Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Federal Law  >  

Terrorism Act of 2001

RSS Feed    Add to Google    Add to My Yahoo!
Terrorism Act of 2001 Reports
WAN Speak Musings – Volume III
sponsored by
ANALYST REPORT: Analysts Clive Longbottom and Bob Tarzey discuss all things network related in this series of 11 short business focused articles.
Posted: 01 Nov 2013 | Published: 01 Nov 2013

Five Things to Know About Hyper-Convergence
sponsored by Hewlett Packard Enterprise
WHITE PAPER: In this infographic, you'll uncover the top 5 things you need to know about hyper-converged infrastructure.
Posted: 17 Jun 2015 | Published: 28 Feb 2015

Hewlett Packard Enterprise

Key legal and commercial issues with data centre services
sponsored by
RESEARCH CONTENT: This briefing from law-firm DLA Piper looks at the main types of data centre services that are available on the market, common pitfalls and key legal and commercial issues to consider.
Posted: 09 Sep 2013 | Published: 09 Sep 2013

Legal briefing: The Draft EU General Data Protection Regulation
sponsored by
ESSENTIAL GUIDE: This report from law firm Morrison & Foerster, sets out some of the most important changes for private sector organisations in the draft EU Data Protection Regulation.
Posted: 28 Jan 2014 | Published: 28 Jan 2014

European IT Law Briefing: Recruitment and social media
sponsored by
ESSENTIAL GUIDE: Four leading European law firms help you navigate the legal maze when using social media for recruitment in France, Germany, UK and Italy.
Posted: 20 May 2013 | Published: 20 May 2013

How SkillSoft Learning Impacts Performance of Individuals and Organizations
sponsored by Skillsoft
WHITE PAPER: In late 2010, Skillsoft asked KnowledgeAdvisors, the world's largest learning analytics firm, to conduct an independent study to determine the value that SkillSoft training provides to individuals and organizations. Check out this white paper to explore the results of this study and key findings.
Posted: 28 Aug 2012 | Published: 28 Feb 2011


Storage strategies for the health IT professional
sponsored by EMC Isilon
PRESENTATION TRANSCRIPT: In this presentation transcript, Marc Staimer, president of Dragon Slayer Consulting, describes the basics of tiered storage architecture and demonstrates how health care organizations can set policies to automate the process of moving data to different tiers.
Posted: 31 Aug 2012 | Published: 31 Aug 2012

EMC Isilon

Samsung Electronics France Reduced DSO and Improved Invoice Tracking with Esker DeliveryWare
sponsored by Esker Inc.
CASE STUDY: When Samsung Electronics France needed an automated solution for processing and sending 250,000 invoices per year from its SAP solution, they chose Esker DeliveryWare. This project, carried out by Esker Certified Partner, Aegis, reduced time involved in collecting customer payments by over 10% and enabled invoice tracking.
Posted: 10 Jul 2009 | Published: 10 Jul 2009

Esker Inc.

Networking Compliance
sponsored by Dell, Inc.
WHITE PAPER: This paper presents a broad overview of the major types of compliance required today. In addition, it considers an approach to compliance based on the network as a whole, rather than on specific devices or areas.
Posted: 24 Aug 2011 | Published: 24 Aug 2011

Dell, Inc.

Are You Ready For a New Era in B2B Collaboration?
sponsored by IBM
WHITE PAPER: This white paper examines what companies can do to modernize their approach to business-to-business collaboration in response to trends like globalization, consumerization, and mobility.
Posted: 03 Sep 2014 | Published: 31 Mar 2014

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement