Business Enterprises Reports

Computer Weekly –25 April 2017: Blockchain expands reach beyond finance
sponsored by TechTarget ComputerWeekly.com
EZINE: Discover how blockchain, the tech behind bitcoin, is extending its reach beyond financial services into new industries. Also learn from developers about the pros and cons of componentizing application software, examine what a recent court case shows about Oracle's licensing policies, and more.
Posted: 08 Feb 2021 | Published: 25 Apr 2017

TechTarget ComputerWeekly.com

Stronger collaboration platforms emerge as pandemic legacy
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide: HR software had long been a relatively backward zone of enterprise software before the Covid-19 pandemic. It had been catching up, as organisations applied digital approaches drawn from customer experience to employee experience, encompassing the journey from recruitment, through working and learning, to moving up or moving on.
Posted: 06 May 2021 | Published: 06 May 2021

TechTarget ComputerWeekly.com

Latest Thinking in DevOps
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, we share some of the latest thinking on DevOps in the enterprise, as well as the success stories of some household names who have made agile software development work for them.
Posted: 08 Feb 2021 | Published: 25 Sep 2017

TechTarget ComputerWeekly.com

Mining Gold from Gigabytes August 2016 Business Information
sponsored by TechTarget Data Management
EZINE: For companies tapping into mountains of amassed data, enterprise business analytics breathes new life into the old axiom "There's gold in them thar hills."
Posted: 04 Aug 2016 | Published: 04 Aug 2016

TechTarget Data Management

MicroScope September Ezine
sponsored by MicroScope
EZINE: For many, the looming Brexit has stalled IT purchasing all together. But what can your organisation do to counteract this and navigate the complicated matter better than your peers? What does it mean for your employees? Take a look at this article of MicroScope for more information on Brexit's effect on the IT industry.
Posted: 25 Aug 2017 | Published: 25 Aug 2017

MicroScope

Moving Beyond Ad Hoc Mobile Security
sponsored by TechTarget Security
EZINE: Is security the missing piece in your enterprise mobile strategy? In this issue of Information Security, we ask CISOs and other security experts about the uncertain path from basic protections to threat management and mature mobile security.
Posted: 01 Jun 2016 | Published: 01 Jun 2016

TechTarget Security

Computer Weekly – 9 February 2016: How Software Protects People
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how software is helping to maintain safety in high-risk sectors such as oil and gas, aerospace and healthcare. We offer six tips from CIOs for innovation with data. And we examine the continuing threat to businesses from denial of service cyber attacks. Read the issue now.
Posted: 05 Feb 2016 | Published: 09 Feb 2016

TechTarget ComputerWeekly.com

Cloud Services Take Off, GRC Doesn't
sponsored by TechTarget Security
EZINE: The ability for organizations to implement cloud governance models is increasingly challenged by the proliferating use of services by business units and workgroups. This issue of Information Security shares tips on gaining more insight when employees are migrating critical apps and data to the cloud.
Posted: 01 Sep 2016 | Published: 01 Sep 2016

TechTarget Security

A Better Way to Manage Desktops: HP Workplace Management Services
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Enterprises need to give employees a full, flexible and configurable managed desktop environment to meet diverse business requirements and user productivity needs. Find out how HP can help.
Posted: 02 Sep 2014 | Published: 29 Aug 2014

Hewlett-Packard Enterprise

SOC Analyst in a Box
sponsored by TechTarget Security
EZINE: Discover endpoint detection and response (EDR) tools and incident response procedures that will help shorten the time between threat detection and response.
Posted: 01 Mar 2016 | Published: 01 Mar 2016

TechTarget Security