IT Agents  >   Standards Organizations  >   Electronics Industry Standards Organizations  >  

IEC

RSS Feed   
IEC White Papers (View All Report Types)
 
8 Biggest Mistakes IT Practitioners Make
sponsored by Splunk
WHITE PAPER: Inside, learn about the eight most common mistakes that IT pros make when it comes to monitoring and troubleshooting – and read through takeaways and examples that explain how to tackle them.
Posted: 13 Feb 2019 | Published: 13 Feb 2019

Splunk

IT jobswatch – trends in media IT recruitment
sponsored by ComputerWeekly.com
WHITE PAPER: This quarters figures compiled by jobadswatch.co.uk show that during the fourth quarter of 2010 the IT jobs market for permanent staff being recruited by media organisations is up by 1.8%. This is the sixth consecutive quarter that has seen higher demand.
Posted: 20 Oct 2011 | Published: 15 Mar 2011

ComputerWeekly.com

Project Management Network Diagram: A Tool for Understanding the PM Life Cycle
sponsored by Global Knowledge
WHITE PAPER: The Project Management Network Diagram (PM Network Diagram) provides a visual illustration of the project management life cycle (in terms of the chain of events that take place in a project).
Posted: 06 Jul 2006 | Published: 01 Jan 2005

Global Knowledge

The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER: This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012

Skillsoft

The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER: This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

Skillsoft

Gartner Middle East CIO Leadership Forum
sponsored by Gartner
WHITE PAPER: Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.
Posted: 28 Jan 2011 | Published: 28 Jan 2011

Gartner

Governance of IT, an executive guide to ISO/IEC 38500
sponsored by ComputerWeekly.com
BOOK: This extract from the book: Governance of IT, an executive guide to ISO/IEC 38500, tells you the key things you need to consider before you start a project implementation.
Posted: 19 Dec 2013 | Published: 19 Dec 2013

ComputerWeekly.com

Open Group: FAIR -ISO/IEC 27005 Cookbook
sponsored by ComputerWeekly.com
WHITE PAPER: The purpose of this document is to help the security practitioner responsible for their organization’s risk estimation function to utilize The Open Group Risk Management Frameworkin an ISO/IEC 27005 structured process.
Posted: 24 Oct 2011 | Published: 02 Feb 2011

ComputerWeekly.com

Israel Electric Corporation Moves Toward Smarter Maintenance
sponsored by IBM
CASE STUDY: This use case describes how Israel's largest electricity provider utilizes IBM's predictive analytics software to monitor its turbine performance in real time, enabling the company to discover and resolve anomalies before outages occur.
Posted: 25 Feb 2015 | Published: 30 Sep 2013

IBM

Storage Capacity 101 to Post-Grad in a Flash
sponsored by ComputerWeekly.com
ANALYST REPORT: In this report from Quocirca, analyst Clive Longbottom explains why you don't always get what you think you're getting with flash storage.
Posted: 14 Mar 2016 | Published: 14 Mar 2016

ComputerWeekly.com

Key Insights for Building “Consumerised” End-User Services
sponsored by ComputerWeekly.com
IT BRIEFING: This report extract from the Corporate Executive Board gives IT organisations an insight into the best approaches to building and managing consumer technology in the workplace.
Posted: 29 Nov 2012 | Published: 05 Oct 2011

ComputerWeekly.com

Building consumerised end-user services
sponsored by ComputerWeekly.com
IT BRIEFING: This report extract from the Corporate Executive Board, presents key facts and figures on the take up of consumer technology in the workplace.
Posted: 31 Jan 2012 | Published: 10 May 2012

ComputerWeekly.com

Information security for SMEs
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: In this article, from our Royal Holloway Security Thesis series, we propose a simplified implementation approach for an information security management system (ISMS) for SMEs.
Posted: 23 May 2014 | Published: 23 May 2014

ComputerWeekly.com

Mobile NFC in Transport
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This in-depth report from the GSMA explains the opportunities for NFC Mobile communications in transport.
Posted: 23 Nov 2012 | Published: 23 Nov 2012

ComputerWeekly.com

How to Write Secure Code in C
sponsored by Perforce
WHITE PAPER: According to the Software Engineering Institute (SEI), 90% of reported security incidents result from exploiting vulnerabilities in software code or design. Don't let simple coding errors lead to hacking threats. Take a look at this whitepaper to learn 4 ways to ensure your code is secure.
Posted: 29 Apr 2019 | Published: 29 Apr 2019

Perforce

The Open Group Service Integration Maturity Model (OSIMM) Version 2
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Download the Open Group Service Integration Maturity Model (OSIMM).
Posted: 17 Jan 2012 | Published: 17 Jan 2012

ComputerWeekly.com

Plugging Into Zero Clients Powers Investment Programme
sponsored by Dell
CASE STUDY: Discover how a VDI solution enabled improvement of a desktop environment by centralizing data to tighten security.
Posted: 14 Nov 2014 | Published: 31 Oct 2014

Dell

Acumin Contract Rate Index August 2012
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Check out the daily contract rates for IT security professionals in this research from Acumin and Computer Weekly.
Posted: 27 Sep 2012 | Published: 27 Sep 2012

ComputerWeekly.com

Securing Industrial Control Systems With Fortinet
sponsored by Fortinet, Inc.
WHITE PAPER: In recent years, the industrial control systems (ICS) upon which much of our critical infrastructure and manufacturing industry depends, have come under increasingly frequent and sophisticated cyberattacks. In this white paper, learn how, in spite of these challenges, Fortinet's solutions can help to ensure the safety and reliability of ICS.
Posted: 14 Aug 2019 | Published: 14 Aug 2019

Fortinet, Inc.

Next-Gen Network Security for ICS/SCADA
sponsored by Palo Alto Networks
DATA SHEET: In this solution brief, find the business drivers, business benefits, and operational benefits that you need to know about Palo Alto Network's Next-Generation Security Platform.
Posted: 12 Aug 2019 | Published: 12 Aug 2019

Palo Alto Networks

Open Group technical document: The Single Unix Specification
sponsored by ComputerWeekly.com
WHITE PAPER: This document is designed for users, developers, and implementors of open systems. It provides complete infor mation on what’s new in the Single UNIX Specification, Version 4, including POSIX.1-2008,with comprehensive reference material on every aspect.
Posted: 20 Oct 2011 | Published: 25 Oct 2010

ComputerWeekly.com

Open Information Security Management Maturity Model (O-ISM3)
sponsored by ComputerWeekly.com
WHITE PAPER: The O-ISM3 is The Open Group framework for managing information security and information in the Open Information Security Management Maturity Model (O-ISM3) wider context. It aims to ensure that security processes in any organization are implemented so as to operate at a level consistent with that organization's business requirements.
Posted: 21 Oct 2011 | Published: 12 Jan 2011

ComputerWeekly.com

Mitigating OT Cyber Risk with the Fortinet Security Fabric
sponsored by Fortinet, Inc.
WHITE PAPER: Organizations are leveraging digital technologies such as IoT, cloud, artificial intelligence (AI), and others to optimize operations, improve safety and reliability, and gain a competitive edge.
Posted: 15 Aug 2019 | Published: 15 Aug 2019

Fortinet, Inc.

Solutions for Network Closets
sponsored by Schneider Electric
WHITE PAPER: Convergence, consolidation, virtualization - today's IT trends have turned the network closet into a mission-critical environment. APC solutions give you the level of control, monitoring, and management that today’s more critical systems demand.
Posted: 23 Oct 2009 | Published: 23 Oct 2009

Schneider Electric

Considerations for Developing a Cyber Threat Intelligence Team
sponsored by Farsight Security
EGUIDE: In this e-guide, explore the best practices for team location and selection when developing a cyberthreat intelligence team.
Posted: 04 Sep 2019 | Published: 10 Oct 2017

Farsight Security

Considerations for CuttingEdge Threat Intelligence & Incident Response
sponsored by Farsight Security
EGUIDE: The use of a cyberthreat intelligence team can greatly help organizations. Learn the best practices for team location and selection from expert Robert M. Lee.
Posted: 10 Sep 2019 | Published: 10 Sep 2019

Farsight Security

CW+: Mobile payments market opportunities for business
sponsored by ComputerWeekly.com
WHITE PAPER: The definition of a mobile payment is often open to interpretation and can differ from source to source.    Juniper Research has a simple definition of a mobile payment as “payment for goods or services with a mobile device such as a phone, Personal Digital Assistant (PDA), or other such device.”
Posted: 21 Oct 2011 | Published: 20 Dec 2010

ComputerWeekly.com

Cisco 870 Series Integrated Services Routers for Small Offices
sponsored by Cisco Systems, Inc.
SOFTWARE LISTING: The Cisco 850 and Cisco 870 series routers support a secure, affordable, and easy-to-use wireless LAN solution that combines mobility and flexibility with the enterprise-class features required by networking professionals.
Posted: 10 Jul 2008 | Published: 01 Jan 2005

Cisco Systems, Inc.

A Security Approach for Protecting Converged IT and OT
sponsored by Fortinet, Inc.
WHITE PAPER: Operational technology (OT) networks have traditionally been kept separate from information technology (IT) networks. But as the integration of OT and IT is accelerates, OT networks are more exposed than ever to attacks coming from IT networks. Find out how you can thwart attacks and minimize OT risk with 5 best practices in this white paper.
Posted: 12 Aug 2019 | Published: 12 Aug 2019

Fortinet, Inc.

How to Comply With the ISO 26262 Standard
sponsored by Perforce
WHITE PAPER: ISO 26262 is a functional safety standard used in the automotive industry that includes requirements for software development and design. In this whitepaper, learn how using a coding standard and a static code analyzer help organizations comply with ISO 26262 requirements.
Posted: 29 Apr 2019 | Published: 29 Apr 2019

Perforce

Security Pay Rates: UK Permanent Salary Index February 2013
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This research from Acumin and Computer Weekly charts the rate for the job for over 60 IT security and compliance roles.
Posted: 19 Feb 2013 | Published: 19 Feb 2013

ComputerWeekly.com
 
Browse by Report Type:
IEC White Papers | IEC Multimedia | IEC IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement