User AxiomWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: User Axiom returned the following results.
RSS What is RSS?
Related Categories

 •   Storage Management
 •   Storage Area Network (SAN)/ Network Attached Storage (NAS)
 •   Virtualization
 •   Backup Systems and Services
 •   Storage Security
 •   Disk-based Backup & Storage/ RAID
 •   Availability, Performance and Problem Management
 •   Midframe/ Midrange Servers
 •   Disaster Recovery
 •   Data Center Management

Related Searches
 •   Best User Axiom
 •   Conferencing User Axiom
 •   Files User
 •   Implementing User Axiom
 •   Maintain User
 •   Policy User Axiom
 •   Strategies User Axiom
 •   User Axiom Demos
 •   User Axiom Networking
Advertisement

ALL RESULTS
1 - 25 of 432 | Next Page

Featured Sponsors

Foglight - Application Management to Unify IT and the Business by Dell Software.
Your applications are the lifeblood of the service that IT delivers to end users and the business. Foglight, correlates application performance data and events from the entire more...
>> Discover more offerings from Dell Software.
E-mail Recovery, Restoration, Search & Analysis by Ontrack® PowerControls™ by Kroll Ontrack.
Ontrack® PowerControls™ is a simple yet powerful tool for copying, searching, recovering and analyzing mailbox items directly from Microsoft Exchange Server more...
>> Discover more offerings from Ontrack® PowerControls™ by Kroll Ontrack.
Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Delivering Storage Quality of Service with Oracle Pillar Axiom 600 by Oracle Corporation UK Ltd

September 30, 2011 - (Free Research)
In this white paper, you will discover an Oracle storage technology designed from the ground up to deliver business-critical, guaranteed quality of service consistent with the business value of the application and its data. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Building Simple, Scalable and Robust Storage Infrastructures by Pillar Data Systems

March 10, 2011 - (Free Research)
As a service provider, your biggest responsibility is to educate your customers on how to purchase the “right” model to get the job done. This guide touches upon SANs, data collaboration, DR, online backup, and so much more. 
(EGUIDE) READ ABSTRACT |

E-Guide: Best Practices for Managing Storage Efficiency by Pillar Data Systems

March 10, 2011 - (Free Research)
While server virtualization provides your customers with increased flexibility to respond to business needs, it also introduces some problems, especially in the storage arena. This guide is a quick and informative read that will explore new options of helping customers manage their unified and virtual servers projects. 
(EGUIDE) READ ABSTRACT |

Secure Remote Access your Users will Love by Citrix

January 06, 2014 - (Free Research)
This whitepaper looks at a set of secure-by-design remote access solutions dedicated to delivering a user-centric experience and making it simple for users to work any way they choose. 
(WHITE PAPER) READ ABSTRACT |

Mobile, Secure AND Cost-Efficient Desktop Virtualization by Citrix

December 31, 2013 - (Free Research)
This white paper goes over the benefits of desktop virtualization to keep up with the demands of the modern mobilized environment that requires anywhere, anytime, any-device computing. 
(WHITE PAPER) READ ABSTRACT |

Chalk Talk: NetIQ Cloud Access by NetIQ

April 02, 2014 - (Free Research)
This webcast highlights a cloud access management solution that easily integrates with your user directory and Microsoft Office 365. Learn how you can seamlessly manage user provisioning to virtualized business applications and resources. 
(WEBCAST) READ ABSTRACT |

Managing Identities and Access in the Cloud by IBM

December 31, 2011 - (Free Research)
Access this white paper to explore a federated, full life-cycle identity and access management solution that allows IT managers to ensure the right users are accessing the right corporate data. 
(WHITE PAPER) READ ABSTRACT |

Data Security for Mobile Users: One Size Does Not Fit All by Accellion, Inc.

April 30, 2014 - (Free Research)
Read this whitepaper to learn the 3 key criteria for customizing a mobile security policy for your users. 
(WHITE PAPER) READ ABSTRACT |

Successful Virtual Desktop Strategies for the Enterprise by Flexera Software

May 06, 2014 - (Free Research)
This whitepaper will help you learn more about successfully planning for a successful virtual desktop project by identifying which technologies should be used for each type of user and mapping their required desktop features and applications. 
(WHITE PAPER) READ ABSTRACT |

What defines an effective user experience? by Hewlett-Packard Limited

November 17, 2013 - (Free Research)
In this on-demand webcast, learn what makes for an effective user experience and discover how the right user experience design service can help you find success. 
(WEBCAST) READ ABSTRACT |

How user experience is a business differentiator by Hewlett-Packard Limited

February 21, 2013 - (Free Research)
In this brief on-demand video, John McCarthy – Vice President and Principal Analyst at Forrester Research – explains how organizations can increase their value by delivering a great user experience. 
(WEBCAST) READ ABSTRACT |

3 undeniable use cases for automated IAM controls by IBM

January 03, 2011 - (Free Research)
This white paper describes how IBM Tivoli Identity Manager and IBM Tivoli Federated Identity Manager can help organizations automate and control access rights for millions of online users, while maintaining security and tracking user activity. 
(WHITE PAPER) READ ABSTRACT |

Get the Whole Picture: Why Most Organizations Miss User Response Monitoring-and What to Do about It by CA Technologies.

December 31, 2013 - (Free Research)
This white paper underscores the importance of user response monitoring and explores three reasons why many organizations fail to capture this critical insight. Discover the capabilities and characteristics to look for as you evaluate your options and gain insight into  use cases where your monitoring solution will prove especially valuable. 
(WHITE PAPER) READ ABSTRACT |

Are You On The Path to Great Mobile App Performance? by Hewlett-Packard Company

February 28, 2014 - (Free Research)
To avoid frustrated users, negative reviews, and lost revenue, you can invest in a mobile app monitoring strategy. View this infographic to discover the benefits of such a strategy, and learn how a user-centric approach to app monitoring can help you proactively detect performance issues and keep users happy. 
(WHITE PAPER) READ ABSTRACT |

You’ve tried VDI and failed…Now what? by Wanova, Inc.

September 16, 2011 - (Free Research)
In this videocast from industry experts Brian Madden and Gabe Knuth, learn how to deliver a native PC experience while still taking advantage of centralized images and management with desktop virtualization. 
(VIDEO) READ ABSTRACT |

Rally Software: User Stories Guide by Rally Software

May 28, 2013 - (Free Research)
This brief, yet informative white paper offers a detailed description of user stories and how they function within agile development methodology. Discover the 'who', 'what', and 'why' of user stories, along with templates for creating your own. 
(WHITE PAPER) READ ABSTRACT |

Securing Network Access for Guests and Contractors by Bradford Networks

December 12, 2011 - (Free Research)
This whitepaper explores the driving factors for allowing external users to access the network. It discusses what an effective guest and contractor access control solution must do, how such a solution can address potential security and operational challenges, and the many benefits that it can provide to an organization. 
(WHITE PAPER) READ ABSTRACT |

How SAP Users hold the key to Business Process Improvement by Winshuttle, LLC

February 10, 2011 - (Free Research)
This paper highlights the key role that SAP users play in enabling their organizations to improve processes, and discusses how their expertise is lost in some of the traditional approaches companies use to try to improve processes. Learn an alternative “user-centric” approach that will enable companies to measurably improve their processes. 
(WHITE PAPER) READ ABSTRACT |

User-ID Linked with Next-Generation Firewalls Improves Network Visibility and Controls by Palo Alto Networks

November 12, 2012 - (Free Research)
This white paper highlights a security solution that integrates existing enterprise directory services with next-generation firewalls so application activity and policies are linked directly with users or groups. Read on to learn how user-based analysis, reporting, and forensics can improve visibility and protection. 
(WHITE PAPER) READ ABSTRACT |

User Profile Manager Best Practices Guide by Citrix

February 01, 2009 - (Free Research)
This document provides the best practices for addressing the "last write wins" issue and key profile use case scenarios that can dramatically benefit with a User Profile Manager solution. 
(WHITE PAPER) READ ABSTRACT |

Google+ Guide by Oracle Corporation

December 31, 2013 - (Free Research)
This guide explores some best practices for utilizing Google+ as an effective user engagement strategy. 
(WHITE PAPER) READ ABSTRACT |

Network Evolution E-Zine: June 2014 by SearchNetworking.com

June 02, 2014 - (Free Research)
In this issue of Network Evolution, we explore the need for high-density wireless network designs, the future of MPLS and whether Microsoft Lync is ready to replace legacy PBXs. 
(EZINE) READ ABSTRACT |

Analysis of IBM XIV Storage: Customer Performance Experiences by IBM

June 30, 2013 - (Free Research)
This white paper summarizes real user insights from 9 users of IBM's XIV storage system. Research focused on the system performance and flash-caching ability through a series of interviews with these users. 
(WHITE PAPER) READ ABSTRACT |

Importance of Information Governance for Business Users by RSD

April 11, 2014 - (Free Research)
The following white paper explores the importance of information governance of business users and provides technology recommendations that can meet with the compliance and data needs of today's market. 
(WHITE PAPER) READ ABSTRACT |

Addressing Outlook Security Concerns and Preparing Mobile Users for an Exchange Migration by Thawte Inc.

May 19, 2011 - (Free Research)
Users enticed by the ability to check email at a glance increasingly log onto Exchange 2010 remotely and cause new security risks. This expert e-guide from SearchExchange.com explains how to address these Outlook security concerns by creating a buffer zone between your internal network and the Internet. 
(EGUIDE) READ ABSTRACT |

1 - 25 of 432 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts