Business of Information Technology  >   Business Management  >   Best Practices  >  

IT Technology Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
IT Technology Best PracticesReports
 
Update Your Application Security Policy After Heartbleed
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Michael Cobb explains why relying solely on other parties to correctly implement and deliver software security can put enterprise and customer data at risk.
Posted: 25 Nov 2014 | Published: 25 Nov 2014

Hewlett-Packard Company

The New Style of IT
sponsored by Hewlett-Packard Company
WEBCAST: This short webcast highlights some of the biggest technologies that are affecting businesses today, and what they mean for the role of IT.
Posted: 17 Jan 2014 | Premiered: Jan 17, 2014

Hewlett-Packard Company

10 Things Every IT Manager Must Know About the Enemy Within
sponsored by Clearswift
WHITE PAPER: This white paper contains critical information on where insider threats originate and explores one company's innovative tools for preventing data breaches within your enterprise.
Posted: 16 Oct 2014 | Published: 16 Oct 2014

Clearswift

Which CIO Wins in an M&A? It’s a Roll of the Dice
sponsored by Hewlett-Packard Company
WHITE PAPER: Read on to gain critical insight from industry strategic management leader Philippe Haspeslagh on achieving balance after a merger and acquisition, which are often costly and complex.
Posted: 07 Feb 2014 | Published: 03 Jul 2013

Hewlett-Packard Company

Protecting Your Critical Data with Integrated Security Intelligence
sponsored by IBM
WHITE PAPER: Access this white paper to gain actionable insights that can help you reduce security risks and boost compliance.
Posted: 08 Oct 2014 | Published: 30 Apr 2013

IBM

Disrupt IT:  A new model for IT in the digital age
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Ian Cox, specialist in digital transformation and IT leadership, assesses the impact of digital technology on the role of the CIO.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

ComputerWeekly.com

Banco Galicia Plans its Global Future with the Help of IBM and SAP
sponsored by IBM
CASE STUDY: In this case study you will learn how one of Argentina's top three private banks deployed this infrastructure and was able to develop and launch new banking and financial products much faster, helping the bank to win new customers from private and corporate banks and improve its competitiveness.
Posted: 24 Jul 2014 | Published: 30 Jun 2013

IBM

It's Time to Mothball Traditional ITSM Approaches
sponsored by Pangea Systems
EGUIDE: In the following expert e-guide from SearchCIO.com, learn how ITSM needs to evolve in order to remain business-aligned, operationally controlled and cost-effective.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

Pangea Systems

Cloud Migration: A Security Architect Case Study
sponsored by CenturyLink Technology Solutions
WHITE PAPER: This use case describes CenturyLink's partnership with a global shipping and logistics firm looking to adopt cloud technologies to lower IT support costs and refocus its resources.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

CenturyLink Technology Solutions

Health IT University: PACS Best Practices- Image Sharing and Interoperability
sponsored by SearchHealthIT.com
VIRTUAL ENVIRONMENT: What does it take to integrate PACS with a central RIS for more effective diagnoses – and then extending those imaging systems to the EHR? Experts offer tips for integrating archiving systems with EHRs and patient portals in order to meet meaningful use requirements.
Posted: 09 Jan 2014 | Premiered: 09 Jan 2014

SearchHealthIT.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement