IT Agents  >   Standards Organizations  >   Internet Industry Standards Organizations  >  

ARIN

RSS Feed   
ARIN White Papers (View All Report Types)
 
8 Biggest Mistakes IT Practitioners Make
sponsored by Splunk
WHITE PAPER: Inside, learn about the eight most common mistakes that IT pros make when it comes to monitoring and troubleshooting – and read through takeaways and examples that explain how to tackle them.
Posted: 13 Feb 2019 | Published: 13 Feb 2019

Splunk

IT jobswatch – trends in media IT recruitment
sponsored by ComputerWeekly.com
WHITE PAPER: This quarters figures compiled by jobadswatch.co.uk show that during the fourth quarter of 2010 the IT jobs market for permanent staff being recruited by media organisations is up by 1.8%. This is the sixth consecutive quarter that has seen higher demand.
Posted: 20 Oct 2011 | Published: 15 Mar 2011

ComputerWeekly.com

The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER: This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

Skillsoft

Project Management Network Diagram: A Tool for Understanding the PM Life Cycle
sponsored by Global Knowledge
WHITE PAPER: The Project Management Network Diagram (PM Network Diagram) provides a visual illustration of the project management life cycle (in terms of the chain of events that take place in a project).
Posted: 06 Jul 2006 | Published: 01 Jan 2005

Global Knowledge

Gartner Middle East CIO Leadership Forum
sponsored by Gartner
WHITE PAPER: Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.
Posted: 28 Jan 2011 | Published: 28 Jan 2011

Gartner

The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER: This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012

Skillsoft

Government Could Miss IPv6 Deadline; Enterprises Make IPv6 Transition
sponsored by Hewlett Packard Enterprise
EGUIDE: Uncover why many government agencies risk missing the IPv6 transition deadline and how your enterprise stands to benefit by making the IPv6 transition in a timely manner.
Posted: 02 Jan 2013 | Published: 02 Jan 2013

Hewlett Packard Enterprise

AI is at the Forefront of Reducing Money Laundering and Combating the Financing of Terrorism
sponsored by SAS
WHITE PAPER: Inside, explore how advanced analytics can be used to identify patterns of fraud and potentially suspicious activities, and review what AI and machine learning can do for your anti-money laundering (AML) and combating the financing of terrorism (CFT) programs.
Posted: 13 Aug 2019 | Published: 13 Aug 2019

SAS

Prepare Your Network for the Future: Embrace IPv6
sponsored by Hewlett Packard Enterprise
EGUIDE: This E-Guide from SearchEnterpriseWAN.com explores the importance of IPv6 and why it should be on every enterprise's short-term to-do list. View now to uncover how this influential protocol will shape your enterprise now and in the future.
Posted: 02 Jan 2013 | Published: 02 Jan 2013

Hewlett Packard Enterprise

IPv6 Timeline: The Road to a New Protocol
sponsored by Hewlett Packard Enterprise
EGUIDE: This IPv6 timeline lists the major milestones in the history of the protocol, describing how – and why – it became what it is today.
Posted: 02 Jan 2013 | Published: 02 Jan 2013

Hewlett Packard Enterprise

Maturing Your DLP Strategy for Today’s Threats
sponsored by SearchSecurity.com
EGUIDE: Social networks have become a new avenue to cybercriminals today, using social engineering to exploit systems and data. In this expert resource, uncover how social networking is impacting data loss prevention (DLP) strategies and explore eight key questions to ask your vendor to help mature your DLP solution.
Posted: 02 Feb 2012 | Published: 02 Feb 2012

SearchSecurity.com

CW Buyer's Guide: IPV6 Migration
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This Computer Weekly Buyer's guide takes you through the steps you need to take to migrate to IPv6 and explains the potential impact on your business.
Posted: 26 Jul 2012 | Published: 05 Feb 2012

ComputerWeekly.com

Modern Mobility e-zine – September 2016
sponsored by SearchMobileComputing
EZINE: Many companies are looking to the top enterprise software vendors for guidance when mobilizing their core business apps. Read on as experts explore how SAP, Oracle, IBM and Microsoft are making moves to help IT tailor essential software for smartphones and tablets.
Posted: 13 Sep 2016 | Published: 13 Sep 2016

SearchMobileComputing

What Enterprises Should Do About IPv6 in 2011
sponsored by Cisco Systems, Inc.
WHITE PAPER: The purpose of this white paper is to provide enterprises with guidance, based on a three- to five-year outlook, on how IPv6 should be included in their network design, planning, and operations starting today. The intended audience is enterprise network administrators.
Posted: 26 Jan 2011 | Published: 26 Jan 2011

Cisco Systems, Inc.

ISM Essentials Guide – Threat Management
sponsored by SearchSecurity.com
ESSENTIAL GUIDE: In this essential guide, gain a complete overview of today's threat landscape. Discover the new platforms – such as mobile devices, social media, and the cloud – that cybercriminals are targeting, learn key antimalware strategies, and more by reading on today.
Posted: 18 Dec 2012 | Published: 18 Dec 2012

SearchSecurity.com

Threat Management: Devising a new strategy to tackle today's cyberattacks
sponsored by SearchSecurity.com
ESSENTIAL GUIDE: This Information Security Essential Guide on Threat Management explores the new strategies organizations are developing to tackle the threat of today’s growing malware threats and targeted attacks.
Posted: 31 May 2012 | Published: 31 May 2012

SearchSecurity.com

February Essentials Guide on Threat Management
sponsored by SearchSecurity.com
ESSENTIAL GUIDE: Today, security pros must fight on multiple fronts as cybercriminals find new ways to exploit customers and their users. In this Information Security Essential Guide, get a comprehensive look into today’s threat landscape and gain new strategies to tackle emerging cyberattacks.
Posted: 07 Feb 2012 | Published: 06 Feb 2012

SearchSecurity.com

IT in Europe: Security in the Cloud
sponsored by SearchSecurity.com
EZINE: Although cloud computing offers the ability to be flexible and agile at lower costs, many organisations are still hesitant to adopt because of one concern – security. This SearchSecurity.co.UK E-Zine explores the security challenges of cloud computing and offers expert advice for defending against the latest threats and mitigating risks.
Posted: 26 Aug 2011 | Published: 26 Aug 2011

SearchSecurity.com

Computer Weekly - 21 February 2012: Preparing for IPv6
sponsored by ComputerWeekly.com
EZINE: This week's digital magazine examines the challenges of migrating to IPv6 now the internet has run out of IPv4 addresses - a process every IT manager now faces. We also look into the IT issues facing smart meters and ask what will the beta launch of Gov.uk hold in store for public services?
Posted: 20 Feb 2012 | Published: 21 Feb 2012

ComputerWeekly.com

May Issue of Information Security Magazine: Data Protection: Going the Distance
sponsored by Information Security Magazine
EZINE: This month’s Information Security cover story explores the practical ways you can avoid mishaps by building on the technical specifications of compliance requirements like PCI DSS. Learn to focus your efforts on not only satisfying these compliance mandates, but also create a robust, comprehensive information security program at the same time.
Posted: 05 May 2011 | Published: 05 May 2011

Information Security Magazine

2012 IBM X-Force Annual Trend and Risk Report
sponsored by IBM
WHITE PAPER: Access this informative resource to learn about the latest trends and technology that security pros are taking advantage of in order to provide effective and efficient mobile security.
Posted: 19 Jul 2013 | Published: 19 Jul 2013

IBM
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement