users

Results 1526 - 1550 of 1775Sort Results By: Published Date | Title | Company Name
Published By: Oracle     Published Date: Dec 13, 2011
Find out how Oracle On Demand provides all of the business features that users need plus the instant gratification they demand
Tags : 
on demand, oracle on demand, instant gratification, crm, customer relationship management, deployment, saas, software-as-service
    
Oracle
Published By: ZScaler     Published Date: Dec 13, 2011
Leveraging a combined view of billions of daily web transactions-spanning millions of enterprise users across over 140 countries - Zscaler ThreatLabZ delivers the State of the Web Q3 2011 Report.
Tags : 
blue coat, proxy sg, url filtering, web 2.0, cloud security, proxy av, xss, vpn
    
ZScaler
Published By: SAP     Published Date: Nov 22, 2011
Become acquainted with the script logic functionality available in SAP BusinessObjects Planning and Consolidation 7.x, version for SAP NetWeaver. Review use cases for script logic, its architecture, various ways to execute it, and a few basic key words. Designed for individuals who will be end users of SAP BusinessObjects Planning and Consolidation or who require a product overview. The goal is to work with the SAP BusinessObjects Planning and Consolidation Excel, Word, PowerPoint and Web interfaces.
Tags : 
sap, businessobject, planning, business, technology, excel, word, powerpoint
    
SAP
Published By: ZScaler     Published Date: Nov 21, 2011
Leveraging a combined view of billions of daily web transactions-spanning millions of enterprise users across over 140 countries - Zscaler ThreatLabZ delivers the State of the Web Q3 2011 Report.
Tags : 
blue coat, proxy sg, url filtering, web 2.0, cloud security, proxy av, xss, vpn
    
ZScaler
Published By: Liaison Technologies     Published Date: Nov 21, 2011
In this whitepaper, we describe how executive and IT management can get and maintain control of their company's data architecture to help meet business objectives. We describe the relationship between data integration projects and data architecture concepts and practices. We describe how the business planning and IT development processes that direct and leverage data integration projects depend on tooling. We describe breakthrough ways in which data architects, business analysts, programmers, and business users can collaborate to address their organization's pressing business challenges.
Tags : 
enterprise, soa, technology, liaison, business, data integration, data architecture, it management
    
Liaison Technologies
Published By: Cotendo     Published Date: Nov 18, 2011
Learn about the technology limitations killing the performance of mobile websites and mobile applications, plus how innovations in mobile content delivery networks (CDNs) can transform users' experience of the mobile Web.
Tags : 
mobile cloud, mobile web performance, mobile website performance, mobile application performance, mobile content delivery, mobile acceleration, mobile cdn, cotendo mobile
    
Cotendo
Published By: LogRhythm     Published Date: Nov 16, 2011
This paper explores some of the types of insider threats organizations face today and discusses monitoring and managing privileged user actions.
Tags : 
security, compliance, threats, insider threats, monitor, monitoring, attack, security
    
LogRhythm
Published By: ScriptLogic     Published Date: Nov 14, 2011
In this whitepaper, you'll get an idea of a very different migration strategy -- moving your users and their desktops to Windows 7.
Tags : 
windows 7, migration, operating system
    
ScriptLogic
Published By: ScriptLogic     Published Date: Nov 14, 2011
Security Explorer provides IT administrators with one platform to completely manage access controls and security across a Windows network environment.
Tags : 
scriptlogic, desktop authority, computer-based management, desktop management tool, validation logic, software deployment, reporting, remote support
    
ScriptLogic
Published By: Brainloop     Published Date: Nov 09, 2011
Business users are a key part of a company\'s security, and even the most conscientious employees can introduce serious breaches of security policy. IT can do everything in its power to secure the company\'s confidential documents--provide first-class security infrastructure, develop reasonable security policies and engage in extensive communication and training--yet still people fail to comply. The solution is to provide security that helps people do their jobs more efficiently, thereby inducing users to follow best security practices without even knowing it.
Tags : 
brainloop, technology, security, user compliance, indentity management
    
Brainloop
Published By: AT&T     Published Date: Nov 07, 2011
Is your network prepared to ""speak"" IPv6? To say connected, your network must be able to communicate with either IPv4 or IPv6 hosts/users. Prepare your network for the transition!
Tags : 
ipv6, ipv4, network, customers, operations, infrastructure, challenges, preparation
    
AT&T
Published By: AT&T     Published Date: Nov 07, 2011
Is your network prepared to ""speak"" IPv6? To say connected, your network must be able to communicate with either IPv4 or IPv6 hosts/users. Prepare your network for the transition!
Tags : 
ipv6, ipv4, network, customers, operations, infrastructure, challenges, preparation
    
AT&T
Published By: YouSendIt     Published Date: Oct 26, 2011
Mail server management is a balancing act between server performance and user satisfaction. In this white paper from Osterman Research, find out how to improve mail server performance and boost user productivity by integrating a secure, cloud-based file sharing solution into your Microsoft Exchange migration. In addition, learn why integration plays a key role, and how choosing a solution that works seamlessly with Outlook can support how users want to communicate, while reducing the burden on IT. The Osterman white paper is offered courtesy of YouSendIt, the first business content collaboration service to offer an integrated approach for sending, sharing and signing documents online. Download the white paper.
Tags : 
yousendit, technology, email, exchange, windows. osterman research
    
YouSendIt
Published By: Blue Coat Systems     Published Date: Oct 25, 2011
Blue Coat WebFilter is best-in-class for web threat protection, but content filtering databases have another key role to play: control of Internet use
Tags : 
blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Oct 25, 2011
The WebPulse delivers fast and effective Web 2.0 threat protection for 75 million users worldwide. Find out more about how WebPulse can protect you!
Tags : 
webpulse, defense, malware, security, protection, blue coat, insider threats, security
    
Blue Coat Systems
Published By: Alere Wellbeing     Published Date: Oct 18, 2011
Learn about new technologies for tobacco cessation and how they can effect real, measurable behavior change in the tobacco users at your organization - and save you from excess healthcare costs.
Tags : 
tobacco cessation benefit, text to quit, quit smoking app, wellness program, specialized program, quitting tobacco, nicotine addiction, specialized treatment
    
Alere Wellbeing
Published By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 13, 2011
Download Protecting Users From Firesheep and other Sidejacking Attacks with SSL to learn how to avoid HTTP attacks.
Tags : 
verisign, firesheep, sidejacking, attacks, security, http, ssl, wifi
    
VeriSign Authentication Services, now a part of Symantec Corp.
Published By: NetShelter - CyrusOne     Published Date: Oct 12, 2011
This whitepaper outlines issues that arise when planning for growth of IT infrastructure and explains how the colocation of data centers can provide scalability, enabling users to modify capacity quickly to meet fluctuating demand.
Tags : 
cyrus one, data center, texas, infrastructure, capacity, planning, colocation, scablability
    
NetShelter - CyrusOne
Published By: Secunia     Published Date: Oct 12, 2011
This paper discusses the limitations of security and highlights how cybercriminals can achieve their goals without administrative access.
Tags : 
vulnerability assessment, internet security, windows patching, exploit definition, endpoint security, microsoft patch management, patch management policy, vulnerability intelligence
    
Secunia
Published By: GoToMeeting     Published Date: Oct 11, 2011
Video conferencing use is growing. In fact, users recently surveyed by 1080 Group expect it to grow by 211% in the next year. Better make sure you're putting your best virtual face forward. Video conferencing no longer has to mean 'go to a room with expensive, hard-to-use equipment installed.' This new 1080 Group white paper explores best practices for video conferencing and provides a handy checklist for preparing and conducting a successful video conferencing session.
Tags : 
citrix, video conference, webinar, marketing, 1080 group, internet
    
GoToMeeting
Published By: IBM Software     Published Date: Oct 04, 2011
With a network of more than 200 stores across Canada, Giant Tiger wanted to find a better way to align local financial and operational planning with central corporate objectives. Learn how they automated budgeting and forecasting processes and enabled store-based users to enter actual data directly into the system via a simple web interface to reduce the budgeting cycle by up to 85 percent, save approximately 220 hours per month for store-based staff, and receive a full return on investment within 24 months.
Tags : 
customer, perfomance management, technology, ibm, planning objectives, budget, forecasting, investment
    
IBM Software
Published By: VMware     Published Date: Oct 04, 2011
This eBook looks at the challenges involved in delivering and managing desktops, today and in the future. Its goal is to demonstrate how VMware desktop virtualization can deliver a solution to address the requirements of IT and end-users without compromise.
Tags : 
desktop management, technology, vmware, end-user, virtualization, data management
    
VMware
Published By: Interactive Intelligence     Published Date: Oct 03, 2011
Richard Snow at Ventana Research and Jason Alley of Interactive Intelligence provide insight into the issue of control for those considering moving their contact center to the cloud.
Tags : 
interactive intelligence, cloud computing, control, technology, contact center, data management
    
Interactive Intelligence
Published By: IBM Corp     Published Date: Sep 23, 2011
ESG Lab Validation Report - Reducing Storage Capacity and Costs without Compromise. Even with the plethora of storage efficiency technologies-such as deduplication and thin provisioning-available in the market today, users have not been able to stem the growth. This ESG Lab report looks at how IBM Real-time Compression can be used to reduce the cost of storing primary file data without impacting performance. The results of hands-on testing of IBM Real-time Compression Appliances performed by ESG at an IBM facility is used to demonstrate the value of non-disruptive deployment, loss-less capacity savings, real-time performance, and non-stop high availability.
Tags : 
ibm, esg, lab validation, storage capacity, real-time compression, technology
    
IBM Corp
Published By: Trend Micro Inc.     Published Date: Sep 21, 2011
Fake Antivirus (AV) or rogue antivirus software has been prevalent in the market today and has affected millions of computers. This document aims to educate users on how Fake AV arrives on a computer's system and what are the available Trend Micro solutions to combat this threat.
Tags : 
tend micro, fake antivirus, technology, software
    
Trend Micro Inc.
Start   Previous    55 56 57 58 59 60 61 62 63 64 65 66 67 68 69    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.