users

Results 1401 - 1425 of 1773Sort Results By: Published Date | Title | Company Name
Published By: Urban Airship     Published Date: Mar 15, 2013
Push messaging is becoming must-have technology because nothing else enables such a close and personal connection with mobile users. Read more
Tags : 
push messaging, mobile, mobile marketing, engagement, smartphones, mobile devices
    
Urban Airship
Published By: Urban Airship     Published Date: Mar 15, 2013
An analysis of the impact that push notifications have on mobile application users, conducted by Urban Airship. Based on real-time data collected from the top push notification senders, the Index explores the impact of push messaging around the globe
Tags : 
marketing, push marketing, publishers, consumers, marketing campaigns
    
Urban Airship
Published By: NETIQ     Published Date: Mar 12, 2013
A poll of CIOs and IT managers reports why departments must defend against complex internal and external threats while mitigating regulatory and compliance concerns. The results provide data about how enterprises view compliance.
Tags : 
security compliance, users access management, it management compliance
    
NETIQ
Published By: NETIQ     Published Date: Mar 12, 2013
As your business users consume software-as-a-service applications, they are introducing new risks to your organization.
Tags : 
cloud computing, access control, saas, software-as-a-service, security, compliance, user access management, security risks
    
NETIQ
Published By: BlackBerry     Published Date: Mar 12, 2013
BlackBerry® 10 is an entirely new mobile computing platform that removes many of the barriers that slow down other devices. Here are just a few of the reasons end users love BlackBerry 10.
Tags : 
reasons to love blackberry 10, reasons end users, efficiently and effortless, blackberry 10, mobile devices
    
BlackBerry
Published By: Scalebase     Published Date: Mar 08, 2013
Learn how to scale MySQL databases with ScaleBase. Cost-effectively scale to an infinite number of users, with NO disruption to your existing infrastructure.
Tags : 
mysql, databases with scalebase, no existing infrastructure issues, use mysql with scalebase, cost effectively scale, shard, cluster, high availability, failover, mariadb, read/write, scalability, capacity planning
    
Scalebase
Published By: Scalebase     Published Date: Mar 08, 2013
Learn how Mozilla is able to cost-effectively scale out their new Firefox mobile operating system App Store (running MySQL) to an infinite number of users, while increasing performance.
Tags : 
mozilla, scalebase, performance, app store, increasing performance, infinite number of users, increasing performance, shard, cluster, high availability, failover, mariadb, mysql, read/write, scalability, capacity planning
    
Scalebase
Published By: GrapeCity, Inc.     Published Date: Feb 25, 2013
Getting ad hoc reporting tools into users’ hands can be a logistical challenge. This white paper offers five tips for easing that process and discusses how to effectively deploy ad hoc reporting for business users.
Tags : 
ad hoc reporting, ad hoc report designer, self-service bi, business intelligence, reporting, activereports, web-based reporting, mobile bi, end user reporting, dashboards, data visualization, charts, reports, analytics, multi-tenant, self-service reporting, crystal
    
GrapeCity, Inc.
Published By: Scalebase     Published Date: Feb 19, 2013
This white paper examines how to scale MySQL databases to handle more users, more connections and more data without re-writing apps or re-architecting the database.
Tags : 
mysql, databases, users, data distribution, improve, performance
    
Scalebase
Published By: McAfee     Published Date: Feb 06, 2013
Windows 8 includes many new security features, such as secure password storage, secure boot functions, anti-malware defenses, and even enhanced reputation capabilities. Will these features be enough to mitigate risks to users and corporate networks?
Tags : 
windows 8 security, endpoint security, windows platform security, windows 2008, windows 2003, windows 7, windows vista, windows 2000, windows xp, windows defender, boot time protection, 2012 windows server security, endpoint protection 2012, smartscreen technology, adobe flash security
    
McAfee
Published By: McAfee     Published Date: Feb 06, 2013
Users who take work with them everywhere unknowingly jeopardize networks and systems.
Tags : 
windows 8 security, endpoint security, windows platform security, windows 2008, windows 2003, windows 7, windows vista, windows 2000, windows xp
    
McAfee
Published By: McAfee     Published Date: Feb 06, 2013
The move towards multi-faceted protection has been gathering pace, with more technologies coming into play to protect users from the vast and increasing number of threats.
Tags : 
anti malware performance test, security performance test, application control benchmark, anti virus benchmark, hips benchmark, windows 7 anti malware benchmark, anti malware protection comparison, west coast labs
    
McAfee
Published By: Okta     Published Date: Jan 30, 2013
Read this whitepaper to learn about moving beyond user names and passwords, and how Okta's MFA solution for on premises and cloud apps provides both the highest security and simplest administration possible.
Tags : 
okta, multifactor, authentication, user names, passwords, beyond users, okta multifactor authentication
    
Okta
Published By: CollabNet     Published Date: Jan 13, 2013
These resources discuss the need to include long term product vision, coherent user experience and User Centered design and architecture along with specific best practices for achieving a coherent product that delights users.
Tags : 
scrum, software development, strategy, agile, project management
    
CollabNet
Published By: Symantec     Published Date: Jan 10, 2013
The recent release of the Firesheep Wi-Fi attack tool has increased awareness among both users and attackers of the inherent insecurity of unprotected HTTP connections. This white paper is about protecting users from Firesheep and other attacks.
Tags : 
firesheep, sidejacking attacks, ssl, unprotected networks, symantec, http connections
    
Symantec
Published By: OpenDNS     Published Date: Jan 07, 2013
This whitepaper examines how the dramatic shift toward mobility has impacted IT's ability to effectively secure users, wherever they choose to work. Inside, you'll find advice for securing your users that's both practical and easy to implement.
Tags : 
security, network security, cloud, mobile, nomadic users
    
OpenDNS
Published By: ProfitBricks     Published Date: Jan 01, 2013
Performance testing and benchmarking of cloud computing platforms is a complex task, compounded by the differences between providers and the use cases of cloud computing users. IaaS services are utilized by a large variety of industries and, performance metrics cannot be understood by simply representing cloud performance with a single value. When selecting a cloud computing provider, IT professionals consider many factors: compatibility, performance, cost, security and more. Performance is a key factor that drives many others including cost. In many cases, 3 primary bottlenecks affect server performance: central processing unit (CPU) performance, disk performance, and internal network performance.
Tags : 
cloud computing, iaas, profitbricks, amazon ec2, rackspace cloud, central processing unit, disk performance, internal network performance
    
ProfitBricks
Published By: Absolute Software     Published Date: Dec 20, 2012
In the last four years, the number of Mac computers at Under Armour has quadrupled.
Tags : 
apple, asset management, end users
    
Absolute Software
Published By: Absolute Software     Published Date: Dec 20, 2012
David Johnson, Senior Analyst at Forrester has a look forward to the reality of supporting Apple devices in a post-BYOD world.
Tags : 
byod, network security, mobile, security, policy, apple, end user, device
    
Absolute Software
Published By: VMware     Published Date: Dec 18, 2012
Taneja Group presents an evaluation of the virtualization and cloud solution market for small and medium business (SMB) users.
Tags : 
virtualization, process management, cloud, operations management, viom, infrastructure operations management
    
VMware
Published By: Sophos     Published Date: Dec 17, 2012
IT departments should be perceived as the lubricant in the machine that powers an organization. BYOD is a great opportunity to make life easier for your users. But convenience is always a trade-off with security.
Tags : 
byod, network security, mobile, security, buyer's guide, mdm, mobile device management
    
Sophos
Published By: Box     Published Date: Nov 28, 2012
End users need the right tools for document collaboration, and in the era of consumerization, they'll find them... with or without you!
Tags : 
cloud, cloud file sharing, cloud file sharing vendors, cloud vendors, dropbox, box, google drive, files sharing
    
Box
Published By: Dell SonicWALL     Published Date: Nov 28, 2012
According to Time, as much as 40% of social network users are exposed to some form of malware.
Tags : 
firewall, security, social media, threats, web2.0, consumerization, byod
    
Dell SonicWALL
Published By: Rapid7     Published Date: Nov 27, 2012
The "Bring Your Own Device" (BYOD) trend started in late 2009 and caught on with users faster than IT expected, especially as iOS and Android devices became dominant. This webinar will delve into the underlying risks associated with BYOD, and provide a simple step-by-step approach to mitigate their risks.
Tags : 
rapid7, technology, security, it management, business technology
    
Rapid7
Published By: FireEye     Published Date: Nov 27, 2012
Aided by their targets' porous defenses and unwitting end users, today's cybercriminals are able to deliver advanced malware that exploits systems and enables a range of malicious activities.
Tags : 
fireeye, spear phishing attacks, cybercriminals, malware, malicious activities
    
FireEye
Start   Previous    50 51 52 53 54 55 56 57 58 59 60 61 62 63 64    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.