Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Contract Law  >   Contracts  >   Licensing  >  

Software Pricing

RSS Feed   
Software Pricing Reports
 
Using ICT financing for strategic gain
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Clive Longbottom and Rob Bamford offer advice to smaller businesses on financing and leasing of ICT hardware and software
Posted: 08 Jul 2013 | Published: 08 Jul 2013

ComputerWeekly.com

Computer Weekly – 12 September 2017: IT transformation takes the lead at Dogs Trust
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, the head of IT at Dogs Trust discusses their use of cloud computing and data analytics. We also look at the societal challenges of AI and investigate how to get a good deal on Office 365. Plus our buyer's guide checks out DevOps tools. Read the issue now.
Posted: 11 Sep 2017 | Published: 11 Sep 2017

ComputerWeekly.com

Expose Your New Vendor Audit Risks
sponsored by Livingstone Tech
VIDEO: As the number of cloud platforms and subscription-based licenses continue to rise, many organizations existing software auditing capabilities are no longer good enough. Tune into this webinar to learn how to identify and manage audit risks within your organization’s software portfolio.
Posted: 07 Apr 2020 | Premiered: 07 Apr 2020

Livingstone Tech

First edition of Computer Weekly 1966
sponsored by ComputerWeekly.com
EBOOK: To celebrate Computer Weekly's 50th anniversary, the National Museum of Computing, which holds the print archives of the magazine, has scanned the first issue of Computer Weekly. We have made this available to download.
Posted: 09 Sep 2016 | Published: 09 Sep 2016

ComputerWeekly.com

CW@50 - What was making the news in May
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: The National Museum of Computing has trawled the Computer Weekly archives for another selection of articles highlighting significant articles published in the month of May over the past five decades.
Posted: 10 May 2016 | Published: 09 May 2016

ComputerWeekly.com

Avoiding Audits - How to Get Of Software Vendors’ Radar
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Software license audits bog down operations and can be costly, though the ultimate sacrifice of the audit process is the relationship with customers. View this whitepaper to identify the 4 key triggers for being identified by a vendor for an audit, and how to alter habits to avoid unjust scrutiny.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

Hewlett-Packard Enterprise

The IT Management Software Megavendors
sponsored by BMC Software, Inc.
WHITE PAPER: The current recession and credit crunch deeply affected IT spending in the last quarter of 2008 and into 2009. This SWOT Analyst report for Q3 2009 regroups the market contenders by categories for an easier evaluation to enable vendor strategy professionals to substantiate decisions about their partnership and go-to-market strategies.
Posted: 27 Oct 2009 | Published: 27 Oct 2009

BMC Software, Inc.

Upgrade Strategies and Third-Party Support: Taking Back Control of Your Enterprise Applications Road Map
sponsored by Rimini Street, Inc.
WHITE PAPER: How to use third-party support to get information on enterprise application software licensing renewels.
Posted: 13 Jun 2011 | Published: 09 Jun 2011

Rimini Street, Inc.

ComputerWeekly: Why a Private Cloud Was Chosen for the Thames Tunnel Project
sponsored by ComputerWeekly.com
EZINE: In this issue of ComputerWeekly, we examine why one of the UK's largest construction projects—the Thames Tideway Tunnel—decided to use a private cloud setup. Our latest buyer's guide looks at containers and microservices, and we report on what U.S. court documents tell us about Oracle's controversial licensing polices.
Posted: 02 Feb 2016 | Published: 02 Feb 2016

ComputerWeekly.com

How Verification Services Fortify Your Software Escrow Solution
sponsored by Iron Mountain
WHITE PAPER: This paper examines the types of verification services used in the escrow industry. It discusses why verification has become a best practice for both the users of software and the developers creating the applications, as well as a solid recommendation by the lawyers who advise them.
Posted: 28 Dec 2011 | Published: 28 Dec 2011

Iron Mountain
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info