Enterprise Businesses Reports

Latest Thinking in DevOps
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, we share some of the latest thinking on DevOps in the enterprise, as well as the success stories of some household names who have made agile software development work for them.
Posted: 08 Feb 2021 | Published: 25 Sep 2017

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to operational IT
sponsored by TechTarget ComputerWeekly.com
EBOOK: In this 14-page buyer's guide, Computer Weekly looks at applying back-office IT to industrial machines, how businesses can further digitise their operations, and how best to tap into data held in mainframes.
Posted: 08 Feb 2021 | Published: 30 Aug 2016

TechTarget ComputerWeekly.com

Mining Gold from Gigabytes August 2016 Business Information
sponsored by TechTarget Data Management
EZINE: For companies tapping into mountains of amassed data, enterprise business analytics breathes new life into the old axiom "There's gold in them thar hills."
Posted: 04 Aug 2016 | Published: 04 Aug 2016

TechTarget Data Management

Global Threats and an Intelligent Response
sponsored by TechTarget Security
EBOOK: In today's world of multipronged, global threats, a global threat intelligence service is becoming essential to enterprise security strategy.
Posted: 16 Sep 2015 | Published: 16 Sep 2015

TechTarget Security

Computer Weekly – 25 August 2015: Coping with a crisis
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, IT leaders discuss their experiences of dealing with disaster and the importance of planning to ensure business continuity. Jaeger's CIO talks about bring the iconic fashion brand into the digital age. And we look at the issues around writing supplier contracts for agile software development. Read the issue now.
Posted: 21 Aug 2015 | Published: 21 Aug 2015

TechTarget ComputerWeekly.com

Cloud Enterprise Content Management: Streamlining Mobile Business Processes
sponsored by IBM
EGUIDE: Cloud-based ECM makes content available anywhere and anytime, a key feature in the era of proliferating mobile devices. But while identifying these benefits is one thing, actually implementing them is another. In this e-guide, we explore the challenges you face when adopting cloud ECM and the capabilities you can unlock like cloud file sharing.
Posted: 25 Jul 2016 | Published: 21 Jul 2016

IBM

Addressing Remote and Endpoint Backup Challenges with the Cloud
sponsored by TechTarget Data Backup
EBOOK: This handbook provides you with an overview of challenges associated with remote data protection and the products available today to address them. Read on now to address your endpoint data protection concerns, as well as how to choose the right cloud endpoint backup products for your organization.
Posted: 19 Aug 2015 | Published: 19 Aug 2015

TechTarget Data Backup

Moving Beyond Ad Hoc Mobile Security
sponsored by TechTarget Security
EZINE: Is security the missing piece in your enterprise mobile strategy? In this issue of Information Security, we ask CISOs and other security experts about the uncertain path from basic protections to threat management and mature mobile security.
Posted: 01 Jun 2016 | Published: 01 Jun 2016

TechTarget Security

Information Security magazine Insider Edition, April 2017
sponsored by TechTarget Security
EZINE: Managing IAM is more critical than ever to corporate security; Your IAM policy must be updated to reflect the current risks and IT advances. Discover how to tackle changes in the "identity layer" and consider other factors affecting your IAM policy. Also delve into multifactor authentication and the specific risks to cloud-based IAM tools.
Posted: 19 Apr 2017 | Published: 10 Apr 2017

TechTarget Security

SQL, Hadoop Make a Powerful Data Pair
sponsored by TechTarget Data Management
EBOOK: SQL-on-Hadoop tools give companies new, efficient ways to deal with data. Read on to learn more.
Posted: 10 Aug 2015 | Published: 10 Aug 2015

TechTarget Data Management