Business of Information Technology  >   Business Processes  >   Product Development  >  

User Experience

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Customer Experience, UX, Web User Experience
DEFINITION: The overall experience and satisfaction a user has when using a product or system.
User ExperienceReports
51 - 75 of 224 Matches Previous Page  | Next Page
Unified Networking: Manage Wired and Wireless Networks with Ease
sponsored by Cisco Systems, Inc.
WHITE PAPER: Learn about a set of unified networking and management platforms built to provide consistency and continuity within your unified wired and wireless network, helping you achieve cost-efficiency, improved user experience, and simplified management.
Posted: 15 Jul 2013 | Published: 31 Jan 2013

Cisco Systems, Inc.

CW Buyer's Guide: Client Computing
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Computer Weekly looks at Windows 8 and the complexities of mobile working, the benefits to the business of an enhanced user experience and the shift from the 9-to-5 office desk to IT delivered over a variety of devices, anytime, anywhere.
Posted: 03 Jun 2013 | Published: 03 Jun 2013

ComputerWeekly.com

Magic Quadrant for Security Information and Event Management
sponsored by Hewlett-Packard Company
WHITE PAPER: View this helpful white paper to learn more about analyzing security event data in real time for effective threat management. It outlines some of the top vendors who have technologies that are designed to help collect, store, analyze and report log data.
Posted: 01 Apr 2013 | Published: 24 May 2012

Hewlett-Packard Company

UC's Impact on the Network
sponsored by SearchUnifiedCommunications.com
EZINE: This TechGuide from SearchUnifiedCommunications.com looks at how UC applications affect network performance and explains the importance of coordinating deployments with other enterprise IT plans.
Posted: 14 Mar 2013 | Published: 14 Mar 2013

SearchUnifiedCommunications.com

Innovative business technologies in a converging world
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This independently researched report investigates converging business technologies, including cloud computing, big data analytics and business intelligence.  
Posted: 18 Feb 2013 | Published: 18 Feb 2013

ComputerWeekly.com

2012-2013 IT Budget Benchmark
sponsored by ComputerWeekly.com
IT BRIEFING: This in-depth research from business advisory group CEB assesses IT spending plans in 2013 based on a survey of 180 large international businesses.
Posted: 13 Dec 2012 | Published: 13 Dec 2012

ComputerWeekly.com

Unlocking data with document capture and imaging
sponsored by Kodak
WHITE PAPER: Before your business decides to go completely paperless, there are a few steps you should keep in mind. Consult this expert E-guide to learn more about how you can practice effective document capture. Explore more about how capture and scanning tools provide improved image quality and color by reading this resource now.
Posted: 26 Oct 2012 | Published: 26 Oct 2012

Kodak

McHenry County College: AppSense helps McHenry County College scale IT smoothly to meet increased growth
sponsored by AppSense
CASE STUDY: In this solution case-study, you’ll learn more about McHenry County College, an Illinois-based community college that serves a large number of traditional and adult students, and the steps they took after experiencing problems with their Active Directory roaming profile environment following a rapid growth in student enrollment.
Posted: 22 Jul 2013 | Published: 22 Jul 2013

AppSense

Case Study: Fransicican Missionaries of Our Lady Health System
sponsored by AppSense
WHITE PAPER: Read this whitepaper to learn how one major healthcare provider that manages roughly 13,000 employees and 8000 contract staff were able to use user virtualization to improve clinical workflow and gain a competitive advantage.
Posted: 19 Jul 2013 | Published: 18 Jul 2013

AppSense

Case Study: Global Law Firm Solves Privilege Management Issues with User Virtualization
sponsored by AppSense
CASE STUDY: In this case-study, you’ll discover how a global, highly regulated law firm was able to eliminate end-user management issues with a people-centric user virtualization solution.
Posted: 19 Jul 2013 | Published: 19 Jul 2013

AppSense

How to Optimize IT Initiatives with User Virtualization
sponsored by AppSense
WHITE PAPER: This whitepaper explains how user virtualization works to span both physical and virtual desktops, allowing you to manage all aspects of the user independent of your method of desktop delivery.
Posted: 19 Jul 2013 | Published: 19 Jul 2013

AppSense

Intelligent Authentication and User Access Balancing Security and Convenience
sponsored by CA Technologies.
WHITE PAPER: Inside this vital resource, uncover the new technologies and trends sweeping the nation – and the security effects they are having – and discover how advanced intelligent authentication is key to ensuring your security needs are met.
Posted: 12 Jul 2013 | Published: 31 Dec 2012

CA Technologies.

Single Source of Truth: A Guide for Real User Measurement in the Workplace
sponsored by SOASTA, Inc
WHITE PAPER: Inside this valuable resource, discover how, by measuring from the user's browser or app, real user management (RUM) tools can quantify the correlation between page load time and user engagement, and show where to optimize performance for more positive outcomes.
Posted: 11 Jul 2013 | Published: 11 Jul 2013

SOASTA, Inc

Accelerate App Delivery, Improve App Performance, and Spur Innovation
sponsored by CA Technologies.
WHITE PAPER: Learn about a set of application performance management (APM) and capacity management solutions that together facilitate information sharing between your DevOps teams, in end leading to better app deployments, improved monitoring, lowered number of risks, and reduced repair times.
Posted: 28 Jun 2013 | Published: 31 Aug 2012

CA Technologies.

Customer Experience Management in the New Era of Mobility
sponsored by IBM
WHITE PAPER: View this white paper to learn more about how your business can obtain higher revenues, lower costs and higher customer satisfaction. Mobility provides businesses with the opportunity to provide customers with unique value. It gives customers a channel to interact with their preferred companies.
Posted: 05 Jun 2013 | Published: 24 Aug 2012

IBM

Developing a Solid Web Content Management Strategy
sponsored by Limelight Networks, Inc.
EGUIDE: In this expert e-guide, find five must-see steps that will help your organization enable Web content management (WCM) success. Also inside, uncover top tips for planning an intelligent WCM strategy.
Posted: 21 May 2013 | Published: 21 May 2013

Limelight Networks, Inc.

Data Centre to Cloud
sponsored by Juniper Networks, Inc.
VIDEO: Leave the complexity of your legacy data center network and upgrade to a revolutionary 3-2-1 data center network architecture that will help make your organization cloud-ready today and for years to come.
Posted: 17 May 2013 | Premiered: 17 May 2013

Juniper Networks, Inc.

IDC Buyer Case Study: Customer-Centric, User-Friendly Videoconferencing
sponsored by Vidyo, Inc.
WHITE PAPER: This IDC Buyer Case Study explores which videoconferencing solution Mydin, Malaysia's largest retailer enterprise, put in place to help connect and communicate, reduce costs, and achieve an optimal ROI.
Posted: 07 May 2013 | Published: 31 Jul 2012

Vidyo, Inc.

Defining VDI users: Who should really be using virtual desktops?
sponsored by VMware, Inc.
EGUIDE: This expert guide from SearchVirtualDesktops.com can help you define your VDI users so that you can determine who in your organization benefits the most from virtual desktops, allowing you to provide them to the workers who would get the most value from them.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

VMware, Inc.

MOBILE OPTIMIZATION: How Testing on Smartphones and Tablets Lifts Conversion
sponsored by WebTrends
WHITE PAPER: In this white paper, discover a new set of best practices for optimizing and monetizing mobile development, focusing on CRM, layout, and usability. Read on for more information and best practices on testing and optimization, segmentation and targeting, case studies of successful mobile migrations, and more.
Posted: 16 Apr 2013 | Published: 16 Apr 2013

WebTrends

Presentation Transcript: Content Monitoring in the Enterprise
sponsored by Lumension
PRESENTATION TRANSCRIPT: This presentation transcript will help readers learn key strategies to meet both business security needs and user demands. Discover more about topics such as setting content monitoring goals, data loss prevention technologies, database activity monitoring, and more.
Posted: 04 Jan 2013 | Published: 04 Jan 2013

Lumension

End-to-End Network Application Performance Monitoring
sponsored by Ixia
EGUIDE: This quick E-Guide from SearchNetworking.com explores why multiple tools are necessary for true end-to-end monitoring and offers tips that will help you deal with multiple tools.
Posted: 14 Dec 2012 | Published: 14 Dec 2012

Ixia

Considering a BYOPC Strategy
sponsored by Symantec Corporation
EGUIDE: Before implementing a BYOPC strategy, it is imperative to take many security and management factors into account. Check out this E-Guide from SearchConsumerization.com to learn all about the BYOPC trend, the pros and cons, and what you need to know before implementation.
Posted: 20 Nov 2012 | Published: 20 Nov 2012

Symantec Corporation

Magic Quadrant for Security Information and Event Management
sponsored by Hewlett-Packard Limited
WHITE PAPER: View this helpful white paper to learn more about analyzing security event data in real time for effective threat management. It outlines some of the top vendors who have technologies that are designed to help collect, store, analyze and report log data.
Posted: 19 Sep 2012 | Published: 19 Sep 2012

Hewlett-Packard Limited

Securely Enable Online Business
sponsored by CA Technologies.
WHITE PAPER: Historically, security practices meant less productivity and growth for businesses, but it no longer has to be a trade-off. In order for organizations to effectively grow their business, protection and efficiency need to go hand in hand. Read this white paper to find out more about improving security without sacrificing productivity.
Posted: 10 Sep 2012 | Published: 10 Sep 2012

CA Technologies.
51 - 75 of 224 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement