Change Management (Systems) Reports

Computer Weekly Innovation Awards APAC 2024 - Nomination form
sponsored by TechTarget ComputerWeekly.com
DATA SHEET: The Computer Weekly Innovation Awards APAC 2024 will once again shine the spotlight on digital transformation projects that have delivered business impact and/or solved problems using innovative approaches. All entries will be assessed by an independent panel of judges. Download your nomination form here.
Posted: 30 Nov 2023 | Published: 01 Dec 2023

TechTarget ComputerWeekly.com

Don't Be a Hostage to Your ERP System
sponsored by CSC
WHITE PAPER: ERP systems are essential to the functioning of your business, but when it comes to customizing ERP systems to fit changing needs, it can be a lengthy, costly, risky process. Wouldn't it be great if you could get the process agility you need from your ERP system, without the complexity or the high price tag? Access this resource to find out how.
Posted: 12 Sep 2013 | Published: 01 Jan 2012

CSC

Five Critical Rules for Firewall Management
sponsored by Dell SecureWorks
WHITE PAPER: This white paper will teach you five things to consider when managing your firewall, and will present you with real life examples of how these five things have helped other organisations improve their firewall management.
Posted: 06 Sep 2011 | Published: 06 Sep 2011

Dell SecureWorks

For Continuous Delivery, It's All About Integration
sponsored by TechTarget App Architecture
EBOOK: Leaders in the software industry are using continuous integration and CI-based tools to make continuous delivery a reality throughout the application lifecycle, and not just at the development stage.
Posted: 05 Mar 2014 | Published: 05 Mar 2014

TechTarget App Architecture

Kenco uses automation to streamline development
sponsored by IBM
CASE STUDY: To combat failed software development and configuration processes, Kenco wanted to implement a smarter, more collaborative application lifecycle management (ALM) process. Check out Kenco's case study to learn what tools they used to achieve this goal,
Posted: 07 Nov 2013 | Published: 08 Apr 2013

IBM

Trusted Data Delivery - Help reduce operational costs and risk while improving accessibility of critical business data
sponsored by IBM
WHITE PAPER: This white paper discusses how to reduce operational costs and risk while you improve the accessibility of critical business data. Don't put your business in a catch-up position - be the one in the forefront with the CDC advantage.
Posted: 26 Jul 2011 | Published: 26 Jul 2011

IBM

Open Source BPM Hits The Mark For Delivering New Class Of Process Apps
sponsored by Red Hat
WHITE PAPER: In this report from Forrester Research, Inc., explore the various challenges that modern application developers face and learn why savvy dev teams are considering open source BPM as an alternative to hand-coding and as a viable way to overcome these issues.
Posted: 12 May 2014 | Published: 31 Mar 2014

Red Hat

Overcoming virtualization security risks: Best practices
sponsored by Kaspersky
EGUIDE: Read this expert e-guide to learn best practices for securing your virtualized environment. Gain insights on how to overcome common challenges and minimize potential risks.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

Kaspersky

The Business Case for Information Management
sponsored by Oracle Corporation
WHITE PAPER: In this analysis, Frank Buytendijk examines what information management means, and describes a complete spectrum of business cases, ranging from tactical cost reduction to transformational impact on the organization’s business model.
Posted: 21 Mar 2011 | Published: 01 Dec 2008

Oracle Corporation

E-Guide: Exploring Configuration Changes to Reduce Attacks
sponsored by Tripwire, Inc.
EGUIDE: Configuration changes help organizations with limited IT staff and resources not only mitigate against known threats, but also future attacks. This expert e-guide explains why firms continue to struggle with zero-day vulnerabilities and offers advice on how to lock down systems to eliminate threats posed by high-profile attacks.
Posted: 15 Sep 2011 | Published: 15 Sep 2011

Tripwire, Inc.