Information Technology by Industry Sector White Papers

(View All Report Types)
Measuring the Business Impacts of Effective Data: Chapter One of a Three-Part Study
sponsored by Sybase, an SAP company
WHITE PAPER: This study of over 150 Fortune 1000 firms from every major industry or vertical explores issues associated with the lifeblood of today’s enterprises: data. The findings demonstrate the often dramatic impacts that even marginal investments in information technology can have when that technology addresses data quality, usability, and intelligence.
Posted: 02 Nov 2010 | Published: 02 Nov 2010

Sybase, an SAP company

Small Form Factor (SFF) SAS - Meeting the Demanding Requirements in Specific Markets
sponsored by Xtore
WHITE PAPER: SAS technology has been proven to be the most versatile storage solution in data transfer and high performance. Read this white paper to learn about a solution that renders the necessary performance needed for your client's expanding market requirements.
Posted: 22 Aug 2007 | Published: 01 Aug 2007

Xtore

Manage By Exception A Roadmap For Personalized Healthcare At Scale
sponsored by Validic
WHITE PAPER: Management by exception — a personalized care approach that monitors patients for specific changes that require provider intervention, can help providers treat more patients without overburdening them. Learn more about the manage by exception model, including how it leverages data, remote technology and real-time monitoring, in this white paper.
Posted: 01 Feb 2024 | Published: 01 Feb 2024

Validic

Create Flexible Process Automation in the Trade Management Sector
sponsored by Oracle Corporation UK Ltd
WHITE PAPER: Access this brief paper to discover how you can now get Oracle Transportation and Global Trade Management in the cloud, minimizing cost, optimizing service levels and creating flexible business process automation within global transportation and logistics networks.
Posted: 08 Dec 2014 | Published: 31 Aug 2014

Oracle Corporation UK Ltd

Mobile Checkout: Controlling Shrink With Self-Scanning
sponsored by Toshiba
WHITE PAPER: While mobile self-scanning technology helps retailers improve the shopping experience, many businesses worry about the impact mobility will have on shrink. In this informative white paper, learn how to combine technical, operational, and psychological deterrents to reap the benefits of mobile shopping while also minimizing shrink concerns.
Posted: 13 May 2014 | Published: 13 May 2014

Toshiba

What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?
sponsored by IBM
WHITE PAPER: Mobile security is about more than the device: It's also about protecting apps on the device. Learn how IBM can help.
Posted: 09 Oct 2014 | Published: 31 Jan 2014

IBM

Why Every CIO Should Consider Vulnerability Assessment a Necessity
sponsored by IBM
WHITE PAPER: In this resource, CIOs will learn why vulnerability assessment is so essential to enterprise security, and can discover a leading vulnerability assessment platform that scans targeted systems on a scheduled basis in order to increase your understanding of your organization's overall security posture.
Posted: 03 Feb 2015 | Published: 30 Apr 2014

IBM

Cisco 2015 Annual Security Report
sponsored by Cisco Systems, Inc.
WHITE PAPER: Access this white paper to read the Cisco 2015 annual report and discover research, insights, and techniques straight from security experts that can protect your business.
Posted: 09 Feb 2015 | Published: 09 Feb 2015

Cisco Systems, Inc.

Personally Identifiable Information (PII) and Personal Health Information (PHI)
sponsored by Voltage Security, Inc.
WHITE PAPER: This white paper features an encrypted email solution that eliminates the need for paper-driven information sharing processes, and ensures secure, compliant transfers.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

Voltage Security, Inc.

The Evolution of Application Vulnerabilities, Spam Threats, and Incident Response
sponsored by IBM
WHITE PAPER: This report details the many breaches and security incidents that have plagued organizations in recent years; threats from past years that are currently showing signs of resurgence; and issues to be aware of in today's security landscape.
Posted: 24 Jul 2014 | Published: 30 Jun 2014

IBM