IT Agents  >   Information Technology End Users  >  

Remote Users

RSS Feed    Add to Google    Add to My Yahoo!
Remote UsersReports
1 - 25 of 156 Matches Previous Page  | Next Page
The Ultra-Dense Server Breakthrough to Design Hosted Desktop Infrastructure
sponsored by Citrix and HP
WHITE PAPER: This white paper explains how HP Moonshot server technology makes it possible to deliver a dedicated PC experience to remote PC users. When deployed in the HD Moonshot server, the new AMD Opteron X2150 delivers Hosted Desktop Infrastructure.
Posted: 09 Apr 2014 | Published: 31 Dec 2013

Citrix and HP

Nip and Tuck: ECM Gets a Facelift
sponsored by SearchContentManagement
EBOOK: With mobile, cloud and remote workforce trends changing the scope of content management, 2014 will be a year of growth for ECM systems.
Posted: 12 Mar 2014 | Published: 12 Mar 2014

SearchContentManagement

Top Use Cases for Desktop Virtualization
sponsored by Citrix
WHITE PAPER: Find out what’s really driving businesses to deliver Windows-as-a-Service and empower their workforce get a better look at the true potential of desktop virtualization.
Posted: 09 Jan 2014 | Published: 09 Jan 2014

Citrix

VDI for SMBs and Remote Offices
sponsored by Dell and Microsoft
WHITE PAPER: Review the specific challenges SMBs and remote offices face when it comes to VDI, the advantages they can garner from new desktop virtualization technologies, and the compact solutions that can make VDI a reality for these organizations.
Posted: 09 Jan 2014 | Published: 09 Jan 2014

Dell and Microsoft

Single Point of Access, Single Point of Control
sponsored by Citrix
WHITE PAPER: Read on to learn how desktop virtualization can help support remote connectivity better than VPN.
Posted: 07 Jan 2014 | Published: 07 Jan 2014

Citrix

Consumerisation and BYOD Purchasing Intentions Europe 2013
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This exclusive Computer Weekly/TechTarget research reveals European organisations plans for BYOD and Consumerisation of IT.
Posted: 19 Dec 2013 | Published: 19 Dec 2013

ComputerWeekly.com

Swisscomm Uses HP Security to Provide Superior and Secure Client Services
sponsored by Hewlett-Packard Limited
VIDEO: Providing superior – and secure – services to clients is Swisscom's greatest goal. This quick video reveals how they have achieved the security needed, and who provides it. View now to learn more!
Posted: 02 Aug 2013 | Premiered: 02 Aug 2013

Hewlett-Packard Limited

Endpoint Security Suites Take Center Stage in the Enterprise
sponsored by Symantec Corporation
ANALYST REPORT: This Forrester report on endpoint security explores how nine top vendors in the market – F-Secure, IBM, Kaspersky, LANDesk, Lumension, McAfee, Sophos, Symantec, and Trend Micro – stacked up against each other.
Posted: 29 Jul 2013 | Published: 04 Jan 2013

Symantec Corporation

Managing a Mobile Workforce: Support and Motivate Your Remote Staff
sponsored by Ultimate Software
WHITE PAPER: This resource explores the growth of mobile technology and the rise of the teleworker, and details how cloud-based human capital management (HCM) can enable you to support, engage, and motivate your virtual employees more easily and effectively.
Posted: 24 Jul 2013 | Published: 31 Mar 2013

Ultimate Software

Unified Networking: Manage Wired and Wireless Networks with Ease
sponsored by Cisco Systems, Inc.
WHITE PAPER: Learn about a set of unified networking and management platforms built to provide consistency and continuity within your unified wired and wireless network, helping you achieve cost-efficiency, improved user experience, and simplified management.
Posted: 15 Jul 2013 | Published: 31 Jan 2013

Cisco Systems, Inc.

Communication and Collaboration Solutions for Your Business
sponsored by Cisco
WHITE PAPER: This Forrester Research paper unveils the need for UC&C in mid-sized businesses today and outlines the many benefits you can enjoy after implementation.
Posted: 15 Jul 2013 | Published: 29 Mar 2013

Cisco

Avaya CS 1000: Defining Calling Line Identification Numbers
sponsored by Global Knowledge
WHITE PAPER: This white paper describes a two-part process used to define CLID information for both emergency and non-emergency calls. The first part involves defining the number(s) that will be sent to the called party. The second part of the process involves assigning the CLID entry to an analog telephone or to a key on a digital or IP telephone.
Posted: 14 Jun 2013 | Published: 16 May 2013

Global Knowledge

Application Optimization for the Network
sponsored by SearchNetworking.com
EZINE: In the new WAN, we'll see user-aware WAN optimization, the rise of software-defined networking and WAN-on-demand. There may be some bumps along the road to WAN innovation, but it's sure to be an interesting journey.
Posted: 06 Jun 2013 | Published: 06 Jun 2013

SearchNetworking.com

Top 10 Reasons You Don't Need MDM
sponsored by Fiberlink
WHITE PAPER: This white paper reveals the top 10 reasons you don't need a mobile device management (MDM) solution ... or do you?
Posted: 16 May 2013 | Published: 16 May 2013

Fiberlink

Four Citrix customers enable anywhere, any device CAD productivity
sponsored by Citrix
CASE STUDY: This whitepaper highlights 3 key priorities virtual desktops address by examining 4 companies that have used centralization to improve business processes.
Posted: 27 Nov 2013 | Published: 27 Nov 2013

Citrix

Using a Risk-Based Approach to Address a Changing Threat Landscape
sponsored by RSA, The Security Division of EMC
WHITE PAPER: In this white paper, gain exclusive insight on risk-based authentication systems. Learn why these systems will continue to enable convenient user access, boost information security policies to prevent fraudulent access, and ensure user privacy.
Posted: 15 Nov 2013 | Published: 31 Jan 2013

RSA, The Security Division of EMC

Remote Backup Drill Down
sponsored by SearchDataBackup.com
ESSENTIAL GUIDE: Remote backup of data on endpoint devices like laptops and smart phones is a challenge for IT staffs. This Drill Down takes a look at remote backups today, focusing on the challenges and solutions available to address endpoint device backup.
Posted: 13 Nov 2013 | Published: 13 Nov 2013

SearchDataBackup.com

Delivering IT to the Virtual Workforce
sponsored by Citrix
WHITE PAPER: Uncover the four key requirements of workshifting, the technologies needed to achieve them, and the solutions that can provide these capabilities to your organization.
Posted: 13 Aug 2013 | Published: 30 Jun 2011

Citrix

Extended Enterprise Poses Identity and Access Management Challenges
sponsored by CA Technologies.
EGUIDE: Inside this SearchSecurity.com e-guide, we explore the disconnect between traditional IAM and the distributed, mobile enterprise to uncover the top three IAM challenges organizations are experiencing today.
Posted: 26 Jul 2013 | Published: 26 Jul 2013

CA Technologies.

Global Security University: IAM Integration Classroom
sponsored by IBM
VIRTUAL ENVIRONMENT: This Information Security Classroom focuses on identity and access management (IAM) strategies for hosted and cloud-based systems accessed by company-owned and employee-owned devices.
Posted: 25 Jul 2013 | Premiered: 25 Jul 2013

IBM

Identity-Centric Security: Enabling and Protecting the Business
sponsored by CA Technologies.
WHITE PAPER: Discover why the enterprise perimeter as we know it is dissolving and how your users are taking its place – creating numerous security issues for your IT department. In addition, learn how identity-centric security can help you protect data and maintain compliance in this new enterprise model.
Posted: 24 Jul 2013 | Published: 31 May 2013

CA Technologies.

The Truth About Working from Anywhere - Part 2: Best Practices for Working on the Go
sponsored by Citrix Online Go To Meeting
WHITE PAPER: This best practices guide provides guidance to help you more effectively and efficiently operate as a mobile worker. Inside, find advice to help you drive success with mobile work at home and on the road, as well as tips for increasing mobile communication.
Posted: 12 Jun 2013 | Published: 12 Jun 2013

Citrix Online Go To Meeting

Expert Advice: How App Delivery Optimization Tools Can Satisfy Your Business Needs
sponsored by F5 Networks
VIRTUAL ENVIRONMENT: In this first section of SearchEnterpriseWAN.com's three-part guide on application delivery optimization, we take a look at the business and technology issues driving ADO adoption and the benefits of deploying an ADO solution.
Posted: 20 May 2013 | Premiered: 20 May 2013

F5 Networks

Virtualization of Video Infrastructure
sponsored by Vidyo, Inc.
WHITE PAPER: As virtualization spreads users across the globe, organizations are seeking solutions to keep their users connected. View this white paper to learn how the virtualization of video is helping make these options more affordable and flexible for businesses today.
Posted: 07 May 2013 | Published: 31 Jan 2013

Vidyo, Inc.

Troubleshooting Your Network Without Breaking the Bank
sponsored by Riverbed Technology, Inc.
WHITE PAPER: As a network manager, application manager or security manager, you need systems that can collect data across your WAN, continuously analyze the data to discover problems, and troubleshoot issues as soon as they occur. Riverbed Cascade has fundamentally changed the economics of network performance management. Learn more.
Posted: 23 Apr 2013 | Published: 30 Dec 2011

Riverbed Technology, Inc.
1 - 25 of 156 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement