IT Agents  >   Professional Organizations  >   Information Industry Professional Organizations  >  

Communities

RSS Feed    Add to Google    Add to My Yahoo!
Communities Reports
 
Five Tips for Better Virtual Meetings
sponsored by Citrix Online Go To Meeting
WHITE PAPER: Virtual meetings are becoming the standard communication platform for businesses but they require careful consideration and planning to offset issues that result from the distance.  Take a look at this brief resource to discover five easy tips to enhance your virtual meeting.
Posted: 01 Oct 2011 | Published: 01 Oct 2011

Citrix Online Go To Meeting

E-Guide: Run Antivirus Scans in Virtual Environments Without Compromising System Performance
sponsored by CA Technologies.
EGUIDE: This expert e-guide from SearchServerVirtualization.com explains considerations to keep in mind when planning antivirus scans in your virtual environment.
Posted: 15 Oct 2010 | Published: 15 Oct 2010

CA Technologies.

The Virtual Office Checklist
sponsored by Cisco Systems, Inc.
WHITE PAPER: The technology behind remote access is called a "virtual private network," or "VPN," and it establishes a private, secure network connection over a public network, such as the Internet.
Posted: 10 Oct 2008 | Published: 10 Oct 2008

Cisco Systems, Inc.

Driving Collaboration Efficiency - H.264 High Profile
sponsored by Polycom, Inc.
WEBCAST: Polycom continues bringing leading-edge, standards-based technologies to visual communication. This is an advantage that resonates across all applications and industries.  View this webcast to learn how Less Delivers Much More!
Posted: 15 Sep 2010 | Premiered: Sep 15, 2010

Polycom, Inc.

IDC MarketScape: Worldwide Desktop Virtualization Vendor Analysis
sponsored by Citrix
WHITE PAPER: This IDC study assesses the capability and business strategy of 11 vendors in the client virtualization market.
Posted: 25 Nov 2013 | Published: 25 Nov 2013

Citrix

Collaboration solutions: Solutions for small and medium business
sponsored by IBM
RESOURCE CENTER: Check out this IBM resource center to identify collaboration software solutions specifically geared towards small and medium-sized businesses.
Posted: 18 Feb 2009 | Published: 18 Feb 2009

IBM

Securing Virtual Environments
sponsored by CA Technologies.
PODCAST: Listen to this podcast for insight as well as an understanding of what security solutions are available now to help you address the issues.
Posted: 06 Oct 2010 | Premiered: Oct 6, 2010

CA Technologies.

The CISO's Guide to Virtualization Security
sponsored by Rapid7
WHITE PAPER: Security incidents that occur in a virtual environment can cause significant, sometimes crippling damage to businesses. It's essential that security professionals outline their efforts and making securing virtual infrastructure a priority.
Posted: 18 Jul 2012 | Published: 12 Jan 2012


How can I Overcome the Security Challenges of Today’s Virtualized Infrastructures?
sponsored by CA Technologies.
WHITE PAPER: Read this solution brief to learn how to improve control over systems, applications and information to reduce risk in both physical and virtual server environments.
Posted: 25 Nov 2010 | Published: 01 Sep 2010

CA Technologies.

IT Connects Customers to Brands
sponsored by Cisco Systems, Inc.
VIDEO: Paul Gillin, author of three social media marketing books, reveals how CIOs are becoming the designated guardians of intellectual property. As the use of social media tools grows, Gillen recommends how a CIO can stay in front of the widespread access and create enhanced customer experiences.
Posted: 16 Aug 2010 | Premiered: 16 Aug 2010

Cisco Systems, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement