IT Agents  >   IT Workforce  >   Information Technology Professionals  >  

Managers

RSS Feed    Add to Google    Add to My Yahoo!
ManagersReports
 
Bay Cove Human Services Achieves HIPAA Compliance on Google Apps & BYOD
sponsored by BitGlass
WHITE PAPER: This short white paper details how Bay Cove Human Services collaborated with BitGlass to achieve HIPAA compliance while still enabling the company to utilize Google Apps as their productivity backbone.
Posted: 09 Oct 2014 | Published: 09 Oct 2014


Improving Collaboration and Trimming Infrastructure Costs in a Hybrid Environment
sponsored by IBM
WHITE PAPER: This white paper describes how IBM SmartCloud services helped Brunswick Corporation, an employer of 16,000 worldwide, to cost-effectively support a variety of mobile devices, and also enabled them to move email, meeting, and other capabilities to the cloud while keeping other applications in-house.
Posted: 30 Sep 2014 | Published: 29 Nov 2013

IBM

From BlackBerry to BYOD
sponsored by Citrix
WHITE PAPER: This white paper discusses mobile device management tools and other solutions for enterprises in the era of BYOD and mobile device diversity.
Posted: 30 Jul 2014 | Published: 31 Dec 2013

Citrix

Cisco UCS Outperforms HP Blade Servers on East-West Latency
sponsored by CISCO & INTEL® XEON® PROCESSOR
WHITE PAPER: Explore this performance brief to learn how Cisco's UCS solution faired in a latency head-to-head with HP BladeSystem. Discover which system faired better in regards to speed and performance, and also learn how the UCS system's connectivity fabric and design led to it's results. Read on now to find out more.
Posted: 10 Jul 2014 | Published: 31 Jul 2013

CISCO & INTEL® XEON® PROCESSOR

C&J Energy: Going Public and Outgrowing Its Infrastructure
sponsored by Alert Logic
WHITE PAPER: This white paper describes how C&J Energy, an oilfield services firm, collaborated with Alert Logic in order to meet user needs and achieve SOX compliance quickly without compromising protected information or spending unnecessary time on installation and implementation.
Posted: 22 Oct 2014 | Published: 22 Oct 2014

Alert Logic

Rethinking People Costs in Enterprise IT
sponsored by Rackspace
WHITE PAPER: In this white paper, learn how to assess your IT people spend and position IT as a central driver of business growth. Discover how to cut costs while increasing efficiency with an effective outsourcing strategy that includes a hybrid cloud environment with server virtualization.
Posted: 15 Oct 2014 | Published: 12 Aug 2014

Rackspace

Creating a Successful Patch Management Strategy
sponsored by N-able Technologies
EGUIDE: In this expert e-Guide, learn how to ensure that your patch management strategy remains secure following the transition from physical to virtual desktops; why delaying security patches puts organizations at risk; and how to build a case for a formal patch management program.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

N-able Technologies

Build for Growth: Master the ICM Advantage in Retail - How Incentive Compensation Management Fuels Dynamic, High Performance Retail Businesses
sponsored by IBM
WHITE PAPER: Explore this informative resource to discover how Incentive Compensation Management technology fuels dynamic, high performance retail businesses and promotes productivity through compensation programs, streamlined administration, and rewards contributions that advance growth initiatives.
Posted: 31 Jul 2014 | Published: 31 Jul 2014

IBM

University of San Francisco Uses ITSM Platform for Custom Applications
sponsored by ServiceNow
VIDEO: The University of San Francisco (USF) was suffering from an inflexible legacy system for IT service management (ITSM). In this video, find out how USF leveraged an ITSM platform to automate IT operations, and in particular, develop custom marketing and communications applications.
Posted: 03 Sep 2014 | Premiered: 31 Jul 2014

ServiceNow

Enterprise Information Security in Transition
sponsored by IBM
WHITE PAPER: This white paper boils the reasons behind current issues in the information security field down into four major causes, and also lays out a list of specific, detailed changes that need to be made to the enterprise security model for these core issues to be resolved.
Posted: 28 Jul 2014 | Published: 31 Oct 2012

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement