sponsored by RES Software
Posted:  27 Oct 2010
Published:  27 Oct 2010
Format:  PDF
Length:  17  Page(s)
Type:  eBook
Language:  English

You’ve already come to understand the workspace itself, and how that workspace can be made pervasive across the spectrum of delivery mechanisms. You should at this point also recognize how that workspace is composed from an integration of content, context, and security.

But, as I mentioned in the conclusion of the previous chapter, the real technological detail of User Workspace Management is a topic that’s best left for this final chapter. Now that you understand the value and the positioning of this solution’s paradigm, your final questions should center around "How do I get this implemented in my environment?"

Answering that question is the primary topic of this final chapter. In it, you'll learn the details of the workspace composition process, including all the components that are necessary to enable its functionality.

Database Security | Desktop Applications Management | Desktop Management | Malware | Networking | Personalization | User Groups

View All Resources sponsored by RES Software

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement