Vertical Industries  >   Leisure Industry  >  

Resorts

RSS Feed    Add to Google    Add to My Yahoo!
Resorts Reports
 
Infrastructure Management Is Not Enough: The New IT Operations Imperative
sponsored by Mercury
WHITE PAPER: Infrastructure management is not enough to ensure enterprise applications are meeting business goals because users experience applications, NOT infrastructure.
Posted: 20 Dec 2005 | Published: 01 Dec 2005

Mercury

Information Security Breaches Survey 2013
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Security breaches cost large businesses an average of £850,000, the 2013 Information Security Breaches Survey reveals.
Posted: 29 Apr 2013 | Published: 29 Apr 2013

ComputerWeekly.com

Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007

Xtore

Managing and Securing Mobile Healthcare Data and Devices
sponsored by Fiberlink Communications
WHITE PAPER: Regulatory compliance tops the list of concerns among healthcare and life sciences IT professionals with 86% of healthcare IT decision-makers rating it as a high or critical priority over the course of the coming year. Check out this paper to find out more!
Posted: 17 Mar 2010 | Published: 17 Mar 2010

Fiberlink Communications

Measuring the Business Impacts of Effective Data: Chapter One of a Three-Part Study
sponsored by Sybase, an SAP company
WHITE PAPER: This study of over 150 Fortune 1000 firms from every major industry or vertical explores issues associated with the lifeblood of today’s enterprises: data. The findings demonstrate the often dramatic impacts that even marginal investments in information technology can have when that technology addresses data quality, usability, and intelligence.
Posted: 02 Nov 2010 | Published: 02 Nov 2010

Sybase, an SAP company

Rising Above the Competition as a Cloud Services Provider: Five Effective Steps for Claiming Your Share of the Pie
sponsored by CA Technologies.
WHITE PAPER: Learn how you can rise above the competition as a cloud provider, especially by using the five key steps outlined in this resource.
Posted: 06 Apr 2012 | Published: 06 Apr 2012

CA Technologies.

Webinar: Managing the Deployment Lifecycle
sponsored by RightScale
WEBCAST: In this webinar, RightScale presents typical lifecycle scenarios that you accomplish today in your datacenter – and show how you can execute them on the cloud in a more automated and repeatable manner.
Posted: 01 Mar 2010 | Premiered: Mar 1, 2010

RightScale

Hospitality and Cybercrime: How to Safeguard Sensitive Information
sponsored by SurfWatch Labs
WHITE PAPER: This white paper explores the many cyber-risks faced by the hospitality sector. Access it and discover just how much your business is at risk – and what you can do about it.
Posted: 06 Jan 2016 | Published: 06 Jan 2016

SurfWatch Labs

Case Study: Medical Record Scanning Service Providers Find Success with Mobile Scan Capabilities
sponsored by Kodak
WHITE PAPER: This brief case study shows how one service bureau specializing in medical record scanning was able to leverage faster, high-quality mobile scanning tools while out on the road. Access now to determine if their strategy is right for you.
Posted: 22 Sep 2015 | Published: 22 Sep 2015

Kodak

Business Resource Optimization 101
sponsored by Red Hat
WHITE PAPER: In this technology overview, developers will learn how to optimize planning so you can do more business with fewer resources. Discover how to mitigate planning issues in five steps.
Posted: 09 Oct 2015 | Published: 09 Oct 2015

Red Hat

The Benefits of Converged Infrastructure for Business Applications
sponsored by EMC Converged Platforms
WHITE PAPER: Leave dated operations in the past. Access this white paper and learn how you can optimize performance, reduce complexity, and lower total cost of ownership on the applications you bet your business on every day.
Posted: 09 Apr 2013 | Published: 09 Apr 2013

EMC Converged Platforms

Reduce Your Markdowns: 7 Ways to Maintain Your Margins by Aligning Supply and Demand
sponsored by Infor
WHITE PAPER: This resource highlights seven ways to step off the high-volume, low-price treadmill and reduce the need for costly markdowns. Learn how to increase profits by delivering the right products to the right people at the right time -- and in the right quantity.
Posted: 22 Jan 2016 | Published: 22 Jan 2016

Infor

VARs: Gain More Reliable Revenue from Endpoint Security
sponsored by Webroot
WHITE PAPER: This white paper discusses the challenges VARs face when providing endpoint security and suggests offering cloud-based options as an alternative.
Posted: 27 Aug 2015 | Published: 27 Aug 2015

Webroot

Three simple steps to building a digital framework
sponsored by ComputerWeekly.com
PRESENTATION: Mark Thompson, Digital and IT Director for TUI Travel Specialist & Activity, discusses IT transformation in this PowerPoint presentation.
Posted: 10 Dec 2013 | Published: 10 Dec 2013

ComputerWeekly.com

How Can You Ensure Stability and Reliability?
sponsored by Red Hat
WHITE PAPER: This whitepaper explains how Red Hat Enterprise Linux can provide the stable and proven enterprise platform you need to bring new levels of simplicity to your IT operations while ensuring your underlying infrastructure is completely secure.
Posted: 08 Oct 2014 | Published: 08 Oct 2014

Red Hat

Further IT Spending Cuts Likely in Europe's Public Sector
sponsored by ComputerWeekly.com
WHITE PAPER: The UK's June Budget provides a mandate for all government departments to submit their spending review plans before the summer break and reports that it has scheduled the government spending review for October.
Posted: 24 Oct 2011 | Published: 05 Jul 2010

ComputerWeekly.com

Platform provides insight into your infrastructure
sponsored by Tintri
WHITE PAPER: This white paper discusses the challenges IT faces in pinpointing performance issues and how Tintri VMstore and Tintri Global Center deliver deep insight in to utilization and performance helping IT detect trends and enhance troubleshooting.
Posted: 18 Mar 2015 | Published: 18 Mar 2015

Tintri

5 DBA Mistakes That Can Cost You Your Job
sponsored by Idera
WHITE PAPER: This white paper reveals the 5 unforgivable mistakes that could endanger the integrity, recoverability and security of the databases, including SQL Server, DBAs are supposed to protect.
Posted: 21 Jul 2014 | Published: 21 Jul 2014

Idera

Completing the Puzzle for Roaming Users in Healthcare
sponsored by NVIDIA/VMware
CASE STUDY: The following case study explores how Metro Health was able to deliver anywhere access to critical patient information and imaging to doctors and other health staff by adopting the right VDI system. Access now and learn how you can attain similar benefits.
Posted: 27 May 2015 | Published: 27 May 2015


Completing the Puzzle for Roaming Users in Healthcare
sponsored by NVIDIA/VMware
WHITE PAPER: Metro Health wanted full roaming access for all doctors and nurses. Learn how VDI enabled it for imaging and more.
Posted: 06 Apr 2015 | Published: 06 Apr 2015

TOPICS:  IT Management

E-Guide: Configure Outbound Firewall Rules for Data Protection
sponsored by SearchSecurity.com
EGUIDE: A new form of firewall was recently developed in order to withstand more sophisticated threats. Consult this expert E-guide to learn more about the value of application firewalls and how they can benefit the security of your business.
Posted: 24 Aug 2012 | Published: 24 Aug 2012

SearchSecurity.com

How to Thwart Privilege Creep with Access Reviews
sponsored by SearchSecurity.com
EGUIDE: In this E-Guide from SearchSecurity.com, industry expert Peter H. Gregory delves deep into the topic of privilege creep: the risks, the remedies, and key tips for access review and automation success.
Posted: 10 Apr 2013 | Published: 10 Apr 2013

SearchSecurity.com

Mitigating the Top 3 Office 365 Security Risks
sponsored by Mimecast
WHITE PAPER: This white paper examines how to mitigate the 3 key high risk areas of Office 365 email security.
Posted: 14 Sep 2015 | Published: 02 Sep 2015

Mimecast

The Power of Collaboration with an Expiration Date and Data-Centric Security
sponsored by BlackBerry
WHITE PAPER: In this white paper, you will learn the role of data-centric security in expiration collaboration. Access this paper now to see why the movement of consumers to apps like Snapchat clearly presages a similar move for enterprises to EFSS tools with real expiration built in.
Posted: 12 Oct 2015 | Published: 12 Oct 2015

BlackBerry

Storage Provider Profile: Red Hat
sponsored by Red Hat
WHITE PAPER: The following white paper profiles a scale-out, open source object-based storage software solution and the benefits it provides for businesses looking for a middle road when integrating data.
Posted: 30 Jun 2014 | Published: 30 Nov 2012

Red Hat

Deployment Data: Using Research to Break Bad Habits
sponsored by ZeroTurnaround
WHITE PAPER: The average developer wastes 39% of their day on redeploys and interactive testing in their development environments. This resource breaks down the facts about delays in the deployment process. Learn about productive strategies that eliminate the rebuild/redeploy cycle, and how these approaches compare to traditional methods already in place.
Posted: 03 Sep 2014 | Published: 03 Sep 2014

ZeroTurnaround

Smarter Cybersecurity Solutions
sponsored by Webroot
WHITE PAPER: This white paper highlights a cloud-based, cybersecurity solution that enables you to provide your customers with one, simple solution. Learn how to provide your customers with security that will simplify deployment and management, as well as save time and money.
Posted: 31 Dec 2015 | Published: 31 Dec 2015

Webroot

Application Server Goodness Without Misconfiguration
sponsored by ZeroTurnaround
WHITE PAPER: What are the various woes of different application servers? Get the low-down inside this resource, so you can turn your current frustrations into actionable, informed decisions.
Posted: 18 Jul 2014 | Published: 18 Jul 2014

ZeroTurnaround

Four Steps to Being More Mobile Than Ever
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this expert white paper to examine four key steps involved in enhancing mobility. Discover technologies and platforms that will give your organization the foundation it needs to be more flexible and mobile than ever.
Posted: 18 Mar 2015 | Published: 18 Mar 2015

Dell, Inc. and Intel®

Stopping Privilege Creep: Limiting User Privileges with Access Reviews
sponsored by SearchSecurity.com
EGUIDE: This SearchSecurity.com e-guide outlines the risks of privilege creep and outlines the remedies available to help you successfully mitigate them. View now to learn more!
Posted: 29 Jul 2013 | Published: 29 Jul 2013

SearchSecurity.com

BYOD Security: How to Remotely Wipe iPhone and Android Devices
sponsored by SearchSecurity.com
EGUIDE: In this expert e-guide, explore the need for remote data wipe on top of mandatory PINs and passwords to ensure optimum data protection in this BYOD age. Click now to get started!
Posted: 09 Dec 2013 | Published: 09 Dec 2013

SearchSecurity.com

The big returns from big data
sponsored by ComputerWeekly.com
ANALYST REPORT: Organisations can earn an incremental ROI of 241 percent by using big data technology to examine large and complex data sets, according to this report from Nucleus Research.
Posted: 05 Apr 2012 | Published: 05 Apr 2012

ComputerWeekly.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement