Business of Information Technology  >   Business Management  >   Best Practices  >  

Information Technology Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Information Technology Best PracticesReports
 
It's Time to Mothball Traditional ITSM Approaches
sponsored by Pangea Systems
EGUIDE: In the following expert e-guide from SearchCIO.com, learn how ITSM needs to evolve in order to remain business-aligned, operationally controlled and cost-effective.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

Pangea Systems

UKTech50: The senior IT event of the year
sponsored by ComputerWeekly.com
EVENT: UKTech50 returns in 2014 for its 5th annual event, highlighting the successes of individuals within UK IT. With a combination of fantastic speakers and the countdown of the top 50, this event never fails to please.
Posted: 18 Nov 2014 | Published: 17 Nov 2014

ComputerWeekly.com

Cloud Migration: A Security Architect Case Study
sponsored by CenturyLink Technology Solutions
WHITE PAPER: This use case describes CenturyLink's partnership with a global shipping and logistics firm looking to adopt cloud technologies to lower IT support costs and refocus its resources.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

CenturyLink Technology Solutions

Monitor and Protect Critical Web Applications with a Web Application Firewall
sponsored by Imperva
VIDEO: While the growth of business applications has grown, corporate resources have become more exposed to security threats. This resource takes a look at the growing risk of application attacks via SQL injection.
Posted: 19 Feb 2014 | Premiered: 19 Feb 2014

Imperva

Great Customer Service Takes off at WestJet
sponsored by IBM
VIDEO: Learn why WestJet turned to IBM Security Identity and Access Management to gain a better understanding of its guests.
Posted: 09 Oct 2014 | Premiered: 24 Oct 2013

IBM

How HPA improved IT value and facilitated maximum growth
sponsored by Cisco & Fujitsu
VIDEO: Hutchison Ports Australia is developing new facilities at Brisbane and expects that when fully operational, these facilities will increase capacity by almost 100 per cent, providing importers, exporters and shipping lines with more choice and better service. View this video to see how Fujitsu is helping them achieve these goals.
Posted: 24 Oct 2014 | Premiered: 24 Oct 2014

Cisco & Fujitsu

The Top 5 Security Challenges of Higher Education
sponsored by Tenable Network Security
WHITE PAPER: This informative white paper discusses how in addition to the same IT security challenges as commercial enterprises, universities face a number of difficulties that are entirely unique to higher education.
Posted: 24 Oct 2014 | Published: 24 Oct 2014

Tenable Network Security

A Flexible, Scalable MSP Platform
sponsored by IBM
WHITE PAPER: This informative case study explores the role of the cloud in their IT infrastructure – outlining the benefits of its implementation.
Posted: 06 Jun 2014 | Published: 31 Dec 2013

IBM

Top 5 IT Benefits of the Next-Generation Workplace
sponsored by Aruba Networks
WHITE PAPER: This guide explores 5 top IT benefits of the next-generation workplace and how with the right network tools in place, you can reap the maximum benefits of mobility.
Posted: 14 Apr 2014 | Published: 31 Dec 2013

Aruba Networks

Transformative Service Management - Reinventing Service Management for the New Style of IT
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper details the changes that have transformed IT and how they should be viewed as an opportunity for the department to reassert its value.
Posted: 26 Nov 2013 | Published: 22 Oct 2013

Hewlett-Packard Company
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement