Users Reports

Take the Modernization Impact Assessment
sponsored by Hewlett Packard Enterprise
ASSESSMENT TOOL: Take this online assessment today to discover the impact that modernization can have on your organization's IT environment, and find out what you can do to plan for modernization success.
Posted: 09 Oct 2013 | Published: 09 Oct 2013

Hewlett Packard Enterprise

SAP and Voice: Optimize Supply Chain Operations
sponsored by Voxware, Motorola, and PEAK Technologies
WEBCAST: Attend this Webcast to learn how this powerful combination provides improved real-time data collection and increased flexibility to make downstream business process changes easily and inexpensively.
Posted: 16 Aug 2007 | Premiered: Aug 29, 2007, 14:00 EDT (18:00 GMT)

Voxware, Motorola, and PEAK Technologies

Why Business Rules?: A Case for Business Users of Information Technology
sponsored by IBM
WHITE PAPER: This whitepaper explains how business people are allowed to directly define how their business rules are being executed with a BRMS; and, perhaps more important, how it facilitates change in an easy, safe and reliable manner.
Posted: 07 Jul 2011 | Published: 01 Sep 2009

IBM

Ten Critical Success Factors for CRM: Lessons Learned from Successful Implementations
sponsored by Oracle Corporation
WHITE PAPER: Customer relationship management (CRM) deployments can be complex and difficult. This white paper provides a checklist of the ten critical success factors for organizations to follow to avoid common pitfalls as they design and deploy their CRM system.
Posted: 16 Jan 2007 | Published: 01 Aug 2006

Oracle Corporation

11 Questions Every CIO Should Ask Their IT Manager
sponsored by Red Hat and JBoss
WHITE PAPER: What is your IT really costing you? Could you be doing more with the technology you have? Could you reduce costs and provide better service to your organization? Read Red Hat's suggestions on "11 Questions Every CIO Should Ask Their IT Manager", and how Red Hat open source solutions can help.
Posted: 19 Jun 2009 | Published: 10 Jun 2009

Red Hat and JBoss

Computer Weekly - 18 May 2021: The real-life consequences of ransomware attacks
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, after a ransomware attack shut a major US oil pipeline, we examine the real-life consequences for organisations facing similar threats. We ask the experts for their top tips in reducing datacentre running costs. And we hear how data science skills are helping government make better decisions. Read the issue now.
Posted: 17 May 2021 | Published: 18 May 2021

TechTarget ComputerWeekly.com

Computer Weekly - 28 September 2021: Chancellor Rishi Sunak talks tech
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to the Chancellor of the Exchequer about his plans to support innovation and growth in the UK tech sector. Composable IT is the latest trend in building software to support business change. And Halfords built its own service management software – and now is selling it to other retailers. Read the issue now.
Posted: 27 Sep 2021 | Published: 28 Sep 2021

TechTarget ComputerWeekly.com

Understanding CPaaS market growth, trends and providers
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The CPaaS market is maturing as increased demand for digital communications drives new use cases. Organizations looking to buy CPaaS APIs should examine the various use cases that APIs can address and how to choose a CPaaS provider. Read this article to learn more about the trends and providers fueling CPaaS market growth.
Posted: 06 Nov 2023 | Published: 07 Nov 2023

TechTarget ComputerWeekly.com

MicroScope – June 2021: A hybrid working world
sponsored by MicroScope
EZINE: With hybrid working set to become the norm as the world starts to return to a more normal footing post-Covid, we look at how businesses are preparing for the new world of work. Also discover how to tackle the sustainability challenge, and have some key questions answered around handling bottlenecks caused by large volumes of data
Posted: 03 Jun 2021 | Published: 04 Jun 2021

MicroScope

CW APAC: Expert advice on zero-trust security
sponsored by TechTarget ComputerWeekly.com
EZINE: Zero trust is a security model that eliminates the traditional perimeter and assumes that no user or device can be trusted until proven otherwise. In this handbook, Computer Weekly looks at how enterprises can take a zero-trust approach to securing their network, devices and workforce.
Posted: 08 Feb 2021 | Published: 19 Nov 2020

TechTarget ComputerWeekly.com