Trading Exchanges Reports

IT Decision Checklist: Messaging Security
sponsored by TechTarget Security
EGUIDE: Read this paper to learn how companies face complicated buying decisions when it comes to buying messaging security, the most important being whether to go with an on-premise solution, a SaaS offering in the cloud, or both.
Posted: 03 Mar 2010 | Published: 03 Mar 2010

TechTarget Security

Step up Your Game. Global Delivery Capabilities for the Electronics Industry
sponsored by IBM Line of Business
WHITE PAPER: How can your business meet the ever-increasing demands of end users and still make a healthy profit? IBM takes a look at innovation's role in driving business objectives and helping electronics enterprises move forward.
Posted: 17 Jun 2008 | Published: 17 Jun 2008

IBM Line of Business

Retailers' tech response to consumers' increasingly online habits
sponsored by TechTarget ComputerWeekly.com
EBOOK: The past few years has seen an increase in online shopping as the pandemic shifted more consumers into the realm of e-commerce to purchase goods during lockdowns. In return, retailers have been investing in technology to meet the e-commerce demands of customers, and now as predictions suggest pandemic shopping habits are set continue.
Posted: 25 Jul 2022 | Published: 25 Jul 2022

TechTarget ComputerWeekly.com

RPA bots compared: Unattended vs. Attended vs. Hybrid
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Robotic process automation (RPA) bots can be divided into three modes -- unattended, attended and hybrid -- depending on how they operate within the enterprise. In this infographic, we compare the main similarities and differences between the three modes and examine how organizations can benefit from each of them.
Posted: 23 Mar 2022 | Published: 23 Mar 2022

TechTarget ComputerWeekly.com

Cloud Provisioning: Provision. Orchestrate. Innovate.
sponsored by OpenText
WHITE PAPER: In this white paper, learn about a cloud provisioning technology with a workflow-enabled framework, allowing you to create, provision, and orchestrate virtual "bundles" of on-premise and cloud capabilities that make up a new product, service, or application.
Posted: 14 Feb 2014 | Published: 31 Dec 2013

OpenText

What's the Pulse on the BPM World?
sponsored by Microsoft
EGUIDE: What is going on in the business process management (BPM) market? Why is India set up to be the next major market for BPM growth? How does BPM fit into the Internet of Things? Access this e-guide to get the answers to these questions.
Posted: 23 May 2017 | Published: 17 May 2017

Microsoft

The management cockpit approach to running your IT environment
sponsored by Hewlett Packard Enterprise
WEBCAST: As IT environments become more dynamic, your operations teams need a unified approach to management and monitoring. In this webcast, learn how automatic detection and automated monitoring setup and configuration are two methods for meeting IT challenges. Inside, discover how the "management cockpit" improves management, and much more.
Posted: 13 Nov 2013 | Premiered: Nov 13, 2013

Hewlett Packard Enterprise

Cancer Treatment Centers of America
sponsored by Insight and HP
CASE STUDY: Access this case study of Cancer Treatment Centers of America as they turned to a managed print services (MPS) system to deliver a reliable print infrastructure to support its exemplary patient care.
Posted: 28 May 2014 | Published: 31 Jul 2013

Insight and HP

BPM Best Practices
sponsored by IBM
EGUIDE: Access this e-guide to hear from experts such as Erik Marks, founder and CEO of AgilePath, a long-time SOA and BPM specialist, on the subject of the BPM-modernization relationship. Discover the modernization needs BPM can fill, and when it's not the best choice.
Posted: 19 Nov 2013 | Published: 19 Nov 2013

IBM

CW Buyer's Guide: E-Commerce Experience Management, Security, and More
sponsored by TechTarget ComputerWeekly.com
EBOOK: Computer Weekly has explored ways to deliver a dynamic, secure, and even compliant omni-channel experience. Discover how tokenization is shaking things up in transaction data, and what you can do to access and protect customer information in the face of Payment Card Industry Security Standards.
Posted: 25 Jun 2015 | Published: 25 Jun 2015

TechTarget ComputerWeekly.com