IT Agents  >   IT Workforce  >   Information Technology Professionals  >  

Information Technology Managers

RSS Feed    Add to Google    Add to My Yahoo!
Information Technology Managers Reports
 
Three Steps to Ensure the Success of Your IT Projects
sponsored by Global Knowledge
WHITE PAPER: In this Global Knowledge white paper, discover how you can head off issues that can de-rail IT projects with 3 overarching considerations, including: stakeholder identification and analysis, effective communication, and one more.
Posted: 10 Feb 2016 | Published: 31 Dec 2015

Global Knowledge

Transformative Business Outcomes Service Management
sponsored by Hewlett-Packard Enterprise
VIDEO: Tune into this brief video to achieve transformative business outcomes with an ITSM that will improve organizational agility, boost business efficiency, and lower ops costs. Watch now to faster realize transformative ideas for the enterprise—and deliver them with greater impact.
Posted: 19 Sep 2016 | Premiered: 31 Dec 2015

Hewlett-Packard Enterprise

Automated Test Data Creation: An IT Manager's Review
sponsored by CA Technologies
VIDEO: Don't let manual data creation bog down IT ops. Tune into this video to discover a test data manager (TDM) that creates data on demand, allowing IT to revolutionize testing. View now to learn how to capture and recreate data models on demand from existing legacy apps with this TDM.
Posted: 09 Sep 2016 | Premiered: 29 Feb 2016

CA Technologies

9 Ways to Migrate IT to a Value Center: Quick Tips for IT Leaders
sponsored by Blue Jeans Network
RESOURCE: Discover 9 surefire ways to transform IT into a value-generating department within your enterprise. Some simple, some challenging, these tips will help you use your IT department to drive growth across your entire enterprise.
Posted: 29 Jun 2016 | Published: 29 Jun 2016

Blue Jeans Network

Skills and sourcing trends for successful IT strategy
sponsored by ComputerWeekly.com
EBOOK: In this presentation from our CW500 event, Louise McCarthy, director of IT transformation at the European Bank of Reconstruction and Development, shares her experiences of overhauling IT sourcing strategy at major private and public sector organisations.
Posted: 19 Apr 2016 | Published: 19 Apr 2016

ComputerWeekly.com

Mortimer Spinks and Computer Weekly Women in IT survey 2016
sponsored by ComputerWeekly.com
EBOOK: The Mortimer Spinks and Computer Weekly Women in Technology Survey 2016 collected data between 16 March 2016 and 11 May 2016 and represents the views of 3,706 technology professionals across 75 countries.
Posted: 23 Jun 2016 | Published: 23 Jun 2016

ComputerWeekly.com

Digitizing IT: IT Leadership for the Next Phase of Digital Transformation
sponsored by SAP/Lenovo/Intel
ANALYST REPORT: Examine the challenges facing, and opportunities presented to, IT leadership in the era of digital transformation. Access this report to prepare your organization for the next phase of digitization, and discover why digital transformation lacks strategic co-ordination and how IT can take an active role.
Posted: 07 Sep 2016 | Published: 07 Sep 2016

SAP/Lenovo/Intel

Why Every CIO Should Consider Vulnerability Assessment a Necessity
sponsored by IBM
WHITE PAPER: In this resource, CIOs will learn why vulnerability assessment is so essential to enterprise security, and can discover a leading vulnerability assessment platform that scans targeted systems on a scheduled basis in order to increase your understanding of your organization's overall security posture.
Posted: 03 Feb 2015 | Published: 30 Apr 2014

IBM

Mobile Cloud Security: What CXOs Need to Know
sponsored by Cisco Systems, Inc.
RESOURCE: This blog post discusses the need for end-to-end security in a mobile cloud environment.
Posted: 27 Nov 2014 | Published: 28 Nov 2014

Cisco Systems, Inc.

HP Security Cyber Risk Report
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This HP Security Cyber Risk Report provides industry-wide data on vulnerabilities in software, mobile, and web applications; examines how specific technologies like iOS, Android, and JAVA contribute to the attack surface; and more.
Posted: 19 Nov 2014 | Published: 31 Jan 2014

Hewlett Packard Enterprise
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement