Business of Information Technology  >   Business Processes  >   Product Development  >  

User Experience

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Customer Experience, UX, Web User Experience
DEFINITION: The overall experience and satisfaction a user has when using a product or system.
User Experience Reports
101 - 125 of 269 Matches Previous Page  |  Next Page
CW Buyer's Guide: Client Computing
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Computer Weekly looks at Windows 8 and the complexities of mobile working, the benefits to the business of an enhanced user experience and the shift from the 9-to-5 office desk to IT delivered over a variety of devices, anytime, anywhere.
Posted: 03 Jun 2013 | Published: 03 Jun 2013

ComputerWeekly.com

UC's Impact on the Network
sponsored by SearchUnifiedCommunications.com
EZINE: This TechGuide from SearchUnifiedCommunications.com looks at how UC applications affect network performance and explains the importance of coordinating deployments with other enterprise IT plans.
Posted: 14 Mar 2013 | Published: 14 Mar 2013

SearchUnifiedCommunications.com

Innovative business technologies in a converging world
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This independently researched report investigates converging business technologies, including cloud computing, big data analytics and business intelligence.  
Posted: 18 Feb 2013 | Published: 18 Feb 2013

ComputerWeekly.com

Presentation Transcript: When to Use Thin Clients
sponsored by Dell, Inc. and Intel®
TRANSCRIPT: Hear from industry expert Brian Madden on the evolution of thin-clients and advice for when you should use thin clients in your business. Learn more about what today's end users expect from their experience and review recommendations for meeting these demands with a thin-client computing model.
Posted: 11 Jan 2013 | Published: 11 Jan 2013

Dell, Inc. and Intel®

2012-2013 IT Budget Benchmark
sponsored by ComputerWeekly.com
IT BRIEFING: This in-depth research from business advisory group CEB assesses IT spending plans in 2013 based on a survey of 180 large international businesses.
Posted: 13 Dec 2012 | Published: 13 Dec 2012

ComputerWeekly.com

Considering a BYOPC Strategy
sponsored by SearchSecurity.com
EGUIDE: Before implementing a BYOPC strategy, it is imperative to take many security and management factors into account. Check out this E-Guide from SearchConsumerization.com to learn all about the BYOPC trend, the pros and cons, and what you need to know before implementation.
Posted: 20 Nov 2012 | Published: 20 Nov 2012

SearchSecurity.com

The Importance of End-User Experience to Video Collaboration Success
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchUnifiedCommunications.com explores how to calculate the value of video collaboration and why measuring end-user experience is so vital.
Posted: 26 Oct 2012 | Published: 26 Oct 2012

SearchSecurity.com

Accelerate App Delivery, Improve App Performance, and Spur Innovation
sponsored by CA Technologies.
WHITE PAPER: Learn about a set of application performance management (APM) and capacity management solutions that together facilitate information sharing between your DevOps teams, in end leading to better app deployments, improved monitoring, lowered number of risks, and reduced repair times.
Posted: 28 Jun 2013 | Published: 31 Aug 2012

CA Technologies.

Customer Experience Management in the New Era of Mobility
sponsored by IBM
WHITE PAPER: View this white paper to learn more about how your business can obtain higher revenues, lower costs and higher customer satisfaction. Mobility provides businesses with the opportunity to provide customers with unique value. It gives customers a channel to interact with their preferred companies.
Posted: 05 Jun 2013 | Published: 24 Aug 2012

IBM

Developing a Solid Web Content Management Strategy
sponsored by Limelight Networks, Inc.
EGUIDE: In this expert e-guide, find five must-see steps that will help your organization enable Web content management (WCM) success. Also inside, uncover top tips for planning an intelligent WCM strategy.
Posted: 21 May 2013 | Published: 21 May 2013

Limelight Networks, Inc.

Data Centre to Cloud
sponsored by Juniper Networks, Inc.
VIDEO: Leave the complexity of your legacy data center network and upgrade to a revolutionary 3-2-1 data center network architecture that will help make your organization cloud-ready today and for years to come.
Posted: 17 May 2013 | Premiered: 17 May 2013

Juniper Networks, Inc.

IDC Buyer Case Study: Customer-Centric, User-Friendly Videoconferencing
sponsored by Vidyo, Inc.
WHITE PAPER: This IDC Buyer Case Study explores which videoconferencing solution Mydin, Malaysia's largest retailer enterprise, put in place to help connect and communicate, reduce costs, and achieve an optimal ROI.
Posted: 07 May 2013 | Published: 31 Jul 2012

Vidyo, Inc.

Defining VDI users: Who should really be using virtual desktops?
sponsored by VMware, Inc.
EGUIDE: This expert guide from SearchVirtualDesktops.com can help you define your VDI users so that you can determine who in your organization benefits the most from virtual desktops, allowing you to provide them to the workers who would get the most value from them.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

VMware, Inc.

MOBILE OPTIMIZATION: How Testing on Smartphones and Tablets Lifts Conversion
sponsored by WebTrends
WHITE PAPER: In this white paper, discover a new set of best practices for optimizing and monetizing mobile development, focusing on CRM, layout, and usability. Read on for more information and best practices on testing and optimization, segmentation and targeting, case studies of successful mobile migrations, and more.
Posted: 16 Apr 2013 | Published: 16 Apr 2013

WebTrends

Presentation Transcript: Content Monitoring in the Enterprise
sponsored by Lumension
PRESENTATION TRANSCRIPT: This presentation transcript will help readers learn key strategies to meet both business security needs and user demands. Discover more about topics such as setting content monitoring goals, data loss prevention technologies, database activity monitoring, and more.
Posted: 04 Jan 2013 | Published: 04 Jan 2013

Lumension

End-to-End Network Application Performance Monitoring
sponsored by Ixia
EGUIDE: This quick E-Guide from SearchNetworking.com explores why multiple tools are necessary for true end-to-end monitoring and offers tips that will help you deal with multiple tools.
Posted: 14 Dec 2012 | Published: 14 Dec 2012

Ixia

Magic Quadrant for Security Information and Event Management
sponsored by Hewlett-Packard Limited
WHITE PAPER: View this helpful white paper to learn more about analyzing security event data in real time for effective threat management. It outlines some of the top vendors who have technologies that are designed to help collect, store, analyze and report log data.
Posted: 19 Sep 2012 | Published: 19 Sep 2012

Hewlett-Packard Limited

Securely Enable Online Business
sponsored by CA Technologies.
WHITE PAPER: Historically, security practices meant less productivity and growth for businesses, but it no longer has to be a trade-off. In order for organizations to effectively grow their business, protection and efficiency need to go hand in hand. Read this white paper to find out more about improving security without sacrificing productivity.
Posted: 10 Sep 2012 | Published: 10 Sep 2012

CA Technologies.

SharePoint Security in Action: Best Practices Drive Secure Collaboration
sponsored by CA Technologies.
WHITE PAPER: Microsoft SharePoint is a widely deployed enterprise content management (ECM) and collaboration system because it delivers a functional user experience. However, it also presents some security concerns. Consult this informative white paper to learn more about some of the challenges and how to remedy these obstacles.
Posted: 10 Sep 2012 | Published: 10 Sep 2012

CA Technologies.

Endpoint Protection Small Business Edition
sponsored by Symantec Corporation
VIDEO: Small businesses may think they have enough protection, but they are at risk to attacks. The budget and staff for small businesses is often smaller than larger corporations, so they need a security plan that protects against a multitude of attacks. View this video to learn more about endpoint protection for small businesses.
Posted: 05 Sep 2012 | Premiered: 05 Sep 2012

Symantec Corporation

Virtual Desktop Foundations e-Book: Chapter 1, Restructuring for virtual desktops
sponsored by Citrix
EBOOK: Access this exclusive resource to discover expert advice on introducing virtual desktopsto your work environment.
Posted: 28 Aug 2012 | Published: 01 Dec 2012

Citrix

4 Steps to Creating a Mobile Strategy
sponsored by Appcelerator
WHITE PAPER: Read this white paper to learn four steps to decrease time-to-market and development costs, increase customer adoption and revenues, and enjoy greater flexibility and control when launching enterprise mobile apps.
Posted: 20 Aug 2012 | Published: 20 Aug 2012

Appcelerator

Contextual Authentication: A Multi-factor Approach
sponsored by PortalGuard
WHITE PAPER: This informative white paper offers a few solutions for remaining efficient without sacrificing security. It provides an explanation on the midpoint between better password policies and two-factor authentication processes. Your data deserves the utmost protection, access this white paper now so you can ensure security.
Posted: 17 Aug 2012 | Published: 17 Aug 2012

PortalGuard

Leveraging SAML for Federated Single Sign-on: Seamless Integration with Web-based Applications whether cloudbased, private, on-premise, or behind a firewall
sponsored by PortalGuard
WHITE PAPER: Consult this informative white paper to find out how you can resolve issues with user-accessibility. Single sign-on can eliminate problems with multiple password prompts and make accessibility easier for the user. Learn why a single sign-on process can help handle an organizations multiple cloud applications as well as provide secure accessibility.
Posted: 13 Aug 2012 | Published: 13 Aug 2012

PortalGuard

Citrix XenClient Virtual desktops… to go
sponsored by Citrix Systems, Inc.
PRODUCT OVERVIEW: This solution guide examines the computing requirements of today's highly mobile workforce and details the security and management issues that frequently accompany them. Find out how desktop virtualization can help to mitigate laptop-related risks and explore the competitive marketplace for this technology.
Posted: 06 Aug 2012 | Published: 06 Aug 2012

Citrix Systems, Inc.
101 - 125 of 269 Matches Previous Page    3 4 5 6 7 8    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement