Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Intellectual Property Law  >   Intellectual Property  >  

Patents of Invention

RSS Feed   
Patents of Invention White Papers (View All Report Types)
 
Paths to Success: Three Ways to Innovate Your Business Model
sponsored by IBM Line of Business
WHITE PAPER: In today's ever-changing times,innovation in business models is a success differentiator for CEOs,as we learned from the IBM 2006 Global CEO Study.
Posted: 29 Nov 2007 | Published: 01 Jun 2007

IBM Line of Business

Advancing Healthcare through the Application of Predictive Knowledge Management
sponsored by DellEMC and Intel®
WHITE PAPER: This white paper examines how the health care industry can proactively support patient-focused care through the use of technology services that enable predictive analysis.
Posted: 20 Jun 2012 | Published: 20 Jun 2012

DellEMC and Intel®

The Performance Manager: Turning Information Into Higher Business Performance
sponsored by IBM
WHITE PAPER: Download this white paper for an extensive summary of The Performance Manager, Proven Strategies for Turning Information into Higher Business Performance, a book that examines the partnership between decision-makers and the people who provide them with information to drive better decisions.
Posted: 20 Jul 2009 | Published: 14 Feb 2008

IBM

E-Discovery Cross-Border Data Compliance
sponsored by Exterro
WHITE PAPER: This white paper highlights two popular cross-border cases and recent developments in global data privacy laws, while also addressing common questions that legal teams are presented when faced with cross-border e-discovery issues and best practices for improving e-discovery and regulatory cross-border privacy processes.
Posted: 16 Apr 2014 | Published: 16 Apr 2014

Exterro

Using enterprise architecture to develop a blueprint for improving your energy efficiency and reducing your carbon footprint
sponsored by IBM
WHITE PAPER: This whitepaper is about enterprise architecture as it pertains to finding and maximizing the business value in greener operations. Higher energy efficiency and a smaller carbon footprint are obvious areas of interest for any business, but how do you balance these goals with productivity, customer service, and all your other business concerns?
Posted: 09 Apr 2009 | Published: 31 Dec 2008

IBM

Implementing an Effective Data Loss Prevention Solution for Your Network
sponsored by IBM
WHITE PAPER: Read this paper for a thorough examination of data loss prevention and for a step-by-step guide for implementing an effective DLP solution in your organization.
Posted: 27 Oct 2009 | Published: 25 Jul 2009

IBM

Managing Instant Messaging for Business Advantage: Phase Two - Protecting against IM Threats
sponsored by Symantec Corporation
WHITE PAPER: This white paper provides a four phase approach for effectively managing the risks and costs associated with the corporate use of IM. Learn more about how this four phase approach can help your company establish an effective IM usage policy.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

Kazeon Data Privacy & Security Solution
sponsored by Kazeon
WHITE PAPER: This white paper examines an Information Classification Management (ICM) solution that helps classify and secure your company's sensitive information and overcome the challenges of securing data while complying with federal guidelines.
Posted: 22 Nov 2006 | Published: 01 Nov 2006

Kazeon

Case Study: Top 5 Communications Company Evaluates Leading eDiscovery Solutions
sponsored by AccessData Group
WHITE PAPER: The following case study examines the decision made by a Top 5 Communications Company to implement AccessData (AD)eDiscovery. The company found AccessData Group's product to be the solution that best addressed their internal requirements. The following reviews the findings and the benefits received as a result of implementing AccessData technology.
Posted: 11 Apr 2011 | Published: 06 Apr 2011

AccessData Group

Anatomy of a Data Breach: Why Breaches Happen…and What to Do About It
sponsored by Symantec Corporation
WHITE PAPER: This paper examines the three most common causes of data breaches—well-meaning insiders, targeted attacks from outside the organization, and malicious insiders-- and then illustrates each cause to show that breaches can occur in.
Posted: 03 Sep 2009 | Published: 10 Aug 2009

Symantec Corporation
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement