IT Services  >   eBusiness Services  >   eCommerce Services  >  

e-Tickets

RSS Feed    Add to Google    Add to My Yahoo!
e-Tickets White Papers (View All Report Types)
 
The World’s #1 vRA/vCAC Alternative
sponsored by Embotics
WHITE PAPER: This data sheet explores a cloud management platform allowing delivery of IT-as-a-service (ITaaS) from a single console while continuously monitoring resources to optimize automation, deployment and configuration of IT services across cloud environments.
Posted: 14 Sep 2016 | Published: 14 Sep 2016

Embotics

Shadow IT Guide: Protect Data and Avoid Compliance Violations
sponsored by Globalscape
WHITE PAPER: Are you sure that employees are only using IT-sanctioned ways of transferring data? If the answer is "no," then your sensitive data may be vulnerable. In this guide from Globalscape, you'll learn: what shadow IT is and its drawbacks, how to identify signs of a shadow IT problem, how to reduce shadow IT, and more.
Posted: 07 Nov 2016 | Published: 31 Oct 2016

Globalscape

Understanding NIST's Cloud Computing Reference Architecture: Part II
sponsored by Global Knowledge
WHITE PAPER: This second white paper in a series on Cloud Computing Reference Architecture focuses on the activities, processes, and requirements that cloud players need to follow in order to ensure a successful delivery of cloud services. It addresses the three active cloud players that may be involved in delivering cloud services to cloud consumers.
Posted: 06 Nov 2014 | Published: 06 Nov 2014

Global Knowledge

Edinburgh Computer Services Breaks Down the Silos of Chaos
sponsored by ConnectWise
WHITE PAPER: In this case study, discover how Edinburgh Computer Services overcame its disjointed information tracking system and adopted an integrated platform that enabled them to grow and improve productivity.
Posted: 20 Apr 2016 | Published: 20 Apr 2016

ConnectWise

5 steps to aligning IT to the needs of your organization
sponsored by CISCO & INTEL® XEON® PROCESSOR
WHITE PAPER: Read this white paper to uncover the five steps you can take to align your IT to the needs of your organization. Inside, uncover how to develop a vision, leverage cloud to facilitate alignment, and much more.
Posted: 09 Oct 2015 | Published: 09 Oct 2015

CISCO & INTEL® XEON® PROCESSOR

How one Australian Company Built Efficiencies Around their All-Star Team
sponsored by ConnectWise
WHITE PAPER: This white paper describes how IT solution provider PowerNET implemented an integrated business process management and sales analytics system to create profitability through efficiency.
Posted: 19 Feb 2015 | Published: 19 Feb 2015

ConnectWise

Service-Oriented Configuration Management
sponsored by Pangea Systems
WHITE PAPER: This whitepaper details the core functionality and key benefits of service-oriented configuration management and offers up a four-step approach for implementation.
Posted: 26 Jun 2014 | Published: 10 Jun 2010

Pangea Systems

Deepen Visibility into Cloud and Hybrid IT with Unified Infrastructure Management
sponsored by CA Technologies
WHITE PAPER: Learn why it's recommended your organization extends the visibility of existing infrastructure tools with a unified, hybrid IT monitoring platform—providing visibility into traditional and next-generation technologies. Read on to take a unified approach to IT ops, and monitor all hybrid cloud, software-defined, and converged environments.
Posted: 07 Sep 2016 | Published: 30 Jun 2016

CA Technologies

IT as a service provider: Accelerating business results
sponsored by Dell Software
WHITE PAPER: In this resource, learn how you can increase collaboration between business and IT, with a multi-cloud management technology. Read on to discover how it enables IT to take and maintain control over cloud operations, while seamlessly meeting all the needs of business users.
Posted: 31 Oct 2013 | Published: 23 Oct 2013

Dell Software

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement