IT Agents  >  

IT End Users

RSS Feed    Add to Google    Add to My Yahoo!
IT End UsersWhite Papers (View All Report Types)
 
From BlackBerry to BYOD
sponsored by Citrix
WHITE PAPER: This white paper discusses mobile device management tools and other solutions for enterprises in the era of BYOD and mobile device diversity.
Posted: 30 Jul 2014 | Published: 31 Dec 2013

Citrix

11 Questions Every CIO Should Ask Their IT Manager
sponsored by Red Hat and JBoss
WHITE PAPER: What is your IT really costing you? Could you be doing more with the technology you have? Could you reduce costs and provide better service to your organization? Read Red Hat's suggestions on "11 Questions Every CIO Should Ask Their IT Manager", and how Red Hat open source solutions can help.
Posted: 19 Jun 2009 | Published: 10 Jun 2009

Red Hat and JBoss

Ten Critical Success Factors for CRM: Lessons Learned from Successful Implementations
sponsored by Oracle Corporation
WHITE PAPER: Customer relationship management (CRM) deployments can be complex and difficult. This white paper provides a checklist of the ten critical success factors for organizations to follow to avoid common pitfalls as they design and deploy their CRM system.
Posted: 16 Jan 2007 | Published: 01 Aug 2006

Oracle Corporation

Why Business Rules?: A Case for Business Users of Information Technology
sponsored by IBM
WHITE PAPER: This whitepaper explains how business people are allowed to directly define how their business rules are being executed with a BRMS; and, perhaps more important, how it facilitates change in an easy, safe and reliable manner.
Posted: 07 Jul 2011 | Published: 01 Sep 2009

IBM

Top 10 Misconceptions about Performance and Availability Monitoring
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper examines ten common misunderstandings about monitoring and offers suggestions for implementing complete end-user monitoring strategies that can adapt to today's more complex computing environments.
Posted: 13 Jun 2007 | Published: 04 Mar 2011

Hewlett-Packard Company

Identity-Centric Security: Enabling and Protecting the Business
sponsored by CA Technologies.
WHITE PAPER: Discover why the enterprise perimeter as we know it is dissolving and how your users are taking its place – creating numerous security issues for your IT department. In addition, learn how identity-centric security can help you protect data and maintain compliance in this new enterprise model.
Posted: 24 Jul 2013 | Published: 31 May 2013

CA Technologies.

Seizing Opportunities and Eliminating Risks with BYOD and Mobile Security
sponsored by Gemalto
WHITE PAPER: This white paper distills the complexities of BYOD scenarios into three common use cases. Read on to find actionable mobile security ideas that fit your own organization's specific requirements in order to reduce threats in this dynamic landscape.
Posted: 11 Nov 2014 | Published: 10 Nov 2014

Gemalto

The Truth About Working from Anywhere - Part 2: Best Practices for Working on the Go
sponsored by Citrix Online Go To Meeting
WHITE PAPER: This best practices guide provides guidance to help you more effectively and efficiently operate as a mobile worker. Inside, find advice to help you drive success with mobile work at home and on the road, as well as tips for increasing mobile communication.
Posted: 12 Jun 2013 | Published: 12 Jun 2013

Citrix Online Go To Meeting

Virtualization of Video Infrastructure
sponsored by Vidyo, Inc.
WHITE PAPER: As virtualization spreads users across the globe, organizations are seeking solutions to keep their users connected. View this white paper to learn how the virtualization of video is helping make these options more affordable and flexible for businesses today.
Posted: 07 May 2013 | Published: 31 Jan 2013

Vidyo, Inc.

Make Life Easier - Let End Users Connect to Computers from Anywhere with My Desktop
sponsored by SysAid Technologies Ltd
WHITE PAPER: This resource explores a remote access technology that lets your end users connect to their work computer from virtually any computer or smartphone in a cost-effective, secure, business oriented manner that your business will approve of.
Posted: 30 Aug 2012 | Published: 30 Aug 2012

SysAid Technologies Ltd
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement