Business Graphics Software Reports

Choosing visual properties for successful visualizations
sponsored by IBM
WHITE PAPER: In the following article, IBM experts address a key aspect in the design process.
Posted: 09 Oct 2013 | Published: 09 Oct 2013

IBM

Tips for Presenting to Business People
sponsored by Code42
WHITE PAPER: Presenting to "the Business" can be one of the most intimidating things that technical IT pros do as part of their standard job. This guide outlines strategies for giving a top-notch presentation.
Posted: 05 Jun 2014 | Published: 05 Jun 2014

Code42

Selecting a Visual Analytics Application
sponsored by Tableau Software
WHITE PAPER: Visual analytics is the process of analytical reasoning facilitated by interactive visual interfaces. Its becoming the fastest way for people to explore and understand Business Intelligence data of any size. This paper will introduce you to the seven essential elements of true visual analytics applications.
Posted: 20 Apr 2009 | Published: 20 Apr 2009

Tableau Software

From monologue to dialogue: Adding interaction to your presentations
sponsored by Citrix Online Go To Meeting
WHITE PAPER: This IT brief reviews best practices for enhancing interactivity and participation creating a more memorable, engaging presentation experience for you – and your audience.
Posted: 17 Jul 2013 | Published: 17 Jul 2013

Citrix Online Go To Meeting

How to Give a Killer Presentation: Lessons from TED
sponsored by Citrix Online Go To Meeting
WHITE PAPER: In this article, TED's curator describes the process that TED uses to prepare speakers for their presentations- suggestions that are helpful for presentations in any setting.
Posted: 04 Jun 2014 | Published: 30 Jun 2013

Citrix Online Go To Meeting

Designing Great Visualizations
sponsored by Tableau Software
WHITE PAPER: Visual representations are a fundamental component of human learning and understanding. To study the impact of data visualization, we must first look to the past and see how our ways of shaping and representing data have changed over time. This paper traces the history of visual representation, from cave drawings to the computer revolution.
Posted: 20 Apr 2009 | Published: 20 Apr 2009

Tableau Software

CW Benelux - August-October 2022: Belgium seeks top tech talent
sponsored by TechTarget ComputerWeekly.com
EZINE: The battle for the right IT staff to transform businesses is changing and recruiters and job-seekers need to be clued up. In this issue, a Belgium-based recruiter gives the lowdown on tech job-seeking. Also read why Dutch beer brewer Heineken has replaced more than 60 different HR systems with SAP SuccessFactors as its central HR system.
Posted: 28 Jul 2022 | Published: 11 Aug 2022

TechTarget ComputerWeekly.com

Computer Weekly - 20 December 2022: The Post Office IT scandal - cock-up or cover-up?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, the Post Office IT scandal inquiry continues to reveal shocking details – we review the latest evidence. We examine progress of the roll-out of fast broadband across the UK. And as the Online Safety Bill returns to Parliament, we look at the arguments about how to keep the internet safe. Read the issue now.
Posted: 16 Dec 2022 | Published: 20 Dec 2022

TechTarget ComputerWeekly.com

Application Delivery Network Buyers' Guide
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The more systems become remote, the less secure they are. On face value a huge cliché – or truism - but sadly actually true. And sadly, for those running networks, something that is going to be truer – or more clichéd – as remote working continues to proliferate in the new normal of the hybrid mode of working.
Posted: 15 Mar 2021 | Published: 18 Feb 2021

TechTarget ComputerWeekly.com

Royal Holloway: Information security of the 2016 Philippine automated elections
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: We analysed 426 log files provided by the Philippines' Commission on Elections to objectively recreate what transpired during the 2016 elections. These log files were used to gauge the integrity of the Philippine AES using an AES Trust Model developed by this research.
Posted: 13 Apr 2022 | Published: 13 Apr 2022

TechTarget ComputerWeekly.com