IT Management  >   Systems Design and Development  >   Application Development  >   Graphic Design  >   Interface Design  >  

Information Needs Analysis

RSS Feed    Add to Google    Add to My Yahoo!
Information Needs AnalysisWhite Papers (View All Report Types)
 
The Great Software Mind Meld: How “The Cloud” Is Helping Vendors Peer Inside the Heads of Prospective Buyers
sponsored by Runaware
WHITE PAPER: The difference between intriguing software and best-selling software is customer insight from feedback. Read this white paper to learn about a cloud-based analytics solution that for the first time allows software vendors to cull actionable intelligence from reliable, untainted customer feedback.
Posted: 14 Jul 2011 | Published: 30 Jun 2011

Runaware

Monitoring Application Performance from an End-User Perspective
sponsored by Fluke Networks
WHITE PAPER: Download this whitepaper to learn how to see and solve user experience problems from their point of view. We’ll show you how to measure actual application traffic from the user perspective and other critical points in the network.
Posted: 22 Apr 2010 | Published: 22 Apr 2010

Fluke Networks

Internet-Scale Identity Systems:An Overview and Comparison
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper provides an overview of the benefits of implementing an Internet-based identity system and explores the similarities, differences and synergies among the top technologies and initiatives available.
Posted: 27 Mar 2014 | Published: 04 Mar 2014

Ping Identity Corporation

ArcSight IdentityView: Increasing Security and Compliance with a 360-Degree View of User Activity
sponsored by ArcSight, an HP Company
WHITE PAPER: This paper describes ArcSight IdentityView, a new application designed to leverage the power of the ArcSight SIEM Platform and apply it to user monitoring, for security and compliance purposes.
Posted: 15 Jun 2010 | Published: 15 Jun 2010

ArcSight, an HP Company

Plantronics UC Toolkit Planning Guidelines for Success
sponsored by Plantronics
WHITE PAPER: Communications in today’s enterprise are undergoing dramatic changes as a result of the convergence of computer and voice technologies. As an IT manager, you know that introducing UC audio devices such as headsets and speaker phones into your environment changes the way users communicate and work.
Posted: 10 Feb 2011 | Published: 10 Feb 2011

Plantronics

End-user Experience Monitoring
sponsored by Nimsoft, Inc.
WHITE PAPER: What exactly is End-user Monitoring (EUM) and why should businesses care? In this resource, discover why it's increasingly important to assess system performance from the end-user perspective in the age of IT as a service, and how you can effectively measure and quantify end-user experiences.
Posted: 13 Feb 2012 | Published: 13 Feb 2012

Nimsoft, Inc.

Citrix Xendesktop : Desktop Virtualization for all – Technical overview
sponsored by Citrix
WHITE PAPER: In this whitepaper, you’ll find a discussion of the various options that FlexCast provides to help meet the computing requirements of various user types.
Posted: 26 Aug 2013 | Published: 26 Aug 2013

Citrix

Is your user management process getting you down? Improving efficiency and security through automation
sponsored by NetIQ Europe
WHITE PAPER: Access control is something that has hindered business for years. There can be a variety of different levels of access a user may posses at a company. Some users may need to access different programs than others, so they would require a different level of access.
Posted: 04 May 2011 | Published: 02 May 2011

NetIQ Europe

Top 10 Benefits of Modernizing Your Desktop
sponsored by VMware
WHITE PAPER: Faced with a growing number of client devices, new user requirements, and the challenges of desktop management, many companies are determining that the conventional PC-centric model is no longer effective. This white paper explores the concept behind desktop modernization and outlines ten reasons you should start adopting it.
Posted: 25 Jun 2012 | Published: 22 Jun 2012

VMware

Tackling the Top Five Network Access Control Challenges
sponsored by Juniper Networks, Inc.
WHITE PAPER: In this document we explore five common networking challenges that enterprises face—network protection, guest user access, network visibility and monitoring, application access control, and identity-based Quality of Service (QoS)—and discuss how UAC can be used to address each
Posted: 28 Mar 2011 | Published: 28 Mar 2011

Juniper Networks, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement