users

Results 1601 - 1625 of 1802Sort Results By: Published Date | Title | Company Name
Published By: Riverbed     Published Date: Mar 31, 2011
Just what is cloud computing anyway? Skeptics might say it is nothing but industry hyperbole, visionaries might say it is the future of IT. In reality, both statements are true-cloud computing has been embellished by the tech industry, but it does hold real potential for new types of on--demand dynamic IT services. This paper seeks to clarify the definition of cloud computing, identify how far along users are in terms of cloud deployment, and examine the role of the network in the cloud computing model.
Tags : 
riverbed, cloud computing, networking
    
Riverbed
Published By: Adobe Systems     Published Date: Mar 04, 2011
Join Adobe experts to learn how to enable your PDF documents so that multiple people, in real time, can add notes and comments, promoting a true "conversation" about your critical documents. See how to use familiar commenting tools and even enable users of the free Adobe Reader to take part in your review.
Tags : 
adobe, pdf, portfolio, acrobat, pro, rich media, acrobat x
    
Adobe Systems
Published By: GFI Software     Published Date: Feb 24, 2011
Read the results of a survey focused on enterprise antivirus users and discover why customers love VIPRE Antivirus Business.
Tags : 
gfi software, sunbelt, vipre business, antivirus solution, security, enterprise antivirus survey
    
GFI Software
Published By: IBM Software     Published Date: Feb 16, 2011
IBM Cognos Business Insight changes information delivery for all business users. Watch this recorded event which originally aired on February 15, 2011 to see how this unlimited BI workspace enables business users to create, personalize and interact with all of their information assets. Through demos and discussion, you'll learn how this revolutionary interface lets users: . Satisfy all their information needs in a single, highly intuitive workspace . Blur the lines between business authoring and analysis . Easily create net-new analysis . Enhance existing reports with information from a personal data source Discover how IBM Cognos Business Insight enables self-service BI for business users, while giving IT complete confidence that data will remain secure.
Tags : 
ibm, cognos, business intelligence, query, analysis
    
IBM Software
Published By: VeriSign     Published Date: Feb 10, 2011
This paper will show how code signing works, how attacks can be mounted against unsigned software, (including autoupdate software), and how real-world signing systems protect software vendors, enterprises and end users.
Tags : 
verisign, ssl spoofing attack, code protection, security, code signing certificates, malicious software
    
VeriSign
Published By: IBM Software     Published Date: Feb 07, 2011
Learn the benefits of a single reporting solution that can be used by all users, for all types of reports and with all data sources.
Tags : 
ibm cognos, midsize companies, self-service reporting, it infrastructure, collaborative
    
IBM Software
Published By: IBM Software     Published Date: Feb 07, 2011
Read about how Mayflex used IBM Cognos Express to replace a complex spreadsheet system, improve time-consuming budgeting and forecasting processes, compare actuals against budgets at various levels and save time for end-users through automatic system updates.
Tags : 
ibm cognos express, dashboard, business intellligence, automatic system update, business analytics
    
IBM Software
Published By: Symantec.cloud     Published Date: Jan 26, 2011
Growing businesses face real difficulties in protecting their users, especially remote workers, while keeping management costs down.Understand the challenges of delivering endpoint security in an increasingly mobile environment.
Tags : 
symantec cloud, endpoint security, remote worker, mobile environment, spyware, intrusion
    
Symantec.cloud
Published By: Red Hat     Published Date: Jan 21, 2011
Daniel Walsh - Principal Software Engineer, Red Hat In this session, Daniel Walsh will show attendees new SELinux features and explain how to use them in Red Hat Enterprise Linux 6. He will cover several SELinux topics, including: * Confining users * Securing your virtual environment * Securing the desktop * Controlling grid jobs * Sandboxing: putting the power into the hands of the administrator * Building and shipping your own SELinux policy
Tags : 
red hat virtual tradeshow, live event, enterprise linux 6, security, desktop, selinux, virtual environment
    
Red Hat
Published By: Red Hat     Published Date: Jan 21, 2011
Red Hat Enterprise Virtualization for Desktops can help your business reduce desktop-associated costs, improve data security, and simplify overall desktop infrastructure management. In this session, Jeff Jameson will explain the technology features and benefits of delivering centrally hosted Linux and Windows desktops to the client of your choosing, while providing a true PC-like experience to your end users. With incredibly rich, integrated features like bi-directional audio and video, and kernel-level security enforcement, Red Hat Enterprise Virtualization for Desktops provides a complete solution for your virtual desktop deployments.
Tags : 
red hat virtual tradeshow, live event, enterprise virtualization, desktop infrastructure management, linux, windows desktop, security
    
Red Hat
Published By: ESET, LLC.     Published Date: Jan 18, 2011
Download this Tech Brief to learn the five common complaints IT professionals have with antivirus software and how you can find software that does the job right.
Tags : 
eset, antivirus software, malware, it professional, security, crm solutions/software, customer experience/engagement, business intelligence
    
ESET, LLC.
Published By: BP Logix     Published Date: Jan 17, 2011
This white paper covers how time is the critical element of the planning, oversight, and improvement of business processes. Learn how business users can gain ultimate control making processes more effective.
Tags : 
bpm, business process management, process management, worklfow
    
BP Logix
Published By: NetIQ     Published Date: Jan 12, 2011
Addressing the potential for insider threats is an often overlooked security imperative for virtually all organizations worldwide.
Tags : 
netiq, insider threat, security, audits, access control, enterprise software
    
NetIQ
Published By: BlackBerry     Published Date: Jan 06, 2011
With consumer use of smartphones growing by the day, it's no surprise that users are taking them into the workplace as well. Thousands of people already use their personal smartphones for work-related tasks like checking email and calendars when they're away from their desks. And many wish they could do more with their smartphones, given their myriad functions and applications.
Tags : 
blackberry, enterprise server, desktop manager, communications software, rim, microsoft exchange, mobile device management, mobile device management software
    
BlackBerry
Published By: Gomez Marketing     Published Date: Jan 06, 2011
Do you know your mobile customers - really? Without genuine insight, you might be tempted, for example, to offer mobile users the regular website that works well with your Internet customers. But most smart and feature phones cannot support the complex, high-bandwidth Flash and Ajax applications at the heart of your site. Further, your feature and content rich website can pose numerous usability, navigation, or even screen real estate issues on hand-held devices.
Tags : 
gomez, web performance, mobile, mobility, site performance, ecommerce, online shopping, web performance
    
Gomez Marketing
Published By: Mobile Commerce     Published Date: Dec 21, 2010
This paper shows what and how users search on a mobile device to enable advertisers to optimise thier campaigns
Tags : 
search, mobile, seo, mobile internet, advertising, mobile advertising, mobile ads, display
    
Mobile Commerce
Published By: Madison Logic     Published Date: Dec 13, 2010
Please register for this case study to learn more about how you can monetize your LinkedIn group while also adding value for your users.
Tags : 
lead generation, linkedin, linked in, white papers, case studies, social media marketing
    
Madison Logic
Published By: e-DMZ Security LLC     Published Date: Nov 16, 2010
This whitepaper discusses how e-DMZ Security's Total Privileged Access Management enhances host controls to deliver PCI compliance.
Tags : 
e-dmz security, pci compliance, compliance, pci dss, access control, password management, privileged users
    
e-DMZ Security LLC
Published By: IBM Software     Published Date: Oct 26, 2010
Learn how Cognos Business Intelligence lets you access virtually any data source, regardless of platform, and provide detailed, understandable views of the data to all users, regardless of location.
Tags : 
data analytics, business intelligence
    
IBM Software
Published By: IBM Software     Published Date: Oct 26, 2010
Learn how important it is to address the different BI needs of your business constituents, so they have insight when and where they need it.
Tags : 
business insight
    
IBM Software
Published By: Mimecast     Published Date: Oct 25, 2010
Understanding how much your current email system costs, and how that all adds up, is the key to making changes, and to providing a better service for your users.
Tags : 
mimecast, email system, policy management, email security, archiving, migration, data loss prevention, dlp
    
Mimecast
Published By: Citrix     Published Date: Oct 14, 2010
This planning guide provides best practices for virtualizing Citrix XenApp. Even though these best practices are based on the Hosted Shared Desktop model, they are still relevant in a non-desktop model where users only connect to published applications without the desktop interface.
Tags : 
citrix, xenapp, desktop virtualization, hosted shared desktop, windows servers, data centers
    
Citrix
Published By: IBM Software     Published Date: Oct 05, 2010
This report focuses on IBM Cognos 8 BI users and compares the results they are seeing to other survey respondents.
Tags : 
ibm cognos, business analytics, business intelligence strategy, bi tools, operating
    
IBM Software
Published By: IBM Software     Published Date: Oct 05, 2010
Using enterprise reporting, an organization can progressively address immediate reporting needs, use BI capabilities to acquire greater insight, extend BI to more users and prepare a platform for the future that includes the implementation of performance management.
Tags : 
ibm cognos, business analytics, business intelligence, bi investment, enterprise reporting, performance management
    
IBM Software
Published By: Okta     Published Date: Oct 01, 2010
Controlling who is granted secure access to which applications and data becomes a real challenge when users can get access from any browser, at any time, from any place.
Tags : 
okta, cloud area network, scaling saas applications, security, identity management, iam, active directory, google apps
    
Okta
Start   Previous    61 62 63 64 65 66 67 68 69 70 71 72 73    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.