IT Management  >   Systems Design and Development  >   Application Development  >   Graphic Design  >   Interface Design  >  

Needs Analysis

RSS Feed    Add to Google    Add to My Yahoo!
Needs Analysis White Papers (View All Report Types)
 
Avoiding Roadblocks to Monitoring End-User Responses
sponsored by CA Technologies.
WHITE PAPER: This whitepaper details the importance of user response time monitoring.
Posted: 06 Jun 2014 | Published: 06 Jun 2013

CA Technologies.

End User Services - Experience true collaboration & business agility
sponsored by Fujitsu
WHITE PAPER: This whitepaper reviews a portfolio of management solutions that simplifies end-user management and service delivery through workplace assessment tools, managed mobile services, managed file services, and much more.
Posted: 03 Apr 2014 | Published: 03 Apr 2014

Fujitsu

ArcSight IdentityView: Increasing Security and Compliance with a 360-Degree View of User Activity
sponsored by ArcSight, an HP Company
WHITE PAPER: This paper describes ArcSight IdentityView, a new application designed to leverage the power of the ArcSight SIEM Platform and apply it to user monitoring, for security and compliance purposes.
Posted: 15 Jun 2010 | Published: 15 Jun 2010

ArcSight, an HP Company

Top 10 Benefits of Modernizing Your Desktop
sponsored by VMware
WHITE PAPER: Faced with a growing number of client devices, new user requirements, and the challenges of desktop management, many companies are determining that the conventional PC-centric model is no longer effective. This white paper explores the concept behind desktop modernization and outlines ten reasons you should start adopting it.
Posted: 25 Jun 2012 | Published: 22 Jun 2012

VMware

User Provisioning: The Business Imperative
sponsored by CA Technologies.
WHITE PAPER: Did you know utilizing a comprehensive provisioning tool can help you improve compliance, reduce costs, and improve operational efficiency? Read now to learn more!
Posted: 15 Jul 2013 | Published: 29 Feb 2012

CA Technologies.

Plantronics UC Toolkit Planning Guidelines for Success
sponsored by Plantronics
WHITE PAPER: Communications in today’s enterprise are undergoing dramatic changes as a result of the convergence of computer and voice technologies. As an IT manager, you know that introducing UC audio devices such as headsets and speaker phones into your environment changes the way users communicate and work.
Posted: 10 Feb 2011 | Published: 10 Feb 2011

Plantronics

End-user Experience Monitoring
sponsored by Nimsoft, Inc.
WHITE PAPER: What exactly is End-user Monitoring (EUM) and why should businesses care? In this resource, discover why it's increasingly important to assess system performance from the end-user perspective in the age of IT as a service, and how you can effectively measure and quantify end-user experiences.
Posted: 13 Feb 2012 | Published: 13 Feb 2012

Nimsoft, Inc.

Monitoring Application Performance from an End-User Perspective
sponsored by Fluke Networks
WHITE PAPER: Download this whitepaper to learn how to see and solve user experience problems from their point of view. We’ll show you how to measure actual application traffic from the user perspective and other critical points in the network.
Posted: 22 Apr 2010 | Published: 22 Apr 2010

Fluke Networks

Is your user management process getting you down? Improving efficiency and security through automation
sponsored by NetIQ Europe
WHITE PAPER: Access control is something that has hindered business for years. There can be a variety of different levels of access a user may posses at a company. Some users may need to access different programs than others, so they would require a different level of access.
Posted: 04 May 2011 | Published: 02 May 2011

NetIQ Europe

Tackling the Top Five Network Access Control Challenges
sponsored by Juniper Networks, Inc.
WHITE PAPER: In this document we explore five common networking challenges that enterprises face—network protection, guest user access, network visibility and monitoring, application access control, and identity-based Quality of Service (QoS)—and discuss how UAC can be used to address each
Posted: 28 Mar 2011 | Published: 28 Mar 2011

Juniper Networks, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement