UX Reports

Top trends shaping APAC's tech landscape in 2024
sponsored by TechTarget ComputerWeekly.com
EGUIDE: While GenAI is not expected to supersede other IT priorities such as cloud, application development and cyber security, it will augment those areas by making it easier to build software and improve cyber resilience. In this round-up, we review some of the key IT trends that are likely to shape the industry across the region in 2024.
Posted: 07 Jan 2024 | Published: 08 Jan 2024

TechTarget ComputerWeekly.com

Desktop Virtualisation Insights for IT Strategic Planning
sponsored by Intel
RESEARCH CONTENT: This report analyses desktop virtualisation adoption and provides detailed guidance to help you plan a successful initiative. Discover major deployment barriers and get advice on how to measure the return on your investment.
Posted: 21 Feb 2012 | Published: 01 Sep 2011

Intel

Merz Intranet Portal Alzheimer’s specialist resolves communication issues with e-Spirit
sponsored by e-Spirit AG
CASE STUDY: Access this case study today to learn how Alzheimer's specialist Merz Pharma breathed new life into its employee portal and resolved key communications issues.
Posted: 26 Feb 2014 | Published: 26 Feb 2014

e-Spirit AG

McHenry County College: AppSense helps McHenry County College scale IT smoothly to meet increased growth
sponsored by AppSense
CASE STUDY: In this solution case-study, you’ll learn more about McHenry County College, an Illinois-based community college that serves a large number of traditional and adult students, and the steps they took after experiencing problems with their Active Directory roaming profile environment following a rapid growth in student enrollment.
Posted: 22 Jul 2013 | Published: 22 Jul 2013

AppSense

Social Login 101
sponsored by Gigya
WHITE PAPER: View this white paper to learn why social login -- with permission-based access to first-party identity data -- is the better option for getting the kind of information that creates relevant cross-channel experiences. Read now to explore the basics of social login, best practices, and benefits for consumers and businesses.
Posted: 27 Jun 2014 | Published: 27 Jun 2014

Gigya

Presentation Transcript: Content Monitoring in the Enterprise
sponsored by Lumension
PRESENTATION TRANSCRIPT: This presentation transcript will help readers learn key strategies to meet both business security needs and user demands. Discover more about topics such as setting content monitoring goals, data loss prevention technologies, database activity monitoring, and more.
Posted: 04 Jan 2013 | Published: 04 Jan 2013

Lumension

Guide to Design-Centric Application Development
sponsored by CraveInfoTech
EGUIDE: Designing customer-experience grade apps is a must in the age of empowered users. But you need the right tools to do it successfully. This comprehensive guide is your roadmap to developing user-friendly apps with SAP Fiori. Learn how to develop apps from a design-centric standpoint that focuses on the end user's needs.
Posted: 05 Oct 2016 | Published: 04 Oct 2016

CraveInfoTech

CIO Stories of Driving Digital Transformation in Today's World
sponsored by ServiceNow
EBOOK: How do CIOs achieve digital transformation? Read this white paper to learn how your organization can unlock its digital potential by gleaning expert insight from leading C-suite executives.
Posted: 22 Oct 2018 | Published: 31 Dec 2018

ServiceNow

How to Achieve Blissful Collaborative Nirvana
sponsored by TechTarget Content Management
EGUIDE: Often when enterprises confront the issue of collaboration, the initial reaction is to search for a new tool. And companies don't just look for any tool; they want the tool to bring colleagues together in blissful collaborative nirvana. This e-guide features best practices for choosing collaboration tools from Shawn Shell, VP of Hitachi Consulting.
Posted: 03 Mar 2016 | Published: 02 Mar 2016

TechTarget Content Management

The Ten Must Haves for Secure Mobile Device Management
sponsored by Zenprise
WHITE PAPER: Businesses are changing their traditions as employees continue to adopt mobile phone practices. Enterprise mobility may be efficient, but it can also put important company data at risk. Learn more about how you can have secure mobile device management with this valuable resource.
Posted: 01 Aug 2012 | Published: 01 Aug 2012

Zenprise