Business of Information Technology  >   Business Environment  >   Legal Environment  >  

Online Censorship

RSS Feed    Add to Google    Add to My Yahoo!
Online Censorship Reports
 
Accenture Technology Vision 2016
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Leading companies that develop a people first approach will win in today's digital economy, according to the latest global technology trends report from Accenture.
Posted: 04 Feb 2016 | Published: 04 Feb 2016

ComputerWeekly.com

European IT Law Briefing: Recruitment and social media
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Four leading European law firms help you navigate the legal maze when using social media for recruitment in France, Germany, UK and Italy.
Posted: 20 May 2013 | Published: 20 May 2013

ComputerWeekly.com

Storage strategies for the health IT professional
sponsored by EMC Isilon
PRESENTATION TRANSCRIPT: In this presentation transcript, Marc Staimer, president of Dragon Slayer Consulting, describes the basics of tiered storage architecture and demonstrates how health care organizations can set policies to automate the process of moving data to different tiers.
Posted: 31 Aug 2012 | Published: 31 Aug 2012

EMC Isilon

Bringing BI to the Masses
sponsored by SearchCIO.com
EZINE: This issue of Enterprise CIO Decisions E-Zine highlights several success stories showcasing how today's IT leaders are finding enough success to increase BI investments and, ultimately, putting their data growth management concerns to rest.
Posted: 25 Apr 2012 | Published: 24 Apr 2012

SearchCIO.com

CIO Decisions E-Zine: PPM: Validating the Value of IT
sponsored by SearchCIO.com
EZINE: This e-zine breaks down how PPM tools and best practices simplified project management and justified IT project service delivery and costs.
Posted: 02 Apr 2013 | Published: 02 Apr 2013

SearchCIO.com

Workgroup Connections Notes eDiscovery
sponsored by Workgroup Connections, An IBM Partner
PRODUCT OVERVIEW: This comprehensive offering provides an immediate and long-term solution that helps companies apply cost-saving best practices, reduce risk and improve the management of their eDiscovery efforts.
Posted: 19 Mar 2009 | Published: 19 Mar 2009

Workgroup Connections, An IBM Partner

How to Use the Six Laws of Persuasion during a Negotiation
sponsored by Global Knowledge
WHITE PAPER: Discover the Six Laws of Persuasion and learn how to use them to conduct more effective negotiations.
Posted: 10 Dec 2008 | Published: 01 Oct 2006

Global Knowledge

Building an ESB without Limits
sponsored by IBM Software Group
WHITE PAPER: This white paper dives deeper into the area, to answer why you need one in an SOA, and what the ESB will do for you.
Posted: 05 Dec 2007 | Published: 01 May 2007

IBM Software Group

EMA Analyst Report: Enabling Real-World Business Transformation through IBM Service Management
sponsored by IBM
INFORMATION CENTER: Visit this information center and find out how smarter technology can result in gains in efficiency, business alignment and risk management strategies.
Posted: 05 Oct 2009 | Published: 01 Oct 2009

IBM

From Fear to Value: CIO strategies for propelling business through the economic crisis
sponsored by IBM
WHITE PAPER: Your aspiration: As a CIO, drive change, innovation and efficiency to help build a smarter enterprise that will prosper amidst global competition. Your daily challenge: As a CIO, deliver business results faster and better–with less. This whitepaper outlines key strategies for CIOs to drive business results through the economic crisis.
Posted: 18 Jun 2010 | Published: 17 Mar 2009

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement