Researching Supplier ReviewsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Researching Supplier Reviews returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Virtualization
 •   Mobile Device Management
 •   Application Security
 •   Enterprise Systems Management
 •   Customer Relationship Management (CRM)
 •   Wireless Technologies and Mobile Computing
 •   Social Networks and Community Management
 •   Vulnerability Assessment
 •   Enterprise Resource Planning (ERP)

Related Searches
 •   Billing Researching
 •   Database Researching Supplier
 •   Notes Researching Supplier Reviews
 •   Purchase Researching Supplier
 •   Researching Reservation
 •   Researching Supplier Activity
 •   Researching Supplier Case Studies
 •   Researching Supplier Time
 •   Researching Supplier Tool
 •   Sample Researching Supplier
Advertisement

ALL RESULTS
1 - 25 of 484 | Next Page

Computer Weekly 18 October 2011: Download the latest issue of the UK's leading technology publication, where we analyse the latest news in IT and what it means for IT managers by ComputerWeekly.com

October 14, 2011 - (Free Research)
In this week's Computer Weekly, we talk to the CIO of the London 2012 Olympics about progress on the UK's highest-profile IT implementation. We ask customers about Oracle’s long-awaited Fusion Applications; review the latest version of Windows Server; and find out how the Blackberry outage affected corporate customers. Download the new issue now. 
(EZINE) READ ABSTRACT |

Computer Weekly - 29 November 2011: Read this week’s issue of the UK’s leading technology publication, featuring the latest news, analysis and opinion about UK IT by ComputerWeekly.com

November 28, 2011 - (Free Research)
In this week's Computer Weekly, we go behind the scenes at the datacentre that knows everything about you, at credit checking firm Experian. We analyse the government's new plans to change the way it works with IT suppliers; and kick-off our Buyer's Guide to outsourcing with a look at the latest trends. Download the new issue now. 
(EZINE)

Information is King: Business Analytics in the Age of the Downturn and the (Re)Emergence of the Customer by SAS

April 07, 2010 - (Free Research)
BusinessWeek Research Services (BWRS) launched a research program in April 2009 to determine the attitudes and opinions of C-level executives with regard to the use and value of business analytics. This paper reviews a portion of the research and provides analysis and insights on the topic of business analytics. 
(WHITE PAPER) READ ABSTRACT |

The Customer You Know: Keeping, Leveraging, and Profiting from Current Customers with Business Analytics by SAS

May 05, 2010 - (Free Research)
Read this paper to learn about business analytics and how it can significantly impact customer service improvements and customer retention and how it can enable your company to develop more agile strategies that will allow you to adapt to changing customer behavior and achieve their business goals. 
(ANALYST REPORT) READ ABSTRACT |

Expert Analyst Reviews the Ins and Outs of Database Encryption by Guardium, an IBM Company

February 16, 2010 - (Free Research)
In this expert E-Guide, learn the ins and outs of database encryption. Jonathon Penn, principal analyst at Forrester Research Inc., reviews desktop, laptop and full disk encryption and outlines a cost-effective approach for managing security. Also discover three questions you must answer before embarking on any encryption project. 
(EGUIDE) READ ABSTRACT |

The New Language of Business: SOA and Web 2.0. Download a complimentary chapter by IBM

October 2007 - (Free Research)
Sandy Carter, Vice President of SOA and WebSphere Strategy, IBM Corporation, takes readers through a specific roadmap on how, where, when, and why to embrace a Service Oriented Architecture (SOA) strategy in her new book. 
(WHITE PAPER)

Web Application Security: Automated Scanning versus Manual Penetration Testing by Logicalis

December 2008 - (Free Research)
This paper explains the two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis. 
(WHITE PAPER) READ ABSTRACT |

Software Licensing and Subscription by ComputerWeekly.com

August 2011 - (Free Research)
This research from Freeform Dynamics, based on a survey of end users,  identifies the challenges faced by IT departments and suppliers on software licensing, and offers advice to organisations on dealing with software licensing. 
(ANALYST BRIEF) READ ABSTRACT |

Wireless LANs Standards: Where Are We Now? by Burton Group

July 2008 - (Free Research)
Not all standards are created equal. Some are technically elegant but achieve little market adoption. Others are broadly deployed. 
(WHITE PAPER) READ ABSTRACT |

A Full Report on the Cisco Catalyst 2960-X by Cisco Systems, Inc.

June 2013 - (Free Research)
In this Lippis Report Research Note, Lippis Research reviews the latest edition of the "most popular access switch on the planet" – the Cisco Catalyst 2960-X. Get a break down of the capabilities, features, and benefits of the new Catalyst 2960-X. 
(WHITE PAPER) READ ABSTRACT |

The Deloitte Consumer Review: A more secure customer by ComputerWeekly.com

March 2013 - (Free Research)
This report from Deloitte assesses the impact of cybercrime on consumers and offers advice to businesses on how to respond. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Computer Weekly – 24 April 2012: Are CIOs earning credibility in the boardoom? by ComputerWeekly.com

April 2012 - (Free Research)
This week’s Computer Weekly examines research that suggests CEOs want to invest in IT more than ever, but still see CIOs as technical experts and not business people. We review SQL Server 2012 and ask if Microsoft's database software is catching its competitors as well as concluding our Buyer's Guide to data security. 
(EZINE)

Analytics, Decision Making & Teams That Do It Right by ComputerWeekly.com

October 2012 - (Free Research)
Experts advise how to make the most of analytics in this report from SAS and the Harvard Business Review. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Data Management & Architecture by Accenture

Accenture's Data Management & Architecture group addresses how an organization manages data across its entire lifecycle. 
(SOFTWARE PRODUCT)

How Do You Score? Silverpop's Benchmark Study of B2B Lead Management Practices by Vtrenz, Inc

August 2008 - (Free Research)
Listen to this webinar and learn how to grab a peek at your competitors marketing results. It also discusses lead growth, form completion rate, email performance metrics, channels, and best practices. 
(WEBCAST) READ ABSTRACT |

Computer Weekly 16 August 2011: Read our analysis of the week’s biggest news stories in IT and in-depth features examining the latest technology trends by ComputerWeekly.com

August 2011 - (Free Research)
In this week’s issue of Computer Weekly we kick-off a programme of content aimed at providing a resource for IT training, education and career development. We also look at the controversial supplier contracts for the NHS IT programme, and examine the challenges of Big Data - plus our usual analysis of the week’s news. Download the latest issue now. 
(EBOOK) READ ABSTRACT |

Extending Advanced Malware Protection to Unmanaged devices, Cloud and Virtual Desktops by Trusteer

July 2012 - (Free Research)
Advanced threats and emerging IT initiatives such as BYOD, cloud applications and desktop virtualization are making security more challenging than ever before. This resource explores these challenges and offers insight on how to build a layered defense. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Parallel Programming Talk - Dr. David Patterson on the future of Parallel Programming by Intel Software Network

June 2009 - (Free Research)
Join master of the parallel universe Clay Breshears and Aaron Tersteeg as they discuss parallel programming with a special guest. This episode features Dr. David Paterson, Director of the Universal Parallel Computing Research Center at UC Berkeley sponsored by Intel and Microsoft. 
(PODCAST)

ERP in SME Fueling Growth and Profits by Sage Software

September 2011 - (Free Research)
This Aberdeen Group research report provides an in-depth and comprehensive look at companies leveraging ERP solutions as a strategic weapon.  This report reviews methodologies and technologies with best practice identification and actionable recommendations. 
(WHITE PAPER) READ ABSTRACT |

B2B Collaboration: Assessing the ROI of Process Integration Business Value Research Series by Sterling Commerce Manufacturing Solutions

March 2008 - (Free Research)
Business and IT leaders are under increasing pressure to improve B2B collaboration and the electronic communication capabilities of their organizations. This report looks at the key drivers for B2B collaboration in both the purchase-to-pay and... 
(WHITE PAPER) READ ABSTRACT |

The Forrester Wave™: Risk-Based Authentication, Q1 2012 by RSA, The Security Division of EMC

February 2012 - (Free Research)
This white paper reviews the top six risk-based authentication (RBA) vendors in the market today. Discover the pros and cons of each and how they stack up to one another. Review evaluations of each based on 16 key criteria, including customer satisfaction, mobile strategy, product revenue, and much more. 
(WHITE PAPER) READ ABSTRACT |

Maximize Your Collaboration Investment by Choosing the Right Services Approach by Cisco Systems, Inc.

June 2010 - (Free Research)
This IDC Vendor Spotlight reviews Cisco's collaboration services. This paper also reviews IDC research on the overall collaboration market, including unified communications (UC), and looks at the impact and benefits of collaboration services on customers and partners. 
(ANALYST REPORT)

ROI Case Study: Salesforce Data.com Tableau Software by ComputerWeekly.com

February 2014 - (Free Research)
Analyst group Nucleus Research examines how Tableau Software's used Salesforce Data.com to identify sales leads across regions and to manage its customer data within a single, centralised solution. 
(ANALYST REPORT) READ ABSTRACT |

CW+: Bloor Research - EU Compliance and Regulations for the IT Professional by ComputerWeekly.com

January 2011 - (Free Research)
This paper highlights key directives and legislation within the European Union that have an impact on IT security practitioners, especially those responsible for the safe storage of data using data loss prevention technologies. 
(WHITE PAPER) READ ABSTRACT |

Web Exploits: There’s an App for That by M86 Security

May 2010 - (Free Research)
The main motivation driving the cybercrime industry is the possibility of monetary gain. Savvy, knowledgeable individuals with skills in developing Web applications and basic knowledge in hacking have filled a niche by creating exploit kits. Read this white paper to learn the basics about exploit kits, what they do, and why the bad guys use them. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 484 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts