Business of Information Technology  >   Business Processes  >   Marketing  >   Market Research  >  

Questionnaires

RSS Feed    Add to Google    Add to My Yahoo!
QuestionnairesReports
 
Cyber Risk Perceptions: An Industry Snapshot
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Concerns about cyber-risks in business have increased over the past 12 months, this snapshot survey from Marsh and Chubb reveals.
Posted: 27 Jun 2012 | Published: 27 Jun 2012

ComputerWeekly.com

Security considerations for UK enterprises
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This Research Snapshot from Vanson Bourne looks at IT security spending trends, awareness of cyber-threats, and the factors perceived as the biggest security risks for organisations.
Posted: 10 Dec 2013 | Published: 10 Dec 2013

ComputerWeekly.com

Top 10 Project Management Trends for 2013
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: A global panel of experts identify the top 10 trends in project management in 2013
Posted: 05 Jan 2012 | Published: 24 Jan 2013

ComputerWeekly.com

Podcast: Gleaning New Insights from Big Data and Predictive Analytics: Trends, Directions and Outcomes
sponsored by NEC Corporation of America
PODCAST: Learn about the results of a recent big data survey, so you can be one step ahead of wherever it's going.
Posted: 27 Jun 2014 | Premiered: Jun 24, 2014

NEC Corporation of America

Automating Information Governance - assuring compliance
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from AIIM takes an in-depth look at information governance policies, privacy and records management issues, policy enforcement, and how well technology can set or correct metadata, detect security risks, and enforce deletion policies.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

ComputerWeekly.com

The Cyber Savvy CEO: Getting to grips with today’s growing cyber-threats
sponsored by ComputerWeekly.com
IT BRIEFING: The recent surge in cyber attacks has forced organisations to align cyber security efforts across all of their operations, rather than focusing on IT, but CEOs now need to take the lead in protecting their organisations, this report from PwC argues.
Posted: 05 Jan 2012 | Published: 05 Sep 2011

ComputerWeekly.com

Information security trends
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This report from CompTIA, based on original research, assesses the current trends in information security.
Posted: 11 Mar 2013 | Published: 11 Mar 2013

ComputerWeekly.com

Genesys Global Consumer Survey - 2007
sponsored by Genesys
WHITE PAPER: This survey highlights the importance of the contact center experience and the direct impact it can have on revenue and consumer loyalty, it also reveals some interesting trends in consumer expectations.
Posted: 25 Mar 2008 | Published: 01 Jan 2007

Genesys

The Emergence of Service Assurance in Enterprise IT
sponsored by CA Technologies.
ANALYST REPORT: Forrester Consulting evaluated issues surrounding the assurance of critical business services and applications. In surveying more than 150 IT professionals, Forrester found that all of these enterprises had fundamental issues around managing the performance of these applications and business services and the underlying transactions.
Posted: 09 Jun 2011 | Published: 09 Jun 2011

CA Technologies.

Essential Rack System Requirements for Next Generation Data Centers
sponsored by APC by Schneider Electric
WHITE PAPER: This paper presents a categorized and prioritized collection of rack system challenges and requirements as obtained through systematic user interviews.
Posted: 13 Jan 2005 | Published: 01 Feb 2005

APC by Schneider Electric
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement