User Profile ManagementWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: User Profile Management returned the following results.
RSS What is RSS?
Related Categories

 •   Virtualization
 •   Identity Management/ User Provisioning
 •   Desktop Management
 •   Data Security
 •   Desktops/ Workstations
 •   Security Policies
 •   Enterprise Systems Management
 •   Operating Systems and Subsystems
 •   Data Center Management
 •   Application Management and Maintenance

Related Searches
 •   Introduction Of User Profile
 •   Simple User Profile Management
 •   User Creation
 •   User Profile Examples
 •   User Profile Management Example
 •   User Profile Management Warehouse
 •   User Profile Retail
 •   User Profile Utah
 •   User Profile White Papers
 •   User Tennessee
Advertisement

ALL RESULTS
1 - 25 of 468 | Next Page

Featured Sponsors

The Path to Enterprise Desktops: From Personal Computer to Personalized Computing by AMD and VMware, Inc..
This IDC white paper considers the concept of desktop virtualization, specifically as made available by VMware's VDI and ACE. The document also considers the benefits more...
>> Discover more offerings from AMD and VMware, Inc..
Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Things You Always Wanted To Know About Windows Profile Management by Immidio

January 15, 2011 - (Free Research)
This white paper examines why Windows user profiles are so critically important for corporate IT environments and how they can be managed efficiently. 
(WHITE PAPER) READ ABSTRACT |

Get Personal: Capitalize On Your Subscriber Data With a Unified User Profile by Hewlett-Packard Company

September 12, 2008 - (Free Research)
This white paper discusses the role of user profile management. HP’s solution for this business issue is discussed as a means of addressing the subscriber experience infrastructure. 
(WHITE PAPER) READ ABSTRACT |

Get Personal: Capitalize On Your Subscriber Data With a Unified User Profile by Hewlett-Packard Company

September 12, 2008 - (Free Research)
This white paper discusses the role of user profile management. HP’s solution for this business issue is discussed as a means of addressing the subscriber experience infrastructure. 
(WHITE PAPER) READ ABSTRACT |

Get Personal: Capitalize on Your Subscriber Data with a Unified User Profile by Hewlett-Packard Company

November 2008 - (Free Research)
This IDC white paper discusses the role of user profile management in the telecom industry. Service providers' (SPs) efforts to manage, capitalize on, and provision user information across multiple databases are critical to fuel applications-led services. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: How to Determine if VDI is Right for your Company and Ways to Overcome Common Annoyances by SearchDataCenter.com

May 2011 - (Free Research)
Even though the thought of virtual desktops has caught everyone's attention, the actual number of installations remains small. This expert e-guide from SearchVirtualDesktop.com explains how organizations can determine whether this technology is right for them by calculating the return on investment from VDI. 
(EGUIDE) READ ABSTRACT |

Case Study: Fransicican Missionaries of Our Lady Health System by AppSense

July 2013 - (Free Research)
Read this whitepaper to learn how one major healthcare provider that manages roughly 13,000 employees and 8000 contract staff were able to use user virtualization to improve clinical workflow and gain a competitive advantage. 
(WHITE PAPER) READ ABSTRACT |

User Profile Manager Best Practices Guide by Citrix

February 2009 - (Free Research)
This document provides the best practices for addressing the "last write wins" issue and key profile use case scenarios that can dramatically benefit with a User Profile Manager solution. 
(WHITE PAPER) READ ABSTRACT |

Migration to Windows 7 with Immidio Flex Profiles by Immidio

January 2011 - (Free Research)
This white paper discusses how to use Immidio Flex Profiles for making user profiles cross-platform compatible to Windows XP and Windows 7, both for migration projects and side-by-side scenarios using multiple versions of Windows simultaneously. 
(WHITE PAPER) READ ABSTRACT |

How to determine if VDI is right for your company and ways to overcome common annoyances by Intel

September 2011 - (Free Research)
Companies are still deciding if a virtual desktop infrastructure (VDI) has a place in their organizations. This expert e-guide from SearchVirtualDesktop.com explains how to calculate the return on investment from VDI to determine if this technology makes sense for your organization. 
(EGUIDE) READ ABSTRACT |

HOWTO Secure and Audit Oracle 10g & 11g: Account Security (Complimentary Chapter Download) by IBM

December 2010 - (Free Research)
Read this chapter from "HOWTO Secure and Audit Oracle 10g and 11g" (CRC Press, 2009) and learn how to secure Oracle by checking for weak passwords, configuring failed login policies, preventing DoS attacks with resource limits, and auditing user profiles. 
(EBOOK) READ ABSTRACT |

The State of System i Security 2007 by PowerTech

April 2007 - (Free Research)
This study highlights a number of very common security exposures and configuration management practices that must be mitigated in order to protect the data that resides on the AS/400. 
(WHITE PAPER) READ ABSTRACT |

User Virtualization and Windows 7: Migration, personalization, satisfaction by AppSense

June 2011 - (Free Research)
Windows 7 will soon be the preferred organisational operating system, and the migration could cause difficulty. Read now to discover how user virtualisation will automate the process of migrating and managing thousands of user profiles and endpoint devices. 
(PRODUCT OVERVIEW) READ ABSTRACT |

The State of System i Security 2008 by PowerTech

August 2008 - (Free Research)
This paper explains a number of common security exposures and configuration management practices that must be mitigated in order to protect the data that resides on the System i. 
(WHITE PAPER) READ ABSTRACT |

On Lockdown: HMV/Waterstone’s asserts control over user activity by Safestone Technologies

September 2011 - (Free Research)
Download this case study to discover how, by deploying Safestone’s DetectIT solution, the organization can now granularly control access to areas their systems and meet their compliance requirements. 
(CASE STUDY) READ ABSTRACT |

Six Steps to a Successful Microsoft® Exchange Server 2010 Deployment by Dimension Data.

June 2010 - (Free Research)
If an organisation wants to realise the full advantages of Exchange Server 2010, it's important to take a systematic approach that includes a thorough understanding of all of the integration points, dependencies and end user profiles. Read this paper for 6 steps to a successful Microsoft® Exchange Server 2010 deployment. 
(WHITE PAPER) READ ABSTRACT |

Configuring and Using IBM i's Auditing Functions by PowerTech

March 2010 - (Free Research)
Did you know that IBM i includes powerful auditing features? In fact, our own class-leading audit reporting solution leverages the information captured by this facility. Join this webinar-based on content presented at the 2009 COMMON conference-to learn about activating and configuring IBM i's built-in auditing capabilities. 
(WEBCAST) READ ABSTRACT |

Presentation Transcript: Configuring and Using IBM i's Auditing Functions by PowerTech

April 2010 - (Free Research)
Did you know that IBM i includes powerful auditing features? In fact, our own class-leading audit reporting solution leverages the information captured by this facility. Read this presentation transcipt - based on content presented at the 2009 COMMON conference - to learn about activating and configuring IBM i's built-in auditing capabilities. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Guide: Desktop Authority by ScriptLogic Corporation

August 2009 - (Free Research)
Desktop Authority comprehensively manages the Windows desktop throughout the desktop lifecycle, reducing the total cost of desktop and application ownership. 
(WHITE PAPER) READ ABSTRACT |

CyberAgent translates blog user insights into a more engaging experience by IBM

April 2013 - (Free Research)
View this white paper to learn how Japan's largest blog service provider, CyberAgent, found a way to create a new level of engagement and loyalty among its blog readers. By developing an analytics framework that enabled a new kind of insight into blogging preferences and behavior. 
(WHITE PAPER) READ ABSTRACT |

Symantec Workspace Profiles by Symantec

October 2009 - (Free Research)
SWP is a new software product from Symantec's Endpoint Virtualization group. SWP separates (virtualizes) the user's profile (user data, settings and personality) from the underlying operating system allowing users to easily roam from device to device, work on two sessions simultaneously, or access their profile in the context... 
(SCREENCAST) READ ABSTRACT |

AppSense The Low down: What does user virtualization boil down to? by AppSense

June 2011 - (Free Research)
Traditional roaming profiles can no longer provide one, consistent and stable platform for your users. Access this exclusive resource to uncover the 10 reasons for adopting user virtualisation. 
(PRODUCT OVERVIEW) READ ABSTRACT |

Faster SQL Profiling for Better Database Performance by Embarcadero Technologies, Inc.

April 2009 - (Free Research)
Find out how Embarcadero's DB Optimizer™ can help you to quickly discover and fix problematic SQL statements that can cause performance bottlenecks in your database. DB Optimizer™ gives you the flexibility of using a single easy-to-use IDE to test, profile and tune SQL. 
(WHITE PAPER) READ ABSTRACT |

Oracle Data Quality for Data Integrator and Oracle Data Profiling 11g by Oracle Corporation

August 2010 - (Free Research)
To ensure that information is accurate and consistent across complex systems, Oracle Data Quality for Data Integrator 11g and Oracle Data Profiling 11g provide a solution to integrate trusted data. Read this data sheet to learn more. 
(DATA SHEET) READ ABSTRACT |

Cloud App Success Means End-User Identity Management by VMware, Inc.

July 2013 - (Free Research)
This e-guide takes a deeper look at whether roaming profiles can increase the use and mobility of a cloud app among providers and discusses the impacts of end-user identity management on the success of your cloud apps. 
(EGUIDE) READ ABSTRACT |

AppSense User Virtualisation Platform by AppSense

June 2011 - (Free Research)
Immense changes are taking place throughout the IT infrastructure, especially in the area traditionally referred to as the "desktop." With mobile devices, laptops, netbooks and fixed desktops allowing simultaneous and varied computing experiences, user virtualisation creates one centralised control that manages users across multiple devices. 
(PRODUCT REVIEW) READ ABSTRACT |

1 - 25 of 468 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts