access this informative white paper to learn how businesses are rethinking the IT infrastructure. Gain insights into strategies that significantly reduce costs and complexity of new initiatives by leveraging Business Intelligence (BI) platforms with IT expertise.
Posted: 08 Apr 2015 | Published: 30 Apr 2012

Information Builders

Staying the course as a CIO
sponsored by
BOOK: In this extract from his book, Staying the Course as a CIO, Jonathan M. Mitchell looks at the challenges of managing IT projects.
Posted: 27 Mar 2015 | Published: 27 Mar 2015

Tech Trends 2015
sponsored by
ESSENTIAL GUIDE: Deloitte's sixth Annual Tech Trends Report reveals the top macro technology developments that will disrupt businesses in the next 18-24 months.
Posted: 16 Mar 2015 | Published: 16 Mar 2015

Tech Insights: The UK Digital Economy
sponsored by
RESEARCH CONTENT: The number of tech enterprises in the UK grew by 8% in the past 12 months, double the rate of industry as a whole, contributing more than £90bn to the UK economy, according to this report by the Tech Partnership.
Posted: 10 Mar 2015 | Published: 10 Mar 2015

The economy in 2015
sponsored by
RESEARCH CONTENT: Deloitte chief economist Ian Stewart charts the prospects for the economy in 2015 in this presentation for the CW500 Club.
Posted: 20 Feb 2015 | Published: 20 Feb 2015

Enterprise Gamification: Playing to win
sponsored by
ESSENTIAL GUIDE: Enterprise gamification is becoming increasingly important to delivering true business transformation, according to this report from Capgemini.
Posted: 11 Feb 2015 | Published: 11 Feb 2015

IT Priorities 2015 – Germany, Austria & Switzerland
sponsored by
RESEARCH CONTENT: Benchmark your IT spending plans, with our in-depth study of IT spending priorities in Germany, Austria & Switzerland.
Posted: 11 Feb 2015 | Published: 11 Feb 2015

IT Priorities 2015 – France
sponsored by
RESEARCH CONTENT: Benchmark your IT spending plans with our in-depth study of IT spending priorities in France.
Posted: 10 Feb 2015 | Published: 10 Feb 2015

IT Priorities 2015 – UK
sponsored by
RESEARCH CONTENT: Benchmark your IT spending plans with our in-depth study of IT spending priorities in the UK.
Posted: 10 Feb 2015 | Published: 10 Feb 2015

Recognizing Five Sources of High-Profile Data Security Breaches
sponsored by Mimecast
WHITE PAPER: This white paper discusses the 5 major categories of vulnerabilities that IT and security professionals need to account for in their solutions planning.
Posted: 06 Feb 2015 | Published: 06 Feb 2015


Deloitte CIO Survey 2014
sponsored by
RESEARCH CONTENT: Deloitte's second global CIO survey assesses CIO's role in innovation, spending and technology priorities, and their relationship with the business.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

How Aligning the Cloud with Business Needs Drives Success
sponsored by Dell EMC and Microsoft
PRODUCT OVERVIEW: This solution brief provides a quick look into a hybrid cloud system that works to closely align the cloud with your business needs in order to drive success.
Posted: 11 Jan 2016 | Published: 31 Dec 2015

Dell EMC and Microsoft

Why Every CIO Should Consider Vulnerability Assessment a Necessity
sponsored by IBM
WHITE PAPER: In this resource, CIOs will learn why vulnerability assessment is so essential to enterprise security, and can discover a leading vulnerability assessment platform that scans targeted systems on a scheduled basis in order to increase your understanding of your organization's overall security posture.
Posted: 03 Feb 2015 | Published: 30 Apr 2014


Cloud Security: Enterprise Point of View
sponsored by Dimension Data
VIRTUAL SEMINAR: Access this webcast today to listen as Darren O'Loughlin, CSO for Dimension Data's global business enabling IT as a Service, shares strategic objectives for securing applications and workloads on an enterprise-class cloud.
Posted: 29 Jan 2015 | Premiered: 26 Nov 2014

Dimension Data

Beginner's Guide to SSL Certificates: Making the Best Choice When Considering Your Online Security Options
sponsored by Symantec Website Security Solutions
WHITE PAPER: This helpful guide explains how the effective implementation of SSL certificates is critical to protecting your customers, earning their trust, and ensuring your success when it comes to conducting business online.
Posted: 08 Jan 2015 | Published: 10 Jun 2013

Symantec Website Security Solutions

Rethinking People Costs in Enterprise IT
sponsored by Rackspace
WHITE PAPER: This white paper explores how to assess your IT people spend and position IT as a central driver of business growth.
Posted: 15 Oct 2014 | Published: 12 Aug 2014


SaaS Takes Center Stage in 2014
sponsored by IBM
WHITE PAPER: Learn how subscription-based business applications are expected to make an even bigger impact in 2014 and beyond in this informative infographic.
Posted: 02 Oct 2014 | Published: 29 Jul 2013


Top Enterprise IT Spending Trends and Priorities
sponsored by SearchCIO
EBOOK: In this visual PhotoStory, examine some of the highlights of TechTarget's annual IT Priorities Survey including how 2014 IT budgets are expected to differ from 2013 budgets.
Posted: 27 Aug 2014 | Published: 27 Aug 2014


Enterprise Information Security in Transition
sponsored by IBM
WHITE PAPER: This white paper boils the reasons behind current issues in the information security field down into four major causes, and also lays out a list of specific, detailed changes that need to be made to the enterprise security model for these core issues to be resolved.
Posted: 28 Jul 2014 | Published: 31 Oct 2012

26 - 50 of 207 Matches Previous Page    1 2 3 4 5    Next Page
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement