users

Results 1726 - 1750 of 1775Sort Results By: Published Date | Title | Company Name
Published By: Microsoft Dynamics     Published Date: Jul 03, 2008
Microsoft, together with Unisys Corporation, completed benchmark testing of Microsoft Dynamics CRM 4.0 running on the Microsoft Windows Server 2008 operating system with Microsoft SQL Server 2008 database software. Benchmark results demonstrate that Microsoft Dynamics CRM can scale to meet the needs of an enterprise-level, mission-critical workload of 24,000 concurrent users while maintaining performance at sub-second response times.
Tags : 
microsoft crm, microsoft, microsoft dynamics
    
Microsoft Dynamics
Published By: VMware Dell     Published Date: Jul 02, 2008
Bell Canada began an initiative to provide desktop solutions at reduced costs. With 8,000 call center agents, Bell Canada faced hardware attrition and rising costs. Streamlining systems, facilitating outsourcing and increasing capabilities to telecommute would reduce costs while improving service. This would require creating customized workstations for users. Bell Canada approached VMware Partner CGI Group Inc., which provides end-to-end IT and business process services, for a solution.
Tags : 
vmware, call center, virtualization, virtual machine, virtual workstation, telecom, bell canada
    
VMware Dell
Published By: Exact Software     Published Date: Jun 22, 2008
Businesses, more than ever before, are relying on fact based decision-making and analytics to compete in this environment. This has given rise to "Business Intelligence," or simply BI, a broad category of applications and technologies for accessing, combining, computing and analyzing data to help enterprise users make better business decisions.
Tags : 
business intelligence, business analytics, analytical applications, make more money, exact america, exact software, exact, competitive
    
Exact Software
Published By: IBM     Published Date: May 30, 2008
Collaboration. It is the critical element to success and IBM Lotus software is at the forefront. With collaborative innovations that enable users to work the way they want to, Lotus software offers a compelling portfolio that is based on open, integrated and secure solutions.
Tags : 
collaboration, web 2.0, ibm, ibm ep, ep campaign
    
IBM
Published By: IBM     Published Date: May 30, 2008
In the age of Web 2.0, Internet users are rewriting the rules of social interaction, using blogs, forums, and social bookmarking for sharing information and sustaining relationships across borders. This IBM white paper looks at how organizations can achieve tangible business benefits through embracing these technologies.
Tags : 
ibm, collaboration, ibm ep, ep campaign, ibm
    
IBM
Published By: IBM     Published Date: May 30, 2008
Unified communications and collaboration strategies can help organizations deliver a user experience that brings together communications and collaboration silos across and beyond traditional business boundaries. This paper reviews how by providing users with a single, integrated experience across both business applications and communications and collaboration tools, organizations can cultivate more dynamic and flexible business systems.
Tags : 
unified communication, unified communications, collaboration, lotus, lotus notes, ibm ep, ep campaign, ibm
    
IBM
Published By: iProspect     Published Date: May 20, 2008
Learn how search engine users behave when they conduct different types of searches and are presented with different types of search results within the three largest search engines (in terms of market share): Google, Yahoo!, and MSN.
Tags : 
iprospect, blended search results, search marketing, search engine optimization, seo, search marketing agencies
    
iProspect
Published By: IBM     Published Date: Apr 23, 2008
Imagine using your personal desktop on any computer. You can, with the IBM Virtual Client Solution. This demo explains the backend process of server-hosted services, shows how a user’s desktop is delivered through a remote connection, and demonstrates how an administrator can shift servers for IT simplification without interrupting users.  Watch the demo now.
Tags : 
ibm, ibm opt it, opt it, remote desktop, vnc, virtual client, virtual machine, virtual desktop, remote access
    
IBM
Published By: Netwrix     Published Date: Apr 22, 2008
At the end of an academic year, many thousands of students may permanently leave a school or university system. Once these users graduate, discontinue their education, or perhaps simply move away, IT administrators are left with a huge number of accounts that must be marked as inactive and then dealt with according to system policies.
Tags : 
netwrix, graduate, graduation, education, college, university, school, inactive accounts, inactive account, password management, identity management, access control
    
Netwrix
Published By: Quocirca     Published Date: Apr 09, 2008
Today, many organizations are increasingly reliant on software application development to deliver them competitive edge. Simultaneously, they are progressively opening up their computer networks to business partners, customers and suppliers and making use of next-generation programming languages and computing techniques to provide a richer experience for these users. However, hackers are refocusing their attention on the vulnerabilities and flaws contained in those applications.
Tags : 
quocirca, application security
    
Quocirca
Published By: Ektron     Published Date: Apr 08, 2008
As the Internet evolves, users become more and more savvy about what they want from the experience. Web sites are updated daily when they used to change monthly, and social networking sites such as Facebook and Myspace are checked more often than e-mail. Users know what they want and where to get it.
Tags : 
intranets, ektron, facebook, myspace, user experience, twitter, social networking, support, infrastructure
    
Ektron
Published By: Integration New Media     Published Date: Apr 01, 2008
Librarians looking to build electronic libraries face numerous challenges. This new white paper by Integration New Media provides a summary of best practices for building an eLibrary. From defining your audience and content requirements, through to choosing a technology solution that makes sense for your use cases, this paper will provide a strong checklist of items to consider. The paper also looks at the three types of users and the key elements of designing the user experience for your eLibrary.
Tags : 
inm, integration new media, online library, elibrary
    
Integration New Media
Published By: IBM     Published Date: Mar 28, 2008
For many organizations, applications have been moved to an SOA environment and now must be extended to offer a service interface to new sets of users that were not originally planned.  Extending resources in this way requires that you reassess your security risk. To minimize any risk, you need the right level of security checks for user authentication and authorization.
Tags : 
    
IBM
Published By: Identity Engines     Published Date: Mar 24, 2008
Guests, contractors, vendors, business partners, and other temporary users require and expect certain level of network access within organizations that they visit. Corporate network access has been typically open; internal LAN connections have seldom required authentication. Today however, regulatory and other security concerns demand that organizations adopt a more secure posture towards these short-term users.
Tags : 
idengines, id engines, identity engines, access control, authentication
    
Identity Engines
Published By: Tideway Systems     Published Date: Mar 21, 2008
Cost transparency in relation to IT consumption isn't just about showing which applications, physical resources or even individual users increase company's costs (although that can be valuable information). The real goal is to drive efficiencies throughout the whole business. This white paper offers some practical guidance on where to start.
Tags : 
it cost, cost management, budget, budgeting, spending, tideway
    
Tideway Systems
Published By: Clarus Systems     Published Date: Mar 18, 2008
Accessible through a web-based, interactive dashboard, the latest version of the ClarusIPC Plus+ solution integrates performance management capabilities that create real-world "What-if" scenarios to predict capacity issues before they have a chance to impact end users. By monitoring KPI's such as server health, gateway capacity, media resources and device registration, you consistently maintain the ability to estimate future bandwidth needs.
Tags : 
itil, clarus systems, ipt, ip telephony, unified communications, cisco, callmanager, best practices, voice engineering, pdioo, strategies, deployment, operations, day 1, day 2, clarusipc, automated testing, business intelligence, performance management, configuration management
    
Clarus Systems
Published By: CopiaTECH     Published Date: Mar 18, 2008
Wireless networking is no more a new name to computer users these days than iPod is to music lovers. This technology is one of the most popular, inexpensive and simple modes of connecting computers to the internet or a network. Both home users, work users and laptop/mobile users, who want to stay connected, even while on the move, are adopting this technology. Download this paper to read about all the threats that come with wireless connections and ways to guard against them.
Tags : 
copiatech, wireless, wireless security
    
CopiaTECH
Published By: IBM     Published Date: Feb 25, 2008
It has become clear that storage virtualization has become a core element of the storage strategy of forward-thinking end users and that the technology is finally delivering the value that it had promised earlier this decade. In this paper by Taneja Group, you'll learn about IBM SAN Volume Controller, its architecture and features, and about 5 tangible benefits of storage virtualization.
Tags : 
storage virtualization, storage, san, ibm, san volume controller, svc, ibm svc
    
IBM
Published By: Elastic Collision     Published Date: Feb 14, 2008
Media coverage of Second Life typically favors the opinions of industry analysts and naysayers. All too often, the concerns of regular users are overlooked. In October 2007, as part of a larger survey, we asked more than 800 Second Life residents what advice they would give to real-world organizations establishing a presence in Second Life.
Tags : 
elastic collision, virtual, virtual world, virtual reality, sims, avatar, avatars, social networking
    
Elastic Collision
Published By: Motorola     Published Date: Feb 06, 2008
By empowering mobile users with interactive access to mission-critical systems, Good Mobile Intranet increases the ROI of your existing IT investments. Read this white paper to learn more about how to deliver mobile solutions that provide an intuitive user experience.
Tags : 
intranet, intranets, motorola, motorola good, mobile, wireless, mobile applications
    
Motorola
Published By: Motorola     Published Date: Feb 06, 2008
This paper details the importance of striking a balance between the lock-down management of your mobile solutions and allowing end users the freedom to use mobile devices in the way that works best for them.
Tags : 
motorola, motorola good, smart phone, smart phones, user experience
    
Motorola
Published By: Absolute Software     Published Date: Jan 29, 2008
Does your PC lifecycle management (PCLM) reflect the issues associated with mobile users? Many organizations face expensive inefficiencies by not managing mobile assets effectively. These inefficiencies include dispersed and manual data collection, and inventory tools that are dependent on a connection to the company network.
Tags : 
absolute, intel, laptop, saas, managing laptops, pclm, computrace, absolute software, it asset management, remote data delete, geolocation tracking, theft recovery, service guarantee, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm
    
Absolute Software
Published By: Secure Computing     Published Date: Jan 25, 2008
This paper discusses the value of two-factor authentication systems that provide vital access security for today's mobile workforces, who can now be productive from numerous remote locations: the home office, the airport, hotels, and customer sites. Moreover, the ubiquitous nature of mobile phones has now given rise to a new, convenient form factor for the software-based authenticator that resides right on the mobile phone/device.
Tags : 
cell phone, cell phones, wireless security, mobile security, mobile workers, authentication, 2-factor authentication, iam, identity management, access control, securecomputing, secure computing
    
Secure Computing
Published By: Secure Computing     Published Date: Jan 25, 2008
Enterprises are increasingly opening up their networks to a greater constituency of remote users, but they often do not take into consideration the protection of user identity as a critical component of their strategy. The mobile workforce can now work productively from a remote location such as a home office, the airport, a hotel, or a customer site.
Tags : 
cell phone, cell phones, wireless security, mobile security, mobile workers, authentication, 2-factor authentication, iam, identity management, access control, securecomputing, secure computing, remote access
    
Secure Computing
Published By: Secure Computing     Published Date: Jan 25, 2008
In an environment where business and government databases store ever-increasing amounts of sensitive and confidential data; and where a growing number of employees need to access that data remotely, password security alone is insufficient to ensure user authentication. Two-factor authentication requires two measures for users to verify their identities and access data.
Tags : 
cell phone, cell phones, wireless security, mobile security, mobile workers, authentication, 2-factor authentication, iam, identity management, access control, securecomputing, secure computing, password, password management, passcode, best practices, remote access
    
Secure Computing
Start   Previous    57 58 59 60 61 62 63 64 65 66 67 68 69 70 71    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.