International Commission on Illumination White Papers

(View All Report Types)
Project Management Network Diagram: A Tool for Understanding the PM Life Cycle
sponsored by Global Knowledge
WHITE PAPER: The Project Management Network Diagram (PM Network Diagram) provides a visual illustration of the project management life cycle (in terms of the chain of events that take place in a project).
Posted: 06 Jul 2006 | Published: 01 Jan 2005

Global Knowledge

Examining the FTC's noncompete prohibition and how it affects healthcare
sponsored by XtelligentMedia Healthcare
EGUIDE: The FTC recently prohibited noncompetes, a popular clause used in healthcare employment agreements, but legal challenges and clarifications are on the horizon.
Posted: 06 Jun 2024 | Published: 06 Jun 2024

XtelligentMedia Healthcare

Future Further Report
sponsored by LogicMonitor
INFOGRAPHIC: Download this infographic for a consolidation of the data and the desires of IT managers into one report, which sheds light on hotspots that, when addressed, will position your organization for long-term resiliency.
Posted: 18 May 2024 | Published: 18 May 2024

TOPICS:  .NET
LogicMonitor

Computer Weekly - 14 September 2021: Is 3D printing about to hit the mainstream?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out about the emerging consumer services using 3D printing and ask if the technology is about to go mainstream. Our latest buyer's guide looks at the importance of sustainable datacentres. And we analyse the risks of increasing contactless card spending limits and whether tech could help. Read the issue now.
Posted: 10 Sep 2021 | Published: 14 Sep 2021

TechTarget ComputerWeekly.com

Keeper Security Insight Report Privileged Access Management Survey User Insights on Cost & Complexity
sponsored by Keeper Security Inc
RESEARCH CONTENT: Survey reveals traditional privileged access management (PAM) solutions are too complex, with 68% of organizations paying for unused features. Learn how to simplify PAM and secure remote access by reading the full research report.
Posted: 06 Sep 2024 | Published: 06 Sep 2024

Keeper Security Inc

Approaches to Gaining Deep Observability in a Zero Trust Architecture
sponsored by Gigamon
RESEARCH CONTENT: Today, many organizations believe that zero-trust principles present the future of cybersecurity. In order to understand the state of zero trust, Gigamon commissioned Gatepoint Research to survey 148 selected U.S.-based IT executives and collect their thoughts, experiences, and insights. Download the report now to learn more.
Posted: 04 May 2024 | Published: 04 May 2024

TOPICS:  .NET
Gigamon

Illuminate Your Application Security
sponsored by Contrast Security
PRODUCT OVERVIEW: As the threat landscape evolves, security must move with the network perimeter. This product overview reveals how Contrast Security's Security Observability solution provides real-time insights to help you secure applications, prioritize vulnerabilities, and respond to incidents more efficiently. Read the full overview to learn more.
Posted: 11 Sep 2024 | Published: 11 Sep 2024

Contrast Security

Designing a Comprehensive Intent Data Strategy
sponsored by TechTarget
EBOOK: Teams relying only on traditional inward-focused insight sources are at a widening disadvantage as B2B buyer preference for self-directed solution research has already begun reducing the chances today’s vendor teams have to break through. Designing a comprehensive intent data strategy can help you avoid challenges. Learn how in this e-book.
Posted: 02 Apr 2024 | Published: 02 Apr 2024

TOPICS:  .NET
TechTarget

6 Steps for Improving Visibility in Your Complex Tech Landscape
sponsored by Splunk
EBOOK: In the vast expanse of your company’s complex tech environment, comprehensive visibility isn't just a luxury; it's a necessity. In this guide, you’ll discover specific steps you can take to illuminate this treacherous terrain. The strategies in this guide will help your organization boost efficiency, lower MTTx and become more resilient.
Posted: 25 Oct 2024 | Published: 25 Oct 2024

Splunk

The Cybersecurity ABC's Explained
sponsored by Adlumin
EBOOK: This e-book provides an overview and comparison of three key threat management services - Endpoint Detection and Response (EDR), Managed Detection and Response (MDR), and Extended Detection and Response (XDR). It offers insights to help you choose the right solution to maximize your cyber protection. Read the full e-book to learn more.
Posted: 14 Nov 2024 | Published: 14 Nov 2024

All resources sponsored by Adlumin

6 Ways to Automate With LogicMonitor
sponsored by LogicMonitor
WHITE PAPER: How can your MSP leverage IT automation solutions like LogicMonitor to both improve internal operations and service delivery to your customers? Find out by downloading this white paper, which covers six ways MSPs can automate with LogicMonitor.
Posted: 01 Mar 2023 | Published: 01 Mar 2023

TOPICS:  .NET
LogicMonitor

How Graph Databases Help Solve Security Vulnerabilities in SBOMs
sponsored by Amazon Web Services
ESG WHITE PAPER: Software bills of material (SBOMs) are foundational to risk management and cybersecurity. In this white paper, expert-level analysts from TechTarget’s Enterprise Strategy Group (ESG) explore the methodologies Amazon Neptune and Intuit use to secure a software bill of materials (SBOM). Read on to learn more.
Posted: 09 May 2024 | Published: 09 May 2024

TOPICS:  .NET
Amazon Web Services

Can’t Choose Between Public And Private Cloud? You Don’t Have To With IaaS
sponsored by FCN
WHITE PAPER: In this Forrester report, discover why organizations are adopting infrastructure-as-a-service (IaaS), the features they consider essential in an IaaS model, and the business benefits that such a model can deliver.
Posted: 09 Aug 2023 | Published: 14 Jul 2023

TOPICS:  .NET
FCN

Navigating the Build vs. Buy Dilemma in Hybrid Cloud Platforms Operations
sponsored by Morpheus Data
ANALYST REPORT: This theCUBE Research Value Assessment explores the build vs. buy dilemma organizations face when implementing a hybrid cloud platform. It analyzes the challenges of DIY solutions as well as the potential benefits of adopting a commercial solution. Read the full report to learn more.
Posted: 16 May 2024 | Published: 16 May 2024

TOPICS:  .NET
Morpheus Data

Five Steps to Effective Third-Party Access Governance
sponsored by Saviynt
EBOOK: Attracting and retaining employees has become more complicated. Most organizations don't know how many third-party relationships they have. Saviynt Identity Cloud combines multiple identity management capabilities into a single cohesive platform to unify controls and risk management for every identity, app, and cloud across your business.
Posted: 17 Jul 2024 | Published: 18 Jul 2024

Saviynt

Red Hat OpenShift Service On AWS Enables Innovation And Agility For Modern Business
sponsored by Red Hat
ANALYST REPORT: Red Hat OpenShift Service on AWS enables organizations to accelerate application delivery and improve operational efficiency. Key benefits include 65% reduction in development time, 50% less infrastructure management effort, and improved operational efficiency. Read the full study to learn more.
Posted: 07 Jun 2024 | Published: 07 Jun 2024

Red Hat

CW Europe – September-November 2017
sponsored by TechTarget ComputerWeekly.com
EZINE: In this quarter's CW Europe, read about a political crisis in Balkan state with tech at its centre. The country has been accused of using surveillance technology for covert spying. Protests related to this were instrumental in the ruling party losing power after 10 years.
Posted: 08 Feb 2021 | Published: 07 Sep 2017

TechTarget ComputerWeekly.com

CW Europe – March-May 2019: Robots deliver savings for Dutch postal service PostNL
sponsored by TechTarget ComputerWeekly.com
EZINE: European businesses have bought into the digital revolution, with the adoption of the latest technologies like automation enabling companies to transfer their internal operations.
Posted: 08 Feb 2021 | Published: 01 Mar 2019

TechTarget ComputerWeekly.com

Cultivate a PMM Capability that Helps Optimize Your Entire GTM
sponsored by TechTarget
EBOOK: How can your organization transform “alignment” from a buzzword into a performance-driving strategy? Review this TechTarget e-book to unlock Forrester’s framework for planning and activating GTM alignment.
Posted: 12 Aug 2023 | Published: 12 Aug 2023

TOPICS:  .NET
TechTarget

Analyst Infographic: Before & After Impact
sponsored by GoTo
INFOGRAPHIC: LogMeIn Rescue, a secure, enterprise-grade remote support solution, touts the business value it offers to its adoptees. But what’s the actual financial benefit customers have achieved? GoTo commissioned Forrester Consulting to conduct a Total Economic Impact study to find out. Check out this infographic to see the results.
Posted: 08 Feb 2024 | Published: 08 Feb 2024

TOPICS:  .NET
GoTo

Microsoft Azure Red Hat OpenShift Provides More Value And Support To Cloud-First Organizations
sponsored by Red Hat
FORRESTER TOTAL ECONOMIC IMPACT REPORT: Azure Red Hat OpenShift provides a comprehensive container application platform that reduces infrastructure management effort by 50% and development time by 65%. Download this full Forrester Total Economic Impact report to learn how this managed service can increase your organization's cloud agility and innovation.
Posted: 09 Sep 2024 | Published: 12 Sep 2024

Red Hat

Creating pathways to stability for immigrating children and families
sponsored by ICF
EBOOK: Discover how ICF's expertise in child welfare, data science, and workforce optimization can help create pathways to stability for immigrating children and families. Learn best practices for inter-agency collaboration, data management, and training to support this vulnerable population. Read the e-book to learn more.
Posted: 03 Sep 2024 | Published: 30 Aug 2024

ICF

Computer Weekly – 21 February 2017: How to develop mobile apps for business
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, our latest buyer's guide examines the emerging innovations and best practice in mobile app development. We find out how Microsoft and Amazon are opening up their artificial intelligence tools to developers. And GE's CIO discusses the digital transformation of one of the world's industrial giants. Read the issue now.
Posted: 08 Feb 2021 | Published: 21 Feb 2017

TechTarget ComputerWeekly.com

Above All, Do No Harm Navigating AI And Cloud Use In Healthcare
sponsored by AWS Marketplace
FORRESTER RESEARCH REPORT: To understand today's healthcare organizations' technology infrastructure, Forrester Consulting, commissioned by AWS Marketplace, surveyed 302 healthcare decision-makers. Download the 2024 report to learn about top challenges, how organizations are using AI and cloud, and more.
Posted: 14 Oct 2024 | Published: 15 Oct 2024

AWS Marketplace

Computer Weekly – 30 January 2024: Tech companies warn EU over encryption plans
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, tech companies are calling on the European Commission to rethink plans to weaken internet encryption – we explore the issues. We talk to credit rating agency Moody's about why it thinks now is the time to invest in quantum computing. Read the issue now.
Posted: 29 Jan 2024 | Published: 30 Jan 2024

TechTarget ComputerWeekly.com

5 ethical AI framework considerations
sponsored by Infinite
PRESENTATION TRANSCRIPT: The implementation of ethical AI at scale in the insurance industry is pivotal for maintaining trust and safeguarding sensitive data. Read this transcript, based on a recent BrightTALK webinar featuring experts from SAS and Infinite, to understand the nuances of, and how to implement, ethical AI at scale in the insurance industry.
Posted: 07 Nov 2024 | Published: 08 Nov 2024

Infinite