Your Search returned 0 results from our Editorial content

Sort By
  • Close-button

    Remote Access Technologies

   

Your Search returned 53 results from our White Paper Library

Sort By
  • Close-button

    Remote Access Technologies

VMware

Desktop Virtualization

Reference Architecture Brief: Dell Remote Virtual Desktop...

In today's challenging economy, many organizations are evaluating virtualization technology to deliver desktops as a managed service. Learn how Dell and...


Citrix

Desktop Virtualization

A Look at “Bring Your Own” (BYO) Devices in the Enterprise...

As new, alternative devices become more popular and Generation-Y enters the workforce, employees seek empowerment to use their personal computing devices...


Citrix

Remote Access Technologies

Solution Brief: Complete Technical Solution for Enabling...

Turn the iPad and other devices into a powerful business tool with an employee-owned device program.


Citrix

Remote Access Technologies

Checklist for an Employee-Owned Notebook or PC Program

Provide employees complete control over their personal computing technology and free IT from managing non-strategic assets to focus on high-value, high...


Citrix

Remote Access Technologies

Solution Brief: BYO – Rethinking Your Device Strategy

Provide your employees and contractors the freedom and flexibility to use their own computer for work—while eliminating security, control and support issues....


LogMeIn

Help Desk Management

How Sony Delivers a Premium Support Experience

Sony VAIO customers expect a premium product and a premium support experience.


LogMeIn

Remote Access Technologies

For Ceridian, it Pays to Provide High-Quality Support

This brief case study illustrates how Ceridian has improved customer training and first call resolution rates, which has resulted in a decrease in call...


LogMeIn

Remote Access Technologies

Sling Media – A Better Customer Experience with Integrated...

This brief case study illustrates how Sling Media’s transition to a remote support solution with web-based chat realized a substantial cut in session times...


LogMeIn

Help Desk Management

ProActive Chat – Five Commonly Asked Questions

This short whitepaper taps into extensive research findings and professional services experiences in order to answer the five most frequently asked questions...


Previous 1 3 4 5 6

Recommended for You

silhouette

Which Enterprise Password Managers work the best?

IDG Connect tackles the tech stories that matter to you

kathryn-cave

The IoT “time bomb” report: 49 security experts share their views

Kathryn Cave looks at the big trends in global tech

phil-muncaster

China’s Cybersecurity Law: Game over for foreign firms?

Phil Muncaster reports on China and beyond

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.

images

Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.

images

Poll

Should companies have Bitcoins on hand in preparation for a Ransomware attack?