Product Data Management

RSS Feed    Add to Google    Add to My Yahoo!
Product Data Management Reports
25 Matches
Are You Customer-Centric? Why Manufacturers Are Adding Services
sponsored by Infor
WHITE PAPER: Make sure your company is positioned to meet the customer expectations and demands that will result from offering new services. Read on and learn ways to capture the data needed to truly understand what services add value for customers.
Posted: 26 Feb 2016 | Published: 26 Feb 2016

Infor

Best Practice Guide: Quality Planning, Assurance, and Control
sponsored by Global Knowledge
WHITE PAPER: To ensure quality products, you need a strategy in place to plan and control all aspects of your project. This resource reveals key best practices for quality planning, assurance, and control. Discover how to effectively leverage tools like cause and effect diagrams, histograms, statistical sampling, interrelationship diagraphs, and much more.
Posted: 15 Apr 2016 | Published: 15 Apr 2016

Global Knowledge

CW Special report on Wipro
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 5 page special report from Computer Weekly gives you the facts on Wipro, its strategy, products and services and financial performance.
Posted: 23 Nov 2012 | Published: 23 Nov 2012

ComputerWeekly.com

Align Innovation and Strategy for New Product Development Success
sponsored by CA Technologies.
WHITE PAPER: This white paper explores how to align project management with innovation for faster, more efficient development and resource allocation. Discover how to implement full lifecycle PPM and enhance decision-making with increased visibility into projects.
Posted: 05 Apr 2017 | Published: 31 Dec 2015

CA Technologies.

CW Special report on Atos
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 9 page special report, updated for 2014, gives you the facts on Atos, its strategy, products and services and financial performance.
Posted: 01 May 2014 | Published: 05 May 2014

ComputerWeekly.com

Information Security Breaches Survey 2013
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Security breaches cost large businesses an average of £850,000, the 2013 Information Security Breaches Survey reveals.
Posted: 29 Apr 2013 | Published: 29 Apr 2013

ComputerWeekly.com

IT Priorities 2014: UK Europe, France and Germany
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Benchmark your IT spending plans, with our in-depth study of IT spending priorities in the UK, France, Germany, and Europe in 2014.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

TOPICS:  Application Development | Backup for Virtualized Servers | Backup Server Hardware | Backup Software | Backups | Budgeting | Business Continuity Planning | Business Intelligence | Business Process Automation | Business Process Management | Cloud Archive | Cloud Backup | Cloud Computing | Cloud CRM | Cloud Disaster Recovery | Cloud Management | Cloud Security | Cloud Storage | Cloud Storage Services | Cloud Storage Strategy | Compliance Best Practices | CRM | CRM Software | Data Analytics | Data Center Consolidation | Data Center Networking | Data Centers | Data Deduplication | Data Loss Prevention (DLP) | Database Management Software | Desktop Virtualization | Disaster Recovery | ERP | ERP Software | Ethernet Networks | Green Data Center | Green Storage | Hardware | Hybrid clouds | Identity Management | Infrastructure as a Service (IaaS) | ITIL | Mobile CRM | Mobile Device Management | Mobile Device Management Software | Mobile Middleware | Mobile Payments | Mobile Workers | NAS | NAS Software | Network Appliances | Network Architectures | Network Configuration Management | Network Infrastructure | Network Management | Network Monitoring Software | Network Operating Systems | Network Performance Management Software | Network Processors | Network Provisioning | Network Security | Network Security Appliances | Network Security Hardware | Network Security Software | Networking | Networking Hardware | Office Suites | Outsourcing | Platform as a service | Private Cloud | Public Cloud | Remote Access Hardware | Risk Assessment | Risk Management | Security | Security Architectures | Security Audits | Security Best Practices | Security Event Management | Security Hardware | Security Industry | Security Infrastructure | Security Management | Security Managers | Security Policies | Security Software | Security Spending | Security Standards | Security Systems | Security Threats | Security Tokens | Server Appliances | Server Consolidation | Server Hardware | Server Provisioning | Server Software | Server Virtualization | Smart Phones | Social Computing | Software | Software as a Service | Software Implementation | Software Virtualization | Storage Appliances | Storage Architectures | Storage Consolidation | Storage Devices | Storage for File Virtualization/NAS Virtualization | Storage for Virtualized Servers | Storage Hardware | Storage Management | Storage Management Services | Storage Management Software | Storage Media | Storage Resource Management Software | Storage Security | Storage Spending | Storage Switches | Storage Systems | Storage Virtualization | Storage Virtualization Software | Supply Chain Software | Tablet PC | Tape Backups | Testing | Video Services | Videoconferencing Hardware | Videoconferencing Services | Videoconferencing Software | Virtual Desktop Infrastructure | Virtual Machine | Virtualization Security | Vulnerability Management | WAN | WAN Hardware | WAN Switches | WAN Switching | Windows | Windows 7 | Windows Server Software | Windows XP | WLAN | Workforce Management Software
ComputerWeekly.com

Sap business suite now available on Sap Hana
sponsored by ComputerWeekly.com
ANALYST REPORT: This analyst report from Nucleus Research assess the impact of SAPs decision to power SAP Business Suite by its SAP HANA in memory database technology.
Posted: 01 Feb 2013 | Published: 01 Feb 2013

ComputerWeekly.com

Network Purchasing Intentions 2013
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This exclusive Computer Weekly/TechTarget research ,based on a survey of over 400 European IT professionals, reveals organisations’ investment plans for networking technology.
Posted: 02 Dec 2013 | Published: 02 Dec 2013

ComputerWeekly.com

CW Special report on Capgemini
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 8 page special report from Computer Weekly offers a critical assessment of Capgemini, its strategy, products and services and financial performance. Packed with graphs and charts it is essential reading for anyone thinking of working with Capgemini.
Posted: 24 Aug 2012 | Published: 24 Aug 2012

ComputerWeekly.com

Overcome Storage Capacity Conundrums of Genomics and Precision Medicine
sponsored by Pure Storage
WHITE PAPER: Today's fastest compute environments are prevented from delivering on their promise for genomics as a result of constrained performance of the underlying storage infrastructure. Download this resource to learn how to overcome the capacity constraints of legacy storage and harness the possibility of precision medicine.
Posted: 07 Dec 2016 | Published: 07 Dec 2016

Pure Storage

Understanding the Impact of Flash Storage in Healthcare Environments
sponsored by Pure Storage
WEBCAST: Storage experts discuss how to increase provider productivity and enable more patient visits with fast, reliable, flash storage. Discover how flash storage can provide your healthcare organization with the performance and storage flexibility you need to provide secure access to your data anywhere, at any time.
Posted: 20 May 2016 | Premiered: May 20, 2016

Pure Storage

Special report on EMC
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 12 page special report from Computer Weekly, updated for 2013, gives you the facts on EMC, its strategy, products and services and financial performance.
Posted: 04 Dec 2013 | Published: 04 Dec 2013

ComputerWeekly.com

Definitive Guide to Big Data
sponsored by Nutanix
EBOOK: You've heard of big data, and you know you need it, but do you know why? This comprehensive e-book clears away the confusion and gets you to the point where you can start drawing useful insights from your big data.
Posted: 20 Mar 2017 | Published: 20 Mar 2017

Nutanix

Information Governance
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This research from AIIM looks at the risk profile around electronic records, the keep-all versus delete-all options, e-discovery, and the implications of social, mobile and cloud on risk management policies.
Posted: 03 Jun 2013 | Published: 03 Jun 2013

ComputerWeekly.com

Federal Agencies Have a BYOD Program, Like It or Not
sponsored by Lookout
RESEARCH CONTENT: Shadow BYOD introduces a risk of sensitive data leakage due to its lack of visibility and control of access. This report details how shadow BYOD has become a concern for the federal government. Access now to learn about shadow BYOD and how to properly manage personal devices by taking using mobile device management and security solutions.
Posted: 02 Sep 2016 | Published: 29 Jul 2016

Lookout

CW buyer's guide: context-aware security
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 11-page  Computer Weekly buyer's guide  looks at how organisations should approach context-aware security technologies and what business benefits they can deliver.
Posted: 29 Apr 2013 | Published: 29 Apr 2013

ComputerWeekly.com

Kicking off an e-health revolution
sponsored by ComputerWeekly.com
EGUIDE: It has been hailed as the next big thing for many years but, it is fair to say, e-health has failed to fulfill its potential. Issues around cost, ease of use and privacy have held back its adoption. Now, find out how Telefonica hopes to kick start the e-health revolution.
Posted: 21 Jul 2014 | Published: 21 Jul 2014

ComputerWeekly.com

Discover the Cloudification of Healthcare IT
sponsored by Pure Storage
RESOURCE: Is clinical data safe in the cloud? Is the cloud compliant? Access this post to hear what your health IT peers have to say about the cloudification of health IT, and their respective decisions to adopt, or not adopt, cloud platforms.
Posted: 09 Dec 2016 | Published: 09 Dec 2016

Pure Storage

Data Analytics Used to Combat the Opioid Epidemic
sponsored by SAS
RESOURCE: Find out how the utilization of predictive analytics contributes to the development of better treatment protocols for the opioid epidemic. Learn how to take action with the comprehensive data management approaches outlined, such as automating data assembly and streamlining report generation.
Posted: 09 Nov 2016 | Published: 09 Nov 2016

SAS

The currency of trust: why banks and insurers must make customer data safer and more secure
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Banks and insurers enjoy a significantly higher level of trust from consumers in the cyber security of their systems than any other sector, but the financial services industry is less confident in its ability to detect security breaches, this report from Capgemini reveals.
Posted: 25 Apr 2017 | Published: 25 Apr 2017

ComputerWeekly.com

Case Study: How John Lewis Conquered the Web
sponsored by ComputerWeekly.com
BOOK: Bill Goodwin tells the inside story of John Lewis £40m website redevelopment project, assesses the technical and business challenges faced and its impact on the business.
Posted: 17 Mar 2014 | Published: 17 Mar 2014

ComputerWeekly.com

Shadow IT Guide: Protect Data and Avoid Compliance Violations
sponsored by Globalscape
WHITE PAPER: Are you sure that employees are only using IT-sanctioned ways of transferring data? If the answer is "no," then your sensitive data may be vulnerable. In this guide from Globalscape, you'll learn: what shadow IT is and its drawbacks, how to identify signs of a shadow IT problem, how to reduce shadow IT, and more.
Posted: 07 Nov 2016 | Published: 31 Oct 2016

Globalscape

Next Generation Data centre Index – Cycle III
sponsored by ComputerWeekly.com
ANALYST REPORT: Organisations that are investing in key areas of IT and changing their mindset in the way they approach IT are well ahead of those just trying to save money,  say analysts Clive Longbottom and Bob Tarzey.
Posted: 27 Aug 2013 | Published: 27 Aug 2013

ComputerWeekly.com

The Global Risks Report 2016
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from the World Economic Forum identifies the most pressing global risks countries and organisations will face in 2016, including sections on technology and cyber crime.
Posted: 20 Jan 2016 | Published: 20 Jan 2016

ComputerWeekly.com
25 Matches
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement