ESM Software Reports

Spend Performance Management - Maximize Savings, Reduce Supplier Risks
sponsored by SAP America, Inc.
WHITE PAPER: The SAP BusinessObjects Spend Performance Management application provides full visibility into direct and indirect spend, and helps companies proactively identify cost savings opportunities and supply risks, reduce costs, maintain supply continuity, and increase spend under management.
Posted: 05 Nov 2009 | Published: 05 Nov 2009

SAP America, Inc.

Oracle Procurement & Spend Analytics
sponsored by Oracle Corporation
DATA SHEET: Oracle Procurement & Spend Analytics, part of the Oracle BI Applications product line, enables you to optimize supply side performance by integrating data from across the enterprise value chain—enabling executives, managers, and frontline employees to make more informed decisions. Read this data sheet for more.
Posted: 07 Oct 2010 | Published: 11 Jul 2008

Oracle Corporation

Ten Steps to an Enterprise Mobility Strategy
sponsored by iPass Inc.
WHITE PAPER: Ensure traveling employees are productive while you control costs and security, with an enterprise mobility strategy.
Posted: 30 Jan 2012 | Published: 27 Jan 2012

iPass Inc.

Top Ten Reasons to Automate Operating Expense Controls
sponsored by ExpenseWatch.com
WHITE PAPER: Manual processes are error-prone, time-consuming and costly. Learn the top ten reasons to automate operating expense controls.
Posted: 01 Apr 2008 | Published: 01 Jan 2007

ExpenseWatch.com

Computer Weekly – 16 May 2023: Microsoft and Google go into battle for enterprise AI
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as developments in generative AI accelerate, Microsoft and Google have each unveiled plans around enterprise applications. Nobody doubts the importance of digital transformation – but experts say it won't work without cultural change as well. Read the issue now.
Posted: 12 May 2023 | Published: 16 May 2023

TechTarget ComputerWeekly.com

Royal Holloway: Information security of the 2016 Philippine automated elections
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: We analysed 426 log files provided by the Philippines' Commission on Elections to objectively recreate what transpired during the 2016 elections. These log files were used to gauge the integrity of the Philippine AES using an AES Trust Model developed by this research.
Posted: 13 Apr 2022 | Published: 13 Apr 2022

TechTarget ComputerWeekly.com

Computer Weekly - 18 January 2022: The race to quantum computing
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, researchers are racing to create the first commercially useful quantum computer – we look at one of the European candidates. Cyber security is one of the greatest risks facing the global economy, warns the World Economic Forum. And we examine the role of employee experience in hybrid working. Read the issue now.
Posted: 18 Jan 2022 | Published: 18 Jan 2022

TechTarget ComputerWeekly.com

CW Buyer's Guide to Emerging technology
sponsored by TechTarget ComputerWeekly.com
EBOOK: The way we work is changing with the exponential emergence of new technology. In this 15-page buyer's guide, Computer Weekly looks at the potential of DNA storage, how we can benefit from quantum computing in the future and the role of software in business development.
Posted: 13 Jan 2022 | Published: 13 Jan 2022

TechTarget ComputerWeekly.com

Computer Weekly – 14 November 2023: The UK AI Safety Summit – what did it achieve?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look back at the UK government's AI Safety Summit and assess what it achieved – and what it didn't. Our latest buyer's guide examines the future of business software and modernising legacy applications. And we find out how the UK PSTI Act aims to protect your smart devices. Read the issue now.
Posted: 10 Nov 2023 | Published: 14 Nov 2023

TechTarget ComputerWeekly.com

Application Delivery Network Buyer's Guide
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The more systems become remote, the less secure they are. On face value a huge cliché – or truism - but sadly actually true. And sadly, for those running networks, something that is going to be truer – or more clichéd – as remote working continues to proliferate in the new normal of the hybrid mode of working.
Posted: 06 Aug 2021 | Published: 06 Aug 2021

TechTarget ComputerWeekly.com