users

Results 1701 - 1725 of 1760Sort Results By: Published Date | Title | Company Name
Published By: Quocirca     Published Date: Sep 18, 2008
Businesses of all sizes have to manage an increasing diversity of remote users and devices. The task ranges from simply keeping systems running to ensuring security, compliance and the achievement of environmental goals. Under this sort of pressure, IT managers and managed service providers, to which the task is often outsourced, must have flexible access to powerful tools and an ability to share the data those tools rely on.
Tags : 
quocirca, remote, it management
    
Quocirca
Published By: MessageLabs     Published Date: Sep 17, 2008
Social and business networking sites are changing the way people talk online. Sites like Facebook, MySpace and Bebo help friends stay in touch while LinkedIn and Plaxo mainly connect business users. They are very popular but present new challenges to IT managers. They seem to have come out of nowhere. For example, Facebook currently has 70m users, 40% of which are located in the US.  The rapid growth of such sites is part of the problem. Companies risk being caught off guard.  Learn how to protect your business from threats posed by online social networking in this 7 Step Guide for IT Managers.
Tags : 
web security, internet security, social networking, facebook, myspace, my space, social, messagelabs, employee
    
MessageLabs
Published By: Microsoft Office     Published Date: Sep 17, 2008
This white paper presents the results of a commissioned study conducted by Forrester Consulting on behalf of Microsoft Corporation to help IT organizations considering adopting the 2007 Microsoft® Office system anticipate the impact of the new Microsoft Office Fluent™ user interface on their end users.
Tags : 
microsoft office, office, information work, end user, productivity, productivity tool, desktop
    
Microsoft Office
Published By: CA Mainframe     Published Date: Sep 12, 2008
Data Professionals are now being asked to perform higher-level tasks and interact with businesses as “data stewards”.  In this survey, you will learn the challenges as outlined by over 850 data professionals. Get this CA-sponsored survey of the International DB2 Users Group (IDUG) conducted by Unisphere Research. The closer link between corporate performance and database performance is increasing pressure on data professionals to provide higher-level services to enterprise business customers.
Tags : 
database administrator, dba, database, data management, ca mainframe, mainframe
    
CA Mainframe
Published By: BlackBerry     Published Date: Aug 26, 2008
It's important that corporate mobile policies cover everything from what types of devices will be available to users, how and when they can use them, what corporate resources they are able to access and what security measures will be instituted. Furthermore, Mobile managers must not ignore the impact of government regulations and compliance when laying out their corporate mobile policies.
Tags : 
blackberry, mobile policies, vpn, mobile devices, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: NewField IT     Published Date: Aug 19, 2008
As offices review their office printing costs, one significant area almost entirely overlooked is the cost of having A3 devices. The perception is that the A3 document is as necessary to our office printing needs as power-steering is to our cars. The reality, as evidenced by NewField IT's review of more than 70,000 devices supporting over 200,000 users, is that A3 output in the office is remarkably low – less than 2.5% of total page volumes on average.
Tags : 
    
NewField IT
Published By: KEMP Technologies     Published Date: Aug 04, 2008
Chances are, if you’re utilizing SSL, you’re not utilizing it to its full potential. SSL is a powerful technology that can help organizations protect their data as well as their users. While the technology behind SSL is solid, the most common best practices for its implementation do not take full advantage of the benefits that SSL brings. And this may be inadequate to provide proper security to the modern web application environment.
Tags : 
ssl, load balancer, load balancing, application delivery, ssl acceleration, application optimization, windows terminal services, terminal services, content switching, server load balancing, application security, network security, kemp, kemp technologies, web security, secure socket layer
    
KEMP Technologies
Published By: Entrust Datacard     Published Date: Jul 30, 2008
This white paper outlines issues with managing online identities across a diverse customer base when faced with increasing threats. It proposes a common sense approach that matches security to the assessed risk for users, actions and applications.
Tags : 
entrust identityguard, versatile authentication platform, entrust, authentication, password management, identity management, iam, internet security, online security
    
Entrust Datacard
Published By: Burton Group     Published Date: Jul 07, 2008
Data modeling has evolved from an arcane technique for database designers into an entire family of interrelated techniques that serves many constituencies, including techno-phobic business stakeholders and users. The new maturity of modeling tools and techniques arrives in the nick of time, because new technical and regulatory realities demand that enterprises maintain scrupulous awareness of their data and how it is used. Data modeling is no longer for databases only, no longer for technologists only, and no longer optional.
Tags : 
modeling, data modeling, data management, data mining, business intelligence, dba, database administration, burton group
    
Burton Group
Published By: Mailtrust     Published Date: Jul 07, 2008
Email is absolutely critical in making users productive: for example, a February 2008 survey conducted by Osterman Research found that 93% of email users consider email to be important or critical in helping them to get their work done. However, most decision makers are not aware of the true cost of providing email functionality to their users.
Tags : 
messaging, email, e-mail, email costs, cost of email, cost of e-mail, mailtrust
    
Mailtrust
Published By: Microsoft Dynamics     Published Date: Jul 03, 2008
Microsoft, together with Unisys Corporation, completed benchmark testing of Microsoft Dynamics CRM 4.0 running on the Microsoft Windows Server 2008 operating system with Microsoft SQL Server 2008 database software. Benchmark results demonstrate that Microsoft Dynamics CRM can scale to meet the needs of an enterprise-level, mission-critical workload of 24,000 concurrent users while maintaining performance at sub-second response times.
Tags : 
microsoft crm, microsoft, microsoft dynamics
    
Microsoft Dynamics
Published By: VMware Dell     Published Date: Jul 02, 2008
Bell Canada began an initiative to provide desktop solutions at reduced costs. With 8,000 call center agents, Bell Canada faced hardware attrition and rising costs. Streamlining systems, facilitating outsourcing and increasing capabilities to telecommute would reduce costs while improving service. This would require creating customized workstations for users. Bell Canada approached VMware Partner CGI Group Inc., which provides end-to-end IT and business process services, for a solution.
Tags : 
vmware, call center, virtualization, virtual machine, virtual workstation, telecom, bell canada
    
VMware Dell
Published By: Exact Software     Published Date: Jun 22, 2008
Businesses, more than ever before, are relying on fact based decision-making and analytics to compete in this environment. This has given rise to "Business Intelligence," or simply BI, a broad category of applications and technologies for accessing, combining, computing and analyzing data to help enterprise users make better business decisions.
Tags : 
business intelligence, business analytics, analytical applications, make more money, exact america, exact software, exact, competitive
    
Exact Software
Published By: IBM     Published Date: May 30, 2008
Collaboration. It is the critical element to success and IBM Lotus software is at the forefront. With collaborative innovations that enable users to work the way they want to, Lotus software offers a compelling portfolio that is based on open, integrated and secure solutions.
Tags : 
collaboration, web 2.0, ibm, ibm ep, ep campaign
    
IBM
Published By: IBM     Published Date: May 30, 2008
In the age of Web 2.0, Internet users are rewriting the rules of social interaction, using blogs, forums, and social bookmarking for sharing information and sustaining relationships across borders. This IBM white paper looks at how organizations can achieve tangible business benefits through embracing these technologies.
Tags : 
ibm, collaboration, ibm ep, ep campaign, ibm
    
IBM
Published By: IBM     Published Date: May 30, 2008
Unified communications and collaboration strategies can help organizations deliver a user experience that brings together communications and collaboration silos across and beyond traditional business boundaries. This paper reviews how by providing users with a single, integrated experience across both business applications and communications and collaboration tools, organizations can cultivate more dynamic and flexible business systems.
Tags : 
unified communication, unified communications, collaboration, lotus, lotus notes, ibm ep, ep campaign, ibm
    
IBM
Published By: iProspect     Published Date: May 20, 2008
Learn how search engine users behave when they conduct different types of searches and are presented with different types of search results within the three largest search engines (in terms of market share): Google, Yahoo!, and MSN.
Tags : 
iprospect, blended search results, search marketing, search engine optimization, seo, search marketing agencies
    
iProspect
Published By: IBM     Published Date: Apr 23, 2008
Imagine using your personal desktop on any computer. You can, with the IBM Virtual Client Solution. This demo explains the backend process of server-hosted services, shows how a user’s desktop is delivered through a remote connection, and demonstrates how an administrator can shift servers for IT simplification without interrupting users.  Watch the demo now.
Tags : 
ibm, ibm opt it, opt it, remote desktop, vnc, virtual client, virtual machine, virtual desktop, remote access
    
IBM
Published By: Netwrix     Published Date: Apr 22, 2008
At the end of an academic year, many thousands of students may permanently leave a school or university system. Once these users graduate, discontinue their education, or perhaps simply move away, IT administrators are left with a huge number of accounts that must be marked as inactive and then dealt with according to system policies.
Tags : 
netwrix, graduate, graduation, education, college, university, school, inactive accounts, inactive account, password management, identity management, access control
    
Netwrix
Published By: Quocirca     Published Date: Apr 09, 2008
Today, many organizations are increasingly reliant on software application development to deliver them competitive edge. Simultaneously, they are progressively opening up their computer networks to business partners, customers and suppliers and making use of next-generation programming languages and computing techniques to provide a richer experience for these users. However, hackers are refocusing their attention on the vulnerabilities and flaws contained in those applications.
Tags : 
quocirca, application security
    
Quocirca
Published By: Ektron     Published Date: Apr 08, 2008
As the Internet evolves, users become more and more savvy about what they want from the experience. Web sites are updated daily when they used to change monthly, and social networking sites such as Facebook and Myspace are checked more often than e-mail. Users know what they want and where to get it.
Tags : 
intranets, ektron, facebook, myspace, user experience, twitter, social networking, support, infrastructure
    
Ektron
Published By: Integration New Media     Published Date: Apr 01, 2008
Librarians looking to build electronic libraries face numerous challenges. This new white paper by Integration New Media provides a summary of best practices for building an eLibrary. From defining your audience and content requirements, through to choosing a technology solution that makes sense for your use cases, this paper will provide a strong checklist of items to consider. The paper also looks at the three types of users and the key elements of designing the user experience for your eLibrary.
Tags : 
inm, integration new media, online library, elibrary
    
Integration New Media
Published By: IBM     Published Date: Mar 28, 2008
For many organizations, applications have been moved to an SOA environment and now must be extended to offer a service interface to new sets of users that were not originally planned.  Extending resources in this way requires that you reassess your security risk. To minimize any risk, you need the right level of security checks for user authentication and authorization.
Tags : 
    
IBM
Published By: Identity Engines     Published Date: Mar 24, 2008
Guests, contractors, vendors, business partners, and other temporary users require and expect certain level of network access within organizations that they visit. Corporate network access has been typically open; internal LAN connections have seldom required authentication. Today however, regulatory and other security concerns demand that organizations adopt a more secure posture towards these short-term users.
Tags : 
idengines, id engines, identity engines, access control, authentication
    
Identity Engines
Published By: Tideway Systems     Published Date: Mar 21, 2008
Cost transparency in relation to IT consumption isn't just about showing which applications, physical resources or even individual users increase company's costs (although that can be valuable information). The real goal is to drive efficiencies throughout the whole business. This white paper offers some practical guidance on where to start.
Tags : 
it cost, cost management, budget, budgeting, spending, tideway
    
Tideway Systems
Start   Previous    57 58 59 60 61 62 63 64 65 66 67 68 69 70 71    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.