Information Technology Asset Management Reports

Computer Weekly – 5 July 2022: How to get the right level of cyber insurance
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at how the market for cyber insurance is evolving and how to avoid buying the wrong level of cover. We find out what role hydrogen technologies could play in reducing datacentre carbon emissions. And we hear how a 125-year old bicycle maker is embracing digital innovation. Read the issue now.
Posted: 04 Jul 2022 | Published: 05 Jul 2022

TechTarget ComputerWeekly.com

A Hybrid IT Approach to Virtualization & DevOps Management
sponsored by Red Hat
EGUIDE: Here, experts illustrate the evolution of multi-use virtualization tools, and you'll discover how to benefit from a hybrid approach that combines physical, virtual, and application visibility with automation and deep infrastructure analysis. Read on to also learn how DevOps is reshaping IT vendors' offerings.
Posted: 02 Feb 2017 | Published: 31 Jan 2017

Red Hat

Integrating the Finance organization for global business: Important implications for CIOs
sponsored by IBM
WHITE PAPER: This paper looks at the growing alignment between the financial and technical disciplines. It examines the results of the Global CFO Study 2008 in the context of IT, identifying the critical implications for CIOs, and the need for a strategic partnership with CFOs and more ongoing collaboration between Finance and IT.
Posted: 13 Feb 2009 | Published: 13 Feb 2009

IBM

Best Practices for Oracle Licence Management
sponsored by Flexera Software
WHITE PAPER: In this white paper you will learn five reasons why your Oracle licensing requirements may evolve, the five best practices for Oracle license management and more.
Posted: 09 Nov 2011 | Published: 09 Nov 2011

Flexera Software

How to Maintain a Firm Grip on Technical Asset Management
sponsored by Livingstone Group
EGUIDE: Read this expert guide from ComputerWeekly.com to learn how to maintain a firm grip on your technical asset management and to resolve any lack of visibility before it becomes a business issue.
Posted: 08 Feb 2021 | Published: 08 Jul 2020

Livingstone Group

HCI Appliances Embrace Containers and More Flexible Pricing
sponsored by Hewlett Packard Enterprise
EGUIDE: A handful of startups and top-tier players have introduced container-driven bundles that could determine a new delivery and support approach for hyper-converged infrastructure (HCI). Read this expert guide to see highlighted several HCI appliances built for containerized apps that should be on your radar.
Posted: 16 Aug 2017 | Published: 11 Aug 2017

Hewlett Packard Enterprise

Implementing Best Practices: The Dell Management Console and ITIL
sponsored by Dell and Symantec
WHITE PAPER: The Dell™ Management Console Powered by Altiris™ from Symantec™ provides a comprehensive management platform based on standardized IT Infrastructure Library (ITIL) processes—facilitating the adoption of industry best practices and helping streamline and simplify IT management in enterprise data centers.
Posted: 15 Oct 2009 | Published: 01 Mar 2009

Dell and Symantec

VMware Solutions for Small and Midsize Businesses: The Most Cost-Effective Way to Enable Always On IT
sponsored by Dell and VMware
WHITE PAPER: Check out this solution brief to discover how VMware equips SMBs with technology solutions that allow them to cost effectively optimize the use of their existing IT assets and resources as well as protect the systems, data, and applications that run the business, ensuring Always On IT.
Posted: 01 Jun 2009 | Published: 01 May 2009

Dell and VMware

Transform IT: Transform the Enterprise
sponsored by ServiceNow
WHITE PAPER: Discover the three IT imperatives for a CIO-led transformation, and learn how CIOs are adopting strategies to change IT.
Posted: 19 May 2014 | Published: 19 May 2014

ServiceNow

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM