Property Management Industry White Papers

(View All Report Types)
Averting Catastrophe: How Real-Time Location Intelligence Can Mitigate Exposure and Better Manage Risk
sponsored by Pitney Bowes Group 1 Software
WHITE PAPER: What is location intelligence? From an actuary perspective, it's the accessment of risk based on the physical location of real estate. This paper examines how location intelligence links data to precise physical coordinates.
Posted: 25 Apr 2008 | Published: 01 Apr 2008

Pitney Bowes Group 1 Software

Measuring the Business Impacts of Effective Data: Chapter One of a Three-Part Study
sponsored by Sybase, an SAP company
WHITE PAPER: This study of over 150 Fortune 1000 firms from every major industry or vertical explores issues associated with the lifeblood of today’s enterprises: data. The findings demonstrate the often dramatic impacts that even marginal investments in information technology can have when that technology addresses data quality, usability, and intelligence.
Posted: 02 Nov 2010 | Published: 02 Nov 2010

Sybase, an SAP company

Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007

Xtore

China Auto Industry Research - Inside China: The Chinese View Their Automotive Future
sponsored by IBM Line of Business
WHITE PAPER: Automotive manufacturers and suppliers view China as the largest combination of automotive market and low-cost manufacturing and supply base to appear in decades.
Posted: 12 Jun 2008 | Published: 01 Nov 2005

IBM Line of Business

Building Your Business Case for Managed File Transfer
sponsored by OpenText
WHITE PAPER: The following paper is designed to act as a resource for completing a business report for a Managed File Transfer Solution. The paper will begin by detailing some of the costs associated with traditional methods of file transfer, followed by benefits of having an MFT solution, and some resources for business report writing.
Posted: 15 Nov 2011 | Published: 11 Nov 2011

OpenText

Negotiating cloud contracts
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article, drawing on sources including interviews with cloud computing providers, users and other market actors, is the first in-depth research into how cloud contracts are negotiated.
Posted: 24 Jan 2013 | Published: 24 Jan 2013

TechTarget ComputerWeekly.com

Defending Web Properties From Modern Threats
sponsored by Citrix
WHITE PAPER: Your applications are growing—and so are the threats. Discover how you can protect it all using just one solution.
Posted: 10 Mar 2015 | Published: 10 Mar 2015

TOPICS:  IT Management
Citrix

IT Briefing: Is JD Edwards EnterpriseOne Right for Your Business?
sponsored by Oracle Corporation
IT BRIEFING: JD Edwards EnterpriseOne is a comprehensive and highly integrated suite of core business applications including things like financials, manufacturing, distribution, supply chain management, human capital management and so forth.
Posted: 19 May 2009 | Published: 07 Jan 2009

Oracle Corporation

FlexiCapture Drives Business For the Insurance Industry
sponsored by ABBYY
WHITE PAPER: Insurance agents across the country are saving time, saving money and writing more business using AppReader: The automated form conversion solution that allows applications to upload instantly to carrier systems, regardless of agency management system. Read on and find how how AppReader can benefit your business.
Posted: 23 Feb 2011 | Published: 23 Feb 2011

ABBYY

IBM Information Lifecycle Management in Regulated Industries
sponsored by IBM
WEBCAST: Attend this Webcast, and listen as IDC's Research Director, Laura DuBois, discusses the issues around identifying and classifying information.
Posted: 18 Oct 2006 | Premiered: Nov 1, 2006, 13:00 EST (18:00 GMT)

IBM

Choosing visual properties for successful visualizations
sponsored by IBM
WHITE PAPER: In the following article, IBM experts address a key aspect in the design process.
Posted: 09 Oct 2013 | Published: 09 Oct 2013

IBM

Demo: Tivoli Identity Manager Express - Highlighting Security and Identity Management
sponsored by IBM
SOFTWARE DEMO: This multi-part demonstration highlights the security and identity management functions, features, and value of IBM Tivoli Identity Manager Express, including how it can benefit your organization's endpoint security.
Posted: 13 Mar 2009 | Premiered: 13 Mar 2009

IBM

Spotlight on the Middle East: Emerging IT economy
sponsored by TechTarget ComputerWeekly.com
EGUIDE: We focus on how countries in the Middle East region are trying to diversify their economies away from oil revenues. We look at how Saudi Arabia is trying to create their own version of Silicon Valley, how Dubai is trying to incorporate bitcoin into the property sector and how the UAE is trying to harness the power of artificial intelligence.
Posted: 08 Feb 2021 | Published: 29 May 2018

TechTarget ComputerWeekly.com

Demystifying Big Data: Facts vs. Hype
sponsored by TechTarget Data Management
EGUIDE: What is "big data" and why is the IT industry talking about it so much? In this expert e-guide, discover what Gartner Inc. says about the emergence of a big data hype cycle.
Posted: 30 Sep 2013 | Published: 27 Sep 2013

TechTarget Data Management

Computer Weekly – 22 January 2013: Technology takes off at Heathrow Terminal 2
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we go behind the scenes at the building of Heathrow's high-tech Terminal 2 and hear from its CIO about the IT innovations. John Lewis saw 44% online sales growth over Christmas – we find out how the IT team delivered. And News International talks about moving its IT to Amazon's public cloud. Read the issue now.
Posted: 21 Jan 2013 | Published: 22 Jan 2013

TechTarget ComputerWeekly.com

E-Guide: Monitoring Strategies for Insider Threat Detection
sponsored by ArcSight, an HP Company
EGUIDE: Insider threat detection is a vital part of the security of any enterprise organisation. In this guide, learn about the three types of insider crimes and their own set of insider threat detection tactics.
Posted: 13 Dec 2010 | Published: 10 Dec 2010

ArcSight, an HP Company

Data Protection 101: Essential Steps for Holistic Information Security
sponsored by TechTarget Security
EGUIDE: Data protection strategies should not only focus on safeguarding corporate information, but also identifying sensitive records that are subject to regulatory controls. This e-guide offers a comprehensive overview of data protection best practices for ensuring both security and compliance.
Posted: 17 Nov 2011 | Published: 17 Nov 2011

TechTarget Security

Software Compliance Management: Automating License Compliance in the New, Mixed-IP Development World
sponsored by Black Duck Software
WHITE PAPER: Software compliance management systems help ensure enterprises achieve the business acceleration they want from software reuse, while meeting the stringent requirements of shareholders, regulators and customers for proper management of company.
Posted: 13 Oct 2008 | Published: 01 Jul 2008

Black Duck Software

How IFCG Protects Their Data With Managed Security
sponsored by No Panic Computing
CASE STUDY: Independent Financial Concepts Group (IFGC) knew that they needed a solution to help them configure, secure and support the devices containing sensitive information at a low cost. Read on to learn who IFGC turned to in order to help them do just that.
Posted: 14 Jun 2013 | Published: 14 Jun 2013

No Panic Computing

Managing Security Risks and Vulnerabilities
sponsored by IBM
WHITE PAPER: Read now to learn about automated labor-saving automation, a platform that incorporates vulnerability analysis, risk management, and remediation support, all within a single console.
Posted: 06 Mar 2014 | Published: 31 Jan 2014

IBM

Case Study: Eldorado Hotel Casino & Silver Legacy Resort Casino
sponsored by NEC Corporation
CASE STUDY: Read this case study to learn how Eldorado Hotel Casino & Silver Legacy Resort Casino enhanced guest experience, discovered new revenue streams, streamlined employee workflow, and lowered total cost of ownership by implementing UNIVERGE communications framework and servers.
Posted: 24 Aug 2009 | Published: 05 Aug 2009

NEC Corporation

Managing Instant Messaging for Business Advantage: Phase Two - Protecting against IM Threats
sponsored by Symantec Corporation
WHITE PAPER: This white paper provides a four phase approach for effectively managing the risks and costs associated with the corporate use of IM. Learn more about how this four phase approach can help your company establish an effective IM usage policy.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

The Evolution of Asset Management
sponsored by IBM Line of Business
WHITE PAPER: This paper will discuss key perspectives and strategies for new asset management programs within the most capital intensive and revenue producing area of today's businesses.
Posted: 16 Jun 2008 | Published: 01 Feb 2008

IBM Line of Business

Anti-X and the Mob: Addressing Content-Borne Threats with Unified Threat Management
sponsored by Juniper Networks, Inc.
WEBCAST: Register for this webcast to learn more about the anatomy of a modern blended attack and how Unified Threat Management from Juniper Networks can help stop these threats at various points of their progression.
Posted: 30 Sep 2008 | Premiered: Sep 30, 2008

Juniper Networks, Inc.

IBM Rational Asset Manager e-Kit
sponsored by IBM
PRODUCT DEMO: Explore the benefits of Rational Asset Manager with this IBM e-Kit. The e-Kit includes demos, white papers and a webcast. Discover how to track and audit your assets to utilize them for reuse, especially within a service-oriented architecture.
Posted: 16 Mar 2009 | Premiered: 13 Mar 2009

IBM

How to create an effective data protection strategy for IT compliance
sponsored by TechTarget Security
EGUIDE: Data protection strategies should not only focus on safeguarding corporate information, but also identifying sensitive records that are subject to regulatory controls. This tip guide offers a comprehensive overview of data protection best practices for ensuring both security and compliance.
Posted: 01 Dec 2011 | Published: 01 Dec 2011

TechTarget Security

10 Steps to Managing Risk and Regulatory Compliance in Blogs and Wikis
sponsored by Techrigy
WHITE PAPER: Risks related to collaboration tools like blogs and wikis can create legal liability and regulatory problems. Learn how to gain competitive advantage from these community-building tools while ensuring the content in them is appropriate and secure.
Posted: 08 Oct 2007 | Published: 01 Sep 2007

Techrigy