- Budgeting, Planning & Forecasting
- Enterprise Accounting Software
- Financial Management Solutions
- Small and Medium Sized Business Accounting Software
- Treasury, Cash and Risk Management
- Business Activity Monitoring (BAM)
- Business Intelligence Software
- Business Process Management (BPM)
- Enterprise Performance Management
- Reporting and End-User Query Tools
- RFID-- Radio Frequency Identification
- Warehouse Management Software
- Customer Experience Management (CEM)
- Customer Information Management
- Sales and Marketing Software
- Enterprise Asset Management (EAM)
- Facilities Management and Maintenance
- Electronic Medical Billing Systems
- Healthcare Inventory Management
- Employee Benefits Administration
- Employee Relationship Management (ERM)
- Human Resources and Payroll Software
- Learning Management Systems (LMS)
- Workforce Planning and Management
- Enterprise Content Management
- Information Lifecycle Management
- Advanced Planning and Scheduling
- Integrated Manufacturing Solutions
- Manufacturing Enterprise Resource Planning (MERP)
- Product Life Cycle Management (PLM)
- Project Management Solutions
- Resource Planning and Scheduling
- Web, Video and Audio Conferencing
- Data Center Power Management
- Software-Defined Data Center (SDDC)
- Cloud Computing Applications
- Database Planning and Implementation
- Enterprise Application Integration
- Enterprise Application Integration Middleware
- Service Oriented Architecture (SOA)
- Business Service Management (BSM)
- Business Technology Optimization
- Enterprise Architecture Management (EAM)
- Enterprise Resource Management
- Enterprise Resource Planning (ERP)
- Information Technology Infrastructure Library (ITIL)
- IT Service Management (ITSM)
- Project Portfolio Management (PPM)
- Technology Planning and Analysis
- BYOD (Bring Your Own Device)
- Managed Service Provider (MSP)
- Network Configuration Management Software
- Fraud Detection & Prevention
- Intrusion Detection and Prevention
- IT Security Frameworks and Standards
- Threat and Vulnerability Management
- Virtual Private Network Security
- Data Center & Storage Solutions
- Network Attached Storage (NAS)
- Remote and Offsite Data Storage
- SAN Virtualization and Consolidation
- Application Lifecycle Management (ALM)
- Application Performance Management (APM)
- Enterprise Systems Management
- Software as a Service (SaaS)
- Software Configuration Management (SCM)
- Natural Language Processing (NLP)
- Electronic Catalog Management
- Electronic Commerce Interchange (EDI-XML)
A recent study found that one in 1000 devices were infected with mobile surveillance and mobile Remote Access Trojans (mRATs). These attacks were found both on Android...
Review 10 ways how developers can use APM to create better applications with end-user experience monitoring to identify problems and performance bottlenecks before...
Disruptive technologies will contribute to the creation, distribution, and fragmentation of enterprise information. The additional volumes of new data types will...
Why do projects become a success? More and more people believe this is because of motivation and commitment, not planning and control. Collaborative planning, a...
In the last 10 years, the number of DDoS attacks has increased significantly. However, despite their prevalence, many organisations still don’t have a dedicated...
Managing Hadoop batch processing may consume a significant portion of application developers’ time and effort, which drives up application development times and...
Move away from uncertain performance and move to the cloud.Your visitors’ first interactions with your website start with a series of DNS queries. If your DNS performs...
Across businesses of all sizes, vigilance is key when it comes to protecting your private data. Security breaches are on the rise and if your organization suffers...
In this webinar, three cyber security veterans will discuss today’s rapidly evolving cyber threat landscape and LogRhythm’s new Security Intelligence Maturity Model™...
Should you encrypt everything? There has never been more options for encrypting data across applications, databases, servers, storage, and the entire datacenter...
Patrick Martlew’s in-depth breakdown of the B2B tech sphere
Mark Chillingworth on IT leadership
IDG Connect delivers full creative solutions to meet all your demand generation needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.
Our in-house analyst and editorial team create a range of insights for the global B2B technology community. These look at the latest IT trends and other zeitgeist topics.
Do you think your smartphone is making you a workaholic?
Do you think your smartphone is making you a workaholic?
Yes
No
I'm working on keeping a work-life balance