ComputerWeekly.com Research Library

Powered by Bitpipe.com

Small Businesses White Papers

  • Computer Weekly - 1 March 2022: Post Office Horizon scandal enters public conscience - at last

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, 13 years after Computer Weekly first reported on flaws in the Post Office IT system, a public inquiry finally allows victims to reveal the devastating impact on their lives. Enterprises are starting to evaluate the uses of 5G. And we look at how SMEs have turned to e-commerce after the pandemic. Read the issue now.

  • SME security - a business imperative

    Sponsored by: TechTarget ComputerWeekly.com

    A growing number of enterprise-level organisations are assessing cyber security during supplier contract negotiations, which means cyber security is not only important to small and medium enterprises (SMEs) to keep their own data safe, but is also increasingly a requirement for winning new business.

  • DR for SMBs in 2013: Best practices for testing & planning

    Sponsored by: TechTarget Storage

    Check out this expert E-Guide to explore the keys to a successful DR strategy, and learn why it's essential that you document and test your plan once it's implemented.

  • Building a Business Case

    Sponsored by: TechTarget Security

    Small to midsize organizations that fail to adopt adequate mobile security measures may soon be out of business. This expert white paper outlines the business case for mobile security among SMBs; also inside, discover the key features your solution needs, and the benefits of a cloud-based approach to mobile security.

  • CW Europe – March 2015

    Sponsored by: TechTarget ComputerWeekly.com

    This issue of CW Europe explores how Neelie Kroes, who became the Netherlands Special Envoy for Startups at the beginning of 2015, is embarking on a new mission for startups in the Netherlands and the work she is leading via Startup Delta.

  • Computer Weekly: Going mobile in financial services

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, in a highly-regulated sector such as financial services, enabling staff mobility is a challenge – we hear from IT leaders that have made it work. We ask why small businesses are so poorly prepared for cyber attacks. And we examine the key storage technologies in the Openstack cloud platform. Read the issue now.

  • SMBs Need Enterprise-quality Data Protection, Right-sized for Them

    Sponsored by: HPE and Intel®

    This white paper highlights the need for SMBs to find data protection tools that are right-sized for their specific needs. It also cautions against organizations underestimating their data protection needs.

  • CW Europe – June 2014 Edition

    Sponsored by: TechTarget ComputerWeekly.com

    Europe is on a quest for innovation, looking like it might even give California's Silicon Valley a run for its money in a few years' time. London's Silicon Roundabout in Old Street may be smaller than Silicon Valley in size and reputation; however it is often featured on the list of top ten best cities to begin a startup company.

  • Actian's Big Data 2.0 Customer Successes

    Sponsored by: Actian Corporation

    This resource explores how businesses big and small are navigating the challenges of a big data 2.0 world, and explains how predictive analytics can turn big data into business value.

  • Digital CRM and the Customer Experience

    Sponsored by: IBM

    This expert  e-guide describes why digital technologies are proving to be the "next big thing" in the world of CRM, and explores the strategies that small businesses are using to stay competitive in e-commerce.

  • 5 Signs It's Time for a Data Center, SMBs

    Sponsored by: Dell, Inc. and Intel®

    Access this concise resource to find out if your small to mid-size business is in need of a compact server capable of providing the performance of an entire data center, all in a solution small enough to fit under your desk.

  • Top 6 "Must-Have" Technologies for Small and Midsize Manufacturers

    Sponsored by: Epicor Software Corporation

    This valuable resource counts down six critical manufacturing technologies that every small and midsize organization should have.

  • Server virtualization demands more from your storage - is your solution up to par?

    Sponsored by: HPE and Intel®

    This informative report describes how one vendor's storage infrastructure and array can help SMBs reduce costs and improve operations by quickly adding storage that is optimized for server virtualization to their IT infrastructure deployments.

  • How TCO Benefits Make Cloud Computing a No-Brainer for Many SMBs and Mid-Market Enterprises

    Sponsored by: NetSuite

    This resource analyzes the economic benefits of cloud computing in the ERP and CRM space, and details how embracing the cloud can be a competitive differentiator for SMBs.

  • The Backbone for Enterprise Cloud-Ready Database Platform

    Sponsored by: Dell EMC and Microsoft

    This resource introduces a shared infrastructure designed for remote and small office environments, and discusses its usage as a Microsoft SQL Server database platform.

  • Pay-as-you-Grow Data Protection

    Sponsored by: IBM

    This resource examines the data protection requirements of small to midsize businesses (SMBs), and introduces a strategy that enables your organization meet the challenges of explosive data growth.

  • Answers on Demand: Bringing the Power of Advanced Analytics to Midsize Businesses [FROST & SULLIVAN]

    Sponsored by: IBM

    This resource introduces an advanced analytics tool designed with the midsize business in mind – allowing you to affordably get the answers you need with the data you have. Read on to learn more.

  • Making The Move: What to Do When You’ve Outgrown QuickBooks

    Sponsored by: Sage North America

    This guide will provide you with smart, unbiased tips as your prepare to move from QuickBooks to a more powerful accounting solution. Continue reading this guide to decide which accounting solution is right for your company.

  • Making the Leap from SMB to Midmarket Manufacturing

    Sponsored by: Sage Software

    This E-Guide focuses on selecting the right midmarket ERP software for your growing business and offers advice for the best way to go about upgrading an old ERP system from an SMB model to a larger one that can scale appropriately.

  • What’s New with IP Office 8.1

    Sponsored by: Avaya

    This brief guide details the new features and improvements of the communications system IP Office 8.1, explaining how this tool can help you support increased scalability, integrated video collaboration, increased mobility, and more.

  • SMB cookbook: Whipping up a virtualization disaster recovery plan

    Sponsored by: Symantec Corporation

    This exclusive E-Guide explores how to implement a successful virtualization DR plan for the growing needs and shrinking budgets of today's IT departments.

  • IBM Analytic Answers for Retail Purchase Analysis and Offer Targeting

    Sponsored by: IBM

    This resource introduces a portfolio of cloud-based strategies that allow organizations of all shapes and sizes to benefit from advanced analytics – without the need for infrastructural changes, expensive software, or analytics expertise.

  • Choosing the Best Virtual Server Storage: A Tutorial

    Sponsored by: VMware, Inc.

    If you're a small to medium-sized business, you need your storage platform to be manageable by a small IT staff and fit within your budget. This expert E-Guide provides a detailed tutorial to help you navigate the virtual storage marketplace and select the best architecture for you.

  • CW Special Report on TCS

    Sponsored by: TechTarget ComputerWeekly.com

    This 5 page special report from Computer Weekly gives you the facts on TCS, its strategy, products and services and financial performance.

  • 2012 - Endpoint Security Best Practices Survey

    Sponsored by: Symantec Corporation

    Consult this informative resource to find out more about securing your endpoints. It outlines the best practices to avoid a cyber-attack along with many other helpful recommendations.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.