Auctions Reports

Reverse Auction Best Practices
sponsored by SAP America, Inc.
WHITE PAPER: Reverse auctions are a key tool that sourcing organizations can use to bring about huge success if executed along with a well-defined sourcing process. Careful thought and planning must precede an auction event in order to achieve double-digit price compression.
Posted: 26 Apr 2012 | Published: 28 Feb 2011

SAP America, Inc.

Computer Weekly - 29 November 2022: How to stop data retention from killing the planet
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, there's a hidden environmental cost to the vast volumes of data being generated – we examine what can be done to address it. We talk to the CISO of consumer reviews site Trustpilot, about building trust in IT security. And we look at what IT leaders can do if they inherit a toxic team environment. Read the issue now.
Posted: 28 Nov 2022 | Published: 29 Nov 2022

TechTarget ComputerWeekly.com

Computer Weekly - 1 February 2022: How Ocado pushes technological boundaries
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to Ocado's CTO about how the e-commerce company pushes technological boundaries. Our latest buyer's guide looks at the importance and technical challenges of data integration. There's a growing dispute over the use of end-to-end encryption – we look at the differing perspectives. Read the issue now.
Posted: 28 Jan 2022 | Published: 01 Feb 2022

TechTarget ComputerWeekly.com

RPA vs. BPM: How are they different?
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Robotic process automation and business process management are complementary partners in driving digital transformation initiatives. RPA has received a lot more publicity in recent years, but BPM is an essential discipline and a key enabler in scaling RPA projects. Here are the main differences between these process-oriented initiatives.
Posted: 19 May 2022 | Published: 19 May 2022

TechTarget ComputerWeekly.com

Computer Weekly – 6 September 2022: Out with the old at Asda
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to Asda's CIO Carl Dawson about the supermarket's cloud-oriented renovation of its technology stack. We narrate the security woes at Twitter. And we examine best practices for data backup. Read the issue now.
Posted: 02 Sep 2022 | Published: 06 Sep 2022

TechTarget ComputerWeekly.com

What's Up With Business Processes in the Cloud
sponsored by TechTarget App Architecture
EBOOK: In this searchSOA e-guide, learn questions worth asking when choosing a cloud BPM option. Additionally, learn about new trends in the cloud, social media, and mobile are affecting the business landscape, as well as the ways in which business reinvention is overcoming cloud concerns.
Posted: 12 May 2014 | Published: 12 May 2014

TechTarget App Architecture

Case Study: How supercomputing is transforming experimental science
sponsored by TechTarget ComputerWeekly.com
EGUIDE: NERSC lead data scientist Debbie Bard talks about how large-scale data analytics using super computers is making new types of science possible
Posted: 03 Jul 2020 | Published: 03 Jul 2020

TechTarget ComputerWeekly.com

ROI analysis: JBoss Enterprise BRMS Compared to Drools, the JBoss Community Project
sponsored by Red Hat
WHITE PAPER: Drools, a business rules management system (BRMS) created by members of the JBoss developer community, offers the innovation you need for early stage projects or proof-of-concepts. But when it comes to mission-critical applications, don't you want the assurance of SLA-based support, patches, and updates?
Posted: 12 May 2014 | Published: 31 Dec 2012

Red Hat

Data Monetization Strategies: Make and Save Money With Data and Analytics
sponsored by Information Builders
WHITE PAPER: Are you sitting on your data with no plan? Do you know how to capitalize on information you already have? This whitepaper dives into the world of profiting from data. Access now to discover 4 essential steps to getting started, as well as challenges to overcome and a discussion on the importance of data integrity.
Posted: 26 Oct 2015 | Published: 26 Oct 2015

Information Builders

Computer Weekly – 14 June 2016: The password's the problem – lessons from the LinkedIn breach
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, after millions of LinkedIn users had their data compromised, we look at the lesson to be learned from this latest data breach incident. Our buyer's guide looks at NoSQL technologies and compares Microsoft's and Oracle's offerings. And we examine the benefits of cloud-based data analytics. Read the issue now.
Posted: 10 Jun 2016 | Published: 14 Jun 2016

TechTarget ComputerWeekly.com