Vertical Industries  >  

Steel Industry

RSS Feed    Add to Google    Add to My Yahoo!
Steel Industry Reports
 
Managing and Securing Mobile Healthcare Data and Devices
sponsored by Fiberlink Communications
WHITE PAPER: Regulatory compliance tops the list of concerns among healthcare and life sciences IT professionals with 86% of healthcare IT decision-makers rating it as a high or critical priority over the course of the coming year. Check out this paper to find out more!
Posted: 17 Mar 2010 | Published: 17 Mar 2010

Fiberlink Communications

Rising Above the Competition as a Cloud Services Provider: Five Effective Steps for Claiming Your Share of the Pie
sponsored by CA Technologies.
WHITE PAPER: Learn how you can rise above the competition as a cloud provider, especially by using the five key steps outlined in this resource.
Posted: 06 Apr 2012 | Published: 06 Apr 2012

CA Technologies.

Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007

Xtore

Measuring the Business Impacts of Effective Data: Chapter One of a Three-Part Study
sponsored by Sybase, an SAP company
WHITE PAPER: This study of over 150 Fortune 1000 firms from every major industry or vertical explores issues associated with the lifeblood of today’s enterprises: data. The findings demonstrate the often dramatic impacts that even marginal investments in information technology can have when that technology addresses data quality, usability, and intelligence.
Posted: 02 Nov 2010 | Published: 02 Nov 2010

Sybase, an SAP company

Webinar: Managing the Deployment Lifecycle
sponsored by RightScale
WEBCAST: In this webinar, RightScale presents typical lifecycle scenarios that you accomplish today in your datacenter – and show how you can execute them on the cloud in a more automated and repeatable manner.
Posted: 01 Mar 2010 | Premiered: Mar 1, 2010

RightScale

The Global Information Technology Report 2013
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This report from the World Economic Forum remains one of the most comprehensive and authoritative assessments of the impact of ICT on each country.
Posted: 15 Apr 2013 | Published: 22 Apr 2013

ComputerWeekly.com

CW Special Report on CSC
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 16-page report from Computer Weekly analyses the challenges facing CSC, its financial performance, the services it offers, its place in the IT market and its future strategy.
Posted: 29 Apr 2013 | Published: 29 Apr 2013

ComputerWeekly.com

The 2014 Global Cost of Cybercrime Study
sponsored by Hewlett-Packard Company
WHITE PAPER: This informative report distills interviews with senior-level IT personnel about the impact of cybercrime on their organizations in 2014 into trends that apply to every enterprise around the world.
Posted: 19 Nov 2014 | Published: 19 Nov 2014

Hewlett-Packard Company

IT education in Scandavia
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Learn how Scandanvian educators are capitalising on IT advances to help children learn in this Computer Weekly report.
Posted: 15 Mar 2013 | Published: 15 Mar 2013

ComputerWeekly.com

CW Special Report on TCS
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 5 page special report from Computer Weekly gives you the facts on TCS, its strategy, products and services and financial performance.
Posted: 23 Nov 2012 | Published: 23 Nov 2012

ComputerWeekly.com

Global Risks 2014
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Cybercrime and the potential fragmentation of the internet are among the most serious risks  facing businesses and governments in 2014, this report from the World Economic Forum reveals.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

ComputerWeekly.com

Inside the mind of IT professionals
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This unique study by the Psychological Consultancy shows the unique personality traits of IT professionals, and what drives them compared to professionals in a range of other industries.
Posted: 10 Mar 2015 | Published: 10 Mar 2015

ComputerWeekly.com

How Steel Producer ArcelorMittal's Global Network Overhaul Increased Efficiency
sponsored by OpenText
CASE STUDY: Discover what system helped ArcelorMittal achieve a single seamless B2B network solution, increased efficiency, ability to connect to more customers more quickly, increased global visibility, and more. Read now to learn from ArcelorMittal's success and devise your own B2B management strategy.
Posted: 27 Apr 2015 | Published: 27 Apr 2015

TOPICS:  B2B | ERP | ERP Software
OpenText

NetApp expands to add new service offerings
sponsored by NetApp
EGUIDE: NetApp added Cloud Ontap to its arsenal. Learn more about this software-only version of its Data Ontap operating system in this expert e-guide, and discover how NetApp allows customers back up to private and public clouds to their SteelStore platform.
Posted: 05 Mar 2015 | Published: 05 Mar 2015

NetApp

10 Critical Questions to Ask a Manufacturing ERP Vendor
sponsored by ComputerWeekly.com
WHITE PAPER: Choosing the right ERP solution for your manufacturing operations is a very important decision, one that you will be forced to live with for years to come. Learn the key elements that need to be evaluated.
Posted: 20 Oct 2011 | Published: 19 Oct 2010

ComputerWeekly.com

Business leaders agenda 2012
sponsored by ComputerWeekly.com
RESOURCE: This report from KPMG identifies business priorities across a wide range of geographies and industries, and assesses the economic outlook.
Posted: 16 Mar 2012 | Published: 16 Mar 2012

ComputerWeekly.com

Women in IT: Inspiring the next generation
sponsored by ComputerWeekly.com
BOOK: This book seeks to encourage more girls and women to consider a career in IT by showcasing the lives and careers of female IT professionals, entrepreneurs and academics.
Posted: 10 Oct 2014 | Published: 10 Oct 2014

ComputerWeekly.com

Special Report: Cyber Security in 2015
sponsored by IBM
WHITE PAPER: This report summarizes essential attack information from recent security breaches to show you what the current threat landscape looks like.
Posted: 22 May 2015 | Published: 31 Mar 2015

IBM

Taking the Guesswork Out of Data Ownership
sponsored by SearchCIO.com
EBOOK: In this SearchCIO handbook, we explore how digital business has made data ownership a hot topic once again for CIOs in order to meet the needs of the digital business world and transform information into knowledge and knowledge into insights.
Posted: 15 May 2015 | Published: 15 May 2015

TOPICS:  CIOs | IT Governance
SearchCIO.com

NetApp is Accelerating Your Data Protection Strategy to the Clouds
sponsored by NetApp
WHITE PAPER: Access this white paper to find out why many organizations are modernizing their data protection environments with cloud-enabled data protection architectures and solutions.
Posted: 26 Feb 2015 | Published: 30 Jan 2015

NetApp

2014 Egon Zehnder European Board Diversity Analysis
sponsored by ComputerWeekly.com
RESEARCH CONTENT: For the first time Europe now leads the world in board diversity – though numbers of female executives on boards remain stubbornly low and this is a particular issue in technology, this study reveals.
Posted: 10 Oct 2014 | Published: 10 Oct 2014

ComputerWeekly.com

Effective Ways to Search Log Files
sponsored by SearchSecurity.com
EGUIDE: Security log analysis is essential for effective security and risk management. But with countless logs generated every day, searching log files can be a burdensome headache. In this e-guide, expert John Burke uncovers the best methods for thorough security log analysis with an evolutionary path that mixes old concepts with new ones.
Posted: 05 Apr 2012 | Published: 05 Apr 2012

SearchSecurity.com

How to navigate the cloud securely and confidently
sponsored by ComputerWeekly.com
WHITE PAPER: Security is one of the most commonly cited barriers preventing IT managers from taking advantage of cloud computing – yet some experts say the cloud could and should be more secure than in-house IT. This paper looks at how to be confident about security in the cloud.
Posted: 21 Oct 2011 | Published: 23 Nov 2010

ComputerWeekly.com

Evolving your data center into a modern-day business response centre
sponsored by Dimension Data
WHITE PAPER: Consult this white paper to learn how to build a better approach to a modern data center environment. Inside uncover the importance of global systems integration, how to leverage it, and how it can prime your data center for future expansion. Access now to discover more.
Posted: 21 May 2015 | Published: 21 May 2015

Dimension Data

SearchConsumerization.com E-Guide: Enterprise device management: A brave new world
sponsored by SearchSecurity.com
EGUIDE: This exclusive E-Guide from SearchConsumerization.com examines the latest trends, news and analysis pertaining to IT device management today.
Posted: 10 May 2012 | Published: 09 May 2012

SearchSecurity.com

Case study: Global manufacturer automates time and attendance
sponsored by Workforce
WHITE PAPER: Read this white paper to learn about the time and attendance software GSI chose so they could synchronize data with the HR system as often as necessary, or as scheduled to ensure time and attendance information is captured for new employees.
Posted: 03 Apr 2015 | Published: 03 Apr 2015

Workforce

Business Analytics: Strategies for Optimal Decision-Making
sponsored by IBM
WHITE PAPER: This resource presents the case for business analytics, outlining the trends that are redefining analytics and the weaknesses of decentralized analytics solutions. Gain additional insight into IBM Business Analytics solutions on System z, an end-to-end solution that includes BI, predictive analytics and data warehousing on a single platform.
Posted: 22 May 2012 | Published: 18 Aug 2010

IBM

How to Manage Content in the Mobile Cloud Era
sponsored by SearchConsumerization.com
EBOOK: Corporate data no longer lives solely behind the firewall. Learn how EFSS and mobile content management software can protect data in the cloud era.
Posted: 24 Mar 2015 | Published: 24 Mar 2015


The Next Mobility Model: COPE Challenges BYOD
sponsored by SearchConsumerization.com
EBOOK: Now that the dust has settled around bring your own device, some IT shops have turned to the COPE, or corporate-owned, personally enabled, approach to mobile device management.
Posted: 20 May 2015 | Published: 20 May 2015


The Next Mobility Model: COPE Challenges BYOD
sponsored by SearchConsumerization.com
EBOOK: Now that the dust has settled around bring your own device, some IT shops have turned to the COPE, or corporate-owned, personally enabled, approach to mobile device management.
Posted: 09 Jul 2014 | Published: 09 Jul 2014

 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement