IT Agents  >  

Consortia

RSS Feed   
Consortia Reports
 
Five Myths of Agile Development
sponsored by VersionOne Inc.
WHITE PAPER: In this white paper, you will gain insight into five myths commonly associated with agile development. Explore what agile development is in reality, what it is not, and the true benefits of transitioning to agile methods in your organization.
Posted: 15 Oct 2008 | Published: 26 Sep 2008

VersionOne Inc.

Infographic: Who needs to be on your digital transformation team?
sponsored by ComputerWeekly.com
INFOGRAPHIC: Assembling the right team for a digital transformation project is critical. Transformation is a team sport - it requires experience, knowledge and the ability to influence and work with others. In this infographic, we help you figure out who needs to be on your digital transformation team and what are the key skills for each team member.
Posted: 18 Jan 2022 | Published: 18 Jan 2022

ComputerWeekly.com

Solution Spotlight: Creating a Strong Customer Experience Management Strategy
sponsored by SearchCRM
EGUIDE: In this e-guide, learn how to resolve communication issues between the IT and contact center departments by creating internal service-level agreements, recognizing that what's right for the organization is the same as what's right for the customer, and more.
Posted: 05 Dec 2012 | Published: 05 Dec 2012

SearchCRM

Transcript: The Changing Role of the CIO
sponsored by Hewlett Packard Enterprise
PRESENTATION TRANSCRIPT: This presentation transcript addresses the key challenges new CIOs face, their priorities in the role, how they can balance legacy systems with the need to drive change, and more.
Posted: 02 Apr 2013 | Published: 02 Apr 2013

Hewlett Packard Enterprise

The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER: This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012

Skillsoft

Gartner Middle East CIO Leadership Forum
sponsored by Gartner
WHITE PAPER: Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.
Posted: 28 Jan 2011 | Published: 28 Jan 2011

Gartner

The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER: This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

Skillsoft

The Changing Role of the CIO
sponsored by Hewlett-Packard Enterprise
PRESENTATION TRANSCRIPT: This presentation transcript addresses the key challenges new CIOs face, their priorities in the role, how they can balance legacy systems with the need to drive change, and more.
Posted: 28 Nov 2012 | Published: 28 Nov 2012

Hewlett-Packard Enterprise

Compliance Standards for Data Governance
sponsored by Smarsh
EGUIDE: This e-guide teaches you about data governance and how to best comply with data quality assurance policies put in place by industry consortia. Learn about the framework for ensuring the fidelity of data used in business processes.
Posted: 26 Feb 2016 | Published: 22 Feb 2016

Smarsh

E-Book: Compliance in the EU, U.S.A.-- Learn What U.S. Companies Need to Know About European Union Compliance and Vice Versa
sponsored by SearchCompliance.com
EBOOK: Read this e-book to learn about compliance differences in the U.S.A. and the EU, and differences between global business continuity standards.
Posted: 05 Feb 2010 | Published: 05 Feb 2010

SearchCompliance.com

Data Governance Strategies for the Digital Age
sponsored by SearchCompliance.com
EBOOK: The digital age has forced many companies to alter - and sometimes completely revamp - data governance processes. In this handbook, learn about big data governance complications and the latest information management strategies for adapting to increased storage needs, data-specific compliance mandates and security vulnerabilities in the digital age.
Posted: 24 Aug 2015 | Published: 24 Aug 2015

SearchCompliance.com

Increase ARPU, Add Applications and Ensure Policy, QoS and Security
sponsored by Mu Dynamics
PRESENTATION TRANSCRIPT: Recent rulings around Net Neutrality and Lawful Intercept are enabling service providers to take more control over the applications running on their networks. But, due to Facebook and Twitter, operators are struggling to test these policies.
Posted: 14 Feb 2011 | Published: 14 Feb 2011

Mu Dynamics

How New Technologies Are Leading the Public Sector Through Pandemic Recovery
sponsored by Maven Wave
WHITE PAPER: Maven Wave has collaborated with Google to develop a new virtual career center (VCC) based on capabilities in Google Cloud and Google Workspace. Explore the details of the VCC here.
Posted: 16 Sep 2021 | Published: 16 Sep 2021

TOPICS:  .NET
Maven Wave

Securing IoT in 3 steps
sponsored by SearchSecurity.com
EZINE: A lack of proper security testing for IoT devices could create security risks in your organization. This resource provides IT security pros with a deeper understanding into how they can improve IoT security within their companies.
Posted: 10 Jan 2017 | Published: 10 Jan 2017

SearchSecurity.com

Cloud Risk Management: Governance Strategies to Protect Digital Assets
sponsored by SearchCompliance.com
EBOOK: In this handbook, learn data protection techniques for the public and private cloud, including advice to mitigate cloud data risks, implement information security best practices and determine what cloud data protection approach is best for your organization.
Posted: 05 Oct 2015 | Published: 05 Oct 2015

SearchCompliance.com

A Computer Weekly Buyer's Guide to Network Function Virtualisation
sponsored by ComputerWeekly.com
EBOOK: Fixed network architectures are not flexible enough to cope with today's networking needs – hence the growingpopularity of network function virtualisation. In this Computer Weekly buyer's guide, we look at the progress ofOpenStack's Neutron, how NFV can add network flexibility, and how telcos are saving on WAN infrastructure.
Posted: 19 Dec 2016 | Published: 19 Dec 2016

ComputerWeekly.com

An Introduction to Quantum Lifecycle Management
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from The Open Group introduces QLM, explains why it is necessary and how its development and acceptance will be assured.
Posted: 18 Jan 2013 | Published: 05 Nov 2012

ComputerWeekly.com

Beyond BYOD: How IoT and new tech is changing modern GRC
sponsored by SearchCompliance.com
EBOOK: As the IoT continues to gain popularity, capitalizing on its business benefits require big changes to companies' GRC strategy. In this handbook, learn why the connected device movement is making companies reexamine data management, security and compliance processes, and strategies to take full business advantage of IoT data.
Posted: 16 Feb 2016 | Published: 16 Feb 2016

SearchCompliance.com

A hybrid approach: How the conversation around cloud is changing
sponsored by ComputerWeekly.com
EGUIDE: Enterprise cloud migrations used to be discussed in absolute terms.  In this e-guide, we take a look at how the conversation around cloud is changing within the enterprise, as migration habits and preferences are shaped by world events, resiliency and business agility concerns, as well as financial considerations.
Posted: 27 Oct 2021 | Published: 27 Oct 2021

ComputerWeekly.com

World-Class EA: The Agile Enterprise
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Agile is about more than software development, it's a mindset. This report from the Open Group explains how to apply agile techniques and best practices to the enterprise.
Posted: 11 Feb 2013 | Published: 11 Feb 2013

ComputerWeekly.com

Your Guide to Threat Intelligence, AI & Incident Response
sponsored by Dell SecureWorks
EGUIDE: Organizations must now go beyond automating reactive measures. Cybersecurity now requires infosec professionals to work toward proactive detection to preemptively avoid or thwart threats. In this e-guide, find everything you need to know about threat intelligence platforms, AI in cybersecurity, and incident response planning.
Posted: 27 Mar 2020 | Published: 27 Mar 2020

Dell SecureWorks

MOBILE IOT GUIDE HOW NB-IOT AND LTE-M ARE HELPING THE IOT TAKE OFF
sponsored by Telekom Deutschland GmbH
WHITE PAPER: According to the industry trade body GSMA, there will be 25 billion IoT connections globally by 2025. Mobile IoT technologies such as NB-IoT and LTE-M will be a key part of this growth. In this white paper, uncover advice for companies and cities that want to explore new business opportunities around these technologies.
Posted: 01 Apr 2021 | Published: 01 Apr 2021

Telekom Deutschland GmbH

Presentation Transcript: Making Real-Time Business Connections with Cloud-Scale Integration
sponsored by IBM
PRESENTATION TRANSCRIPT: In this presentation transcript, learn about the technologies and business models that enable real-time connections with customers and partners, and find out the characteristics to look for when selecting a cloud integration platform.
Posted: 18 Dec 2010 | Published: 18 Dec 2010

IBM

Getting the most from cyberthreat intelligence services
sponsored by SearchSecurity.com
EZINE: A deluge of data is making it tough to put cyberthreat intelligence to work. This issue of 'Information Security' magazine focuses on what data makes a difference. This issue also includes a feature on top CISO concerns for 2020, plus an interview with Cisco's CISO Steve Martino.
Posted: 23 Feb 2021 | Published: 23 Feb 2021

SearchSecurity.com

Computer Weekly – 18 October 2016: Singapore aims to become a digital leader
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how the city-state of Singapore is investing in skills and technology to become a leading digital nation. We examine how to prevent legacy IT becoming a hindrance to digital transformation. And we look at the impact of controversial new tax rules on the UK's IT contractor community. Read the issue now.
Posted: 16 Oct 2016 | Published: 18 Oct 2016

ComputerWeekly.com

Jargon Buster Guide to Virtualisation
sponsored by ComputerWeekly.com
EGUIDE: This jargon buster e-guide will detail everything an enterprise IT manager needs to know about the concept of virtualisation, while also taking a look at what enterprises are doing to build upon this now commonplace bedrock within most enterprise IT estates.
Posted: 14 Jan 2019 | Published: 14 Jan 2019

ComputerWeekly.com

Jargon Buster Guide to Virtualisation
sponsored by ComputerWeekly.com
EGUIDE: This jargon buster e-guide will detail everything an enterprise IT manager needs to know about the concept of virtualisation, while also taking a look at what enterprises are doing to build upon this now commonplace bedrock within most enterprise IT estates
Posted: 29 Oct 2019 | Published: 29 Oct 2019

ComputerWeekly.com

Computer Weekly - 8 June 2021: The jobseekers turning to cyber crime in the pandemic
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, security researchers say that people left unemployed by the pandemic are turning to cyber crime – we find out why. We examine the confluence of distributed cloud and edge computing technologies. And controversial uses of facial recognition technology come under further scrutiny. Read the issue now.
Posted: 04 Jun 2021 | Published: 08 Jun 2021

ComputerWeekly.com

Computer Weekly - 15 September 2020: How data has helped in the fight against coronavirus
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to the Office for National Statistics about the important role data plays in the battle against Covid-19. We also look at the speedy deployment of the Scottish contact-tracing app and report on a discussion about the UK government's delayed response to its digital identity consultation. Read the issue now.
Posted: 14 Sep 2020 | Published: 15 Sep 2020

ComputerWeekly.com

Computer Weekly – 11 June 2019: Are schools delivering on digital skills?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at the differing approaches to teaching computer science across the UK and assess the pros and cons of each. Our latest buyer's guide examines the technologies and best practices of multicloud environments. And we find out what you get for your money when buying cyber insurance. Read the issue now.
Posted: 07 Jun 2019 | Published: 11 Jun 2019

ComputerWeekly.com

Storage magazine Online June 2009: Heal Thyself
sponsored by SearchStorage.com
EZINE: A trend in storage product messaging these days is the theme of self-healing storage - the ability of a system to detect and repair hard disk problems automatically. In this month's cover story, independent storage expert Marc Staimer explains how and how well they work. This electronic issue also includes features on storage efficiency...
Posted: 28 May 2009 | Published: 28 May 2009

SearchStorage.com

Modelling the Insurance Enterprise
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from the Open Group is aimed at managers, architects, and designers that serve the insurance industry or have an interest in integrating the TOGAF and ArchiMate standards.
Posted: 01 Feb 2013 | Published: 01 Feb 2013

ComputerWeekly.com

Technology, media and telecommunications predictions 2017
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Deloitte predicts the key trends in technology, media and telecommunications in 2017
Posted: 11 Jan 2017 | Published: 11 Jan 2017

ComputerWeekly.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2022, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences