Vertical Industries  >   Market Segments  >  

Consumers

RSS Feed    Add to Google    Add to My Yahoo!
Consumers Reports
 
IT Security Case Studies
sponsored by ComputerWeekly.com
CASE STUDY: Warwick Ashford presents 4 critical IT security case-studies selected from the winners of Computer Weekly's European User Awards.
Posted: 21 Jun 2013 | Published: 21 Jun 2013

ComputerWeekly.com

Computer Weekly - 19 June 2012: How to succeed at desktop virtualisation
sponsored by ComputerWeekly.com
EZINE: In this week’s Computer Weekly, our latest Buyer's Guide examines best practice in desktop virtualisation. We ask if a six-year-old technology could be a key to tackling IT security threats. And we look at how universities are dealing with their IT challenges as they await the first intake of students at new higher tuition fees. Read the issue now.
Posted: 18 Jun 2012 | Published: 19 Jun 2012

ComputerWeekly.com

The Deloitte Consumer Review: A more secure customer
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from Deloitte assesses the impact of cybercrime on consumers and offers advice to businesses on how to respond.
Posted: 12 Mar 2013 | Published: 12 Mar 2013

ComputerWeekly.com

Key Insights for Building “Consumerised” End-User Services
sponsored by ComputerWeekly.com
IT BRIEFING: This report extract from the Corporate Executive Board gives IT organisations an insight into the best approaches to building and managing consumer technology in the workplace.
Posted: 29 Nov 2012 | Published: 05 Oct 2011

ComputerWeekly.com

Network Purchasing Intentions 2013
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This exclusive Computer Weekly/TechTarget research ,based on a survey of over 400 European IT professionals, reveals organisations’ investment plans for networking technology.
Posted: 02 Dec 2013 | Published: 02 Dec 2013

ComputerWeekly.com

The Future of Corporate IT
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This research study from CEB identifies five opportunities for CIOs to drive productivity and growth as organisations adopt new working practices.
Posted: 05 Jun 2013 | Published: 05 Jun 2013

ComputerWeekly.com

Consumerisation and BYOD Purchasing Intentions Europe 2013
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This exclusive Computer Weekly/TechTarget research reveals European organisations plans for BYOD and Consumerisation of IT.
Posted: 19 Dec 2013 | Published: 19 Dec 2013

ComputerWeekly.com

Challenges & Strategies for UK Annuity Providers
sponsored by Wipro Technologies
WHITE PAPER: This white papers talks about the challenges facing the UK annuity market and the strategies that can be taken by the product providers to meet them. The paper also talks about how Wipro can partner with providers to tap the opportunities present in the marketplace.
Posted: 13 May 2009 | Published: 11 May 2009

Wipro Technologies

Consumer Spending and Retailer Strategies in the Current Economy
sponsored by Wipro Technologies
WHITE PAPER: This paper analyze how the current economy is affecting the retail business, how different income groups’ consumer spending patterns are varying in key merchandise groups, and what some retailers are doing about these circumstances.
Posted: 27 Jun 2008 | Published: 26 Jun 2008

Wipro Technologies

Real Time Service Visualization For Your NOC
sponsored by InfoVista Corporation
WHITE PAPER: This whitepaper offers a solution to help the operations manager deal with these complex demands. See how you can isolate, diagnose, and resolve the issues that impact service management.
Posted: 06 Jul 2011 | Published: 06 Jul 2011

InfoVista Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement