Consumer Off the Shelf Software Reports

Securing Mobile Worker Data in the Age of IT Consumerization
sponsored by Code42
WHITE PAPER: This white paper highlights the benefits of consumerization and focuses on the challenges that it presents while also presenting a solution to handle those challenges.
Posted: 24 Feb 2014 | Published: 24 Feb 2014

Code42

Real Time Service Visualization For Your NOC
sponsored by Infovista Corporation
WHITE PAPER: This whitepaper offers a solution to help the operations manager deal with these complex demands. See how you can isolate, diagnose, and resolve the issues that impact service management.
Posted: 06 Jul 2011 | Published: 06 Jul 2011

Infovista Corporation

How Can You Prepare for the Consumerization of IT
sponsored by DynTek & McAfee
WHITE PAPER: The consumerization of IT is all about productivity. That’s the finding from a recent survey of organizations that currently allow or plan to allow employees to use personal IT devices and consumer-driven software on the enterprise network. Read this paper to view strategies McAfee recommends to prepare for the consumerization of IT.
Posted: 11 Mar 2011 | Published: 10 Mar 2011

DynTek  & McAfee

Meeting the Demands of the Smarter Consumer
sponsored by IBM
WHITE PAPER: IBM surveyed more than 30,000 consumers in the United States, Canada, United Kingdom, Brazil, India and China for this report on shopping preferences. Read this report to learn why technology makes consumers smarter, more connected and more certain about what they want.
Posted: 25 Aug 2010 | Published: 25 Aug 2010

IBM

Computer Weekly – 19 January 2021: The UK's struggle with digital schooling
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, the UK government's sudden decision to close schools left many unable to provide children with online schooling - we examine the home learning challenges. Cyber security experts give us their forecasts for 2021. And we find out how technology supports the work of the Guide Dogs charity. Read the issue now.
Posted: 08 Feb 2021 | Published: 19 Jan 2021

TechTarget ComputerWeekly.com

Designing Artificial Intelligence for Games (part 2)
sponsored by Intel Software Network
WHITE PAPER: This article gets dangerously close to real artificial intelligence (AI). All intelligent agents need to have a basic ability to perceive their environment and some means of navigating and moving within the world around them-be it real or otherwise. Read on to learn more about AI.
Posted: 17 Aug 2009 | Published: 11 Jun 2009

Intel Software Network

Gamania Group tightens security to strengthen game development capability
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Inside this white paper, read up on a gaming software company that was looking to expand in the market, but first turned to automated security management tools to ensure compliance and customer trust before moving forward.
Posted: 25 Sep 2013 | Published: 31 Oct 2012

Hewlett Packard Enterprise

Thinking of Cutting Your Team’s Training Budget? Think Again!
sponsored by SAP America, Inc.
WHITE PAPER: This paper will explain how education and training programs from SAP are now offered in a wide variety of delivery options to meet the needs of today’s workforce. This paper will also introduce you to the flexible training options now available from SAP, as well as some innovative new offerings just released in the last few months.
Posted: 28 Sep 2010 | Published: 28 Sep 2010

SAP America, Inc.

Online Training Case Study
sponsored by SyberWorks, Inc.
CASE STUDY: The operations division in a large multibillion-dollar service company had significant challenges training its franchisees to overcome these challenges the company purchased and installed the SyberWorks Training Center with a 250-seat license.
Posted: 08 Dec 2008 | Published: 08 Dec 2008

SyberWorks, Inc.

Information Security ANZ July 2016
sponsored by TechTarget Security
EZINE: Australia's $230m security strategy serves as a wake-up call to enterprises about the need to take the issue much more seriously.
Posted: 05 Jul 2016 | Published: 04 Jul 2016

TechTarget Security