On Demand Applications Reports

Driving Change in the Digital Age
sponsored by TechTarget ComputerWeekly.com
EBOOK: What separates leaders from laggards in digital transformation? In this e-guide, find out what it takes for CIOs to successfully navigate digital transformation strategy and challenges.
Posted: 08 Feb 2021 | Published: 03 May 2017

TechTarget ComputerWeekly.com

Computer Weekly – 25 February 2020: Using meteorological data to prepare for the worst
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, after the storms that swept across the UK, we look at the technology behind Weather Source's meteorological data service. Oracle and SAP are battling over customers to upgrade their ERP systems to the cloud. And we report from the world's biggest retail tech show.
Posted: 08 Feb 2021 | Published: 25 Feb 2020

TechTarget ComputerWeekly.com

Getting the best out of robotic process automation
sponsored by TechTarget ComputerWeekly.com
EGUIDE: IT leaders are used to doing more with less, but the pandemic has forced many organisations to reassess whether the way processes have always been run, is optimal. With people having to work from home, many organisations have needed to automate previous manual tasks, in order to remain operational.
Posted: 06 Aug 2021 | Published: 06 Aug 2021

TechTarget ComputerWeekly.com

Hybrid Cloud Management Comes of Age
sponsored by NTT Communications Corporation
EGUIDE: 2016 was the year of the multicloud. So what does 2017 have in store? Delve into this guide, as our experts demonstrate how cloud management tools are evolving for the hybrid, multicloud operating environment, and learn how to take advantage of the options set before you.
Posted: 21 Jun 2017 | Published: 05 Jun 2017

NTT Communications Corporation

Mobile and Cloud: Shaping your Content Security
sponsored by Adobe
EGUIDE: In this e-guide, we explore how to manage sensitive content and documents, wherever they exist. Get tips about your content security options from experts like Forrester Research's Rick Holland, and learn about the potential benefits of mobile document management systems.
Posted: 29 Mar 2018 | Published: 26 Mar 2018

Adobe

What You Need-to-Know Before Jumping into Containers
sponsored by Nirmata
EGUIDE: There's a lot of buzz about what containers can do, but the technology is new and there are gaps that still need to be filled. Read this e-guide to learn what the experts are saying about containers and why you need to be cautious in planning your container strategy.
Posted: 30 May 2017 | Published: 23 May 2017

All resources sponsored by Nirmata

Adapting IT for Cloud Success
sponsored by VMware
EGUIDE: Enabling line organizations to undertake IT projects on their own, cloud computing is pressuring IT professionals to rethink their approach to application deployment and IT resource planning. In this eGuide, find tips on how to adapt to the cloud environment and address security and compliance risks.
Posted: 21 Sep 2016 | Published: 19 Sep 2016

VMware

SaaS Takes Center Stage in 2014
sponsored by IBM
WHITE PAPER: Learn how subscription-based business applications are expected to make an even bigger impact in 2014 and beyond in this informative infographic.
Posted: 02 Oct 2014 | Published: 29 Jul 2013

IBM

Value of Storage Operational Analytics
sponsored by Tintri
EGUIDE: In this eGuide learn how storage resource management (SRM) software can increase data accessibility and support key analytical functions such as capacity planning, vendor support, performance and dashboards. Also, find an exclusive list of data analytic vendors offering SRM software.
Posted: 02 Dec 2016 | Published: 01 Dec 2016

Tintri

Buyer's Essentials: What to Look for in an EMM Strategy
sponsored by TechTarget Security
EBOOK: EMM products can contain a variety of features - for mobile device management, mobile app management, mobile content management and more. This guide will review the capabilities and features you'll want to consider carefully before you invest in EMM.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

TechTarget Security