IT Management  >   Systems Operations  >   Networking  >  

Transparent Computing

RSS Feed    Add to Google    Add to My Yahoo!
Transparent ComputingReports
 
Real Time Information for the Pervasive Enterprise
sponsored by Infosys Technologies Limited
PRODUCT LITERATURE: Real-time visibility into operations enables response to market dynamics and competition. Read this paper to learn how to leverage pervasive technologies to transform an organization into a pervasive enterprise.
Posted: 14 May 2007 | Published: 01 Oct 2006

Infosys Technologies Limited

Leveraging RFID & Other Pervasive Technologies to Achieve Transaction Efficiency in Consumer Retailing
sponsored by Infosys Technologies Limited
WHITE PAPER: Providing customer satisfaction with retail operations allows organizations to gain the most revenue from their customers. Read this paper to learn how pervasive technology can be deployed to optimize operations and enable a superior customer experience.
Posted: 14 May 2007 | Published: 01 May 2006

Infosys Technologies Limited

How Social Learning Boosts Skills Development
sponsored by IBM
WHITE PAPER: In this white paper, discover how a social learning program can improve engagement, reduce attrition, and increase speed of knowledge. Explore the common problems that social learning can help solve, the core components of a social learning initiative, and recommended actions for implementation.
Posted: 04 Aug 2014 | Published: 31 Jul 2013

IBM

Applying Social Business:The Repeatable Patterns that Improve Business Processes and Provide Return
sponsored by IBM
WHITE PAPER: The following white paper examines how top organizations are optimizing processes and technology to become a social business. Learn about the best practices that have emerged, common pain points to be wary of, and more.
Posted: 01 Aug 2014 | Published: 01 Aug 2014

IBM

Tips and Best Practices for Enterprise Social Software Adoption
sponsored by IBM
EGUIDE: The following solution spotlight uncovers actionable steps that business can undertake to ensure user adoption and executive buy-in for social software.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

IBM

Social Engineering in IT Security
sponsored by ComputerWeekly.com
BOOK: This extract from Sharon Conheady's book, Social Engineering in IT Security, gives an overview of Social Engineering techniques and explains how organisations can protect themselves.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

ComputerWeekly.com

Selecting the Best Social Software for Your Enterprise
sponsored by IBM
WHITE PAPER: This white paper objectively evaluates and compares 20 social software vendors on dimensions such as customer experience, pricing, and innovation.
Posted: 03 Sep 2014 | Published: 10 Sep 2013

IBM

Microsoft Dynamics CRM Release Preview Guide
sponsored by Microsoft India
WHITE PAPER: In this resource, learn about a family of CRM applications that can help you deliver engaging, differentiating customer experiences with marketing, sales, and service capabilities.
Posted: 20 May 2014 | Published: 30 Apr 2014

Microsoft India

Social Login 101
sponsored by Gigya
WHITE PAPER: View this white paper to learn why social login -- with permission-based access to first-party identity data -- is the better option for getting the kind of information that creates relevant cross-channel experiences. Read now to explore the basics of social login, best practices, and benefits for consumers and businesses.
Posted: 27 Jun 2014 | Published: 27 Jun 2014

Gigya

BPS Edge: CEM The New Style of Customer Engagement Management
sponsored by Hewlett-Packard Company
WHITE PAPER: Find out about the most recent customer engagement management innovations.
Posted: 03 Jul 2014 | Published: 31 Mar 2014

Hewlett-Packard Company
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement