Function Point Users Group White Papers

(View All Report Types)
Ten Critical Success Factors for CRM: Lessons Learned from Successful Implementations
sponsored by Oracle Corporation
WHITE PAPER: Customer relationship management (CRM) deployments can be complex and difficult. This white paper provides a checklist of the ten critical success factors for organizations to follow to avoid common pitfalls as they design and deploy their CRM system.
Posted: 16 Jan 2007 | Published: 01 Aug 2006

Oracle Corporation

Gartner Middle East CIO Leadership Forum
sponsored by Gartner
WHITE PAPER: Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.
Posted: 28 Jan 2011 | Published: 28 Jan 2011

Gartner

The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER: This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012

Skillsoft

11 Questions Every CIO Should Ask Their IT Manager
sponsored by Red Hat and JBoss
WHITE PAPER: What is your IT really costing you? Could you be doing more with the technology you have? Could you reduce costs and provide better service to your organization? Read Red Hat's suggestions on "11 Questions Every CIO Should Ask Their IT Manager", and how Red Hat open source solutions can help.
Posted: 19 Jun 2009 | Published: 10 Jun 2009

Red Hat and JBoss

Why Business Rules?: A Case for Business Users of Information Technology
sponsored by IBM
WHITE PAPER: This whitepaper explains how business people are allowed to directly define how their business rules are being executed with a BRMS; and, perhaps more important, how it facilitates change in an easy, safe and reliable manner.
Posted: 07 Jul 2011 | Published: 01 Sep 2009

IBM

The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER: This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

Skillsoft

E-Guide: Wireless LAN access control: Managing users and their devices
sponsored by TechTarget Security
EGUIDE: This expert E-Guide discusses methods for WLAN access control, including policy creation, device fingerprinting and integration with other network access control solutions.
Posted: 15 Jul 2011 | Published: 14 Jul 2011

TechTarget Security

eBook: The Shortcut Guide to User Workspace Management - Chapter 4: Transforming to an Environment of User Workspace Management
sponsored by RES Software
EBOOK: You’ve already come to understand the workspace itself, and how that workspace can be made pervasive across the spectrum of delivery mechanisms.
Posted: 27 Oct 2010 | Published: 27 Oct 2010

RES Software

What Type of Virtualization Should You Use For Each User Segment?
sponsored by Dell, Inc. and Intel®
PRESENTATION TRANSCRIPT: In lesson two of this desktop virtualization classroom, Brian Madden discusses how to segment your users and group them together to figure out what type of desktop virtualization you should use for different groups or users. Then he covers the specific desktop virtualization technologies and the pros and cons of each.
Posted: 23 Dec 2011 | Published: 23 Dec 2011

Dell, Inc. and Intel®

Which Users Should You Virtualize?
sponsored by Dell, Inc. and Intel®
PRESENTATION TRANSCRIPT: Examine your desktop virtualization goals and determine which users you want to virtualize in this expert discussion with Brian Madden. Discover how your goals will change the way you implement your desktop virtualization initiative.
Posted: 22 Dec 2011 | Published: 22 Dec 2011

Dell, Inc. and Intel®

Data Center Cabling Considerations: Point-to-Point vs Structured Cabling
sponsored by Siemon Company
WHITE PAPER: If we don’t learn from the mistakes that occurred in the past, we are bound to repeat them. This is very true when it comes to data centers and aged point-to-point cabling practices. This resource compares point-to-point vs. structured cabling options for data centers.
Posted: 12 Oct 2011 | Published: 12 Oct 2011

Siemon Company

Departmental Specialization Needed With Analytics
sponsored by TechTarget Business Analytics
EBOOK: This three-part handbook examines BI and analytics deployments for different functional units in organizations with advice on how to make your program work. First, learn about how BI functions when geared towards sales and marketing, before turning towards a customer service approach. Finally, read about how analytics can help with asset protection
Posted: 01 Jun 2016 | Published: 27 May 2016

TechTarget Business Analytics

What's New With Microsoft Office Communications Server 2007 R2
sponsored by Microsoft
PRESENTATION TRANSCRIPT: This presentation transcript explains the new features and functionality in the Office Communications Server 2007 R2, the application that continues to deliver on the Microsoft promise to streamline communications for users, give IT organizations the flexibility and control they need, and provide an extensible communications platform.
Posted: 06 Mar 2009 | Published: 06 Mar 2009

Microsoft

Technical Guide on Emerging Threats
sponsored by TechTarget Security
EGUIDE: It takes time and money to adjust IT security in response to evolving attack tactics. As defenders gradually update their security measures, attackers respond accordingly. Such arms-race dynamics lead to threats of increasing sophistication and efficiency.
Posted: 16 Feb 2011 | Published: 16 Feb 2011

TechTarget Security

Mobile App Performance: Learn Usage Patterns and Track Abandonment
sponsored by Hewlett Packard Enterprise
VIDEO: Watch this brief video to find out how one system could help you learn usage patterns and find trends in abandonment points. Functional on both iOS and Android, click now to find out if a system like this can work for you company.
Posted: 12 Dec 2014 | Premiered: 12 Dec 2014

Hewlett Packard Enterprise

eBook: The Shortcut Guide to User Workspace Management - Chapter 3: Tying Security to People, Not Devices
sponsored by RES Software
EBOOK: Today’s unpredictable user needn't necessarily complicate the application of security configurations. In fact, with the right technology in place, the idea of where security is applied grows less important. Replacing it is a new focus on how that security is applied. With User Workspace Management, that how  ties security to...
Posted: 27 Oct 2010 | Published: 27 Oct 2010

RES Software

Business-driven BI: Using New Technologies to Foster Self-Service Access to Insights
sponsored by BeyeNETWORK
EGUIDE: Wayne Eckerson explores the challenges of implementing self-service BI tools in this e-guide. Read it today to discover ten key best practices for self-service BI, including what you need to know about the two main types of users, the realities and challenges of self-service BI, and much more.
Posted: 11 Sep 2012 | Published: 11 Sep 2012

BeyeNETWORK

Focusing on SIEM Integration: A 6 Point SIEM Solution Evaluation Checklist
sponsored by TechTarget Security
EGUIDE: Organizations should take careful consideration before implementing a SIEM solution. This expert e-guide will cover six points to consider before selecting a solution and explore the benefits it can bring to your business.
Posted: 07 Dec 2012 | Published: 07 Dec 2012

TechTarget Security

Presentation Transcript: Why Implement a Pilot Program for Desktop Virtualization? Why Now?
sponsored by DellEMC and Intel®
PRESENTATION TRANSCRIPT: Why is a pilot implementation so important?  This presentation transcript will help you understand how a desktop virtualization pilot works, how to select the right user group, why it's critical to the success of a full desktop virtualization implementation; and what you need to consider before getting started.
Posted: 12 Jul 2010 | Published: 12 Jul 2010

DellEMC and Intel®

Citrix Xendesktop : Desktop Virtualization for all – Technical overview
sponsored by Citrix
WHITE PAPER: In this whitepaper, you’ll find a discussion of the various options that FlexCast provides to help meet the computing requirements of various user types.
Posted: 26 Aug 2013 | Published: 26 Aug 2013

Citrix

Buyer's Guide: What To Look For In 802.11ac Access Points
sponsored by TechTarget Networking
EBOOK: Many enterprises are looking to upgrade their wireless LAN access points (APs) to Gigabit Wi-Fi 802.11ac standards. This essential buyer's guide explores essential 802.11ac features like self-configuration, backwards-compatibility with older APs, dual Gigabit-Ethernet ports for higher throughput, and ease of management.
Posted: 02 Jul 2015 | Published: 02 Jul 2015

TechTarget Networking

IT Spending Priorities Point to Cyber, Cloud and Data
sponsored by TechTarget
EGUIDE: Discover in this TechTarget e-guide, discover the cybersecurity, cloud, and data trends you need to know, which service providers are plugging the gaps, and what need-to-have investments are topping the charts.
Posted: 21 Jun 2023 | Published: 22 Jun 2023

TOPICS:  .NET
TechTarget

IT Project Management: Guide to estimating timescales and resources.
sponsored by TechTarget ComputerWeekly.com
BOOK: Learn how to estimate the effort and timescales required for IT projects with this extract from Project management for IT-related projects.
Posted: 13 Dec 2012 | Published: 13 Dec 2012

TechTarget ComputerWeekly.com

User behavior analytics tackles cloud, hybrid environments
sponsored by TechTarget Security
EZINE: In this issue of Information Security, explore why organizations are investing in user behavior analytics for on-premises and cloud.
Posted: 28 Sep 2018 | Published: 28 Sep 2018

TechTarget Security

Enable Deep Visibility for Applications, Users, and Devices With FortiGate Next-Generation Firewalls
sponsored by Fortinet, Inc.
PRODUCT OVERVIEW: With the death of the network perimeter, cybercriminals have proven that every asset is a potential entry point for an attack. FortiGate Next-Generation Firewalls
Posted: 29 Mar 2023 | Published: 29 Mar 2023

TOPICS:  .NET
Fortinet, Inc.

Computer Weekly – 20 May 2014: The future of networks
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look how IT and networking departments are addressing demand for apps, bandwidth and services. Virtualisation technology is being used to consolidate multiple network equipment types onto industry-standard high-volume servers, switches and storage.
Posted: 19 May 2014 | Published: 19 May 2014

TechTarget ComputerWeekly.com

eBook: The Shortcut Guide to User Workspace Management - Chapter 2: Personalization Equals Content + Context
sponsored by RES Software
EBOOK: That’s why personality - and the preservation of personality, no matter how our users might connect—is so incredibly important. Read Chapter 2 of this series to learn more about the importance of personalization.
Posted: 03 Nov 2010 | Published: 03 Nov 2010

RES Software

Effective Data Discovery Points Way to Bigger BI Benefits
sponsored by TechTarget Business Analytics
EBOOK: How can you reach a middle ground between control for business users and centralized management from IT and BI managers? Discover why self-service software doesn't have to sideline IT or BI teams.
Posted: 02 Oct 2015 | Published: 02 Oct 2015

TechTarget Business Analytics

Understanding Windows PowerShell Functions
sponsored by Dell Compellent
EGUIDE: This expert e-guide, brought to you by SearchWindowsServer.com, offers advice to help you leverage PowerShell and other tools to automate your Hyper-V infrastructure.
Posted: 23 Sep 2011 | Published: 22 Sep 2011

Dell Compellent

Go Back to the Basics with Active Directory
sponsored by One Identity
ESSENTIAL GUIDE: Despite your level of familiarity, it never hurts to keep up-to-date on basic Active Directory best practices. Inside this E-Guide, brush up on some basic Active Directory tips and tricks around domain controllers, cloud AD interactions, and more.
Posted: 12 Mar 2019 | Published: 11 Mar 2019

One Identity

Draw a DevOps adoption roadmap by learning from current users
sponsored by TechTarget IT Operations
EBOOK: With so many organizations already making their DevOps adoption journey, why not learn from their success and failures? Access this handbook to learn DevOps adoption best practices from organizations like yours.
Posted: 05 Apr 2017 | Published: 28 Mar 2017

All resources sponsored by TechTarget IT Operations