Datacollection Reports

Big data vs. Machine learning: How do they compare?
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Data is at the heart of every modern enterprise. As more companies master the big data management process, forward-thinking ones are applying intelligent forms of analytics to extract more value from the data in their systems. In this infographic, we take a lot into the concepts of big data and machine learning, how they differ and how they relate.
Posted: 25 Mar 2022 | Published: 25 Mar 2022

TechTarget ComputerWeekly.com

CW APAC, April 2021: Trend Watch: IoT in India
sponsored by TechTarget ComputerWeekly.com
EZINE: In this handbook, focused on the internet of things in India, Computer Weekly looks at the country's potential as an IoT hotspot.
Posted: 26 Apr 2021 | Published: 26 Apr 2021

TechTarget ComputerWeekly.com

CW ASEAN: Unlock flash opportunities
sponsored by TechTarget ComputerWeekly.com
EZINE: Traditional disks can no longer keep up with the needs of modern enterprises. In this issue of CW ASEAN, we take a look at how enterprises are taking to all-flash array storage, and what they need to do to lay the foundation necessary for getting the most out of the technology. Read the issue now.
Posted: 08 Feb 2021 | Published: 11 Oct 2018

TechTarget ComputerWeekly.com

Computer Weekly – 1 August 2017: The fields of Athenry – how Apple's datacentre plans are causing turmoil in a small Irish town
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look into Apple's controversial plans to build a huge datacentre in a small town in the west of Ireland, and the local arguments it has caused. We find out how the Met Office is managing its vast quantities of weather data. And we examine Google plans to bring AI to the recruitment market. Read the issue now.
Posted: 08 Feb 2021 | Published: 01 Aug 2017

TechTarget ComputerWeekly.com

The Big Data Surge: Data Modeling Challenges & Best Practices for Prepping Big Data Apps for Production
sponsored by IBM
EGUIDE: Surging big data is changing data modeling techniques and app development cycles. Read on to discover what you should expect from big data's near-future and best practices when it comes to transitioning big data applications into the production stage.
Posted: 27 Jul 2016 | Published: 26 Jul 2016

IBM

VIN Scanning Saves Man Hours
sponsored by Intermec
CASE STUDY: Read this case study to learn how this large European shipping company integrated an Intermec Imaging Solution and estimates an annual saving of 25,000 hours on the vehicle logistics work flow. Additional savings are estimated for improving the accuracy of the VIN reading and record keeping.
Posted: 12 Aug 2013 | Published: 12 Aug 2013

Intermec

CRM Survival Guide
sponsored by bpm'online
EGUIDE: As with anything, it is important to start off your CRM initiative on the right foot. The only way to do that is by understanding everything this technology has to offer. From common features to the latest trends, this comprehensive guide breaks down everything you need in order to get started with CRM.
Posted: 31 Aug 2016 | Published: 29 Aug 2016

bpm'online

Social Login 101
sponsored by Gigya
WHITE PAPER: View this white paper to learn why social login -- with permission-based access to first-party identity data -- is the better option for getting the kind of information that creates relevant cross-channel experiences. Read now to explore the basics of social login, best practices, and benefits for consumers and businesses.
Posted: 27 Jun 2014 | Published: 27 Jun 2014

Gigya

7 Guidelines for Achieving High-Performance Information Integration
sponsored by IBM
WHITE PAPER: This white paper highlights 7 guiding principles to achieve high performing, scalable information integration.
Posted: 26 Oct 2015 | Published: 26 Oct 2015

IBM

The Improvement and Evolution of SIEM
sponsored by TechTarget Security
EGUIDE: Get an in-depth look at the past, present and future of security information and event management (SIEM) technology in this informative E-Guide from SearchSecurity.com.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

TechTarget Security