White Papers

 

Displaying 1–15 (of 5852)

Popularity is determined by a calculation of page views and community comments.

Title Date
How to Maximize XenApp and XenDesktop Performance by Combining Citrix Director / EdgeSight and eG Innovations Summary
Attend this online webinar to learn about next-gen performance monitoring best practices that you need to put in place to get the most out of your Citrix XenApp/XenDesktop investments and reliably deliver virtual desktops and applications to users.

sponsored by: Citrix and eG Innovations
04-16-2014
Computer Weekly – 15 April 2014: Spies in the VPN Summary
In this week's Computer Weekly, the NSA/GCHQ snooping scandal has added to concerns about security of virtual private networks (VPNs) – we find out how IT chiefs should respond. Windows XP support has now ended – we look at what it means for the remaining users. And we examine the benefits of data visualisation tools. Read the issue now.

sponsored by: ComputerWeekly.com
04-15-2014
What It Takes to Make Zero Clients Add Up Summary
Chapter 2 looks at the major considerations in making a final decision on whether to move an organization's desktops to zero clients. Cost, return on investment, and vendor choice are among the most essential factors to be weighed. The chapter also discusses the complexity of a shift to a zero client model.

sponsored by: SearchVirtualDesktop.com
04-15-2014
Marketing Automation Industry Overview Summary
As ROI from traditional marketing channels continues to erode, modern marketers have turned to new, tech-based methods for attracting customers. The world of marketing automation is growing, and fast. Get the scoop on what it all means in this complimentary whitepaper, Marketing Automation Industry Overview.

sponsored by: Act On
04-15-2014
5 Steps for Improving Virtual Backup & Data Recovery in Large Enterprises Summary
This paper explores both the benefits that virtualization brings to the backup and recovery space as well as the benefits, advantages and features that backup and recovery can bring to a large virtual environment.

sponsored by: PHD Virtual
04-15-2014
Security Considerations When Undergoing a Network Refresh Summary
This informative paper discusses crucial considerations you need to keep in mind when undergoing a network refresh, outlining the impact that emerging technologies will have on network and security management, along with what you can do to ensure that your network is high-performance and secure.

sponsored by: Hewlett-Packard Company
04-15-2014
Social Media Education: The New Edge for Success Summary
Did you know that according to a report by the McKinsey Global Institute, business can unlock up to $1.3 trillion in business value by leveraging social technologies?  However, if your company isn't armed with the right knowledge, tools, and skill set, those financial (and other CRM) benefits will be out of reach.

sponsored by: Hootsuite
04-15-2014
Social Media in Government: 5 Key Considerations Summary
Government agencies have begun to follow private-sector companies in leveraging social media, but may still have questions regarding the tools, processes, and organizational changes required to make social media work. This informative resource details the five top considerations for government agencies looking to deploy social media strategies.

sponsored by: Hootsuite
04-15-2014
Three Steps to Put Predictive Analytics to Work Summary
Consult the following white paper to explore the 3 steps you need to get predictive analytics up and running.

sponsored by: SAS
04-15-2014
Modern Infrastructure – April 2014 Summary
Some enterprises are charging ahead with a cloud-first approach to their workloads—not just test and dev, but production workloads as well. This most recent, April-edition of Modern Infrastructure details several organizations for whom this cloud-first approach has proved very effective.

sponsored by: SearchDataCenter.com
04-15-2014
Security for a Faster World - Issue 1 2012 Summary
This issue of “Security for a Faster World” takes a look at the kind of attacks being perpetrated against today’s businesses, including hacktivist attacks and advanced persistent threats (APTs) and examines the practices and technologies these organizations can use to keep themselves secure.

sponsored by: Hewlett-Packard Limited
04-15-2014
Finance and Technology: A Confident Partnership Summary
Access this exclusive report and uncover a complete list of findings from a recent IT and finance department related survey, and find out how large an input the finance staff really has in technology decision-making.

sponsored by: Oracle Corporation UK Ltd
04-14-2014
5 Ways Marketing Automation Can Optimize & Grow Your Business Summary
Many marketing teams are touting the benefits of a marketing automation platform. But many CEOs and other executives are still wondering, "What's the urgency? Is marketing automation really worth the investment?" Find out the answers to those questions in this informative white paper.

sponsored by: Act On
04-14-2014
Real-time Operational Intelligence (RtOI) for the Data Center Summary
This white paper talks about the benefits of Real-time Operational Intelligence as a way of handling big data. These benefits include decreased energy costs, maximized data center capacity and improved reliability.

sponsored by: Modius Inc
04-14-2014
MicroScope April 2014: A special issue covering the information security market Summary
A special issue covering the opportunities for resellers selling security, and advice on the use of social media.

sponsored by: MicroScope
04-14-2014

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 >>