ASIS&T Reports

Solution Spotlight: Creating a Strong Customer Experience Management Strategy
sponsored by TechTarget Customer Experience
EGUIDE: In this e-guide, learn how to resolve communication issues between the IT and contact center departments by creating internal service-level agreements, recognizing that what's right for the organization is the same as what's right for the customer, and more.
Posted: 05 Dec 2012 | Published: 05 Dec 2012

TechTarget Customer Experience

Infographic: Who needs to be on your digital transformation team?
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Assembling the right team for a digital transformation project is critical. Transformation is a team sport - it requires experience, knowledge and the ability to influence and work with others. In this infographic, we help you figure out who needs to be on your digital transformation team and what are the key skills for each team member.
Posted: 18 Jan 2022 | Published: 18 Jan 2022

TechTarget ComputerWeekly.com

Transcript: The Changing Role of the CIO
sponsored by Hewlett Packard Enterprise
PRESENTATION TRANSCRIPT: This presentation transcript addresses the key challenges new CIOs face, their priorities in the role, how they can balance legacy systems with the need to drive change, and more.
Posted: 02 Apr 2013 | Published: 02 Apr 2013

Hewlett Packard Enterprise

Gartner Middle East CIO Leadership Forum
sponsored by Gartner
WHITE PAPER: Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.
Posted: 28 Jan 2011 | Published: 28 Jan 2011

Gartner

IBM DeveloperWorks
sponsored by IBM
SOFTWARE DOWNLOAD: The Internet provides great opportunities for networking and learning – and IT is no different. Register now for developerWorks and create your profile for access, not only to articles, webcasts and software downloads, but also a wealth of other IT professionals.
Posted: 09 Jun 2011 | Premiered: 09 Jun 2011

IBM

The Changing Role of the CIO
sponsored by Hewlett-Packard Enterprise
PRESENTATION TRANSCRIPT: This presentation transcript addresses the key challenges new CIOs face, their priorities in the role, how they can balance legacy systems with the need to drive change, and more.
Posted: 28 Nov 2012 | Published: 28 Nov 2012

Hewlett-Packard Enterprise

The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER: This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

Skillsoft

The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER: This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012

Skillsoft

Data Governance for the Enterprise
sponsored by TechTarget Business Analytics
EBOOK: Data governance is all about managing data as a business asset and ensuring that data is accurate, consistent, integrated, timely, complete and secure. This report examines the market trends for implementing data governance.
Posted: 24 Mar 2014 | Published: 24 Mar 2014

TechTarget Business Analytics

Deduplication School 2010 Presentation Download
sponsored by EMC Backup and Recovery Solutions
PRESENTATION TRANSCRIPT: This presentation download will explain how to leverage data deduplication technology to benefit your organization.
Posted: 05 Apr 2010 | Published: 05 Apr 2010

EMC Backup and Recovery Solutions

Expert Checklist: 11 Steps for Aligning Your BC/DR Program with Business Needs
sponsored by TechTarget Storage
EGUIDE: This e-guide provides an expert checklist for developing a successful business continuity program, designed with the specific needs of your organization in mind.
Posted: 25 Jul 2013 | Published: 25 Jul 2013

TechTarget Storage

Information Security Asean July 2016
sponsored by TechTarget Security
EZINE: In April, the Philippines suffered its worst-ever government data breach, when personal information, including fingerprint data and passport information, belonging to around 70 million people, were compromised.
Posted: 05 Jul 2016 | Published: 04 Jul 2016

TechTarget Security

E-Guide: DR Checklist: Tailoring your Plan to your Organization's Needs
sponsored by FalconStor Software
EGUIDE: This E-Guide is your ticket to establishing a successful disaster recovery and business continuity strategy.
Posted: 03 May 2012 | Published: 03 May 2012

FalconStor Software

Backup School 2010 Presentation Download
sponsored by TechTarget Data Backup
PRESENTATION TRANSCRIPT: Storage demands continue to grow exponentially – even as the budgets and resources available to satisfy those demands shrink. This Storage Decisions’ Data Deduplication seminar presentation download provides independent information that will help end users select the appropriate deduplication system for their IT environment.
Posted: 09 Apr 2010 | Published: 09 Apr 2010

TechTarget Data Backup

Presentation Transcript: Understanding Dedupe
sponsored by Symantec Corporation
PRESENTATION TRANSCRIPT: Access this presentation transcript, brought to you by SearchStorage.com, to develop a better understanding of data deduplication from one of the world’s leading experts on deduplication – W. Curtis Preston.
Posted: 10 Aug 2010 | Published: 10 Aug 2010

Symantec Corporation

Cybersecurity Information Sharing: Establishing New Protocols
sponsored by BMC Software, Inc.
EGUIDE: This eGuide will tune you in to the challenges of cybersecurity information sharing, why it's needed more than ever, and what can be done to keep everyone properly informed and protected. Topics covered include today's sharing initiatives, the importance of baseline cybersecurity practices, the rules governing cybersecurity information, and more.
Posted: 26 Dec 2012 | Published: 26 Dec 2012

BMC Software, Inc.

Information Security ANZ March 2016
sponsored by TechTarget
EZINE: Australian organisations face a huge skills shortage when it comes to fighting cyber-crime unless they act quickly
Posted: 03 Mar 2016 | Published: 03 Mar 2016

TechTarget

Information Security ANZ March 2014
sponsored by TechTarget Security
EZINE: This issue looks at the security challenges facing IT security professionals in the Australia/New Zealand region.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

TechTarget Security

Information Security Magazine – November 2012
sponsored by Dell SonicWALL
EZINE: Consult this enlightening online magazine to learn more about how you can keep up with the rapidly changing technology trends. Find out to defend against adversaries and create a strong enterprise that's prepared for a myriad of attacks.
Posted: 13 Nov 2012 | Published: 01 Nov 2012

Dell SonicWALL

Your Guide to Combatting Ransomware's Domination of 2017
sponsored by CyberArk
EGUIDE: Learn how to boost your ransomware security awareness in this expert e-guide. Additionally, discover why ransomware continues to be a major threat and what ransomware prevention tools can help you win the battle.
Posted: 06 Jun 2017 | Published: 02 Jun 2017

CyberArk

Developing Effective DR/BC Plans
sponsored by TechTarget Disaster Recovery
ESSENTIAL GUIDE: This handbook offers tips on how to develop and implement an effective disaster recovery plan.
Posted: 15 May 2013 | Published: 15 May 2013

TechTarget Disaster Recovery

Global Risks Report 2017
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: Society is not keeping pace with technological change, with artificial intelligence and robotics offering the greatest benefits but also the greatest negative effects, this report from the World Economic Forum reveals
Posted: 08 Feb 2021 | Published: 13 Jan 2017

TechTarget ComputerWeekly.com

Calculating Cloud ROI : From the Customer Perspective
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This white paper lays out a framework to help IT and business decision makers calculate the return on investment of cloud services.
Posted: 15 Mar 2013 | Published: 01 Jul 2012

TechTarget ComputerWeekly.com

New E-Guide: Securing and Consolidating Remote and Branch Offices
sponsored by Brocade
WHITE PAPER: The remote office/branch office (ROBO) is now a main part of many organizations' storage initiatives. This eGuide, featuring articles from Storage magazine, outlines the issues of protecting ROBO data and provides insight and strategies for...
Posted: 04 Sep 2007 | Published: 01 Sep 2007

Brocade

Computer Weekly – 5 August 2014: Driving virtualisation into pole position in Formula One
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how the Caterham F1 team has used virtualisation in its trackside technology to help race performance. We analyse how growing competition in the cloud market is affecting Amazon Web Services' dominant position. And we look at an emerging datacentre technology - silicon photonics. Read the issue now.
Posted: 04 Aug 2014 | Published: 04 Aug 2014

TechTarget ComputerWeekly.com

Computer Weekly: How cloud is saving lives
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at how the power of public cloud is helping scientists to tackle diseases such as cancer and malaria. Big banks are turning to tech startups for innovation – we ask why. And our latest buyer's guide examines micro-datacentre technologies. Read the issue now.
Posted: 08 Sep 2014 | Published: 08 Sep 2014

TechTarget ComputerWeekly.com

Proactive Security: Software vulnerability management and beyond
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide we discover why modern security professionals are moving to a more pro-active approach to cyber defence, and how managing vulnerabilities is a key element of that.
Posted: 08 Feb 2021 | Published: 17 May 2019

TechTarget ComputerWeekly.com

CI/CD Security Risks
sponsored by Palo Alto Networks
EBOOK: Pipelines open new attack surfaces if not secured properly. In this 42-page eBook, learn key strategies to lock down your CI/CD environments and processes to avoid data breaches, compromised infrastructure, and failed audits.
Posted: 08 Nov 2023 | Published: 06 Nov 2023

TOPICS:  .NET
Palo Alto Networks

Focus: Securing for the future
sponsored by TechTarget ComputerWeekly.com
EGUIDE: 2016 saw the rapid increase in the use of ransomware and a resurgence of distributed denial of service (DDoS) attacks using hijacked devices making up the internet of things (IoT) against a background of new and newly-reported breaches of personal information involving an ever-increasing number of online user accounts.
Posted: 08 Feb 2021 | Published: 10 Jan 2017

TechTarget ComputerWeekly.com

Modern Infrastructure – October 2014
sponsored by TechTarget Data Center
EZINE: Liquid immersion cooling promises efficiency and cost savings, but could be messy and require major overhauls.
Posted: 14 Oct 2014 | Published: 15 Oct 2014

TechTarget Data Center

Proactive Security: Software vulnerability management and beyond
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide we discover why modern security professionals are moving to a more pro-active approach to cyber defence, and how managing vulnerabilities is a key element of that.
Posted: 03 Jul 2020 | Published: 03 Jul 2020

TechTarget ComputerWeekly.com

Computer Weekly – 15 October 2013: What if your cloud provider shuts down?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, after a major US cloud provider collapsed, we consider the exit strategies and business continuity plans needed when buying cloud services. We learn how big data analytics helped uncover an offshore tax avoidance scandal. And we examine the role of collaboration in successful IT security. Read the issue now.
Posted: 14 Oct 2013 | Published: 15 Oct 2013

TechTarget ComputerWeekly.com