IT Agents  >  


RSS Feed    Add to Google    Add to My Yahoo!
Customers White Papers (View All Report Types)
Why Business Rules?: A Case for Business Users of Information Technology
sponsored by IBM
WHITE PAPER: This whitepaper explains how business people are allowed to directly define how their business rules are being executed with a BRMS; and, perhaps more important, how it facilitates change in an easy, safe and reliable manner.
Posted: 07 Jul 2011 | Published: 01 Sep 2009


11 Questions Every CIO Should Ask Their IT Manager
sponsored by Red Hat and JBoss
WHITE PAPER: What is your IT really costing you? Could you be doing more with the technology you have? Could you reduce costs and provide better service to your organization? Read Red Hat's suggestions on "11 Questions Every CIO Should Ask Their IT Manager", and how Red Hat open source solutions can help.
Posted: 19 Jun 2009 | Published: 10 Jun 2009

Red Hat and JBoss

Top 10 Misconceptions about Performance and Availability Monitoring
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This white paper examines ten common misunderstandings about monitoring and offers suggestions for implementing complete end-user monitoring strategies that can adapt to today's more complex computing environments.
Posted: 13 Jun 2007 | Published: 04 Mar 2011

Hewlett Packard Enterprise

Ten Critical Success Factors for CRM: Lessons Learned from Successful Implementations
sponsored by Oracle Corporation
WHITE PAPER: Customer relationship management (CRM) deployments can be complex and difficult. This white paper provides a checklist of the ten critical success factors for organizations to follow to avoid common pitfalls as they design and deploy their CRM system.
Posted: 16 Jan 2007 | Published: 01 Aug 2006

Oracle Corporation

Using a Risk-Based Approach to Address a Changing Threat Landscape
sponsored by RSA
WHITE PAPER: In this white paper, gain exclusive insight on risk-based authentication systems. Learn why these systems will continue to enable convenient user access, boost information security policies to prevent fraudulent access, and ensure user privacy.
Posted: 15 Nov 2013 | Published: 31 Jan 2013


Backup Mobile and Remote Users Securely, With or Without a VPN
sponsored by Copiun
WHITE PAPER: This white paper examines the challenges with backing up corporate data on these remote users’ PCs and describes Copiun’s Constant Access Gateway option which allows IT organizations to securely backup remote and mobile users without opening any firewall ports or placing the backup server in the DMZ.
Posted: 16 May 2011 | Published: 29 Oct 2010


Transforming Branch/Remote Office IT in the Digital Economy
sponsored by Riverbed Technology, Inc.
WHITE PAPER: Find out why survey results show businesses can't compete in the new digital economy if they don't transform branch IT, and learn how you can consolidate and centralize management of branch infrastructure without compromising control or performance.
Posted: 02 Dec 2015 | Published: 02 Dec 2015

Riverbed Technology, Inc.

IT Best Practices: To Support or Not Support Consumer-Owned Smartphones
sponsored by Zenprise
WHITE PAPER: This white paper outlines current and future implications of consumer and enterprise mobile devices (especially when it comes to messaging), and how they can and will impact your organization. In addition, learn what you can do to prepare your business to ensure high service levels for smartphone users.
Posted: 20 Oct 2011 | Published: 20 Oct 2011


A Business Guide to MPLS IP VPN Migration: Five Critical Factors
sponsored by XO Communications
WHITE PAPER: Uncover five critical factors for a successful migration to an MPLS IP VPN service in this whitepaper. Learn the evolving needs of today’s enterprise networks and uncover how an MPLS-based IP VPN can help you fulfill these wants and needs.
Posted: 25 May 2012 | Published: 30 Apr 2012

XO Communications

IT Security Management McAfee ePolicy Orchestrator Deep Command
sponsored by Intel
WHITE PAPER: This white paper outlines a security and management solution that allows you to remotely diagnose and update your enterprise even when endpoints are disabled or powered off. Discover how advances in malware and cyberthreats are driving the need for this capability and see if this solution is right for you by reading on now.
Posted: 02 Jan 2013 | Published: 31 Dec 2011

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement