IT Management  >   Systems Operations  >   Contingency Planning  >  

Y2K

RSS Feed    Add to Google    Add to My Yahoo!
Y2KReports
 
Webcast: Practical Threat Management and Incident Response for Small and Medium-Sized Enterprises
sponsored by AlienVault
WEBCAST: This helpful webcast discusses a multitude of critical issues related to threat management in small and medium-sized enterprises.
Posted: 23 Jul 2014 | Premiered: Jul 23, 2014

AlienVault

Your Guide to Improving IT Service Visibility
sponsored by Pangea Systems
WHITE PAPER: This whitepaper details the importance of IT service visibility for providing the performance your users demand and justifying the value of your services.
Posted: 25 Jun 2014 | Published: 20 Mar 2014

Pangea Systems

Strategic Server Refresh with IBM System x
sponsored by IBM and Intel.
WHITE PAPER: This white paper demonstrates the value of keeping your servers up to date with refresh and upgrades.
Posted: 07 Jul 2014 | Published: 18 Jun 2013

IBM and Intel.

Put Your Customers First with Agile, Powerful and Comprehensive IT Monitoring Software
sponsored by CA Nimsoft
WHITE PAPER: This exclusive resource details an IT monitoring solution that can give you're the visibility you need to run an efficient data center.
Posted: 25 Jun 2014 | Published: 25 Jun 2014

CA Nimsoft

EDM's Digital Mailroom Gets a Makeover
sponsored by Perceptive Software
VIDEO: Find out which industry-leading product helped an information management services provider gain a competitive edge over their peers, and solve the unique automation challenges of the digital mailroom.
Posted: 08 Jul 2014 | Premiered: 08 Jul 2014

Perceptive Software

Survey: Can Security in Higher Education Be Both Open and Secure?
sponsored by AlienVault
WHITE PAPER: This report contains data collected by SANS regarding the successes and challenges that colleges and universities experience in protecting their environments from threats, and also provides advice for security professionals working in these environments to improve their tactics in this critical area.
Posted: 23 Jul 2014 | Published: 30 Jun 2014

AlienVault

Service-Oriented Configuration Management
sponsored by Pangea Systems
WHITE PAPER: This whitepaper details the core functionality and key benefits of service-oriented configuration management and offers up a four-step approach for implementation.
Posted: 26 Jun 2014 | Published: 10 Jun 2010

Pangea Systems

Key Considerations for Colocation Services
sponsored by Equinix
EGUIDE: Explore this expert e-guide to learn about the pros and cons of data center colocation, and review considerations such as power costs, redundancy, availability, and services levels to help you decide if outsourcing data is a wise move for you and your organization.
Posted: 23 Jul 2014 | Published: 23 Jul 2014

Equinix

Computer Weekly – 8 July 2014: The most influential women in UK IT
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we reveal our annual list of the 25 most influential women in UK IT – female IT leaders making a difference to the digital economy. We look at how to integrate iPads into the corporate IT infrastructure. And we profile enterprise software upstart Workday as it challenges Oracle and SAP. Read the issue now.
Posted: 07 Jul 2014 | Published: 07 Jul 2014

ComputerWeekly.com

Overview of Office 365
sponsored by CDW Corporation
WEBCAST: This exclusive webcast details the key features of Microsoft Office 365 and will help you work through the implementation process.
Posted: 01 Jul 2014 | Premiered: Jun 10, 2014

CDW Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
Y2K White Papers | Y2K Multimedia | Y2K IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement