IT Management  >   Systems Operations  >   Networking  >  

Transparent Computing

RSS Feed    Add to Google    Add to My Yahoo!
Transparent ComputingWhite Papers (View All Report Types)
 
Leveraging RFID & Other Pervasive Technologies to Achieve Transaction Efficiency in Consumer Retailing
sponsored by Infosys Technologies Limited
WHITE PAPER: Providing customer satisfaction with retail operations allows organizations to gain the most revenue from their customers. Read this paper to learn how pervasive technology can be deployed to optimize operations and enable a superior customer experience.
Posted: 14 May 2007 | Published: 01 May 2006

Infosys Technologies Limited

Choosing visual properties for successful visualizations
sponsored by IBM
WHITE PAPER: In the following article, IBM experts address a key aspect in the design process.
Posted: 09 Oct 2013 | Published: 09 Oct 2013

IBM

What role does BPM play and how can it help you improve your business operations?
sponsored by OpenText
WHITE PAPER: Your business processes are fundamentally linked to operations and overall performance. Achieving efficient, flexible, and agile processes involves collaboration between business and IT -- which is where many businesses fall short. Fortunately, business process management (BPM) can address all of these issues.
Posted: 14 Feb 2014 | Published: 31 Dec 2013

OpenText

Developing a Road Map to an Exceptional Web Experience
sponsored by IBM
WHITE PAPER: When it comes to web experiences, customers have high expectations. Consult this resource to learn how you can provide innovative, high-value user experience solutions to satisfy your customers. It explains how to deliver resources that draw from user experience and knowledge.
Posted: 16 Jul 2013 | Published: 16 Jul 2013

IBM

New expectations for a new era: HR insights from the Global C-suite Study
sponsored by IBM
WHITE PAPER: The customer is more empowered than ever before, and the workforce needs to adapt to their increasing demands -- is your business ready? In this analysis of a 2013 C-suite study, discover what steps companies are taking to create a workforce that succeeds in today's customer-driven world.
Posted: 07 Aug 2014 | Published: 31 Mar 2014

IBM

Becoming a Social Business: Social Business Enterprise Strategy Accelerator
sponsored by IBM
WHITE PAPER: The way people interact and form relationships is changing, social business is the way of the future. This resource explains more about the opportunities that social business provides. It discusses how to go about adopting social media for both external and internal purposes, read on to learn more tips on transitioning to the social enterprise.
Posted: 16 Jul 2013 | Published: 16 Jul 2013

IBM

Social Login 101
sponsored by Gigya
WHITE PAPER: View this white paper to learn why social login -- with permission-based access to first-party identity data -- is the better option for getting the kind of information that creates relevant cross-channel experiences. Read now to explore the basics of social login, best practices, and benefits for consumers and businesses.
Posted: 27 Jun 2014 | Published: 27 Jun 2014

Gigya

Making Sense of the Chaos: Measuring The Influence of Social Media
sponsored by IBM
WHITE PAPER: In this white paper, find out how, with the right tools in place, today's marketers can understand the value social media provides as a marketing channel and, in coordination with other channels, drive conversions and, ultimately, revenue.
Posted: 02 Mar 2014 | Published: 30 Jun 2013

IBM

Transform your business with Software as a Service
sponsored by IBM
WHITE PAPER: Becoming a customer-centric organization that fosters innovation and collaboration requires a new way of thinking and operating. Companies equipped with the tools and vision to embrace that change today will be positioned for greatness. Find out how to develop a collaborative business by reading this resource now.
Posted: 26 Sep 2013 | Published: 26 Sep 2013

IBM

The Five-Step Guide to Better Social Media Security
sponsored by Hootsuite
WHITE PAPER: Access this helpful resource to explore some of the most common security challenges for social media and learn the tools and processes you can use to reduce your risk. Learn how to prepare for the worst-case scenario so your social media data is always protected.
Posted: 22 Oct 2013 | Published: 22 Oct 2013

Hootsuite
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement