Enterprise Applications Reports

A Computer Weekly Buyer's Guide to Microsoft Office 365
sponsored by TechTarget ComputerWeekly.com
EBOOK: Microsoft Office used to be a simple thing. You'd buy a box of software, install Word, Excel, Outlook and PowerPoint – and that was it. But that all changed with the launch of Office 365. In this 13-page buyer's guide, Computer Weekly looks at Microsoft's subscription-based enterprise software offering.
Posted: 08 Feb 2021 | Published: 15 Nov 2017

TechTarget ComputerWeekly.com

SearchSOA.com Tip Guide: Approaches to Business Process Management
sponsored by iMANY
EGUIDE: Read this exclusive, eGuide to gain insight to the four different types of business process management (BPM).
Posted: 16 Sep 2011 | Published: 16 Sep 2011

iMANY

Cloud-ready networks - WAN Governance for cloud computing
sponsored by IPANEMA TECHNOLOGIES
WHITE PAPER: Cloud computing simplifies enterprise application delivery with resource flexibility, investment-less OPEX models, and no need for specialized in-house support resources.
Posted: 09 Feb 2011 | Published: 09 Feb 2011

IPANEMA TECHNOLOGIES

Where's the Collaboration in Enterprise Collaboration Tools?
sponsored by TechTarget Content Management
EGUIDE: Enterprise collaboration tools can help generate sales, reduce costs and connect dispersed workers. So why are many companies hesitant to use them? In this e-guide, you'll ensure strong governance policies are at the heart of your enterprise-wide collaboration strategy and learn the secrets of collaboration success.
Posted: 03 Mar 2016 | Published: 02 Mar 2016

TechTarget Content Management

PPL Successfully Orchestrates an Accurate Repertoire Database with Enterprise MDM
sponsored by DataFlux Corporation
CASE STUDY: A leading UK-based music licensing company works with DataFlux and Deloitte to verify and validate millions of data records from multiple sources.
Posted: 28 Feb 2011 | Published: 28 Feb 2011

DataFlux Corporation

The Next Frontier for Virtualization: Over-Utilized Systems: Identifying and eliminating the most critical and costly constraints from the enterprise software development and testing lifecycle
sponsored by iTKO LISA
WHITE PAPER: This article explains the utilization patterns in enterprise IT environments, and which type of Virtualization (Hardware or Service virtualization or both) should be applied to receive the greatest value. This paper discusses how to apply the principle of under and over-utilization to apply the right type of virtualization for business needs.
Posted: 20 Oct 2010 | Published: 20 Oct 2010

iTKO LISA

Unraveling the Mysteries of the Open Source Cloud
sponsored by TechTarget Cloud Computing
EBOOK: In this handbook, experts Tom Nolle, Trevor Jones, and Jim O'Reilly look at open source's place in the cloud, the various platforms currently in use, and where they can make a difference in an organization.
Posted: 17 Feb 2015 | Published: 17 Feb 2015

TechTarget Cloud Computing

Extract from book: "In-Memory Data Management"
sponsored by SAP America, Inc.
EBOOK: SAP in-memory computing is putting the "r" back in "real-time" computing by bringing together online transaction processing (OLTP) applications and online analytical processing (OLAP) applications at a lower total cost. Get an in-depth look at how this technology will impact business.
Posted: 29 Aug 2011 | Published: 01 Sep 2011

SAP America, Inc.

SAP Enterprise Applications on Cisco UCS
sponsored by Cisco Systems, Inc.
RESOURCE CENTER: The Cisco Unified Computing System (UCS) server platform has been designed with the performance and reliability to power memory-intensive, mission-critical applications, as well as virtualized workloads. Check out this solution center to learn more about SAP enterprise applications that are optimized on the UCS server platform.
Posted: 29 Nov 2011 | Published: 29 Nov 2011

Cisco Systems, Inc.

Next-generation capabilities of enterprise application-aware firewalls
sponsored by SonicWALL
EGUIDE: The emergence of Web 2.0 technologies has prompted the need for a firewall that is able to distinguish between different risks within a website's features and content, and apply policies accordingly. This expert tip discusses the new generation of "application-aware" firewalls that has emerged to deal with today's application-centric threats.
Posted: 07 Mar 2011 | Published: 07 Mar 2011

SonicWALL