Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Intellectual Property Law  >   Intellectual Property  >  

Trade Secrets

RSS Feed    Add to Google    Add to My Yahoo!
Trade Secrets Reports
 
Computer Weekly - 10 January 2012: What’s in store for IT this year?
sponsored by ComputerWeekly.com
EZINE: In this week’s issue of Computer Weekly, we look at the key trends and technologies that will be on IT leaders’ agenda in 2012. Our first Buyer’s Guide of the year examines how IT consumerisation will affect business technology; and Home Office IT director Denise McDonagh tells us why government IT isn’t working. Download the new issue now.
Posted: 09 Jan 2012 | Published: 10 Jan 2012

ComputerWeekly.com

Computer Weekly - 10 January 2012: What’s in store for IT this year?
sponsored by ComputerWeekly.com
EZINE: In this week’s issue of Computer Weekly, we look at the key trends and technologies that will be on IT leaders’ agenda in 2012. Our first Buyer’s Guide of the year examines how IT consumerisation will affect business technology; and Home Office IT director Denise McDonagh tells us why government IT isn’t working. Download the new issue now.
Posted: 14 Sep 2012 | Published: 10 Jan 2012

ComputerWeekly.com

Architecting an Agile Enterprise
sponsored by SearchCIO.com
EBOOK: This white paper takes an in-depth look at the relationship between Agile business practices and mobile computing. Inside, learn more about the balancing act many modern businesses face when trying to provide a quick turnaround for mobile applications on a limited budget.
Posted: 22 Jan 2013 | Published: 22 Jan 2013

SearchCIO.com

Sharing knowledge to tackle online banking fraud
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series argues that an information sharing service between national banking systems and law enforcement agencies could counteract online fraud.
Posted: 22 Jul 2014 | Published: 22 Jul 2014

ComputerWeekly.com

Business leaders agenda 2012
sponsored by ComputerWeekly.com
RESOURCE: This report from KPMG identifies business priorities across a wide range of geographies and industries, and assesses the economic outlook.
Posted: 16 Mar 2012 | Published: 16 Mar 2012

ComputerWeekly.com

Nuonce Video
sponsored by Hewlett-Packard Limited
VIDEO: As businesses move forward into a new digital industrial era, the services required to send, receive, store and analyze documents need to adapt and progress. Access this video to find out how manufacturing companies can streamline crucial elements of business as the business world becomes more digitally driven.
Posted: 22 Jan 2015 | Premiered: 15 Dec 2014

Hewlett-Packard Limited

What's Yours is Mine: How Employees are Putting Your Intellectual Property at Risk
sponsored by Symantec Corporation
WHITE PAPER: Intellectual property theft can often be attributed to employees – whether intentional or not. This whitepaper explores the mindset employees have about taking corporate assets and provides recommendations that will help you minimize the risk.
Posted: 27 Feb 2013 | Published: 31 Jan 2013

Symantec Corporation

IT Transformation Consulting Services: Align your technology direction
sponsored by Hewlett-Packard Company
WHITE PAPER: This brief resource introduces an IT transformation consulting service as a means of achieving effective, value-driven change. Read on now to learn how you can ensure business and IT alignment, spur business growth, and more.
Posted: 09 Oct 2013 | Published: 31 May 2012

Hewlett-Packard Company

Best Practices for Managing the Increasing Depth of Compliance Regulation
sponsored by IBM
EGUIDE: According to Gartner Research, 41% of corporations have employed a chief compliance officer to keep up with today’s increasingly complex compliance regulations.  Learn what actions your organization can take to ensure compliance with evolving regulations.
Posted: 18 May 2011 | Published: 18 May 2011

IBM

E-Guide: Monitoring Strategies for Insider Threat Detection
sponsored by IBM
EGUIDE: In this e-guide, you will learn about practical strategies for implementing insider threat detection tools. Also covered in this e-guide are the three common types of insider crimes and how each one requires its own set of insider threat detection tactics. Read on to learn more about monitoring strategies for insider threat detection.
Posted: 22 Mar 2011 | Published: 22 Mar 2011

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement