Joint Electron Device Engineering Council White Papers

(View All Report Types)
The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER: This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012

Skillsoft

Gartner Middle East CIO Leadership Forum
sponsored by Gartner
WHITE PAPER: Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.
Posted: 28 Jan 2011 | Published: 28 Jan 2011

Gartner

The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER: This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

Skillsoft

Project Management Network Diagram: A Tool for Understanding the PM Life Cycle
sponsored by Global Knowledge
WHITE PAPER: The Project Management Network Diagram (PM Network Diagram) provides a visual illustration of the project management life cycle (in terms of the chain of events that take place in a project).
Posted: 06 Jul 2006 | Published: 01 Jan 2005

Global Knowledge

Engineering the Wireless Hospital
sponsored by Aerohive Networks
EBOOK: Implementing a wireless network in a hospital allows physicians to use state-of-the-art equipment. However, there are security, infrastructure, and connectivity obstacles to overcome. Check out this e-book to learn more.
Posted: 15 Nov 2010 | Published: 15 Nov 2010

Aerohive Networks

E-Book: Engineering the Wireless Hospital
sponsored by TechTarget Health IT
EBOOK: Implementing a wireless network in a hospital allows physicians to use state-of-the-art equipment. But there are security, infrastructure and connectivity obstacles to overcome. Read this exciting E-Book to learn more about topics like device security, running your network, and more.
Posted: 13 Aug 2010 | Published: 13 Aug 2010

TechTarget Health IT

Engineering the Wireless Hospital
sponsored by CDW Healthcare
EBOOK: Implementing a wireless network in a hospital allows physicians to use state-of-the-art equipment. But there are security, infrastructure and connectivity obstacles to overcome. Read this CDW Healthcare e-book to learn how these obstacles can be eliminated.
Posted: 21 Feb 2011 | Published: 21 Feb 2011

CDW Healthcare

Computer Weekly – 18 October 2016: Singapore aims to become a digital leader
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how the city-state of Singapore is investing in skills and technology to become a leading digital nation. We examine how to prevent legacy IT becoming a hindrance to digital transformation. And we look at the impact of controversial new tax rules on the UK's IT contractor community. Read the issue now.
Posted: 16 Oct 2016 | Published: 18 Oct 2016

TechTarget ComputerWeekly.com

E-Book: Technical Guide on PCI
sponsored by TechTarget Security
EBOOK: TechTarget’s Security Media Group presents a global look at PCI, and how it is impacted by today’s evolving business needs. Our technical editors from the U.S., Europe, India and Asia provide their respective regions’ perspective on PCI compliance.
Posted: 14 Oct 2011 | Published: 10 Oct 2011

TechTarget Security

MicroScope: July 2016
sponsored by MicroScope
EZINE: The online battleground of SEO sabotage is the latest and worrying way some firms are being undermined by competitors. MicroScope looks at the issue and outlines how to stop it from wrecking website rankings
Posted: 01 Jul 2016 | Published: 01 Jul 2016

MicroScope

Best Practices for Deploying SSD
sponsored by TechTarget Storage
EBRIEF: Check out this E-Brief for best practices and key considerations regarding SSD purchase and deployment. Learn the basics of solid state storage, determine if SSD is a good fit for your company and learn the keys to success before implementing.
Posted: 21 Feb 2012 | Published: 21 Feb 2012

TechTarget Storage

Presentation Transcript: HP Care Management Solution for Health Plans
sponsored by Hewlett Packard Enterprise
PRESENTATION TRANSCRIPT: Care management programs need to reach across organizational boundaries. In this presentation transcript, HP, MicroStrategy and Informatica present their joint approach to solving your organization’s care management challenges.
Posted: 04 Nov 2010 | Published: 03 Nov 2010

Hewlett Packard Enterprise

The Growing Importance of E-Discovery on Your Business
sponsored by Google Apps
WHITE PAPER: The goal of this white paper is to focus on the key issues involved in developing an e-discovery capability and to help organizations plan to become better prepared for the rigors of the e-discovery process.
Posted: 14 Nov 2008 | Published: 14 Nov 2008

Google Apps

Why Businesses Need a More Enlightened Approach to Phishing Attacks
sponsored by PhishMe
EGUIDE: Discover why your enterprise needs to take phishing seriously, 6 tactics these types of attacks utilize, how to teach your employees to recognize phishing, and security measures to take after an employee clicks on a malicious link.
Posted: 19 Jun 2017 | Published: 14 Jun 2017

PhishMe

Computer Weekly – 19 November 2013: Software-defined networking explodes
sponsored by TechTarget Security
EZINE: In this week's Computer Weekly, we look at the fast-growing trend for software-defined networking, and how startups are shaking up the established suppliers. We examine the new guidelines for using bring your own device schemes in the public sector. And we find out how second-user software could save money on licensing. Read the issue now.
Posted: 18 Nov 2013 | Published: 18 Nov 2013

TechTarget Security

February Essentials Guide on Threat Management
sponsored by TechTarget Security
ESSENTIAL GUIDE: Today, security pros must fight on multiple fronts as cybercriminals find new ways to exploit customers and their users. In this Information Security Essential Guide, get a comprehensive look into today’s threat landscape and gain new strategies to tackle emerging cyberattacks.
Posted: 07 Feb 2012 | Published: 06 Feb 2012

TechTarget Security

ISM Essentials Guide – Threat Management
sponsored by TechTarget Security
ESSENTIAL GUIDE: In this essential guide, gain a complete overview of today's threat landscape. Discover the new platforms – such as mobile devices, social media, and the cloud – that cybercriminals are targeting, learn key antimalware strategies, and more by reading on today.
Posted: 18 Dec 2012 | Published: 18 Dec 2012

TechTarget Security

Creating Business Value with Internet-Connected and Mobile-First Strategies
sponsored by Red Hat
EGUIDE: This expert e-guide details 5 IIoT companies that prove the value of internet-connected manufacturing. Learn how IIoT offers these companies benefits like process optimization and costs saving. Additionally, educate yourself on how to choose the right middleware for your mobile-first strategy.
Posted: 09 Sep 2016 | Published: 08 Sep 2016

Red Hat

Network Security Essential Guide
sponsored by TechTarget Security
WHITE PAPER: The increasing complexity of network attack methods has made it necessary to implement equally complex security tools and - more importantly - strategies. Read this Essential Guide on information security to learn more about key elements of a well-coordinated security strategy.
Posted: 06 Feb 2013 | Published: 06 Feb 2013

TechTarget Security

Information Security Asean November 2015
sponsored by TechTarget
EZINE: The cover story looks at the cyber crime landscape in Singapore and what organisations in the city state are doing to combat it
Posted: 09 Nov 2015 | Published: 09 Nov 2015

TechTarget

The Best Prescription for EHR Interoperability
sponsored by TechTarget Health IT
EZINE: A strong dose of APIs and the cloud might be just the prescription needed for hospitals to boost health IT interoperability of electronic patient records.
Posted: 06 Sep 2017 | Published: 06 Sep 2017

TOPICS: 
TechTarget Health IT

E-Book: Tiered Storage for Health Care
sponsored by TechTarget Health IT
EBOOK: As the number of doctors and hospitals using electronic health records and digital images grows, so will the demands on storage. The strategies presented in this e-book will help health care IT professionals meet those storage needs.
Posted: 29 Jul 2010 | Published: 29 Jul 2010

TechTarget Health IT

Health care Virtual Data Center Ezine: Server Virtualization Strategies for the Health IT Pro
sponsored by Stratus Technologies
EZINE: As healthcare facilities increase their reliance on EHR systems, the need to virtualize servers becomes readily apparent. These facilities can reap the same benefits that enterprises in other industries enjoy, but there are some precautions that providers should take before they embark on a virtualization project. Read on to find out more.
Posted: 23 Aug 2011 | Published: 23 Aug 2011

Stratus Technologies

Threat Management: Devising a new strategy to tackle today's cyberattacks
sponsored by TechTarget Security
ESSENTIAL GUIDE: This Information Security Essential Guide on Threat Management explores the new strategies organizations are developing to tackle the threat of today’s growing malware threats and targeted attacks.
Posted: 31 May 2012 | Published: 31 May 2012

TechTarget Security

MicroScope E-Zine: January 2017
sponsored by MicroScope
EZINE: Is the year ahead a bright one for channel? In this January 2017 edition of MicroScope E-zine, uncover the key expectations for channel in 2017.
Posted: 04 Jan 2017 | Published: 04 Jan 2017

MicroScope

How to guard secure data
sponsored by Optum
EGUIDE: IT staffers should consider using additional applications to track all relevant devices and applications that could pose a security risk. Learn how to best protect patient data with simple security updates and ensure HIPAA compliance to lessen vulnerabilities.
Posted: 14 Jul 2016 | Published: 01 Jun 2016

Optum

An Expert Guide to the PCI DSS 3.0
sponsored by TechTarget Security
EBOOK: This expert handbook gives you the information that you require right now to understand the updated requirements for the PCI DSS 3.0, which went into effect in early 2014.
Posted: 31 Jan 2014 | Published: 31 Jan 2014

TechTarget Security

IT in Europe: Adopting an Application-Centric Architecture
sponsored by TechTarget Security
EZINE: Enterprise networking has shifted from focusing on infrastructure to concentrating on the delivery of the applications that help users do their jobs. Uncover how networking professionals view applications and how their jobs have changed as a result of a network-centric view.
Posted: 03 Nov 2011 | Published: 03 Nov 2011

TechTarget Security

MicroScope E-Zine: December 2016
sponsored by MicroScope
EZINE: Digital transformation is not just about infrastructure with tablets also back in vogue as more businesses look to increase flexibility for their staff
Posted: 01 Dec 2016 | Published: 02 Dec 2016

MicroScope