Enterprise Computing Reports

Infographic: How organizations are using generative AI in Asia-Pacific
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Enterprise Strategy Group (ESG), an IT analyst firm owned by Computer Weekly publisher TechTarget, has published research about generative AI (GenAI) enterprise use cases that shows the concept ranking higher than sustainability and cloud migration as a strategic priority for enterprise IT globally.
Posted: 04 Oct 2023 | Published: 05 Oct 2023

TechTarget ComputerWeekly.com

Computer Weekly - 1 March 2022: Post Office Horizon scandal enters public conscience - at last
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, 13 years after Computer Weekly first reported on flaws in the Post Office IT system, a public inquiry finally allows victims to reveal the devastating impact on their lives. Enterprises are starting to evaluate the uses of 5G. And we look at how SMEs have turned to e-commerce after the pandemic. Read the issue now.
Posted: 01 Mar 2022 | Published: 01 Mar 2022

TechTarget ComputerWeekly.com

Computer Weekly - 30 November 2021: Digital beats - how Warner Music turned to the cloud
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to the CIO of Warner Music about how cloud computing helps it meet the needs of music lovers. AstraZeneca discusses how its enterprise social media system helped through the pandemic. And we assess the tech sector's response to the government's plans to tackle digital skills shortages. Read the issue now.
Posted: 26 Nov 2021 | Published: 30 Nov 2021

TechTarget ComputerWeekly.com

Computer Weekly – 4 September 2018: Power Play – how GE builds digital into its products
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we speak to Bill Ruh, the head of GE Digital about how the business has changed to focus on customer outcomes following a change in senior leadership. The company is exploring new industries to take its Predix platform such the hospitality sector. We also look at the problems of implementing SAP S/4 Hana.
Posted: 08 Feb 2021 | Published: 31 Aug 2018

TechTarget ComputerWeekly.com

How businesses can win talent war with mobile apps, HR data analytics, and cloud technology
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Becoming more digital has emerged as a ruling concept among forward-looking organisations in recent years. Now, while having multi-channel engagement with customers is a big aspect of digital, so too is attracting and retaining the employees who can make a reality of digital transformation.
Posted: 08 Feb 2021 | Published: 21 Apr 2016

TechTarget ComputerWeekly.com

CW Buyer's Guide to Apple in the Enterprise
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This nine-page buyer's guide assesses the growth of Apple's computers and iPads in business and the enterprise.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

TechTarget ComputerWeekly.com

Small and Midsize Business guide to Mobile Security
sponsored by TechTarget Security
WHITE PAPER: In this mobile security FAQ for small to midsize businesses, hear the answers to all of your pressing questions about the mobile threat landscape and what you can do to protect your mobile workforce. Discover how vulnerable SMBs are to mobile threats, tips for evaluating your solution options, and more.
Posted: 20 Dec 2012 | Published: 20 Dec 2012

TechTarget Security

Building a Business Case
sponsored by TechTarget Security
WHITE PAPER: Small to midsize organizations that fail to adopt adequate mobile security measures may soon be out of business. This expert white paper outlines the business case for mobile security among SMBs; also inside, discover the key features your solution needs, and the benefits of a cloud-based approach to mobile security.
Posted: 20 Dec 2012 | Published: 20 Dec 2012

TechTarget Security

BYOD Policy Creation Tips from Gartner
sponsored by TechTarget Security
EGUIDE: This expert e-guide offers key tips for creating a comprehensive Bring Your Own Device (BYOD) policy for compliance, consistency, security, and availability. Learn how you can get started by clicking through now.
Posted: 27 Nov 2012 | Published: 27 Nov 2012

TechTarget Security

Infographic: How organisations are using generative AI in EMEA
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Enterprise Strategy Group (ESG), an IT analyst firm owned by Computer Weekly publisher TechTarget, has published research about generative AI (GenAI) enterprise use cases that shows the concept ranking higher than sustainability and cloud migration as a strategic priority for enterprise IT globally.
Posted: 04 Oct 2023 | Published: 05 Oct 2023

TechTarget ComputerWeekly.com

Content collaboration tools sharpen focus on customer demands
sponsored by TechTarget Content Management
EBOOK: Businesses use content collaboration platforms to create, sharpen and perfect content for public-facing websites and internal corporate consumption. Learn about the latest content collaboration tools that support this software, such as cloud services, headless CMS and AI tools.
Posted: 02 Apr 2020 | Published: 02 Apr 2020

TechTarget Content Management

Single Sign-On Service Requires a Cloud-Era Update
sponsored by TechTarget Security
EBOOK: The best Single Sign-On today can handle the applications mobile workers use, identity as a service and more. In this guide, learn how you can make SSO and other identity management approaches more effective.
Posted: 13 Sep 2017 | Published: 13 Sep 2017

TechTarget Security

Mistakes to Avoid when Migrating to Windows 10
sponsored by eTECH Channel
EGUIDE: Access this expert e-guide to explore two articles: the first discusses upgrade planning for a Windows XP to 10 migration, and the second focuses on the costs of putting off a Windows 10 upgrade for organizations currently running on 7.
Posted: 24 Aug 2016 | Published: 23 Aug 2016

eTECH Channel

Expert Guide to Implementing Desktop Virtualization
sponsored by Dell
EGUIDE: Ensuring that a desktop virtualization implementation delivers a satisfactory end-user experience and uses computer resources effectively can be a challenging task. In this expert Pocket E-Guide, brought to you by SearchVirtualDesktop.com, Dell and Intel, you will discover top strategies for a smooth transition to a virtual desktop environment.
Posted: 03 Nov 2014 | Published: 13 Jan 2010

Dell

Storage in the Age of Cloud Computing
sponsored by Toshiba
WEBCAST: In this fascinating video, learn about a high capacity, high speed, energy efficient storage solution that's capable of reducing the cost of storage capacity and can also be used to improve enterprise computing.
Posted: 18 Jun 2014 | Premiered: Jun 18, 2014

Toshiba

The Total Economic Impact of IBM Managed Mobility for BYOD - Windows
sponsored by IBM
WHITE PAPER: Check out this study from Forrester to get an evaluation of the economic impact and potential ROI you could realize by engaging in mobile enterprise services with IBM. If you're thinking about partnering with a managed mobility vendor for BYOD, this research could prove to be vital.
Posted: 08 Apr 2014 | Published: 31 May 2013

IBM

Del Monte Foods' Cloud Imperative
sponsored by Kenandy
WEBCAST: This video case study explores Del Monte Foods' cloud strategy – including why the food production company decided to move to the cloud and how it alleviated its cloud concerns.
Posted: 06 Jan 2014 | Premiered: Dec 10, 2013

Kenandy

Enable Enterprise Agility by managing feedback loops
sponsored by Hewlett Packard Enterprise
WEBCAST: Join Dave West, Officer at Tasktop, in this webcast to gain expert advice on managing feedback loops to gain a serious boost with enterprise agility.
Posted: 14 Nov 2013 | Premiered: Nov 14, 2013

Hewlett Packard Enterprise

Red Hat Enterprise Linux vs. Microsoft Windows Server 2008. Who wins?
sponsored by Red Hat
WHITE PAPER: How does Red Hat Enterprise Linux stack up to the competition? This white paper offers an overview of Red Hat Enterprise Linux as compared to Microsoft Window Server 2008 in terms of scalability, operational costs, and more.
Posted: 30 Aug 2013 | Published: 30 Aug 2013

Red Hat

Make cloud Work for you
sponsored by Hewlett-Packard Enterprise
WEBCAST: This webcast provides deeper insight into HPs cloud services. Find out why IT leaders are migrating to this technology and discover key benefits of implanting this service.
Posted: 31 Jul 2013 | Premiered: Jul 31, 2013

Hewlett-Packard Enterprise

Windows 8 Migration Station
sponsored by TechTarget Enterprise Desktop
EBOOK: This handbook offers guidance on the best practices for migrating to the Windows 8 operating system.
Posted: 18 Jul 2013 | Published: 18 Jul 2013

TechTarget Enterprise Desktop

The New World of Mobility Management
sponsored by Aruba Networks
WHITE PAPER: This resource offers key information IT professionals can use to set their plans for mobility on the right track. Read on to discover the 3 phases to mobilizing a business, the functions of Enterprise Mobility Management, and a Mobile Management needs checklist.
Posted: 23 Apr 2013 | Published: 31 Mar 2013

Aruba Networks

World-Class EA: The Agile Enterprise
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: Agile is about more than software development, it's a mindset. This report from the Open Group explains how to apply agile techniques and best practices to the enterprise.
Posted: 11 Feb 2013 | Published: 11 Feb 2013

TechTarget ComputerWeekly.com

The Business Case for Integrated ERP
sponsored by Scribe Software Corporation
WHITE PAPER: It's critical that your ERP software is integrated and can talk to other business applications and systems. Those who embrace ERP integration will reap lower operation costs, increased customer satisfaction, and a lot of saved time. Read this paper to learn how integrating your ERP software will impact your company's operations and work flow.
Posted: 22 Aug 2012 | Published: 01 Apr 2011

Scribe Software Corporation

Modernize Your Approach to Authentication
sponsored by TechTarget Security
EBOOK: This white paper can help you discover why attackers can target the token vendor to take advantage of the security of the authentication system as a whole and how you can replace the ubiquitous authenticator in your business.
Posted: 06 Aug 2012 | Published: 06 Aug 2012

TechTarget Security