Step up Your Game. Global Delivery Capabilities for the Electronics Industry
sponsored by IBM Line of Business
WHITE PAPER:
How can your business meet the ever-increasing demands of end users and still make a healthy profit? IBM takes a look at innovation's role in driving business objectives and helping electronics enterprises move forward.
Posted: 17 Jun 2008 | Published: 17 Jun 2008
|
|
|
Winning the Global Challenge: The Japanese Electronics Companies'Race to Innovate
sponsored by IBM Line of Business
WHITE PAPER:
Japanese electronics companies (JEC) are taking bold action to regain market share,profitability and their place as global innovators. Download this IBM Institute for Business Value Study to learn how JECs are transforming their businesses.
Posted: 29 Nov 2007 | Published: 01 Mar 2007
|
|
|
Cutting Edge Multicore Development Techniques for the Next Wave of Electronics Products
sponsored by IBM
WHITE PAPER:
As more and more software is embedded into both consumer and industrial electronics, the electronics industry is being challenged with ensuring rigor within its software development process, often a new core competency, and the integration of hardware and software. Read this paper to learn about solutions that address these complex challenges.
Posted: 01 Sep 2010 | Published: 19 Mar 2010
|
|
|
Computer Weekly - 11 May 2021: Chip supply shortages are hitting hard
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, a shortage of semiconductors is affecting industries beyond just IT – we examine the implications. We talk to the CIO of pharmacy chain Boots about how tech helped in being an essential retailer during lockdown. And we look at the prospects for young people entering the IT sector post-pandemic. Read the issue now.
Posted: 10 May 2021 | Published: 11 May 2021
|
|
|
Computer Weekly – 8 November 2022: How the US-China chip war will affect IT leaders
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, as the US ramps up semiconductor sanctions on China, we examine the ramifications across the tech sector. Cyber criminals are turning to new forms of encryption – we talk to the Dutch researchers trying to catch them. And we look at what cloud providers need to do to improve customer experience. Read the issue now.
Posted: 04 Nov 2022 | Published: 08 Nov 2022
|
|
|
Computer Weekly – 20 March 2018: Where neuroscience meets technology
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we find out how computer scientists are using data, cloud and virtual reality to understand the brain and improve mental wellbeing. We analyse newly published government documents detailing the early problems with Universal Credit. And we look at how AI can help improve cyber security. Read the issue now.
Posted: 16 Mar 2018 | Published: 16 Mar 2018
|
|
|
Computer Weekly – 26 January 2021: 'Salad as a service' – how tech could revolutionise farming
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we find out how new technologies are supporting the rise of vertical farming, and could revolutionise food supply chains. We examine one of the biggest trends in the cloud – serverless computing. And Brexit has not yet ended the debate about UK-EU data protection. Read the issue now.
Posted: 08 Feb 2021 | Published: 26 Jan 2021
|
|
|
Measuring the Business Impacts of Effective Data: Chapter One of a Three-Part Study
sponsored by Sybase, an SAP company
WHITE PAPER:
This study of over 150 Fortune 1000 firms from every major industry or vertical explores issues associated with the lifeblood of today’s enterprises: data. The findings demonstrate the often dramatic impacts that even marginal investments in information technology can have when that technology addresses data quality, usability, and intelligence.
Posted: 02 Nov 2010 | Published: 02 Nov 2010
|
|
|
Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER:
SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007
|
|
|
IBM Bromont Gains Huge ROI Through Smarter Quality Management
sponsored by IBM
CASE STUDY:
This use case describes how IBM Bromont's engineering team harnesses the power of analytics to automatically identify failure patterns in CPU modules and instantly determine how serious the problem is, providing them with a 150% ROI in year one alone.
Posted: 25 Feb 2015 | Published: 30 May 2014
|
|
|
E-Guide: PCI DSS 2011: Key themes to watch
sponsored by TechTarget Security
EGUIDE:
This expert tip pinpoints key observations and common themes related to what’s currently happening with today’s PCI DSS compliance programs and explains what’s in store for the future as companies transition to the PCI DSS 2.0 guidelines.
Posted: 20 May 2011 | Published: 20 May 2011
|
|
|
Collaboration capability: The new imperative for empowered information workers
sponsored by TechTarget Content Management
EGUIDE:
In this e-guide, ebizQ.com Site Editor Anne Stuart takes a multi-faceted look at the use of collaboration and social networking strategies and tools for case management. Gain a big-picture introduction to collaboration and related trends, including insights from several industry thought leaders.
Posted: 21 Nov 2011 | Published: 17 Nov 2011
|
|
|
The best way to begin an enterprise information management program
sponsored by TechTarget Data Management
EGUIDE:
Approaching an enterprise information management (EIM) strategy and ensuring it will provides the best business opportunities for your organization can be a challenge. In this e-guide, readers will learn EIM best practices from Michael Jennings, a data governance director at Walgreens.
Posted: 12 Jan 2012 | Published: 12 Jan 2012
|
|
|
SearchSoftwareQuality.com Expert Tip Guide: Best practices for embedded software development and CI
sponsored by IBM India Pvt. Ltd
EGUIDE:
Read this Tip Guide to discover workable, profitable best practices for embedded software development.
Posted: 25 Jan 2011 | Published: 01 Sep 2011
|
|
|
E-Guide: Avoiding Application Security Pitfalls
sponsored by TechTarget Security
EGUIDE:
This e-guide will explain why people aren’t integrating security with application lifecycle management, the risks businesses take by not taking security measures seriously and what you can do. Read this e-guide to learn why application security measures often fail and what can be done to mitigate them.
Posted: 14 Jan 2011 | Published: 14 Jan 2011
|
|
|
Creating a Compliance Culture: Best Practices
sponsored by TechTarget Security
EGUIDE:
Check out this E-Guide and learn key tips on how to make sure your compliance culture is operating efficiently.
Posted: 17 Nov 2011 | Published: 17 Nov 2011
|
|
|
E-Guide: Database Tools for Auditing and Forensics
sponsored by TechTarget Security
EGUIDE:
This e-guide presents the best practices for tuning database auditing tools. Continue reading this e-guide to learn more about these best practices which will allow you to audit without forfeiting database performance.
Posted: 22 Mar 2011 | Published: 22 Mar 2011
|
|
|
E-Guide: The dangers of application logic attacks
sponsored by TechTarget Security
EGUIDE:
Developing a secure and effective Web application can be daunting. And, hackers aren't making this task any easier. In this tip from our Ask the Experts section, Web application security expert Michael Cobb explains how hackers use application logic to solicit an attack and advises how to prevent them.
Posted: 14 Apr 2011 | Published: 13 Apr 2011
|
|
|
Great collaboration begins with good governance
sponsored by TechTarget Content Management
EGUIDE:
For a growing number of companies today, collaboration is no longer a “soft,” nice-to-have concept—it’s an essential component for competitive differentiation. In this Tip Guide, learn how organizations can promote and support effective worker collaboration, and how managers can provide effective governance for collaborative efforts.
Posted: 21 Nov 2011 | Published: 21 Nov 2011
|
|
|
E-Guide: Improving software with the building security in maturity model
sponsored by TechTarget Security
EGUIDE:
This expert tip introduces a model that utilizes a framework to organize software security tasks and help organizations determine where their security practices stand and how to advance them over time.
Posted: 26 May 2011 | Published: 26 May 2011
|
|
|
Securing the enterprise application layer: Expert Guidelines
sponsored by TechTarget Security
EGUIDE:
If you're a security professional, the focus on application security in IT these days may leave you feeling out of the loop. Yet, in many cases, application security pros rely on the infrastructure team to provide a secure foundation. Find out how securing a naming and directory service will help build a solid platform that application can trust.
Posted: 24 Aug 2011 | Published: 24 Aug 2011
|
|
|
How to create an effective data protection strategy for IT compliance
sponsored by TechTarget Security
EGUIDE:
Data protection strategies should not only focus on safeguarding corporate information, but also identifying sensitive records that are subject to regulatory controls. This tip guide offers a comprehensive overview of data protection best practices for ensuring both security and compliance.
Posted: 01 Dec 2011 | Published: 01 Dec 2011
|
|
|
E-Guide: Expert insights to application security testing and performance
sponsored by TechTarget Security
EGUIDE:
Two of the biggest challenges in an organization’s application security strategies are testing and integrating best practices within the application lifecycle. In this E-Guide, readers will learn best practices for testing injection integrating security measures into the application lifecycle.
Posted: 11 Nov 2011 | Published: 11 Nov 2011
|
|
|
E-Guide: Integrating security into the ALM lifecycle
sponsored by TechTarget Security
EGUIDE:
In this expert e-guide, readers will learn the risks businesses take by not taking security measures seriously and what can be done to help integrate security with application lifecycle management.
Posted: 21 Nov 2011 | Published: 16 Nov 2011
|
|
|
Beating web application security threats
sponsored by TechTarget Security
EGUIDE:
Application security plays an important role in ensuring the accuracy and confidentiality of data, yet at times teams may fear that security can interfere with overall performance. Read this e-book for tips that discuss the value of application security and explain how to implement it to ensure the highest availability and usability.
Posted: 14 Nov 2011 | Published: 31 Oct 2011
|
|
|
Application security testing: Protecting your application and data
sponsored by TechTarget Security
EBOOK:
Application security testing is critical in ensuring your data and applications are safe from security attack. This e-book, written for IT management, including QA and development managers, explains the basics of application security and then delves deeper into common vulnerabilities and performance concerns.
Posted: 07 Nov 2011 | Published: 07 Nov 2011
|
|
|
Best practices for effective information management
sponsored by TechTarget Data Management
EGUIDE:
In this expert e-guide take away tips to optimize your business value of successful data management processes, manage the lifecycle of your information and create effective deployments.
Posted: 29 Sep 2011 | Published: 29 Sep 2011
|
|
|
Data Protection 101: Essential Steps for Holistic Information Security
sponsored by TechTarget Security
EGUIDE:
Data protection strategies should not only focus on safeguarding corporate information, but also identifying sensitive records that are subject to regulatory controls. This e-guide offers a comprehensive overview of data protection best practices for ensuring both security and compliance.
Posted: 17 Nov 2011 | Published: 17 Nov 2011
|
|
|
MicroScope November 2013: A special issue covering virtualization technology
sponsored by MicroScope
EZINE:
A themed issue examining the potential revenue opportunities for resellers that specialize in selling virtualization technology and associated tools.
Posted: 07 Nov 2013 | Published: 07 Nov 2013
|
|
|
E-Book: Data Warehousing Technology Trends
sponsored by HP Inc
EBOOK:
Technological innovations are rapidly changing data warehouse architectures and providing the potential for substantial performance improvements. Read this e-book to get an update on the most important trends in data warehousing, including appliance technology, columnar databases, in-database analytics and more.
Posted: 02 Dec 2010 | Published: 02 Dec 2010
|
|
|
SharePoint E-Zine Volume 20: Mastering Workflow Reports in SharePoint 2010
sponsored by TechTarget Search Windows Server
EZINE:
Workflows can be a useful tool in most organizations. But it takes proper oversight to ensure that participants use them correctly. Find out how SharePoint 2010 can ease the process with improved reporting capabilities and built-in monitoring.
Posted: 18 Aug 2010 | Published: 18 Aug 2010
|
|
|
Exchange Insider E-Zine - Volume 6: Evaluating Exchange Server in the Cloud
sponsored by TechTarget Search Windows Server
EZINE:
Volume 6 of the Exchange Insider e-zine looks at the economics of running Exchange Server on-premise versus hosting it in the cloud.
Posted: 23 Jul 2010 | Published: 23 Jul 2010
|
|
|
eBook: The Green Data Center - Energy-Efficient Computing in the 21st Century, Chapter 2, 2009 Update
sponsored by Rackable Systems
EBOOK:
This document explains about servers which present the most important opportunity and energy-efficient power supply which is the most important aspect of improving servers.
Posted: 31 Jan 2009 | Published: 30 Jan 2009
|
|
|
E-Book: Data Protection Plans for Complying with Privacy Laws
sponsored by TechTarget Security
EBOOK:
This e-book, brought to you by SearchCompliance.com and SearchSecurity.com, discusses how to build a successful data protection strategy, as well as database security auditing tools, how to secure your mainframe, laptop encryption and more!
Posted: 21 Oct 2010 | Published: 21 Oct 2010
|
|