IT Agents  >   Professional Organizations  >   Information Industry Professional Organizations  >  

Technical Communities

RSS Feed    Add to Google    Add to My Yahoo!
Technical CommunitiesReports
 
Unlock the 6 Secrets to Social Success
sponsored by Jive Software
WHITE PAPER: Uncover the top six secrets to social success and receive help implementing and/or adjusting your framework for the addition of social. Also view in-depth key actions you should take and questions you must answer to ensure your social strategy is a beneficial one.
Posted: 25 Jul 2013 | Published: 25 Jul 2013

Jive Software

Configuration Management for Virtual and Cloud Infrastructures
sponsored by ComputerWeekly.com
WHITE PAPER: The top seven things to consider when managing configuration for virtual and cloud infrastructures.
Posted: 25 Oct 2011 | Published: 19 Jan 2011

ComputerWeekly.com

IDC MarketScape: Worldwide Desktop Virtualization Vendor Analysis
sponsored by Citrix
WHITE PAPER: This IDC study assesses the capability and business strategy of 11 vendors in the client virtualization market.
Posted: 25 Nov 2013 | Published: 25 Nov 2013

Citrix

Content-Aware Identity & Access Management in a Virtual Environment
sponsored by CA Technologies
WHITE PAPER: Read this white paper to learn how CA Technologies Content-Aware IAM solutions help protect customers in the physical world and similarly protect virtual environments by controlling identities, access, and information usage.
Posted: 01 Oct 2010 | Published: 01 Jun 2010

CA Technologies

Presentation Transcript: Driving Collaboration Efficiency - H.264 High Profile
sponsored by Polycom, Inc.
PRESENTATION TRANSCRIPT: Polycom continues bringing leading-edge, standards-based technologies to visual communication. This is an advantage that resonates across all applications and industries.  Read this transcript to learn how Less Delivers Much More!
Posted: 27 Sep 2010 | Published: 27 Sep 2010

Polycom, Inc.

The CISO's Guide to Virtualization Security
sponsored by Rapid7
WHITE PAPER: Security incidents that occur in a virtual environment can cause significant, sometimes crippling damage to businesses. It's essential that security professionals outline their efforts and making securing virtual infrastructure a priority.
Posted: 18 Jul 2012 | Published: 12 Jan 2012


Oxilion Deploys Red Hat Enterprise Virtualization to Keep Customers Satisfied
sponsored by Red Hat.
WHITE PAPER: Access this white paper to discover a new virtualization platform with cloud capabilities that delivers flexibility, scalability and cost requirements to virtual data centers.
Posted: 16 May 2011 | Published: 16 May 2011

Red Hat.

The Virtual Office Checklist
sponsored by Cisco Systems, Inc.
WHITE PAPER: The technology behind remote access is called a "virtual private network," or "VPN," and it establishes a private, secure network connection over a public network, such as the Internet.
Posted: 10 Oct 2008 | Published: 10 Oct 2008

Cisco Systems, Inc.

Securing Virtual Environments
sponsored by CA Technologies.
PODCAST: Listen to this podcast for insight as well as an understanding of what security solutions are available now to help you address the issues.
Posted: 06 Oct 2010 | Premiered: Oct 6, 2010

CA Technologies.

Magic Quadrant for Team Collaboration and Social Software, 2007
sponsored by Socialtext
WHITE PAPER: The collaboration support market is being revitalized, with buyers and sellers looking to add social interaction in the context of broad collaboration support. Read this Gartner white paper which discusses new and established vendors in this market...
Posted: 05 Dec 2007 | Published: 24 Oct 2007

Socialtext
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement