Product Data Management

RSS Feed    Add to Google    Add to My Yahoo!
Product Data Management Reports
25 Matches
CW Special report on Wipro
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 5 page special report from Computer Weekly gives you the facts on Wipro, its strategy, products and services and financial performance.
Posted: 23 Nov 2012 | Published: 23 Nov 2012

ComputerWeekly.com

Controlling In-Vehicle Innovation with IVI Design
sponsored by IBM
WHITE PAPER: In this white paper, in-vehicle infotainment systems are revealed as one of the primary focal points for next generation automotive differentiation. Learn how as these systems become increasingly complex, deeper insight across system development and deployment lifecycles will be needed to maximize efficiency gains and organizational agility.
Posted: 08 May 2014 | Published: 08 May 2014

IBM

CW Special report on Atos
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 9 page special report, updated for 2014, gives you the facts on Atos, its strategy, products and services and financial performance.
Posted: 01 May 2014 | Published: 05 May 2014

ComputerWeekly.com

Strategies to Capture Greater Value from Systems Engineering
sponsored by IBM
WHITE PAPER: Access this helpful white paper to learn how you can capture greater value from systems engineering by embracing a more holistic approach to manage complexity in both product and process.
Posted: 11 Nov 2013 | Published: 11 Nov 2013

IBM

Three imperatives for advancing product and systems development
sponsored by IBM
WHITE PAPER: Delivering increasingly complex and smarter products in less time and at a lower cost requires new strategies and development techniques. Consult this insightful resource to learn how a "systems thinking" approach facilitates consideration of the functional dependencies and interconnections necessary to produce high quality, "smarter" products.
Posted: 06 Nov 2013 | Published: 31 May 2013

IBM

Information Security Breaches Survey 2013
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Security breaches cost large businesses an average of £850,000, the 2013 Information Security Breaches Survey reveals.
Posted: 29 Apr 2013 | Published: 29 Apr 2013

ComputerWeekly.com

IT Priorities 2014: UK Europe, France and Germany
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Benchmark your IT spending plans, with our in-depth study of IT spending priorities in the UK, France, Germany, and Europe in 2014.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

TOPICS:  Application Development | Backup for Virtualized Servers | Backup Server Hardware | Backup Software | Backups | Budgeting | Business Continuity Planning | Business Intelligence | Business Process Automation | Business Process Management | Cloud Archive | Cloud Backup | Cloud Computing | Cloud CRM | Cloud Disaster Recovery | Cloud Management | Cloud Security | Cloud Storage | Cloud Storage Services | Cloud Storage Strategy | Compliance Best Practices | CRM | CRM Software | Data Analytics | Data Center Consolidation | Data Center Networking | Data Centers | Data Deduplication | Data Loss Prevention (DLP) | Database Management Software | Desktop Virtualization | Disaster Recovery | ERP | ERP Software | Ethernet Networks | Green Data Center | Green Storage | Hardware | Hybrid clouds | Identity Management | Infrastructure as a Service (IaaS) | ITIL | Mobile CRM | Mobile Device Management | Mobile Device Management Software | Mobile Middleware | Mobile Payments | Mobile Workers | NAS | NAS Software | Network Appliances | Network Architectures | Network Configuration Management | Network Infrastructure | Network Management | Network Monitoring Software | Network Operating Systems | Network Performance Management Software | Network Processors | Network Provisioning | Network Security | Network Security Appliances | Network Security Hardware | Network Security Software | Networking | Networking Hardware | Office Suites | Outsourcing | Platform as a service | Private Cloud | Public Cloud | Remote Access Hardware | Risk Assessment | Risk Management | Security | Security Architectures | Security Audits | Security Best Practices | Security Event Management | Security Hardware | Security Industry | Security Infrastructure | Security Management | Security Managers | Security Policies | Security Software | Security Spending | Security Standards | Security Systems | Security Threats | Security Tokens | Server Appliances | Server Consolidation | Server Hardware | Server Provisioning | Server Software | Server Virtualization | Smart Phones | Social Computing | Software | Software as a Service | Software Implementation | Software Virtualization | Storage Appliances | Storage Architectures | Storage Consolidation | Storage Devices | Storage for File Virtualization/NAS Virtualization | Storage for Virtualized Servers | Storage Hardware | Storage Management | Storage Management Services | Storage Management Software | Storage Media | Storage Resource Management Software | Storage Security | Storage Spending | Storage Switches | Storage Systems | Storage Virtualization | Storage Virtualization Software | Supply Chain Software | Tablet PC | Tape Backups | Testing | Video Services | Videoconferencing Hardware | Videoconferencing Services | Videoconferencing Software | Virtual Desktop Infrastructure | Virtual Machine | Virtualization Security | Vulnerability Management | WAN | WAN Hardware | WAN Switches | WAN Switching | Windows | Windows 7 | Windows Server Software | Windows XP | WLAN | Workforce Management Software
ComputerWeekly.com

Own and Manage Your Encryption Keys
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper discusses the importance of data encryption, the vulnerabilities of third-party encryption, the necessity of encryption key ownership, and how all of it affects the security of your company's data stored in the cloud.
Posted: 29 Jan 2015 | Published: 06 Nov 2014

SafeNet, Inc.

Sap business suite now available on Sap Hana
sponsored by ComputerWeekly.com
ANALYST REPORT: This analyst report from Nucleus Research assess the impact of SAPs decision to power SAP Business Suite by its SAP HANA in memory database technology.
Posted: 01 Feb 2013 | Published: 01 Feb 2013

ComputerWeekly.com

Assess Database Vulnerabilities and Eliminate Risk
sponsored by IBM
VIDEO: This video introduces a vulnerability assessment solution that utilizes in-depth evaluations to examine patch levels and database configurations, highlighting vulnerabilities in your environment so you can quickly remediate problems and safeguard your critical data.
Posted: 30 Jan 2015 | Premiered: 11 Nov 2014

IBM

Network Purchasing Intentions 2013
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This exclusive Computer Weekly/TechTarget research ,based on a survey of over 400 European IT professionals, reveals organisations’ investment plans for networking technology.
Posted: 02 Dec 2013 | Published: 02 Dec 2013

ComputerWeekly.com

Hardware Security Module (HSM) Product Brief
sponsored by SafeNet, Inc.
PRODUCT OVERVIEW: This white paper introduces SafeNet's Luna SA, made for enterprises requiring strong cryptographic security for paper-to-digital initiatives, digital signatures, DNSSEC, hardware key storage, transactional acceleration, certificate signing, code or document signing, bulk key generation, data encryption, and more.
Posted: 15 Dec 2014 | Published: 09 Apr 2013

SafeNet, Inc.

Simplifying Your Healthcare IT Needs
sponsored by CommVault
VIDEO: Learn about a leading data management solution that will enable you to protect, access and manage healthcare data simply.
Posted: 10 Sep 2014 | Premiered: 19 Dec 2013

CommVault

A Smarter Approach to Network Encryption
sponsored by Certes Networks
WHITE PAPER: This white paper explores how enterprises can make network encryption easier to set up and manage, as well as transparent to network and application performance and behavior.
Posted: 09 Jan 2015 | Published: 16 Dec 2014

Certes Networks

CW Special report on Capgemini
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 8 page special report from Computer Weekly offers a critical assessment of Capgemini, its strategy, products and services and financial performance. Packed with graphs and charts it is essential reading for anyone thinking of working with Capgemini.
Posted: 24 Aug 2012 | Published: 24 Aug 2012

ComputerWeekly.com

Top 5 Facts to Know About Data Protection from SafeNet
sponsored by SafeNet, Inc.
WHITE PAPER: This infographic showcases 5 facts about SafeNet, a leading provider of data protection solutions. View now to learn about the protection that SafeNet could bring to your organization's sensitive data.
Posted: 15 Dec 2014 | Published: 15 Dec 2014

SafeNet, Inc.

The Cloud Is More Secure Than Traditional IT Systems - Here's Why
sponsored by Dimension Data
EGUIDE: This expert guide explains why when it comes to cloud security, the physical location of your data matters less than the means of access.
Posted: 06 Jan 2015 | Published: 06 Jan 2015

Dimension Data

A Prescription for Privacy
sponsored by Symantec Corporation
WHITE PAPER: This white paper examines the challenges surrounding the emerging world of EHR technology, including the requirements that govern the protection of confidential patient data online; the measures that organizations need to take right now to prepare for these upcoming changes to the healthcare industry; and more.
Posted: 14 Jan 2015 | Published: 28 Feb 2014

Symantec Corporation

Big Data, Big Sales: Effective Data Management for Retailers
sponsored by Hortonworks
WHITE PAPER: Read this whitepaper to discover how retail businesses effectively store, manage, and analyze their data.
Posted: 22 Jan 2015 | Published: 30 Sep 2014

Hortonworks

Transforming Healthcare Data Management with Simpana Software
sponsored by CommVault
RESOURCE: Learn about the only holistic approach to data and information management that is capable of protecting and recovering your healthcare data.
Posted: 10 Sep 2014 | Published: 10 Sep 2014

CommVault

Special report on EMC
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 12 page special report from Computer Weekly, updated for 2013, gives you the facts on EMC, its strategy, products and services and financial performance.
Posted: 04 Dec 2013 | Published: 04 Dec 2013

ComputerWeekly.com

Infographic: Data Traffic Security is a Mess
sponsored by Certes Networks
WHITE PAPER: This infographic visually displays the sobering results of a recent survey on what are IT decision makers doing to secure and segment their sensitive data traffic.
Posted: 09 Jan 2015 | Published: 09 Jan 2015

Certes Networks

Cloud Data Security for Financial Services
sponsored by BitGlass
WHITE PAPER: This white paper explains that banks can ensure the security of sensitive data stored in the public cloud by deploying a Cloud Access Security Broker, which enables banks to deploy a security platform within their own network infrastructure.
Posted: 30 Jan 2015 | Published: 30 Jan 2015

BitGlass

8 Best Practices for Securing Enterprise Data Sources and Achieving Compliance
sponsored by IBM
WHITE PAPER: This informative white paper explains why organizations need to adopt a more proactive, systematic approach to securing sensitive data and addressing compliance requirements amid the digital information explosion.
Posted: 30 Jul 2013 | Published: 30 Jul 2013

IBM

Is Your Identity Management Infrastructure a Mess?
sponsored by Radiant Logic, Inc.
WHITE PAPER: This infographic depicts the reasons behind identity management challenges, the impact that they have on organizations, and what your enterprise needs to do to confront these issues head-on.
Posted: 26 Nov 2014 | Published: 26 Nov 2014

Radiant Logic, Inc.
25 Matches
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement