User HazardousWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: User Hazardous returned the following results.
RSS What is RSS?
Related Categories

 •   Desktop Management
 •   Data Security
 •   Virtualization
 •   Identity Management/ User Provisioning
 •   Reporting and End-User Query Tools
 •   Business Process Management (BPM)
 •   Business Intelligence Solutions
 •   Availability, Performance and Problem Management
 •   Security Monitoring
 •   Authentication / Password Management

Related Searches
 •   Downloads User Hazardous
 •   Expense User Hazardous
 •   Hardware User Hazardous
 •   Market User Hazardous
 •   Research About User Hazardous
 •   Statistics User Hazardous
 •   User Hazardous Analysis
 •   User Hazardous Georgia
 •   User Hazardous Net
 •   User Hazardous Pay
Advertisement

ALL RESULTS
1 - 25 of 441 | Next Page

Featured Sponsors

The Path to Enterprise Desktops: From Personal Computer to Personalized Computing by AMD and VMware, Inc..
This IDC white paper considers the concept of desktop virtualization, specifically as made available by VMware's VDI and ACE. The document also considers the benefits more...
>> Discover more offerings from AMD and VMware, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..
Foglight - Application Management to Unify IT and the Business by Dell Software.
Your applications are the lifeblood of the service that IT delivers to end users and the business. Foglight, correlates application performance data and events from the entire more...
>> Discover more offerings from Dell Software.

Media Conversion in Video Security and Surveillance Systems by Transition Networks, Inc.

September 2008 - (Free Research)
This whitepaper discusses what can be the weakest link in many video applications – cabling infrastructure. Learn how media conversion can be an economical and effective means to convert to the cabling medium of your choice. 
(WHITE PAPER) READ ABSTRACT |

Sage ERP X3 Helps Aceto Corporation Manage Complicated Compliance Regulations by Sage North America

October 2010 - (Free Research)
This case study explains how with Sage ERP X3, Aceto Corporation’s business processes are streamlined and automated. The company is finding it easier to comply with the financial reporting responsibilities placed on publicly-traded companies. Read on to learn how Aceto benefited from Sage ERP X3. 
(CASE STUDY) READ ABSTRACT |

High Efficiency Indirect Air Economizer-based Cooling for Data Centers by APC by Schneider Electric

November 2013 - (Free Research)
This white paper details how indirect air economizer-based cooling will lower the cost of running your data center without the same risk as directly exposing your infrastructure to the outdoor air. 
(WHITE PAPER) READ ABSTRACT |

5 Steps to Reducing Downtime: Best Practices for Windows Server Application High Availability by Marathon Technologies

September 2009 - (Free Research)
This white paper discusses five steps for protecting Windows Server applications from downtime, offering established best practices to reduce potential single points of failure and ensure rapid recovery or continued operations in the event of failure. 
(WHITE PAPER) READ ABSTRACT |

Battery Technologies for Data Centers and Network Rooms: Environmental Regulations by APC by Schneider Electric

February 2009 - (Free Research)
This paper offers a high level summary of the regulations and provides a list of environmental compliance information resources. 
(WHITE PAPER) READ ABSTRACT |

Roundtable: Green IT: Making sustainability a corporate game-changer by ComputerWeekly.com

June 2010 - (Free Research)
To discuss 'green' issues, C8 Consulting and document imaging manufacturer Kyocera Mita invited a number of specialists to give their views on the role of ‘green’ and making sustainability a corporate game-changer in the future. 
(WHITE PAPER) READ ABSTRACT |

Enterprise Application Delivery: No User Left Behind by BlueCoat

January 2007 - (Free Research)
Blue Coat ProxyClient extends Blue Coat's visionary application delivery infrastructure to include all of these use cases - from any network, any device, and to any application - keeping users productive wherever the business takes them. 
(WHITE PAPER) READ ABSTRACT |

On Lockdown: HMV/Waterstone’s asserts control over user activity by Safestone Technologies

September 2011 - (Free Research)
Download this case study to discover how, by deploying Safestone’s DetectIT solution, the organization can now granularly control access to areas their systems and meet their compliance requirements. 
(CASE STUDY) READ ABSTRACT |

Leveraging Existing Application Monitoring Tools to Enhance the End-User Experience by Keynote Systems

February 2008 - (Free Research)
This white paper explores an end-to-end performance management platform that provides targeted diagnosis of Web application problems. 
(WHITE PAPER) READ ABSTRACT |

Secure Remote Access your Users will Love by Citrix

January 2014 - (Free Research)
This whitepaper looks at a set of secure-by-design remote access solutions dedicated to delivering a user-centric experience and making it simple for users to work any way they choose. 
(WHITE PAPER) READ ABSTRACT |

Mobile, Secure AND Cost-Efficient Desktop Virtualization by Citrix

December 2013 - (Free Research)
This white paper goes over the benefits of desktop virtualization to keep up with the demands of the modern mobilized environment that requires anywhere, anytime, any-device computing. 
(WHITE PAPER) READ ABSTRACT |

Chalk Talk: NetIQ Cloud Access by NetIQ

April 2014 - (Free Research)
This webcast highlights a cloud access management solution that easily integrates with your user directory and Microsoft Office 365. Learn how you can seamlessly manage user provisioning to virtualized business applications and resources. 
(WEBCAST) READ ABSTRACT |

Managing Identities and Access in the Cloud by IBM

December 2011 - (Free Research)
Access this white paper to explore a federated, full life-cycle identity and access management solution that allows IT managers to ensure the right users are accessing the right corporate data. 
(WHITE PAPER) READ ABSTRACT |

Data Security for Mobile Users: One Size Does Not Fit All by Accellion, Inc.

April 2014 - (Free Research)
Read this whitepaper to learn the 3 key criteria for customizing a mobile security policy for your users. 
(WHITE PAPER) READ ABSTRACT |

Successful Virtual Desktop Strategies for the Enterprise by Flexera Software

May 2014 - (Free Research)
This whitepaper will help you learn more about successfully planning for a successful virtual desktop project by identifying which technologies should be used for each type of user and mapping their required desktop features and applications. 
(WHITE PAPER) READ ABSTRACT |

What defines an effective user experience? by Hewlett-Packard Limited

November 2013 - (Free Research)
In this on-demand webcast, learn what makes for an effective user experience and discover how the right user experience design service can help you find success. 
(WEBCAST) READ ABSTRACT |

How user experience is a business differentiator by Hewlett-Packard Limited

February 2013 - (Free Research)
In this brief on-demand video, John McCarthy – Vice President and Principal Analyst at Forrester Research – explains how organizations can increase their value by delivering a great user experience. 
(WEBCAST) READ ABSTRACT |

3 undeniable use cases for automated IAM controls by IBM

January 2011 - (Free Research)
This white paper describes how IBM Tivoli Identity Manager and IBM Tivoli Federated Identity Manager can help organizations automate and control access rights for millions of online users, while maintaining security and tracking user activity. 
(WHITE PAPER) READ ABSTRACT |

Get the Whole Picture: Why Most Organizations Miss User Response Monitoring-and What to Do about It by CA Technologies.

December 2013 - (Free Research)
This white paper underscores the importance of user response monitoring and explores three reasons why many organizations fail to capture this critical insight. Discover the capabilities and characteristics to look for as you evaluate your options and gain insight into  use cases where your monitoring solution will prove especially valuable. 
(WHITE PAPER) READ ABSTRACT |

Are You On The Path to Great Mobile App Performance? by Hewlett-Packard Company

February 2014 - (Free Research)
To avoid frustrated users, negative reviews, and lost revenue, you can invest in a mobile app monitoring strategy. View this infographic to discover the benefits of such a strategy, and learn how a user-centric approach to app monitoring can help you proactively detect performance issues and keep users happy. 
(WHITE PAPER) READ ABSTRACT |

You’ve tried VDI and failed…Now what? by Wanova, Inc.

September 2011 - (Free Research)
In this videocast from industry experts Brian Madden and Gabe Knuth, learn how to deliver a native PC experience while still taking advantage of centralized images and management with desktop virtualization. 
(VIDEO) READ ABSTRACT |

Rally Software: User Stories Guide by Rally Software

May 2013 - (Free Research)
This brief, yet informative white paper offers a detailed description of user stories and how they function within agile development methodology. Discover the 'who', 'what', and 'why' of user stories, along with templates for creating your own. 
(WHITE PAPER) READ ABSTRACT |

Securing Network Access for Guests and Contractors by Bradford Networks

December 2011 - (Free Research)
This whitepaper explores the driving factors for allowing external users to access the network. It discusses what an effective guest and contractor access control solution must do, how such a solution can address potential security and operational challenges, and the many benefits that it can provide to an organization. 
(WHITE PAPER) READ ABSTRACT |

User Profile Manager Best Practices Guide by Citrix

February 2009 - (Free Research)
This document provides the best practices for addressing the "last write wins" issue and key profile use case scenarios that can dramatically benefit with a User Profile Manager solution. 
(WHITE PAPER) READ ABSTRACT |

User-ID Linked with Next-Generation Firewalls Improves Network Visibility and Controls by Palo Alto Networks

November 2012 - (Free Research)
This white paper highlights a security solution that integrates existing enterprise directory services with next-generation firewalls so application activity and policies are linked directly with users or groups. Read on to learn how user-based analysis, reporting, and forensics can improve visibility and protection. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 441 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts