IT Agents  >  

Trade Associations

RSS Feed    Add to Google    Add to My Yahoo!
Trade AssociationsReports
 
Big Data at Work: Dispelling the Myths, Uncovering the Opportunities
sponsored by SAS
WHITE PAPER: Learn about big data technologies from world-renowned thought leader on big data and business analytics, Thomas H. Davenport.
Posted: 08 Jul 2014 | Published: 08 Jul 2014

SAS

SharePoint E-Zine Volume 8: Must-have Free SharePoint Tools and Add-ons
sponsored by SearchWinIT
EZINE: In this issue you will learn about some handy tools and utilities that are helpful to fill in SharePoint functionality gaps.
Posted: 13 Mar 2009 | Published: 13 Mar 2009

SearchWinIT

Enhancing the Customer Experience and Securing Endpoints with Biometrics
sponsored by NEC Corporation of America
TRANSCRIPT: This resource introduces NEC Corporation's NeoFace suite, a set of highly accurate facial recognition tools that use advanced facial processing and matching algorithms, and describes the business applications of biometrics.
Posted: 14 Oct 2014 | Published: 14 Oct 2014

NEC Corporation of America

The Impact of E.U. Internet Copyright Regulations on Early-Stage Investment
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This study from Booz&Co reveals industry concerns that anti-piracy measures will deter venture capital organisations from investing in internet start-ups.
Posted: 20 Feb 2012 | Published: 20 Feb 2012

ComputerWeekly.com

Six reasons why manufacturers should consider cloud ERP
sponsored by ComputerWeekly.com
ANALYST REPORT: There are a number of benefits beyond total cost of ownership when manufacturing companies deploy cloud ERP, this research from Analyst Group Nucleus reveals.
Posted: 01 Jul 2013 | Published: 01 Jul 2013

ComputerWeekly.com

Q&A: An ERP System for Enterprises of All Shapes and Sizes
sponsored by SYSPRO
WEBCAST: This brief video introduces an ERP system designed to meet the demands of businesses of all shapes and sizes. Read on to learn about the key benefits of this ERP tool.
Posted: 11 Apr 2014 | Premiered: Mar 23, 2012

SYSPRO

Simplifying your Compliance Strategy
sponsored by LogRhythm, Inc.
WHITE PAPER: Explore the ins and outs of the Gramm-Leach-Bliley Act (GLBA) and how it protects customer records and information. In addition, explore the consequences of non-compliance and learn how a particular log management solution can help you ease the compliance and reporting process.
Posted: 04 Sep 2013 | Published: 31 Oct 2012

LogRhythm, Inc.

Global Risks 2014
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Cybercrime and the potential fragmentation of the internet are among the most serious risks  facing businesses and governments in 2014, this report from the World Economic Forum reveals.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

ComputerWeekly.com

Rabobank International Enabling Customers to Bank Safe With HP
sponsored by Hewlett-Packard Limited
WEBCAST: View this brief webcast to see what one financial industry leader sees as a solution fit for the security future of his organization, and how strategies involving big data and education can keep customers' money and data safe from cybercrime.
Posted: 27 Nov 2013 | Premiered: Nov 27, 2013

Hewlett-Packard Limited

Workforce Management Software Best Practices
sponsored by Infor WFM Workbrain
EGUIDE: Workforce management (WFM) helps manufacturers improve operational efficiency and enable them to establish control over their enterprise. This e-guide offers an expert definition of WFM software and divulges best practice tips for deployment.
Posted: 07 Feb 2012 | Published: 07 Feb 2012

Infor WFM Workbrain
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement