IT Management  >   Systems Operations  >   Security  >  

National Security

RSS Feed    Add to Google    Add to My Yahoo!
National Security Reports
 
MapXTreme Java Edition Data Sheet
sponsored by Pitney Bowes Business Insight
DATA SHEET: MapXtreme Java is a 100% Java mapping engine designed to enable the use of location intelligence on the desktop, over the internet or through your organization intranet or extranet.
Posted: 17 Mar 2008 | Published: 01 Jan 2007

Pitney Bowes Business Insight

IT Without Boundaries: Choosing Between Conventional or Agile IT?
sponsored by Red Hat
WHITE PAPER: Why should you have to choose between conventional and agile IT? News just in: you don't have to anymore. This white paper explains how organizations can operate more efficiently and become more agile at the same time. Access this research to see how you can balance conventional and agile IT.
Posted: 27 Aug 2015 | Published: 27 Aug 2015

Red Hat

How Blueshore Financial Pioneered and Dominated a New Financial Market Segment with IT Services
sponsored by Hewlett-Packard Limited
CASE STUDY: In the following case study, learn how BlueShore Financial used adaptive HP technology and services to create and then dominate a new financial services market niche.
Posted: 26 Aug 2015 | Published: 26 Aug 2015

Hewlett-Packard Limited

Don’t Build a House of Cards The 5 Pillars of Project Portfolio Management
sponsored by Innotas
WHITE PAPER: This white paper discusses the five critical pillars of project portfolio management and how you should think about each of aspect.
Posted: 28 Aug 2015 | Published: 28 Aug 2015

Innotas

Is Your ITSM Keeping Up With The Business?
sponsored by ServiceNow
WHITE PAPER: This white paper explores how consolidation, automation, and self-service can simplify and transform your ITSM practices to align with strategic business objectives.
Posted: 03 Sep 2015 | Published: 03 Sep 2015

ServiceNow

How-to-Guide: Lenovo Solutions for creating connected government
sponsored by Lenovo and Microsoft
WHITE PAPER: Download this how-to guide, sponsored by Lenovo® and Microsoft, and learn how to empower your government employees with higher productivity, greater data utilization, and a stronger IT infrastructure.
Posted: 26 Aug 2015 | Published: 26 Aug 2015

Lenovo and Microsoft

What Canadian Businesses Stand to Lose from Cybercrime
sponsored by IBM
WHITE PAPER: In this report, data from businesses all over Canada is analyzed to reveal how much your organization stands to lose if breached.
Posted: 04 Sep 2015 | Published: 31 May 2015

IBM

IT Case Study: Overtake Medical Center Enhances Healthcare Applications
sponsored by F5 Networks
WHITE PAPER: This white paper serves as a case study of Overlake Medical Center, and outlines how to provide secure remote access to all enterprise applications and network resources for healthcare facilities, as well as how to manage these apps with a small IT team.
Posted: 28 Aug 2015 | Published: 28 Aug 2015

F5 Networks

Improve IT Agility and Efficiency: An Analysis of Large Data Brings Fresh Insights into Operation
sponsored by IBM
WHITE PAPER: In this white paper, you'll uncover how real-time, historical, and embedded search analytics are helping IT pinpoint massive amounts of data to find and resolve problems faster.
Posted: 28 Aug 2015 | Published: 28 Feb 2014

IBM

How awareness computing is changing healthcare IT
sponsored by Aventura
VIDEO: Access this video to learn how custom desktops can improve speed of access and security at the point of care, and allow clinicians to spend more time with their patients.
Posted: 28 Aug 2015 | Premiered: 30 Apr 2015

Aventura
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement