• Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us

Sign Up

USA | UK | CA | DE | ES | FR | IT | NL | PL | SE | SG | BR
Sign Up
main-logo
  • Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us
  • Sign Up
  • Home
  • |
flow-image
Cisco

Cisco Bring Your Own Device (BYOD)

Enterprises across the globe are continually working towards increasing their employee productivity, efficiency and flexibility. Mobility has moved up the priority list of several IT executives, who are expanding the pervasiveness of mobility initiatives throughout the organization. However, IT executives are challenged...

View More
flow-image
Cisco

How-to Guide: Top Ways to Improve Contact Center Performance

Recent studies have demonstrated a positive relationship between the implementation of advanced technology in contact centers and increased caller satisfaction. For example, advanced call handling techniques reduce average queue time by anywhere from 12 to 43 percent. Calls per hour per agent improved 6 to 18 percent....

View More
flow-image
Bit9

Java Vulnerabilities Report: Write Once, Own Anywhere

Java was originally released with the slogan “write once, run anywhere,” which was intended to underscore its cross-platform capabilities. Over time, Java has become ubiquitous on endpoints, so “run anywhere” can be interpreted as referring to its ubiquity. Even as fewer websites and Web applications...

View More
flow-image
VMware

Meeting Patients Where They Are: Jefferson Health Advocates Patient-Centered Care

A decade ago, Jefferson began its transformation to digital care. It adopted integrated electronic health records, moving from separate, siloed systems to unified ones, powered by Epic and VMware. Jefferson also saw that patients wanted to be actively involved in their own care. 

Published: Apr 06, 2022
View More
flow-image
Symantec

Security and Trust: The Backbone of Doing Business Over the Internet

This paper explores the current state of web site security and the contributions VeriSign is making to help organizations protect critical data and build trust with customers. It begins with Secure Sockets Layer (SSL) encryption, the technology that addresses the most obvious and oldest problem in online business—the...

View More
flow-image
Red Hat

Architects lead the next generation of data-driven applications

Today’s application architects face significant change on all fronts. Asked to deliver a new era of social, mobile, and big data applications, they must do so at a time when the entire application stack is shifting around them. To successfully deliver modern applications, application architects must identify...

View More
flow-image
McAfee

Manage Security and Risk... Get Proactive About Managing Risk

Compliance and financial risk used to be the driving concerns for security and risk management. Audits and governance processes were predictable events that IT attempted to minimize and automate. Risk was a fairly static concept. 

View More
flow-image
Mimecast

The Importance of Continuity in Office 365 Environments

This white paper discusses the important issues related to email and Office 365 continuity and offers recommendations for decision makers to consider as they develop their continuity plans. The paper also provides a brief overview of Mimecast, the sponsor of this paper, as well as their relevant solutions.

View More
flow-image
IBM

Descriptive, Predictive, Prescriptive: Transforming Asset and Facilities Management with Analytics

This white paper describes a key first step in adopting an analytics approach: understanding the different types of analytics— descriptive, predictive and prescriptive—the management role each can play and the value each can deliver.

View More
flow-image
Oracle

Empowering Modern Government

How can agencies capitalize on the power of today’s innovations while mitigating a host of daunting challenges? The answer is a comprehensive strategy that uses the latest technologies to empower modern government. 

View More
flow-image
Citrix

Citrix Workspace Data Sheet

Today’s work environment is consumed with irrelevant notifications, sequentially-sorted emails in overflowing inboxes, and numerous applications that require context switching between them. • Citrix Workspace presents content seamlessly in an intelligent feed to reduce frustration and enable employees to...

View More
flow-image
HP

Deliver Mobile Apps: A Lifecycle Approach

Mobility services are frequently being positioned as part of broader application transformation offerings, enabling enterprises to support the bring-your-own-device (BYOD) approach, with the development of enterprise app stores and the ability to leverage personal devices for business functions. This white paper describes...

View More
flow-image
CA Technologies

The adoption of cloud-based services: Increasing confidence through effective security

This report examines the issues around the adoption of cloud-based services and looks at the security technology that is being deployed by enthusiasts and why the avoiders are holding back. It should be of interest to any IT or business manager who knows there are plenty of benefits for their organisation to gain from...

View More
flow-image
Proofpoint

The Human Factor 2021 Report

As the global pandemic upended work and home routines in 2020, cyber attackers pounced. Dive deep into how this extraordinary time has changed the threat landscape—and what it means for the year ahead. Our premiere threat report draws from one of cybersecurity's largest and most diverse data sets to explore user...

Published: Dec 21, 2021
View More
  •  
  •  
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • ...
  •  
  •  
Site Map
  • Home
  • Categories
  • Vendors A-Z
  • Latest Whitepapers
  • Contact Us
  • Privacy
technology topics
  • Cloud Computing
  • Data Center
  • Desktop/Laptop OS
  • Email
  • Hardware
  • IT Management
  • IT Security
  • Mobile Computing
  • Network
  • Software
  • Storage
  • Telecommunications
Contact Us

info@headleymedia.com

Call +44 (0) 1932 564999

Contact Us

© Copyright 2022: Headley Media Technology Division Ltd. Company Number: 112774219

We use cookies to improve user experience on our website. If you continue, we'll assume you are happy for your web browser to receive all cookies from our website. See our cookies policy for more information on cookies and how to manage them
close icon