Report User Profile ManagementWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Report User Profile Management returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Virtualization
 •   Identity Management/ User Provisioning
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Application Security
 •   Security Monitoring
 •   Data Center Management
 •   Application Management and Maintenance
 •   Security Policies
 •   Enterprise Systems Management

Related Searches
 •   Digital Report
 •   Filing Report User
 •   General Report
 •   Report Needs
 •   Report User Activity
 •   Report User Assessment
 •   Report User Papers
 •   Report User Profile Businesses
 •   Report User Profile Procedures
 •   Report User Profile Tools Software
Advertisement

ALL RESULTS
1 - 25 of 488 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Focus Research Series: Desktop and Application Delivery Landscape Report with All Profiles by Focus

April 2008 - (Free Research)
This excerpt of the Focus Landscape Research Series covers the drivers, trends, technical approaches and available solutions involved in evaluating and implementing desktop and application virtualization and delivery alternatives. 
(WHITE PAPER) READ ABSTRACT |

Faster SQL Profiling for Better Database Performance by Embarcadero Technologies, Inc.

April 2009 - (Free Research)
Find out how Embarcadero's DB Optimizer™ can help you to quickly discover and fix problematic SQL statements that can cause performance bottlenecks in your database. DB Optimizer™ gives you the flexibility of using a single easy-to-use IDE to test, profile and tune SQL. 
(WHITE PAPER) READ ABSTRACT |

AppSense User Virtualisation Platform by AppSense

June 2011 - (Free Research)
Immense changes are taking place throughout the IT infrastructure, especially in the area traditionally referred to as the "desktop." With mobile devices, laptops, netbooks and fixed desktops allowing simultaneous and varied computing experiences, user virtualisation creates one centralised control that manages users across multiple devices. 
(PRODUCT REVIEW) READ ABSTRACT |

Presentation Transcript: Configuring and Using IBM i's Auditing Functions by PowerTech

April 2010 - (Free Research)
Did you know that IBM i includes powerful auditing features? In fact, our own class-leading audit reporting solution leverages the information captured by this facility. Read this presentation transcipt - based on content presented at the 2009 COMMON conference - to learn about activating and configuring IBM i's built-in auditing capabilities. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Configuring and Using IBM i's Auditing Functions by PowerTech

March 2010 - (Free Research)
Did you know that IBM i includes powerful auditing features? In fact, our own class-leading audit reporting solution leverages the information captured by this facility. Join this webinar-based on content presented at the 2009 COMMON conference-to learn about activating and configuring IBM i's built-in auditing capabilities. 
(WEBCAST) READ ABSTRACT |

Performance Report for Microsoft Office Communications Server Consolidated Configuration on HP BladeSystem by Hewlett-Packard Company

January 2008 - (Free Research)
This testing shows that deploying an OCS Consolidated Configuration as defined on HP BladeSystem and StorageWorks for 30,000 users with this profile should provide a very positive user experience. 
(WHITE PAPER) READ ABSTRACT |

Oracle to Teradata Migration Case Studies: Realizing value and improving capabilities by Teradata

April 2011 - (Free Research)
This paper profiles four of the more than 200 Oracle customers who have migrated to a Teradata solution. The companies profiled in this paper have achieved performance improvements, additional business benefits that justify the migration cost, and successful integration of the Teradata Database with the Oracle OLTP environment. 
(CASE STUDY) READ ABSTRACT |

User Profile Manager Best Practices Guide by Citrix

February 2009 - (Free Research)
This document provides the best practices for addressing the "last write wins" issue and key profile use case scenarios that can dramatically benefit with a User Profile Manager solution. 
(WHITE PAPER) READ ABSTRACT |

Symantec Workspace Profiles by Symantec

October 2009 - (Free Research)
SWP is a new software product from Symantec's Endpoint Virtualization group. SWP separates (virtualizes) the user's profile (user data, settings and personality) from the underlying operating system allowing users to easily roam from device to device, work on two sessions simultaneously, or access their profile in the context... 
(SCREENCAST) READ ABSTRACT |

Guide: Desktop Authority by ScriptLogic Corporation

August 2009 - (Free Research)
Desktop Authority comprehensively manages the Windows desktop throughout the desktop lifecycle, reducing the total cost of desktop and application ownership. 
(WHITE PAPER) READ ABSTRACT |

Things You Always Wanted To Know About Windows Profile Management by Immidio

January 2011 - (Free Research)
This white paper examines why Windows user profiles are so critically important for corporate IT environments and how they can be managed efficiently. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Protecting System i Data from FTP, ODBC and Remote Command by PowerTech

October 2009 - (Free Research)
When developing a security strategy, it is critical for businesses to consider their System i platform in order to protect themselves from data breaches. In this presentation transcript, learn how to control network access on System i and protect your organization from data loss. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

On Lockdown: HMV/Waterstone’s asserts control over user activity by Safestone Technologies

September 2011 - (Free Research)
Download this case study to discover how, by deploying Safestone’s DetectIT solution, the organization can now granularly control access to areas their systems and meet their compliance requirements. 
(CASE STUDY) READ ABSTRACT |

Migration to Windows 7 with Immidio Flex Profiles by Immidio

January 2011 - (Free Research)
This white paper discusses how to use Immidio Flex Profiles for making user profiles cross-platform compatible to Windows XP and Windows 7, both for migration projects and side-by-side scenarios using multiple versions of Windows simultaneously. 
(WHITE PAPER) READ ABSTRACT |

Noetix: Getting Analytics to Business Users in an Oracle Applications Environment by Noetix Corporation

June 2008 - (Free Research)
This IDC Vendor Profile highlights the solution offerings and market strategy of Noetix, a business intelligence software vendor. 
(WHITE PAPER) READ ABSTRACT |

iTest Team - Rapid Test Automation for Equipment and Devices by Fanfare

iTest Team is an integrated test environment for developers, testers, and automation teams. It offers a unified approach for rapidly developing, automating, and maintaining test cases. iTest Team tests complex equipment and systems that are accessed through various protocols, such as command line interfaces, Web interfaces, SNMP, or command shells. 
(SOFTWARE PRODUCT)

ESG Market Landscape Report: Understanding the NAS Market by EMC Isilon

October 2011 - (Free Research)
This essential resource takes a look into the network attached storage (NAS) market and the factors that are leading vendor’s obligations to address different price, performance, and feature profiles to meet user needs. 
(WHITE PAPER) READ ABSTRACT |

De-risking IT Lifecycle Management by ComputerWeekly.com

November 2012 - (Free Research)
Analysts Clive Longbottom and Rob Bamforth offer advice on managing IT assets more effectively. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Mortgage Company Uses DataFlux Technology to Improve Reporting, Manage Compliance by DataFlux Corporation

January 2009 - (Free Research)
Read how using DataFlux technology, this financial company implemented a data governance program, creating more complete and accurate data and drastically reducing the time needed to comply with Federal reporting regulations. 
(CASE STUDY) READ ABSTRACT |

Get Personal: Capitalize On Your Subscriber Data With a Unified User Profile by Hewlett-Packard Company

September 2008 - (Free Research)
This white paper discusses the role of user profile management. HP’s solution for this business issue is discussed as a means of addressing the subscriber experience infrastructure. 
(WHITE PAPER) READ ABSTRACT |

Get Personal: Capitalize On Your Subscriber Data With a Unified User Profile by Hewlett-Packard Company

September 2008 - (Free Research)
This white paper discusses the role of user profile management. HP’s solution for this business issue is discussed as a means of addressing the subscriber experience infrastructure. 
(WHITE PAPER) READ ABSTRACT |

Get Personal: Capitalize on Your Subscriber Data with a Unified User Profile by Hewlett-Packard Company

November 2008 - (Free Research)
This IDC white paper discusses the role of user profile management in the telecom industry. Service providers' (SPs) efforts to manage, capitalize on, and provision user information across multiple databases are critical to fuel applications-led services. 
(WHITE PAPER) READ ABSTRACT |

Global profiles of the fraudster by ComputerWeekly.com

November 2013 - (Free Research)
Computers, rather than conmen, are set to be the future face of fraud, as criminals turn to robotics in an effort to avoid detection, this report from KPMG reveals. 
(ESSENTIAL GUIDE) READ ABSTRACT |

ArcSight IdentityView: Increasing Security and Compliance with a 360-Degree View of User Activity by ArcSight, an HP Company

June 2010 - (Free Research)
This paper describes ArcSight IdentityView, a new application designed to leverage the power of the ArcSight SIEM Platform and apply it to user monitoring, for security and compliance purposes. 
(WHITE PAPER) READ ABSTRACT |

Export Compliance Management: Best Practices for Managing Export Compliance to Support Globalization and Reduce Your Risk Profile by Management Dynamics

May 2010 - (Free Research)
Before escalating their overseas sales, companies must gauge their exporting best practices to see what can be gained from improving compliance process. This Report profiles export compliance programs in various industries to reveal key challenges companies face in managing these programs and determine how software is used in the process. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 488 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts