Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Federal Law  >  

Terrorism Act of 2001

RSS Feed    Add to Google    Add to My Yahoo!
Terrorism Act of 2001 Reports
 
WAN Speak Musings – Volume III
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Clive Longbottom and Bob Tarzey discuss all things network related in this series of 11 short business focused articles.
Posted: 01 Nov 2013 | Published: 01 Nov 2013

ComputerWeekly.com

Nuonce Video
sponsored by Hewlett-Packard Limited
VIDEO: As businesses move forward into a new digital industrial era, the services required to send, receive, store and analyze documents need to adapt and progress. Access this video to find out how manufacturing companies can streamline crucial elements of business as the business world becomes more digitally driven.
Posted: 22 Jan 2015 | Premiered: 15 Dec 2014

Hewlett-Packard Limited

Roadmap to Effective eGovernment
sponsored by EMC Corporation
WHITE PAPER: Learn how roadmap to effective eGovernment provides you with a pragmatic, manageable and cost-effective guide to identify which pieces of your information infrastructure can be strengthened to become a high-performance government agency.
Posted: 09 Dec 2010 | Published: 09 Dec 2010

EMC Corporation

Del Monte Foods' Cloud Imperative
sponsored by Kenandy
WEBCAST: This video case study explores Del Monte Foods' cloud strategy – including why the food production company decided to move to the cloud and how it alleviated its cloud concerns.
Posted: 06 Jan 2014 | Premiered: Dec 10, 2013

Kenandy

The business impact of data security regulations: Featuring Massachusetts
sponsored by Sophos, Inc.
WHITE PAPER: This article discusses some aspects of a new regulation -- 201 CMR 17:00 -- and offers suggestions on how data security best practices can help with compliance. Companies should discuss the regulation in detail with their legal consul to examine how it affects their unique circumstances and the best course of action to be taken.
Posted: 11 Aug 2009 | Published: 11 Jun 2009

Sophos, Inc.

Networking Compliance
sponsored by Dell, Inc.
WHITE PAPER: This paper presents a broad overview of the major types of compliance required today. In addition, it considers an approach to compliance based on the network as a whole, rather than on specific devices or areas.
Posted: 24 Aug 2011 | Published: 24 Aug 2011

Dell, Inc.

Building a Robust Business Case for High Quality Master Data
sponsored by Melissa Data Corp
WHITE PAPER: This white paper explains the key elements for building a proper, quantified business case. It presents the measures that are favored by corporate finance departments, and helps develop a strong business case for data quality and MDM projects. A number of real-life examples with quantifiable benefits are also included.
Posted: 19 Apr 2010 | Published: 01 Feb 2010

Melissa Data Corp

Information Security Magazine – December 2010: Understanding the Data Accountability and Trust Act
sponsored by Information Security Magazine
EZINE: This month’s issue of Information Security magazine takes you deep inside the Data Accountability And Trust Act (DATA), pending legislation that could reshape the national privacy landscape and impact the way enterprises and midmarket companies architect their security operations.
Posted: 09 Dec 2010 | Published: 09 Dec 2010

Information Security Magazine

CW Europe – September Edition
sponsored by ComputerWeekly.com
EZINE: In this issue of CW Europe read how data discipline ensures you avoid data loss, as well as helping you to think clearer and to be organised.
Posted: 04 Sep 2013 | Published: 04 Sep 2013

ComputerWeekly.com

IBM Business Process Manager -- Powerfully Simple
sponsored by IBM
WHITE PAPER: IBM Business Process Manager provides the simplicity, efficiency, visibility and collaboration needed to manage highly dynamic and networked business environments. IBM Business Process Manager is easy to deploy and use straight out of the box or in an easily customizable configuration - providing rapid time to value and improved user productivity.
Posted: 07 Jul 2011 | Published: 07 Jul 2011

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement