Vertical Industries  >   Market Segments  >  

Enterprise

RSS Feed   
ALSO CALLED: Business Enterprises, Enterprise Businesses
DEFINITION: In the computer industry, an enterprise is an organization that uses computers. A word was needed that would encompass corporations, small businesses, non-profit institutions, government bodies, and possibly other kinds of organizations. The term enterprise seemed to do the job. In practice, the term is applied much more often to larger organizations than smaller ones.
Enterprise Reports
26 - 50 of 485 Matches Previous Page  |  Next Page
A Computer Weekly buyer's guide to operational IT
sponsored by ComputerWeekly.com
EBOOK: In this 14-page buyer's guide, Computer Weekly looks at applying back-office IT to industrial machines, how businesses can further digitise their operations, and how best to tap into data held in mainframes.
Posted: 06 Sep 2016 | Published: 30 Aug 2016

ComputerWeekly.com

CW ASEAN September 2016
sponsored by TechTarget ANZ
EZINE: Increasingly, companies in the Southeast Asia are embracing the cloud by putting their business applications there.
Posted: 29 Aug 2016 | Published: 29 Aug 2016


A Computer Weekly buyer's guide to expense management
sponsored by ComputerWeekly.com
EBOOK: Every year, UK businesses deal with about £10bn in expenses claims, but surprisingly few use IT to manage that spend. In this 12-page buyer's guide, Computer Weekly looks at how the application of expense management tools can reward organisations with immediate cost and time savings
Posted: 12 Aug 2016 | Published: 09 Aug 2016

ComputerWeekly.com

S2K Enterprise for Retail
sponsored by VAI, Vormittag Associates, Inc.
WHITE PAPER: In this white paper, discover what end-to-end integration for retailers can provide in the way of key features, including real-time access to product information, streamlined returns process, sophisticated forecasting formulas to eliminate time-consuming manual processes, and more.
Posted: 06 Jul 2016 | Published: 06 Jul 2016

VAI, Vormittag Associates, Inc.

Navigating the ERP Landscape Today
sponsored by VAI, Vormittag Associates, Inc.
EGUIDE: Explore this expert e-guide to find out how to simplify your ERP environment, which ERP software features are suited to supporting discrete manufacturing, and four developing ERP trends that are influencing business transformation today.
Posted: 06 Jul 2016 | Published: 30 Jun 2016

VAI, Vormittag Associates, Inc.

Free Yourself from Old-School PC Tools
sponsored by MobileIron
WHITE PAPER: Take a look at the significant improvements new devices have made and learn about how managing all of them can be boiled down to a single enterprise mobility management solution that eases both management and security.
Posted: 03 Jun 2016 | Published: 25 May 2016

MobileIron

What to Look for in Cloud Access Security Brokers
sponsored by SearchCloudSecurity.com
EBOOK: This buyer's guide on CASBs offers an overview of the emerging technology, explains how it works, and highlights the key features a CASB should have, including guidelines on some "nice-to-have" features. Learn what is currently available for this technology and discover the IT evaluation process to helop you select the best CASB for your company.
Posted: 06 Sep 2016 | Published: 06 Sep 2016

SearchCloudSecurity.com

Embrace Intelligence in Your BPM
sponsored by SearchSOA.com
EBOOK: Learn about BPM trends and where iBPM fits into the business rules management spectrum. This handbook takes a look at business process management development trends and how to let BPM guide the technology and not the other way around.
Posted: 02 Sep 2016 | Published: 02 Sep 2016

SearchSOA.com

Cloud Services Take Off, GRC Doesn't
sponsored by SearchSecurity.com
EZINE: The ability for organizations to implement cloud governance models is increasingly challenged by the proliferating use of services by business units and workgroups. This issue of Information Security shares tips on gaining more insight when employees are migrating critical apps and data to the cloud.
Posted: 01 Sep 2016 | Published: 01 Sep 2016

SearchSecurity.com

Make EMM Part of a Broader Mobile Enterprise Strategy
sponsored by Hewlett Packard - Intel Xeon
EGUIDE: Are you like many other who think enterprise mobility management (EMM) can be a centerpiece of your mobile enterprise security strategy? Find out why EMM alone is not enough.
Posted: 18 Aug 2016 | Published: 15 Aug 2016

Hewlett Packard - Intel Xeon

How to Keep up with Governance, Risk, and Compliance in the face of Faster App Development
sponsored by SearchMicroservices
EBOOK: This handbook explores how to implement holistic governance, risk, and compliance (GRC) for SOA and microservices by leveraging ALM, APIs, and Web Services Security. Learn more about microservices and how they're changing the world of app security.
Posted: 10 Aug 2016 | Published: 10 Aug 2016

SearchMicroservices

Mining Gold from Gigabytes August 2016 Business Information
sponsored by SearchDataManagement
EZINE: For companies tapping into mountains of amassed data, enterprise business analytics breathes new life into the old axiom "There's gold in them thar hills."
Posted: 04 Aug 2016 | Published: 04 Aug 2016

SearchDataManagement

Social Media Monitoring Long on Promise, Short on Results
sponsored by SearchContentManagement
EBOOK: Every company knows that social media holds great insight into customer desires, but many are failing. This handbook on social media monitoring identifies some of the difficulties and provides suggestions on converting raw data into actionable information to successfully engage audiences, identify prospects and enhance brand awareness.
Posted: 03 Aug 2016 | Published: 04 Aug 2016

SearchContentManagement

Ovum Decision Matrix for Enterprise Performance Management
sponsored by IBM
WHITE PAPER: This research report illustrates the challenges and opportunities in the enterprise performance management space today. Find out which vendors are market leaders as well as criteria for choosing an EPM offering today.
Posted: 02 Aug 2016 | Published: 31 Dec 2014

IBM

Improve Planning, Budgeting, and Forecasting with Advanced Analytics
sponsored by IBM
RESOURCE: Even businesses with top-performing enterprise performance management (EPM) strategies may need to tweak their approach in today's volatile market. Access this resource to get key facts from the Aberdeen Group about EPM strategies that take advantage of predictive analytics.
Posted: 01 Aug 2016 | Published: 24 Sep 2014

IBM

The Foundation of Sound Performance Management Strategies
sponsored by IBM
RESOURCE: Access this resource to uncover strategies that allow you to automate processes and implement enhanced collaboration for improved performance management. Find out how you can update your analytics capabilities to get accurate forecasts, create predictive models, and drive better decision-making.
Posted: 01 Aug 2016 | Published: 01 Aug 2016

IBM

Improving ECM Strategies Within Your Company
sponsored by IBM
WHITE PAPER: In this Forrester Research Report, learn about the importance of improved enterprise content management (ECM) within large businesses. How can you successfully improve ECM at your own company? Get key recommendations inside.
Posted: 26 Jul 2016 | Published: 30 Sep 2015

IBM

Time to Toughen Up for IoT
sponsored by SearchSecurity.com
EBOOK: This 3-part guide is filled with best practices for Internet-enabled device security, looking at such things as raising awareness of potential security threats wrought by IoT and how to test your defenses in the IoT era.
Posted: 26 Jul 2016 | Published: 20 Jul 2016

SearchSecurity.com

Can Your CFO Manage the Pressure to Innovate?
sponsored by IBM
RESOURCE: The pressure to innovate has increased, and managing risks have become more difficult. How are CFOs helping their enterprises pursue profitable growth? Find out in this research report, and discover the 3 imperatives for gaining actionable insights to accelerate business.
Posted: 25 Jul 2016 | Published: 25 Jul 2016

IBM

Enterprise Content Management Strategies for Integration, Access, and Control
sponsored by IBM
EGUIDE: Implementing the right ECM strategy can be difficult: it means striking the correct balance between accessibility, control, and data integration. In this e-guide, we explore the concept of ECM software integration, enabling you to share formerly siloed information. You'll learn how to optimize user access without sacrificing IT control.
Posted: 25 Jul 2016 | Published: 21 Jul 2016

IBM

Cloud Enterprise Content Management: Streamlining Mobile Business Processes
sponsored by IBM
EGUIDE: Cloud-based ECM makes content available anywhere and anytime, a key feature in the era of proliferating mobile devices. But while identifying these benefits is one thing, actually implementing them is another. In this e-guide, we explore the challenges you face when adopting cloud ECM and the capabilities you can unlock like cloud file sharing.
Posted: 25 Jul 2016 | Published: 21 Jul 2016

IBM

Report: Evaluating 11 Leading ECM Vendors
sponsored by IBM
WHITE PAPER: In this Forrester report, you will see the 11 most significant enterprise content management (ECM) software providers and where they stand in relation to each other to help you select the right partner to manage your business's critical content. See which vendor is right for your organization.
Posted: 22 Jul 2016 | Published: 28 Aug 2015

IBM

Compare Big Data Hadoop Cloud Solutions
sponsored by IBM
RESEARCH CONTENT: This report by Forrester will help you discover who the leaders and strong performers are in viable Hadoop cloud solutions. See how vendors like Amazon Web Services, Google, IBM, and more measure up.
Posted: 29 Jun 2016 | Published: 22 Apr 2016

IBM

Malware Hitching a Ride on Mobile Apps?
sponsored by SearchSecurity.com
EBOOK: The latest mobile app security threats ride into enterprises on employee devices, but you can learn the latest strategies for improving corporate BYOD security.
Posted: 27 Jun 2016 | Published: 20 Jun 2016

SearchSecurity.com

Moving Beyond Ad Hoc Mobile Security
sponsored by SearchSecurity.com
EZINE: Is security the missing piece in your enterprise mobile strategy? In this issue of Information Security, we ask CISOs and other security experts about the uncertain path from basic protections to threat management and mature mobile security.
Posted: 01 Jun 2016 | Published: 01 Jun 2016

SearchSecurity.com
26 - 50 of 485 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement