IT Agents  >   Standards Organizations  >   Telecommunications Industry Standards Organizations  >   International Telecommunication Union  >  

International Telephone and Telegraph Consultative Committee

RSS Feed   
International Telephone and Telegraph Consultative Committee White Papers (View All Report Types)
 
IT jobswatch – trends in media IT recruitment
sponsored by ComputerWeekly.com
WHITE PAPER: This quarters figures compiled by jobadswatch.co.uk show that during the fourth quarter of 2010 the IT jobs market for permanent staff being recruited by media organisations is up by 1.8%. This is the sixth consecutive quarter that has seen higher demand.
Posted: 20 Oct 2011 | Published: 15 Mar 2011

ComputerWeekly.com

8 Biggest Mistakes IT Practitioners Make
sponsored by Splunk
WHITE PAPER: Inside, learn about the eight most common mistakes that IT pros make when it comes to monitoring and troubleshooting – and read through takeaways and examples that explain how to tackle them.
Posted: 13 Feb 2019 | Published: 13 Feb 2019

Splunk

v
sponsored by ServiceNow
WHITE PAPER: To realize a greater return from the change portfolio, read this white paper, which discusses how adopting a Change and Governance Framework will renew IT's ability to become a true engine for driving business growth.
Posted: 25 Jan 2018 | Published: 01 Jan 2018

ServiceNow

The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER: This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012

Skillsoft

Gartner Middle East CIO Leadership Forum
sponsored by Gartner
WHITE PAPER: Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.
Posted: 28 Jan 2011 | Published: 28 Jan 2011

Gartner

Specialized Hardware Answers: Booming VoIP Transcoding Demands
sponsored by Sangoma Technologies
WHITE PAPER: Transcoding is a growing requirement of today’s disparate communications network environment. This whitepaper discusses transcoding and codecs, outlining their operation and application to VoIP, along with relevant products that can benefit buyers.
Posted: 15 Nov 2011 | Published: 15 Nov 2011

Sangoma Technologies

The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER: This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

Skillsoft

Project Management Network Diagram: A Tool for Understanding the PM Life Cycle
sponsored by Global Knowledge
WHITE PAPER: The Project Management Network Diagram (PM Network Diagram) provides a visual illustration of the project management life cycle (in terms of the chain of events that take place in a project).
Posted: 06 Jul 2006 | Published: 01 Jan 2005

Global Knowledge

Tips and Best practices for Enterprise Social Software Adoption
sponsored by IBM
EGUIDE: Most businesses today are aware of the benefits of social technologies, but many organizations are finding that simply deploying social tools isn't enough to ensure social success or user adoption. Read this e-guide to learn 4 steps that lead to enterprise-wide user adoption and the importance of establishing a collaborative environment.
Posted: 14 Nov 2012 | Published: 14 Nov 2012

IBM

First edition of Computer Weekly 1966
sponsored by ComputerWeekly.com
EBOOK: To celebrate Computer Weekly's 50th anniversary, the National Museum of Computing, which holds the print archives of the magazine, has scanned the first issue of Computer Weekly. We have made this available to download.
Posted: 09 Sep 2016 | Published: 09 Sep 2016

ComputerWeekly.com

Drilling to the Core of Better CEM
sponsored by SearchCRM
EZINE: This 3-article E-Zine offers analysis and advice for the CEM professional. In the featured article, Cameron Kittle reviews CEM technologies and shares the thoughts of industry observers who stress that a company should first know what it intends to do with its wired connection to customers. Continue on for this article and more.
Posted: 13 Nov 2012 | Published: 13 Nov 2012

SearchCRM

CRM Analytics: How to Make the Most of Customer Data
sponsored by SearchCRM
EBOOK: The right combination of technology and human resources behind CRM analytics can provide a competitive advantage. Discover how you can empower sales, marketing, and customer service teams to make smarter, data-driven decisions with CRM analytics.
Posted: 22 Jan 2016 | Published: 22 Jan 2016

SearchCRM

Making the Most of Customer Data Using CRM Analytics
sponsored by SearchCRM
WHITE PAPER: Explore this expert e-book for advice on choosing a CRM platform that suits your needs, and learn how to construct a well-defined plan to put social media analytics into a broader enterprise context.
Posted: 02 Apr 2013 | Published: 02 Apr 2013

SearchCRM

Navigating your Future within an SOA information manufacturing system
sponsored by ComputerWeekly.com
BOOK: As the IT industry reaches maturity, IT departments should think of themselves not as data centres but as manufacturing centres for information. Terry Keene argues in this short e-book.
Posted: 27 Aug 2013 | Published: 27 Aug 2013

ComputerWeekly.com

Terrorist use of the internet
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Terrorists are using web technology to help them launch cyber-attacks. What are the current and future threats?
Posted: 23 May 2014 | Published: 23 May 2014

ComputerWeekly.com

The unlikely origins of online banking
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Bryan Johnston, former CEO of TSB Northern Ireland, tells the story behind the bank's development of the first online real-time banking system in Europe.
Posted: 12 Sep 2014 | Published: 12 Sep 2014

ComputerWeekly.com

A Case for IT Security: The Future of New EU Data Protection
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the UK prepares new laws on surveillance and data collection, we hear from security experts on the challenges of balancing privacy and security. Read on to identify implications of new EU data protection rules, as well as examine the growing threat of ransomware and how to tackle it.
Posted: 15 Jan 2016 | Published: 19 Jan 2016

ComputerWeekly.com

CW Special Report on CSC
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 16-page report from Computer Weekly analyses the challenges facing CSC, its financial performance, the services it offers, its place in the IT market and its future strategy.
Posted: 29 Apr 2013 | Published: 29 Apr 2013

ComputerWeekly.com

CW+: Quocirca report: Effective public sector citizen communication
sponsored by ComputerWeekly.com
WHITE PAPER: The UK public sector is in the midst of a period of transformation and improving citizen engagement will be key to the success of this change.
Posted: 21 Oct 2011 | Published: 12 Aug 2010

ComputerWeekly.com

Microscope - June 2013: A special issue announcing the MicroScope ACEs winners
sponsored by MicroScope
EZINE: A special issue announcing the winners of the MicroScope Awards for Channel Excellence
Posted: 06 Jun 2013 | Published: 10 Jun 2013

MicroScope

ComputerWeekly's 50 Most Influential Women in IT 2018
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide we showcase some of the industry role models who break the stereotypical IT mold, and share opinions on what we can do to make the industry more diverse and inclusive.
Posted: 02 Oct 2018 | Published: 02 Oct 2018

ComputerWeekly.com

Computer Weekly 4 October 2011: Download the latest issue of the UK's leading technology publication, with our analysis of the business technology news that matters to IT managers
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, transformation. Download the new issue now.
Posted: 03 Oct 2011 | Published: 04 Oct 2011

ComputerWeekly.com

CW+: Global Simplicity Index – how complicated is your business?
sponsored by ComputerWeekly.com
WHITE PAPER: If you knew that your business was wasting 10% of its R&D spend or 15% of its marketing budget, you would do something about it. Very quickly
Posted: 20 Oct 2011 | Published: 14 Mar 2011

ComputerWeekly.com

Social Engineering in IT Security
sponsored by ComputerWeekly.com
BOOK: This extract from Sharon Conheady's book, Social Engineering in IT Security, gives an overview of Social Engineering techniques and explains how organisations can protect themselves.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

ComputerWeekly.com

Computer Weekly – 17 March 2015: Smartwatches mean business
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the potential enterprise uses of the Apple Watch, and find out what sort of apps might work for businesses. Our latest buyer's guide discusses the future of the desktop computer. And we look at how technology is being used to improve customer experience for big consumer-facing organisations.
Posted: 13 Mar 2015 | Published: 13 Mar 2015

ComputerWeekly.com

Virtual currencies and their potential role in cyber crime
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series looks at the potential for misuse of virtual currencies and legal landscape in the UK.
Posted: 04 Aug 2016 | Published: 04 Aug 2016

ComputerWeekly.com

Women in IT: Inspiring the next generation
sponsored by ComputerWeekly.com
BOOK: This book seeks to encourage more girls and women to consider a career in IT by showcasing the lives and careers of female IT professionals, entrepreneurs and academics.
Posted: 10 Oct 2014 | Published: 10 Oct 2014

ComputerWeekly.com

Computer Weekly – 6 February 2018: How a digital workplace can drive innovation
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at some of the latest tools for the digital workplace and find out how they can improve collaboration and innovation. We ask what lessons the demise of Carillion has for IT outsourcing. And the CIO of retailer River Island tells us how technology is changing the high street in fashion. Read the issue now.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

ComputerWeekly.com

CW+: Bloor Research - EU Compliance and Regulations for the IT Professional
sponsored by ComputerWeekly.com
WHITE PAPER: This paper highlights key directives and legislation within the European Union that have an impact on IT security practitioners, especially those responsible for the safe storage of data using data loss prevention technologies.
Posted: 20 Oct 2011 | Published: 06 Jan 2011

ComputerWeekly.com

Computer Weekly Network IT case studies
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Jennifer Scott takes a look at what made the winning entries stand out from the crowd in the Computer Weekly European User Awards.
Posted: 01 Jul 2013 | Published: 01 Jul 2013

ComputerWeekly.com

Computer Weekly – 4 August 2015: Cyber risks hit the road
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, after hackers took remote control of a Jeep Cherokee, we assess the security concerns for internet-connected cars. With the growth of digital banking, is there a need for high-street branches anymore? And we examine whether email overload is hindering the UK's economic productivity. Read the issue now.
Posted: 03 Aug 2015 | Published: 03 Aug 2015

ComputerWeekly.com

Presentation Transcript: Business Case for Data Protection Survey & Results
sponsored by Ounce Labs, an IBM Company
PRESENTATION TRANSCRIPT: This presentation transcript presents the results of a survey conducted by Ponemon Institute and sponsored by Ounce Labs, an IBM Company. The survey determines what senior executives think about the value proposition of corporate data protection efforts. Read on to learn more.
Posted: 28 Oct 2009 | Published: 21 Oct 2009

Ounce Labs, an IBM Company

Aberdeen Study: Laptop Lost or Stolen? Five Questions to Ask and Answer
sponsored by Intel
ANALYST REPORT: For every 100 laptop PCs companies issue, 15 will never be seen again, according to this research report sponsored partly by Intel. Five will be lost or stolen (one recovered) and 11 will simply vanish, leaving companies stuck for millions of dollars in compromised data alone.
Posted: 27 Apr 2010 | Published: 01 Feb 2010

Intel
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement