Your Search returned 27 results from our White Paper Library

Sort By
Progress

Software

Progress Apama in Manufacturing – Complex Event Processing...

Investments in information and process control systems over the years has certainly yielded measurable results through automation, but can they keep up...


Progress

Software

Increase the Visibility of Your Logistics Operations

Transportation and logistics are inextricable parts of many businesses. At the same time, they leave plenty of room for improvement. Complex Event Processing...


Progress

Software

An Introduction to Complex Event Processing and its Role...

Businesses face demands to move at increasing speeds and depend on information technology to help keep pace. Watch this recorded video in which featured...


Progress

Software

IDC Report: Complex Event Processing

This IDC Report provides an overview of the current landscape of CEP and the role it can play within organizations.


Progress

Software

Understanding Complex Event Processing

This paper seeks to explain what events are, why they are important to your business, and what the options are for processing and managing these events....


Progress

Web Applications Architecture

Actional Architecture: Core Operational Management

This paper presents a detailed description of the patented technology used to deliver a management solution that’s high performing and scalable without...


Progress

Web Services

InterContinental Hotels Group Lowers IT Costs

Discover how IHG built a resilient system that can ensure the success of thousands of business transactions to deliver better customer experience, increased...


Progress

Web Services

Why Runtime Governance Is Critical for Service-Based Applications...

This white paper explains why runtime governance is essential for modern, distributed, interconnected applications and what problems it solves.


Progress

Mainframe Servers

TDWI Checklist Report: Mainframe Modernization

Mainframe modernization takes many forms. Finding a more streamlined method for using mainframe information on other platforms and extending the mainframe...


Previous 1 3

Recommended for You

phil-muncaster

Why does China spot security vulnerabilities quicker than the US?

Phil Muncaster reports on China and beyond

silhouette

Everything you need to know about... Blockchain

IDG Connect tackles the tech stories that matter to you

kathryn-cave

What will be the single biggest security threat of 2018?

Kathryn Cave looks at the big trends in global tech

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.

images

Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.

images

Poll

If it were legal, would your organization hack back?