IT Agents  >   IT Workforce  >   Work Environment  >  

Mobile Workers

RSS Feed    Add to Google    Add to My Yahoo!
Mobile Workers White Papers (View All Report Types)
51 - 75 of 677 Matches Previous Page  |  Next Page
Stay Afloat in the Virtual World With Engagement
sponsored by Unify
WHITE PAPER: In this white paper, discover how to achieve greater engagement of customers, partners and employees throughout your organization.
Posted: 17 Feb 2015 | Published: 31 Dec 2013

Unify

5 Ways Mobility Will Change Your Contact Center
sponsored by Unify
WHITE PAPER: This exclusive white paper explains how the physical contact center is alive and well, and will be for a long time. It also explains why mobility changed the contact center to be untethered, allowing workers to complete tasks from anywhere around the world. Read on to learn more.
Posted: 17 Feb 2015 | Published: 17 Feb 2015

Unify

Executive ViewPoint - Successfully Securing Applications in a Mobility-Focused World
sponsored by F5 Networks
WHITE PAPER: In this whitepaper, F5's Karl Triebes and VMware's Kit Colbert share their perspectives on where the market is headed, and how IT organizations can stay ahead of the curve. Read on to learn more.
Posted: 16 Feb 2015 | Published: 16 Feb 2015

F5 Networks

Changing Face of Mobility: Raises The Stakes For Endpoint Data Protection
sponsored by CommVault
WHITE PAPER: This white paper highlights some potentially troubling byproducts of that movement. Read on to learn more.
Posted: 16 Feb 2015 | Published: 16 Feb 2015

CommVault

Best practices to Focus on as Mobile and PC Management Merge
sponsored by Citrix
WHITE PAPER: This e-guide provides tips and tricks to focus on when choosing a vendor to meet your mobility needs – feature breadth, deployment model and support for new operating systems should all be top of mind. Learn what Citrix is doing with mobility today, and how their Worx environment is key to its XenMobile.
Posted: 12 Feb 2015 | Published: 12 Feb 2015

Citrix

What you need to know before undertaking your virtualization journey
sponsored by AppSense
WHITE PAPER: Find out what is driving IT managers to deploy desktop and application virtualization strategies and the business outcomes for workers and IT. Discover how they measure the success of their virtualization deployment. Also, learn how to take a strategic approach to deployment in order to prevent common challenges of virtualization.
Posted: 11 Feb 2015 | Published: 31 Jul 2014

AppSense

The Clinical End User Experience: Sub-Par Today, Optimal Tomorrow
sponsored by AppSense
WHITE PAPER: In this white paper, explore healthcare IT respondents' opinions on critical areas that could improve the user experience and boost productivity. Find out how VDI has experienced exponential growth within the healthcare industry due to its ability to support a multiplatform workplace.
Posted: 11 Feb 2015 | Published: 11 Feb 2015

AppSense

Strategic CPM as a Driver for Organizational Performance Management
sponsored by IBM
WHITE PAPER: Read this white paper to learn how leveraging new strategic corporate performance management capabilities enables more coordinated performance management initiatives.
Posted: 11 Feb 2015 | Published: 10 Jan 2014

IBM

The four cornerstones of a successful BYOD program
sponsored by Dell, Inc. and Intel®
WHITE PAPER: In this informative e-guide, learn about the four cornerstones of a successful BYOD program: quality of user experience, device flexibility, vendor independence, and security policy. Information is one of the most valuable pieces of an organization – discover how to implement to right BYOD policy to secure it
Posted: 11 Feb 2015 | Published: 11 Feb 2015

Dell, Inc. and Intel®

IDC Analyst Connection: Is Your Print and Document Infrastructure...Intellectual Property Security
sponsored by Hewlett-Packard Company
WHITE PAPER: In this analyst Q&A, Angèle Boyd, Group Vice President and General Manager, Imaging/Output Document Solutions, IDC, shares her insights and advice on a range of important printer and document-management related business productivity and IP security issues.
Posted: 11 Feb 2015 | Published: 11 Feb 2015

Hewlett-Packard Company

Avoid the information governance traps of BYOD management
sponsored by Dell, Inc. and Intel®
WHITE PAPER: In this e-guide, learn the steps you must take to achieve a solid governance and mobile device management strategy to help your organization avoid these information governance traps. Read on to learn more.
Posted: 10 Feb 2015 | Published: 10 Feb 2015

Dell, Inc. and Intel®

Vietnam’s Leading Beverage Manufacturer Gains Real-time Market Visibility With Acumatica
sponsored by Acumatica
WHITE PAPER: Tan Hiep Phat (THP) Beverage Group wanted real-time visibility and enhanced capabilities to better manage its network of more than 200 distributors across the country.Read this case study to find out which single, centralized database improved THP's network management.
Posted: 09 Feb 2015 | Published: 16 Jan 2015

Acumatica

BYOD or COPE - Which enterprise mobility strategy is right for you?
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This e-guide highlights comparison points for the two models, including control,privacy, productivity, and more. Learn which model would be the best fit for your organization.
Posted: 09 Feb 2015 | Published: 09 Feb 2015

Dell, Inc. and Intel®

Empower Your Mobile Workforce
sponsored by FrontRange Solutions Inc.
WHITE PAPER: Read this white paper to find out how to enable users to access business resources form any device, anywhere, at any time. Transform the delivery of endpoint management services from being proactive to reactive.
Posted: 06 Feb 2015 | Published: 21 Nov 2014

FrontRange Solutions Inc.

Move Forward with BYOD Security
sponsored by BitGlass
WHITE PAPER: This exclusive resource explains why mobility and BYOD can be held back by sub-optimal security strategies, and offers one that was able to deliver rock-solid security without affecting end-user privacy. Read on to learn more.
Posted: 04 Feb 2015 | Published: 04 Feb 2015

BitGlass

Office 365: How Bitglass Restores Visibility and Data Protection to IT
sponsored by BitGlass
WHITE PAPER: This white paper presents a potential solution for the security and compliance issues raised by Office 365, enabling enterprises to secure their data outside of the firewall while maintaining user privacy.
Posted: 03 Feb 2015 | Published: 03 Feb 2015

BitGlass

PCI Data Security Compliance & BYOD
sponsored by BitGlass
WHITE PAPER: This exclusive security report takes an in-depth look at BYOD and mobile compliance, offering a strategy that was able to deliver both IT's and end-user's expectations. Read on to learn more.
Posted: 03 Feb 2015 | Published: 03 Feb 2015

BitGlass

BYOD Security: Free Your Employees and Secure Your Data
sponsored by BitGlass
WHITE PAPER: This exclusive security report takes an in-depth look at BYOD and mobile security, offering a strategy that was able to deliver both IT's and end-user's expectations. Read on to learn more.
Posted: 03 Feb 2015 | Published: 03 Feb 2015

BitGlass

Best Practices for PC Lockdown and Control Policies
sponsored by Viewfinity
WHITE PAPER: Fewer end user installed applications results in fewer application compatibility issues and better system reliability. Application instability and application conflicts generate a large number of support requests. Fewer unauthorized applications results in fewer support incidents and this leads to a lower TCO.
Posted: 03 Feb 2015 | Published: 03 Feb 2015

Viewfinity

Simplifying the Management of Macs and Mobile Devices
sponsored by Centrify Corporation
WHITE PAPER: This exclusive whitepaper takes an in-depth look at simplifying the management of Macs and mobile devices. Read on to learn more and take the first step towards improved mobile device management.
Posted: 02 Feb 2015 | Published: 02 Feb 2015

Centrify Corporation

8 Ways to Better Monitor Network Security Threats in the Age of BYOD
sponsored by Hewlett-Packard Company
WHITE PAPER: This helpful white paper takes a look at a number of ways in which security professionals can gain better control of the BYOD explosion and mitigate risk factors before they impact the enterprise.
Posted: 01 Feb 2015 | Published: 14 Jan 2014

Hewlett-Packard Company

Is Your Printing/Imaging Environment Exposing Your Sensitive Data?
sponsored by Hewlett-Packard Limited
WHITE PAPER: This exclusive white paper dives into some of the toughest challenges with data security.  Read on to learn more.
Posted: 26 Jan 2015 | Published: 26 Jan 2015

Hewlett-Packard Limited

Enterprise Mobility Management: The Big Bang Theory
sponsored by IBM
WHITE PAPER: This exclusive white paper takes and in-depth look at how enterprise mobility is expanding, and why device management will become key for organizations. Read on to learn more.
Posted: 23 Jan 2015 | Published: 23 Jan 2015

IBM

The Enemy Within: Why Insiders Are Still the Weakest Link in Your Data Security Chain
sponsored by Absolute Software
WHITE PAPER: This white paper describes the 5 steps that your enterprise needs to take in order to foster a conscientious data security environment within your enterprise, despite the challenges of the digital era.
Posted: 21 Jan 2015 | Published: 29 Dec 2014

Absolute Software

Why IT Leaders Should Take Strategic Action in Mobile and Endpoint Computing in 2015
sponsored by Absolute Software
WHITE PAPER: This white paper explains why enterprises should develop a broader-based, long-term endpoint strategy that connects to business goals, processes, and practices.
Posted: 19 Jan 2015 | Published: 25 Apr 2014

Absolute Software
51 - 75 of 677 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement