Compaq Users Group White Papers

(View All Report Types)
The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER: This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012

Skillsoft

The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER: This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

Skillsoft

Why Business Rules?: A Case for Business Users of Information Technology
sponsored by IBM
WHITE PAPER: This whitepaper explains how business people are allowed to directly define how their business rules are being executed with a BRMS; and, perhaps more important, how it facilitates change in an easy, safe and reliable manner.
Posted: 07 Jul 2011 | Published: 01 Sep 2009

IBM

11 Questions Every CIO Should Ask Their IT Manager
sponsored by Red Hat and JBoss
WHITE PAPER: What is your IT really costing you? Could you be doing more with the technology you have? Could you reduce costs and provide better service to your organization? Read Red Hat's suggestions on "11 Questions Every CIO Should Ask Their IT Manager", and how Red Hat open source solutions can help.
Posted: 19 Jun 2009 | Published: 10 Jun 2009

Red Hat and JBoss

Gartner Middle East CIO Leadership Forum
sponsored by Gartner
WHITE PAPER: Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.
Posted: 28 Jan 2011 | Published: 28 Jan 2011

Gartner

Ten Critical Success Factors for CRM: Lessons Learned from Successful Implementations
sponsored by Oracle Corporation
WHITE PAPER: Customer relationship management (CRM) deployments can be complex and difficult. This white paper provides a checklist of the ten critical success factors for organizations to follow to avoid common pitfalls as they design and deploy their CRM system.
Posted: 16 Jan 2007 | Published: 01 Aug 2006

Oracle Corporation

Easy Active Directory Clean-Up Tips
sponsored by One Identity
ESSENTIAL GUIDE: Inside this E-Guide, read through some Active Directory organization strategies designed to minimize the headaches that often accompany user group restructuring projects – and ultimately reduce the time spent sifting through messy group architectures.
Posted: 13 Mar 2019 | Published: 11 Mar 2019

One Identity

Developers and Identity Services - Tackling Identity Data with Identity Hub
sponsored by Oracle Corporation
WHITE PAPER: This paper takes a closer look at the issues surrounding the patterns for accessing identity data and what an ideal Identity Hub should provide for developers.
Posted: 13 Feb 2009 | Published: 13 Feb 2009

Oracle Corporation

What Type of Virtualization Should You Use For Each User Segment?
sponsored by Dell, Inc. and Intel®
PRESENTATION TRANSCRIPT: In lesson two of this desktop virtualization classroom, Brian Madden discusses how to segment your users and group them together to figure out what type of desktop virtualization you should use for different groups or users. Then he covers the specific desktop virtualization technologies and the pros and cons of each.
Posted: 23 Dec 2011 | Published: 23 Dec 2011

Dell, Inc. and Intel®

Which Users Should You Virtualize?
sponsored by Dell, Inc. and Intel®
PRESENTATION TRANSCRIPT: Examine your desktop virtualization goals and determine which users you want to virtualize in this expert discussion with Brian Madden. Discover how your goals will change the way you implement your desktop virtualization initiative.
Posted: 22 Dec 2011 | Published: 22 Dec 2011

Dell, Inc. and Intel®

Azure Active Directory vs. Classic AD
sponsored by One Identity
ESSENTIAL GUIDE: Jump into this E-Guide to find out how to pinpoint the differences between the Microsoft Azure edition of Active Directory and the classic Windows Active Directory – and how to use those differences to your enterprise's advantage.
Posted: 13 Mar 2019 | Published: 11 Mar 2019

One Identity

eBook: The Shortcut Guide to User Workspace Management - Chapter 4: Transforming to an Environment of User Workspace Management
sponsored by RES Software
EBOOK: You’ve already come to understand the workspace itself, and how that workspace can be made pervasive across the spectrum of delivery mechanisms.
Posted: 27 Oct 2010 | Published: 27 Oct 2010

RES Software

Network Access Control: User and Device Authentication
sponsored by Intel Corporation
WHITE PAPER: Networking has evolved to support both wired and wireless access, securing corporate networks from attack is even more essential. This white paper discusses how your organization can authenticate users and devices before they connect to the network.
Posted: 31 Aug 2007 | Published: 01 Aug 2005

Intel Corporation

Technical Guide on Emerging Threats
sponsored by TechTarget Security
EGUIDE: It takes time and money to adjust IT security in response to evolving attack tactics. As defenders gradually update their security measures, attackers respond accordingly. Such arms-race dynamics lead to threats of increasing sophistication and efficiency.
Posted: 16 Feb 2011 | Published: 16 Feb 2011

TechTarget Security

Fighting the Tide: IBM/Cognos BI Users Reduce Overhead, Increase Operating Profit
sponsored by IBM
ANALYST BRIEF: Read this report to learn what Aberdeen Group found when analyzing the results of 65 IBM/Cognos BI users who participated in a larger study about best practices for business intelligence during a recession.
Posted: 17 Mar 2010 | Published: 14 Sep 2009

IBM

Manage Oracle Database Users and Roles Centrally in Active Directory or Sun Directory
sponsored by Oracle Corporation
WHITE PAPER: This paper illustrates how you can now centrally administer database users and role memberships leveraging your existing LDAP directories.
Posted: 13 Feb 2009 | Published: 01 Aug 2008

Oracle Corporation

E-Guide: Wireless LAN access control: Managing users and their devices
sponsored by TechTarget Security
EGUIDE: This expert E-Guide discusses methods for WLAN access control, including policy creation, device fingerprinting and integration with other network access control solutions.
Posted: 15 Jul 2011 | Published: 14 Jul 2011

TechTarget Security

eBook: The Shortcut Guide to User Workspace Management - Chapter 3: Tying Security to People, Not Devices
sponsored by RES Software
EBOOK: Today’s unpredictable user needn't necessarily complicate the application of security configurations. In fact, with the right technology in place, the idea of where security is applied grows less important. Replacing it is a new focus on how that security is applied. With User Workspace Management, that how  ties security to...
Posted: 27 Oct 2010 | Published: 27 Oct 2010

RES Software

Case Study: Capita Group PLC
sponsored by Druva
CASE STUDY: Office and remote laptop users at Capita were unable to securely backup their critical data. A secure and scalable backup solution featuring low impact on system performance was crucial to fulfilling their backup needs. Find out why Capita selected Druva inSync for their backup solutions.
Posted: 02 Dec 2010 | Published: 02 Dec 2010

Druva

On-demand Webcast: User Provisioning: Gaining the Most Bang for the IT Buck
sponsored by Dell Software
WEBCAST: Streamline and simplify to better manage the provisioning process. This information-packed Webcast includes tips on how to save time, decrease errors and automate your provisioning process.
Posted: 24 Jul 2007 | Premiered: Jul 24, 2007

Dell Software

Has HP taken a calculated risk in splitting the business?
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Hewlett Packard (HP) is planning to turn its consumer computing and printing departments into a separate company. The remaining business would comprise HP's software, business servers and IT services operations.
Posted: 29 Oct 2014 | Published: 29 Oct 2014

TechTarget ComputerWeekly.com

Presentation Transcript: Why Implement a Pilot Program for Desktop Virtualization? Why Now?
sponsored by DellEMC and Intel®
PRESENTATION TRANSCRIPT: Why is a pilot implementation so important?  This presentation transcript will help you understand how a desktop virtualization pilot works, how to select the right user group, why it's critical to the success of a full desktop virtualization implementation; and what you need to consider before getting started.
Posted: 12 Jul 2010 | Published: 12 Jul 2010

DellEMC and Intel®

WebSphere Portal Web 2.0
sponsored by IBM Software Group
SOFTWARE DEMO: IBM WebSphere Portal offers extensive support for Web 2.0 technologies, enabling organizations to easily deploy high performing, intuitive applications that satisfy end users' expectations for a rich browser experience.
Posted: 05 Dec 2007 | Premiered: 05 Dec 2007

IBM Software Group

Query Offloading for Improved Performance and Better Resource Utilization
sponsored by Oracle Corporation
WHITE PAPER: This white paper focuses on the use of a log-based, real-time change data capture (CDC) solution to enable real-time reporting using a low overhead solution that minimizes the impact on IT infrastructure.
Posted: 02 Feb 2010 | Published: 04 Jan 2010

Oracle Corporation

Gamania Group tightens security to strengthen game development capability
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Inside this white paper, read up on a gaming software company that was looking to expand in the market, but first turned to automated security management tools to ensure compliance and customer trust before moving forward.
Posted: 25 Sep 2013 | Published: 31 Oct 2012

Hewlett Packard Enterprise

Ericom Blaze — RDP Acceleration
sponsored by Ericom Software
TRIAL SOFTWARE: Slow and choppy RDP experiences make it hard to work productively with graphics-rich PDFs, PPTs, Flash, etc. in Terminal Services and VDI environments. Today's organizations need to deliver the best quality of experience for the allocated network bandwidth.
Posted: 27 Jan 2011 | Premiered: 14 Jan 2011

Ericom Software

Great collaboration begins with good governance
sponsored by TechTarget Content Management
EGUIDE: For a growing number of companies today, collaboration is no longer a “soft,” nice-to-have concept—it’s an essential component for competitive differentiation. In this Tip Guide, learn how organizations can promote and support effective worker collaboration, and how managers can provide effective governance for collaborative efforts.
Posted: 21 Nov 2011 | Published: 21 Nov 2011

TechTarget Content Management

Web User Experience: Common Indicators for Business and IT Collaboration
sponsored by Dell Software
WHITE PAPER: This paper discusses how to bridge the gap in user experience management (UEM) between business stakeholders and IT by helping each group better understand both perspectives on the user experience. It describes the most common UEM indicators and what they mean to both the business and IT. 
Posted: 29 Dec 2010 | Published: 27 Dec 2010

Dell Software

What's New With Microsoft Office Communications Server 2007 R2
sponsored by Microsoft
PRESENTATION TRANSCRIPT: This presentation transcript explains the new features and functionality in the Office Communications Server 2007 R2, the application that continues to deliver on the Microsoft promise to streamline communications for users, give IT organizations the flexibility and control they need, and provide an extensible communications platform.
Posted: 06 Mar 2009 | Published: 06 Mar 2009

Microsoft

Celina Insurance Group Streamlines Collaborative Processes with Agents to Stay ahead of the Competition
sponsored by IBM
CASE STUDY: Read this case study to see how Celina Insurance Group implemented a collaborative extranet based on IBM Lotus Notes and Lotus Domino to enhance their competitive edge.
Posted: 13 Mar 2009 | Published: 13 Mar 2009

IBM

How Verification Services Fortify Your Software Escrow Solution
sponsored by Iron Mountain
WHITE PAPER: This paper examines the types of verification services used in the escrow industry. It discusses why verification has become a best practice for both the users of software and the developers creating the applications, as well as a solid recommendation by the lawyers who advise them.
Posted: 28 Dec 2011 | Published: 28 Dec 2011

Iron Mountain