IT Agents  >  

Customers

RSS Feed    Add to Google    Add to My Yahoo!
Customers White Papers (View All Report Types)
 
Why Business Rules?: A Case for Business Users of Information Technology
sponsored by IBM
WHITE PAPER: This whitepaper explains how business people are allowed to directly define how their business rules are being executed with a BRMS; and, perhaps more important, how it facilitates change in an easy, safe and reliable manner.
Posted: 07 Jul 2011 | Published: 01 Sep 2009

IBM

Ten Critical Success Factors for CRM: Lessons Learned from Successful Implementations
sponsored by Oracle Corporation
WHITE PAPER: Customer relationship management (CRM) deployments can be complex and difficult. This white paper provides a checklist of the ten critical success factors for organizations to follow to avoid common pitfalls as they design and deploy their CRM system.
Posted: 16 Jan 2007 | Published: 01 Aug 2006

Oracle Corporation

11 Questions Every CIO Should Ask Their IT Manager
sponsored by Red Hat and JBoss
WHITE PAPER: What is your IT really costing you? Could you be doing more with the technology you have? Could you reduce costs and provide better service to your organization? Read Red Hat's suggestions on "11 Questions Every CIO Should Ask Their IT Manager", and how Red Hat open source solutions can help.
Posted: 19 Jun 2009 | Published: 10 Jun 2009

Red Hat and JBoss

Top 10 Misconceptions about Performance and Availability Monitoring
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This white paper examines ten common misunderstandings about monitoring and offers suggestions for implementing complete end-user monitoring strategies that can adapt to today's more complex computing environments.
Posted: 13 Jun 2007 | Published: 04 Mar 2011

Hewlett Packard Enterprise

Delivering Remote Desktop and App Access Across an Extensive Network
sponsored by VMware
WHITE PAPER: Delivering critical apps to remote offices and users is no easy feat – unless, of course, you've got a robust app virtualization strategy in place. Learn how an Australian government agency delivered remote access and streamlined desktop and app services across its extensive network – many in extremely remote locations.
Posted: 06 May 2016 | Published: 06 May 2016

VMware

Rethinking MDM in a BYOD World
sponsored by SearchSecurity.com
WHITE PAPER: Discover the ins and outs of the Bring Your Own Device (BYOD) trend and why traditional mobile device management solutions are no longer sufficient. Also inside, learn a security strategy that will keep your enterprise protected.
Posted: 01 Nov 2012 | Published: 01 Nov 2012

SearchSecurity.com

Desktop Virtualization Survey: Changing Workstyles Drive Demand for Desktop Virtualization
sponsored by Citrix
WHITE PAPER: Review the results of a recent Desktop Virtualization Survey, reporting where organizations are on their journey towards VDI. Learn the key findings of this survey and learn why mobility is a top driver for – and benefit of – VDI.
Posted: 21 Jun 2012 | Published: 31 Dec 2010

Citrix

Troubleshooting Your Network Without Breaking the Bank
sponsored by Riverbed Technology, Inc.
WHITE PAPER: As a network manager, application manager or security manager, you need systems that can collect data across your WAN, continuously analyze the data to discover problems, and troubleshoot issues as soon as they occur. Riverbed Cascade has fundamentally changed the economics of network performance management. Learn more.
Posted: 23 Apr 2013 | Published: 30 Dec 2011

Riverbed Technology, Inc.

Managing a Remote Workforce: Proven Practices from Successful Leaders
sponsored by Citrix Online Go To Meeting
WHITE PAPER: Access this report from research and advisory firm Work Design Collaborative, LLC (WDC) to learn about the business benefits of a remote workforce and the best practices and technologies IT can implement to leverage them.
Posted: 16 Jan 2012 | Published: 16 Jan 2012

Citrix Online Go To Meeting

Using a Risk-Based Approach to Address a Changing Threat Landscape
sponsored by RSA
WHITE PAPER: In this white paper, gain exclusive insight on risk-based authentication systems. Learn why these systems will continue to enable convenient user access, boost information security policies to prevent fraudulent access, and ensure user privacy.
Posted: 15 Nov 2013 | Published: 31 Jan 2013

RSA
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement