UI Reports

Oracle WebLogic Server - A Solid Foundation for SOA
sponsored by Oracle Corporation
WHITE PAPER: This white paper shows how Oracle WebLogic Server supports the next generation of enterprise applications and services. Learn how to leverage the Java EE 5 advantage and dramatically speed development of SOA applications.
Posted: 13 May 2009 | Published: 04 Nov 2008

Oracle Corporation

Prototyping Data Warehouses Using Visual Analytics: Presentation Transcript
sponsored by Tableau Software
PRESENTATION TRANSCRIPT: Read this presentation transcript of the “Prototyping Data Warehouses using Visual Analytics” webinar that includes a case study demonstrating how the City of Charlotte is administering Tableau Server to reduce IT intervention, reduce costs and increase collaboration between business units.
Posted: 09 Apr 2009 | Published: 09 Apr 2009

Tableau Software

Endpoint Protection Small Business Edition
sponsored by Symantec Corporation
VIDEO: Small businesses may think they have enough protection, but they are at risk to attacks. The budget and staff for small businesses is often smaller than larger corporations, so they need a security plan that protects against a multitude of attacks. View this video to learn more about endpoint protection for small businesses.
Posted: 05 Sep 2012 | Premiered: 05 Sep 2012

Symantec Corporation

AppSense The Low down: What does user virtualization boil down to?
sponsored by AppSense
PRODUCT OVERVIEW: Traditional roaming profiles can no longer provide one, consistent and stable platform for your users. Access this exclusive resource to uncover the 10 reasons for adopting user virtualisation.
Posted: 07 Jun 2011 | Published: 07 Jun 2011

AppSense

Usability as an ERP Selection Criteria
sponsored by IFS
WHITE PAPER: ERP software is often criticized for being complex and difficult to use. Read this paper to learn how to evaluate ERP software for usability.
Posted: 04 Feb 2008 | Published: 01 Jan 2008

IFS

How to Optimize IT Initiatives with User Virtualization
sponsored by AppSense
WHITE PAPER: This whitepaper explains how user virtualization works to span both physical and virtual desktops, allowing you to manage all aspects of the user independent of your method of desktop delivery.
Posted: 19 Jul 2013 | Published: 19 Jul 2013

AppSense

E-Procurement Usability: The Good, The Bad and The Ugly
sponsored by Simplifying-IT
WHITE PAPER: A costly, complicated migration to a best-of-breed e-Procurement platform is not the only way to achieve a consumer-friendly user interface (UI) and ensure user adoption. Read this paper to discover a cost-effective alternative that allows SAP ERP users to leverage their existing infrastructure to achieve e-Procurement adoption.
Posted: 09 Jan 2012 | Published: 31 Jul 2010

All resources sponsored by Simplifying-IT

eBook: The Shortcut Guide to User Workspace Management - Chapter 2: Personalization Equals Content + Context
sponsored by RES Software
EBOOK: That’s why personality - and the preservation of personality, no matter how our users might connect—is so incredibly important. Read Chapter 2 of this series to learn more about the importance of personalization.
Posted: 03 Nov 2010 | Published: 03 Nov 2010

RES Software

eBook: The Shortcut Guide to User Workspace Management - Chapter 3: Tying Security to People, Not Devices
sponsored by RES Software
EBOOK: Today’s unpredictable user needn't necessarily complicate the application of security configurations. In fact, with the right technology in place, the idea of where security is applied grows less important. Replacing it is a new focus on how that security is applied. With User Workspace Management, that how  ties security to...
Posted: 27 Oct 2010 | Published: 27 Oct 2010

RES Software

Addressing Outlook Security Concerns and Preparing Mobile Users for an Exchange Migration
sponsored by Thawte Inc.
EGUIDE: Users enticed by the ability to check email at a glance increasingly log onto Exchange 2010 remotely and cause new security risks. This expert e-guide from SearchExchange.com explains how to address these Outlook security concerns by creating a buffer zone between your internal network and the Internet.
Posted: 19 May 2011 | Published: 19 May 2011

Thawte Inc.