UI Reports

How to Optimize IT Initiatives with User Virtualization
sponsored by AppSense
WHITE PAPER: This whitepaper explains how user virtualization works to span both physical and virtual desktops, allowing you to manage all aspects of the user independent of your method of desktop delivery.
Posted: 19 Jul 2013 | Published: 19 Jul 2013

AppSense

BlackBerry Developer Labs
sponsored by BlackBerry
RESOURCE CENTER: Learn more about developing for the BlackBerry platforms with these hands-on exercises: BlackBerry® Browser labs, Rapid Application Development labs, and BlackBerry® Java® Development Environment labs.
Posted: 02 Jun 2010 | Published: 25 May 2010

BlackBerry

Prototyping Data Warehouses Using Visual Analytics: Presentation Transcript
sponsored by Tableau Software
PRESENTATION TRANSCRIPT: Read this presentation transcript of the “Prototyping Data Warehouses using Visual Analytics” webinar that includes a case study demonstrating how the City of Charlotte is administering Tableau Server to reduce IT intervention, reduce costs and increase collaboration between business units.
Posted: 09 Apr 2009 | Published: 09 Apr 2009

Tableau Software

AppSense User Virtualization Platform
sponsored by AppSense
WHITE PAPER: Among a number of important changes to the enterprise computing environment, none are perhaps as impactful as those surrounding the end user. Take a look at this resource to learn how user virtualization is the key to offering your end-user community an effective and consistent computing experience, no matter the location, device or application.
Posted: 27 Jul 2011 | Published: 26 Jul 2011

AppSense

Endpoint Protection Small Business Edition
sponsored by Symantec Corporation
VIDEO: Small businesses may think they have enough protection, but they are at risk to attacks. The budget and staff for small businesses is often smaller than larger corporations, so they need a security plan that protects against a multitude of attacks. View this video to learn more about endpoint protection for small businesses.
Posted: 05 Sep 2012 | Premiered: 05 Sep 2012

Symantec Corporation

Addressing Outlook Security Concerns and Preparing Mobile Users for an Exchange Migration
sponsored by Thawte Inc.
EGUIDE: Users enticed by the ability to check email at a glance increasingly log onto Exchange 2010 remotely and cause new security risks. This expert e-guide from SearchExchange.com explains how to address these Outlook security concerns by creating a buffer zone between your internal network and the Internet.
Posted: 19 May 2011 | Published: 19 May 2011

Thawte Inc.

Usability and Compliance: The Carrots and Sticks that Drive E-Procurement Success
sponsored by Simplifying-IT
WHITE PAPER: Enhancing usability is the key to getting beyond tacit user acceptance of an e-Procurement system to the full adoption and compliance that yields cost reduction and full ROI. Read this paper to learn the full compliance strategies that best-in-class organizations are using for their e-Procurement implementations.
Posted: 09 Jan 2012 | Published: 06 Jan 2012

All resources sponsored by Simplifying-IT

Oracle WebLogic Server - A Solid Foundation for SOA
sponsored by Oracle Corporation
WHITE PAPER: This white paper shows how Oracle WebLogic Server supports the next generation of enterprise applications and services. Learn how to leverage the Java EE 5 advantage and dramatically speed development of SOA applications.
Posted: 13 May 2009 | Published: 04 Nov 2008

Oracle Corporation

Guide to Design-Centric Application Development
sponsored by CraveInfoTech
EGUIDE: Designing customer-experience grade apps is a must in the age of empowered users. But you need the right tools to do it successfully. This comprehensive guide is your roadmap to developing user-friendly apps with SAP Fiori. Learn how to develop apps from a design-centric standpoint that focuses on the end user's needs.
Posted: 05 Oct 2016 | Published: 04 Oct 2016

CraveInfoTech

eBook: The Shortcut Guide to User Workspace Management - Chapter 3: Tying Security to People, Not Devices
sponsored by RES Software
EBOOK: Today’s unpredictable user needn't necessarily complicate the application of security configurations. In fact, with the right technology in place, the idea of where security is applied grows less important. Replacing it is a new focus on how that security is applied. With User Workspace Management, that how  ties security to...
Posted: 27 Oct 2010 | Published: 27 Oct 2010

RES Software