Enterprise Businesses Reports

Computer Weekly –25 April 2017: Blockchain expands reach beyond finance
sponsored by TechTarget ComputerWeekly.com
EZINE: Discover how blockchain, the tech behind bitcoin, is extending its reach beyond financial services into new industries. Also learn from developers about the pros and cons of componentizing application software, examine what a recent court case shows about Oracle's licensing policies, and more.
Posted: 08 Feb 2021 | Published: 25 Apr 2017

TechTarget ComputerWeekly.com

Stronger collaboration platforms emerge as pandemic legacy
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide: HR software had long been a relatively backward zone of enterprise software before the Covid-19 pandemic. It had been catching up, as organisations applied digital approaches drawn from customer experience to employee experience, encompassing the journey from recruitment, through working and learning, to moving up or moving on.
Posted: 06 May 2021 | Published: 06 May 2021

TechTarget ComputerWeekly.com

Predictive Analytics Foretells Consumer Wants on Social Media
sponsored by IBM
EBOOK: Today's companies are looking for new, unusual ways to reach their customers. Unsurprisingly, many of these enterprises are turning to one of the platforms generating the most data every day: Social media. In this guide on predictive marketing analytics and social media, examine how these 2 approaches can work together to shape business strategy.
Posted: 28 Sep 2016 | Published: 26 Sep 2016

IBM

How Mobile Backend as a Service (MBaaS) Can Unleash Apps for the New Style of IT
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Mobile Backend as a Service is a set of cloud-based, server-side mobile services for multiple platforms that can be used as a back end for your mobile apps. Find out how it can benefit you.
Posted: 02 Sep 2014 | Published: 30 May 2014

Hewlett-Packard Enterprise

Cloud Services Take Off, GRC Doesn't
sponsored by TechTarget Security
EZINE: The ability for organizations to implement cloud governance models is increasingly challenged by the proliferating use of services by business units and workgroups. This issue of Information Security shares tips on gaining more insight when employees are migrating critical apps and data to the cloud.
Posted: 01 Sep 2016 | Published: 01 Sep 2016

TechTarget Security

SQL, Hadoop Make a Powerful Data Pair
sponsored by TechTarget Data Management
EBOOK: SQL-on-Hadoop tools give companies new, efficient ways to deal with data. Read on to learn more.
Posted: 10 Aug 2015 | Published: 10 Aug 2015

TechTarget Data Management

Moving Past the Password? Not So Fast
sponsored by TechTarget Security
EBOOK: The password might not be dead, but that doesn't mean it's working. This e-book looks at how other user authentication methods can supplement it, and puts the post-password security landscape in perspective for the future.
Posted: 20 May 2016 | Published: 20 May 2016

TechTarget Security

Exchange to Office 365 Migration: The Good, the Bad, and Essentials Tools to Ease the Transition
sponsored by Riverbed Technology, Inc.
EGUIDE: Discover how to set an effective strategy for Office 365 migration in this e-guide. By reading on, learn about the advantages of its advanced content management and collaboration, as well as iron out potential app migration headaches when moving from Exchange and non-Exchange platforms.
Posted: 28 Nov 2016 | Published: 22 Nov 2016

Riverbed Technology, Inc.

Global Threats and an Intelligent Response
sponsored by TechTarget Security
EBOOK: In today's world of multipronged, global threats, a global threat intelligence service is becoming essential to enterprise security strategy.
Posted: 16 Sep 2015 | Published: 16 Sep 2015

TechTarget Security

Buyer's Essentials: What to Look for in an EMM Strategy
sponsored by TechTarget Security
EBOOK: EMM products can contain a variety of features - for mobile device management, mobile app management, mobile content management and more. This guide will review the capabilities and features you'll want to consider carefully before you invest in EMM.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

TechTarget Security