Customers Reports

Take the Modernization Impact Assessment
sponsored by Hewlett Packard Enterprise
ASSESSMENT TOOL: Take this online assessment today to discover the impact that modernization can have on your organization's IT environment, and find out what you can do to plan for modernization success.
Posted: 09 Oct 2013 | Published: 09 Oct 2013

Hewlett Packard Enterprise

Ten Critical Success Factors for CRM: Lessons Learned from Successful Implementations
sponsored by Oracle Corporation
WHITE PAPER: Customer relationship management (CRM) deployments can be complex and difficult. This white paper provides a checklist of the ten critical success factors for organizations to follow to avoid common pitfalls as they design and deploy their CRM system.
Posted: 16 Jan 2007 | Published: 01 Aug 2006

Oracle Corporation

SAP and Voice: Optimize Supply Chain Operations
sponsored by Voxware, Motorola, and PEAK Technologies
WEBCAST: Attend this Webcast to learn how this powerful combination provides improved real-time data collection and increased flexibility to make downstream business process changes easily and inexpensively.
Posted: 16 Aug 2007 | Premiered: Aug 29, 2007, 14:00 EDT (18:00 GMT)

Voxware, Motorola, and PEAK Technologies

11 Questions Every CIO Should Ask Their IT Manager
sponsored by Red Hat and JBoss
WHITE PAPER: What is your IT really costing you? Could you be doing more with the technology you have? Could you reduce costs and provide better service to your organization? Read Red Hat's suggestions on "11 Questions Every CIO Should Ask Their IT Manager", and how Red Hat open source solutions can help.
Posted: 19 Jun 2009 | Published: 10 Jun 2009

Red Hat and JBoss

Why Business Rules?: A Case for Business Users of Information Technology
sponsored by IBM
WHITE PAPER: This whitepaper explains how business people are allowed to directly define how their business rules are being executed with a BRMS; and, perhaps more important, how it facilitates change in an easy, safe and reliable manner.
Posted: 07 Jul 2011 | Published: 01 Sep 2009

IBM

Computer Weekly - 4 May 2021: How KFC put digital on the menu
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how fast-food chain KFC turned to digital to survive the pandemic. Our latest buyer's guide looks at technologies to improve office productivity for home workers. And we assess the growing problem of electronic waste and how to tackle it. Read the issue now.
Posted: 03 May 2021 | Published: 04 May 2021

TechTarget ComputerWeekly.com

CW APAC: Expert advice on zero-trust security
sponsored by TechTarget ComputerWeekly.com
EZINE: Zero trust is a security model that eliminates the traditional perimeter and assumes that no user or device can be trusted until proven otherwise. In this handbook, Computer Weekly looks at how enterprises can take a zero-trust approach to securing their network, devices and workforce.
Posted: 08 Feb 2021 | Published: 19 Nov 2020

TechTarget ComputerWeekly.com

Computer Weekly – 15 December 2020: How security will be different after Covid-19
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, the world of cyber security will probably never return to its pre-pandemic state – we look ahead. The combination of remote working and streaming video is putting extra strain on networks. And we look at how digital transformation is changing the way contact centres are run. Read the issue now.
Posted: 08 Feb 2021 | Published: 15 Dec 2020

TechTarget ComputerWeekly.com

UCaaS vs. CCaaS vs. CPaaS: What's the difference?
sponsored by TechTarget ComputerWeekly.com
EGUIDE: It can be difficult to make sense of popular cloud communications service models. Compare UCaaS vs. CCaaS vs. CPaaS to understand their differences and how they can be used together.
Posted: 05 Nov 2023 | Published: 06 Nov 2023

TechTarget ComputerWeekly.com

Secure remote access: More vital than ever thanks to Covid-19
sponsored by TechTarget ComputerWeekly.com
EGUIDE: We explore some of the minutiae of securing the remote workforce. First, infosec consultant Kevin Beaver, picks over some remote access security risks that have arisen during the pandemic. Then we explore the findings of a recent supplier report, which detailed how remote working burn-out is becoming a factor in increasing security risk.
Posted: 27 Aug 2021 | Published: 27 Aug 2021

TechTarget ComputerWeekly.com