IT Agents  >   Information Technology End Users  >   User Groups  >  

Function Point Users Group

RSS Feed   
Function Point Users Group White Papers (View All Report Types)
 
Secure IT Asset Disposition: Achieving Business Value While Mitigating Risks
sponsored by Iron Mountain
WHITE PAPER: The risks of not having an IT asset disposition (ITAD) solution are substantial.Download this white paper for advice on how to dispose of old IT equipment successfully while achieving security, compliance, and environmental goals.
Posted: 23 Jul 2020 | Published: 23 Jul 2020

Iron Mountain

Real World Stories of IT Admin Heroes
sponsored by Pure Storage
WHITE PAPER: Check out this compendium of case studies to see 7 shining examples of everyday IT admin heroes as they use Pure Storage to help their organizations simplify and transform operations for mission-critical databases, virtualized environments, and analytics with all-flash and NVMe.
Posted: 21 Aug 2020 | Published: 21 Aug 2020

Pure Storage

IT jobswatch – trends in media IT recruitment
sponsored by ComputerWeekly.com
WHITE PAPER: This quarters figures compiled by jobadswatch.co.uk show that during the fourth quarter of 2010 the IT jobs market for permanent staff being recruited by media organisations is up by 1.8%. This is the sixth consecutive quarter that has seen higher demand.
Posted: 20 Oct 2011 | Published: 15 Mar 2011

ComputerWeekly.com

Why Business Rules?: A Case for Business Users of Information Technology
sponsored by IBM
WHITE PAPER: This whitepaper explains how business people are allowed to directly define how their business rules are being executed with a BRMS; and, perhaps more important, how it facilitates change in an easy, safe and reliable manner.
Posted: 07 Jul 2011 | Published: 01 Sep 2009

IBM

Ten Critical Success Factors for CRM: Lessons Learned from Successful Implementations
sponsored by Oracle Corporation
WHITE PAPER: Customer relationship management (CRM) deployments can be complex and difficult. This white paper provides a checklist of the ten critical success factors for organizations to follow to avoid common pitfalls as they design and deploy their CRM system.
Posted: 16 Jan 2007 | Published: 01 Aug 2006

Oracle Corporation

The 7 Deadly Skills Your IT Team Should Possess
sponsored by Skillsoft
WHITE PAPER: This resource examines IT skill shortages, how to minimise them within your company, and 7 deadly skills that your IT team should possess.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

Skillsoft

11 Questions Every CIO Should Ask Their IT Manager
sponsored by Red Hat and JBoss
WHITE PAPER: What is your IT really costing you? Could you be doing more with the technology you have? Could you reduce costs and provide better service to your organization? Read Red Hat's suggestions on "11 Questions Every CIO Should Ask Their IT Manager", and how Red Hat open source solutions can help.
Posted: 19 Jun 2009 | Published: 10 Jun 2009

Red Hat and JBoss

The 7 Deadly Skills of The Perfect Employee
sponsored by Skillsoft
WHITE PAPER: This resource examines the 7 skills essential to employee success and how to keep your employees productive and satisfied.
Posted: 23 Apr 2012 | Published: 23 Apr 2012

Skillsoft

Gartner Middle East CIO Leadership Forum
sponsored by Gartner
WHITE PAPER: Join Gartner analysts from 28 February to 1 March in Dubai, industry thought leaders and a select group of your peers to find new answers to new questions - and learn how your IT leadership can create and follow the path to world class best practice.
Posted: 28 Jan 2011 | Published: 28 Jan 2011

Gartner

E-Guide: Wireless LAN access control: Managing users and their devices
sponsored by SearchSecurity.com
EGUIDE: This expert E-Guide discusses methods for WLAN access control, including policy creation, device fingerprinting and integration with other network access control solutions.
Posted: 15 Jul 2011 | Published: 14 Jul 2011

SearchSecurity.com

eBook: The Shortcut Guide to User Workspace Management - Chapter 4: Transforming to an Environment of User Workspace Management
sponsored by RES Software
EBOOK: You’ve already come to understand the workspace itself, and how that workspace can be made pervasive across the spectrum of delivery mechanisms.
Posted: 27 Oct 2010 | Published: 27 Oct 2010

RES Software

Developers and Identity Services - Tackling Identity Data with Identity Hub
sponsored by Oracle Corporation
WHITE PAPER: This paper takes a closer look at the issues surrounding the patterns for accessing identity data and what an ideal Identity Hub should provide for developers.
Posted: 13 Feb 2009 | Published: 13 Feb 2009

Oracle Corporation

Which Users Should You Virtualize?
sponsored by Dell, Inc. and Intel®
PRESENTATION TRANSCRIPT: Examine your desktop virtualization goals and determine which users you want to virtualize in this expert discussion with Brian Madden. Discover how your goals will change the way you implement your desktop virtualization initiative.
Posted: 22 Dec 2011 | Published: 22 Dec 2011

Dell, Inc. and Intel®

What Type of Virtualization Should You Use For Each User Segment?
sponsored by Dell, Inc. and Intel®
PRESENTATION TRANSCRIPT: In lesson two of this desktop virtualization classroom, Brian Madden discusses how to segment your users and group them together to figure out what type of desktop virtualization you should use for different groups or users. Then he covers the specific desktop virtualization technologies and the pros and cons of each.
Posted: 23 Dec 2011 | Published: 23 Dec 2011

Dell, Inc. and Intel®

eBook: The Shortcut Guide to User Workspace Management - Chapter 3: Tying Security to People, Not Devices
sponsored by RES Software
EBOOK: Today’s unpredictable user needn't necessarily complicate the application of security configurations. In fact, with the right technology in place, the idea of where security is applied grows less important. Replacing it is a new focus on how that security is applied. With User Workspace Management, that how  ties security to...
Posted: 27 Oct 2010 | Published: 27 Oct 2010

RES Software

Technical Guide on Emerging Threats
sponsored by SearchSecurity.com
EGUIDE: It takes time and money to adjust IT security in response to evolving attack tactics. As defenders gradually update their security measures, attackers respond accordingly. Such arms-race dynamics lead to threats of increasing sophistication and efficiency.
Posted: 16 Feb 2011 | Published: 16 Feb 2011

SearchSecurity.com

Presentation Transcript: Why Implement a Pilot Program for Desktop Virtualization? Why Now?
sponsored by DellEMC and Intel®
PRESENTATION TRANSCRIPT: Why is a pilot implementation so important?  This presentation transcript will help you understand how a desktop virtualization pilot works, how to select the right user group, why it's critical to the success of a full desktop virtualization implementation; and what you need to consider before getting started.
Posted: 12 Jul 2010 | Published: 12 Jul 2010

DellEMC and Intel®

5 IT essentials for building a collaborative work environment
sponsored by Citrix
RESOURCE: Collaboration tools are vital in today's organizations. But before you adopt all the top-rated tools, you need to make sure you're choosing the option that best suits your organization. Download this white paper to learn about the importance of using the right collaboration tool and explore the 5 essential features your future tool should have.
Posted: 08 May 2020 | Published: 08 May 2020

TOPICS:  Working Groups
Citrix

Manage Oracle Database Users and Roles Centrally in Active Directory or Sun Directory
sponsored by Oracle Corporation
WHITE PAPER: This paper illustrates how you can now centrally administer database users and role memberships leveraging your existing LDAP directories.
Posted: 13 Feb 2009 | Published: 01 Aug 2008

Oracle Corporation

Data Center Cabling Considerations: Point-to-Point vs Structured Cabling
sponsored by Siemon Company
WHITE PAPER: If we don’t learn from the mistakes that occurred in the past, we are bound to repeat them. This is very true when it comes to data centers and aged point-to-point cabling practices. This resource compares point-to-point vs. structured cabling options for data centers.
Posted: 12 Oct 2011 | Published: 12 Oct 2011

Siemon Company

How to establish end-point security
sponsored by ComputerWeekly.com
WHITE PAPER: The aim of this paper is to demonstrate how endpoint security status can be used to enable access within a Collaboration Oriented Architecture.
Posted: 25 Oct 2011 | Published: 09 Nov 2010

ComputerWeekly.com

Open Group technical document: IT Specialist Certification Accreditation Policy
sponsored by ComputerWeekly.com
WHITE PAPER: A common characteristic of people-certification programs in the marketplace is that most test or validate the existence of relevant knowledge. Few reach beyond this.
Posted: 20 Oct 2011 | Published: 22 Oct 2010

ComputerWeekly.com

CW+: Open Group technical report: IT Specialist Certification (ITSC) accreditation requirements
sponsored by ComputerWeekly.com
WHITE PAPER: The Open Group IT Specialist Certification Program (the Program) is designed to validate the existence of those qualities and skills in a professional that enable the effective development, implementation, and operation of IT solutions.
Posted: 20 Oct 2011 | Published: 22 Oct 2010

ComputerWeekly.com

What's New With Microsoft Office Communications Server 2007 R2
sponsored by Microsoft
PRESENTATION TRANSCRIPT: This presentation transcript explains the new features and functionality in the Office Communications Server 2007 R2, the application that continues to deliver on the Microsoft promise to streamline communications for users, give IT organizations the flexibility and control they need, and provide an extensible communications platform.
Posted: 06 Mar 2009 | Published: 06 Mar 2009

Microsoft

The Tipping Point
sponsored by Atlassian
WHITE PAPER: In this 62-page E-Book, find out everything there is to know about Data Center, the self-hosted/on-prem deployment option from Atlassian built to scale out mission-critical applications like Jira when your single server environments are no longer cutting it.
Posted: 06 Nov 2018 | Published: 06 Nov 2018

Atlassian

Open Group technical document: The Single Unix Specification
sponsored by ComputerWeekly.com
WHITE PAPER: This document is designed for users, developers, and implementors of open systems. It provides complete infor mation on what’s new in the Single UNIX Specification, Version 4, including POSIX.1-2008,with comprehensive reference material on every aspect.
Posted: 20 Oct 2011 | Published: 25 Oct 2010

ComputerWeekly.com

Departmental Specialization Needed With Analytics
sponsored by SearchBusinessAnalytics
EBOOK: This three-part handbook examines BI and analytics deployments for different functional units in organizations with advice on how to make your program work. First, learn about how BI functions when geared towards sales and marketing, before turning towards a customer service approach. Finally, read about how analytics can help with asset protection
Posted: 01 Jun 2016 | Published: 27 May 2016

SearchBusinessAnalytics

Podcast: Applying Client-aware Technologies for Desktop Virtualization and Cloud Services
sponsored by Intel
PODCAST: We envision a private cloud that can recognize and determine device attributes and user preferences, and deliver the service or information accordingly.  Our testing demonstrates that client-aware technologies can offer several benefits to both users and IT.
Posted: 01 Nov 2011 | Premiered: Oct 31, 2011

Intel

Hitachi ID Group Manager
sponsored by Hitachi ID
PRODUCT OVERVIEW: Hitachi ID Group Manager helps make the administration of security groups and mail distribution lists faster, cheaper and more secure. To learn more, download this product brief and discover all of the ways Hitachi ID Group Manager can benefit your organization today.
Posted: 06 May 2019 | Published: 06 May 2019

Hitachi ID

Focusing on SIEM Integration: A 6 Point SIEM Solution Evaluation Checklist
sponsored by SearchSecurity.com
EGUIDE: Organizations should take careful consideration before implementing a SIEM solution. This expert e-guide will cover six points to consider before selecting a solution and explore the benefits it can bring to your business.
Posted: 07 Dec 2012 | Published: 07 Dec 2012

SearchSecurity.com

Go Back to the Basics with Active Directory
sponsored by One Identity
ESSENTIAL GUIDE: Despite your level of familiarity, it never hurts to keep up-to-date on basic Active Directory best practices. Inside this E-Guide, brush up on some basic Active Directory tips and tricks around domain controllers, cloud AD interactions, and more.
Posted: 12 Mar 2019 | Published: 11 Mar 2019

One Identity

eBook: Must-Know Applications Trends for Oracle Developers
sponsored by CipherSoft, Inc., A subsidiary of Unify Corp.
EBOOK: Since Forms technology is widely in use in many Oracle environments, it's critical that developers and IT professionals understand Oracle's short and long term plans that could affect their strategies. Read more about the key trends that may affect how your organization uses Oracle Forms, a component of Oracle Fusion Middleware.
Posted: 05 Aug 2009 | Published: 05 Aug 2009

CipherSoft, Inc., A subsidiary of Unify Corp.

Citrix Xendesktop : Desktop Virtualization for all – Technical overview
sponsored by Citrix
WHITE PAPER: In this whitepaper, you’ll find a discussion of the various options that FlexCast provides to help meet the computing requirements of various user types.
Posted: 26 Aug 2013 | Published: 26 Aug 2013

Citrix

WLAN Access Control and Wi-Fi Network Needs
sponsored by SearchSecurity.com
EGUIDE: This white paper discusses the nature of high-density WLAN environments, their relationship to enterprise Wi-Fi, and the benefits of 802.1X authentication. Read on to learn more.
Posted: 10 May 2013 | Published: 01 Apr 2013

SearchSecurity.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info