Business of Information Technology  >   Business Processes  >   Product Development  >  

User Experience

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Customer Experience, UX, Web User Experience
DEFINITION: The overall experience and satisfaction a user has when using a product or system.
User ExperienceReports
76 - 100 of 241 Matches Previous Page  | Next Page
Innovative business technologies in a converging world
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This independently researched report investigates converging business technologies, including cloud computing, big data analytics and business intelligence.  
Posted: 18 Feb 2013 | Published: 18 Feb 2013

ComputerWeekly.com

2012-2013 IT Budget Benchmark
sponsored by ComputerWeekly.com
IT BRIEFING: This in-depth research from business advisory group CEB assesses IT spending plans in 2013 based on a survey of 180 large international businesses.
Posted: 13 Dec 2012 | Published: 13 Dec 2012

ComputerWeekly.com

Considering a BYOPC Strategy
sponsored by SearchSecurity.com
EGUIDE: Before implementing a BYOPC strategy, it is imperative to take many security and management factors into account. Check out this E-Guide from SearchConsumerization.com to learn all about the BYOPC trend, the pros and cons, and what you need to know before implementation.
Posted: 20 Nov 2012 | Published: 20 Nov 2012

SearchSecurity.com

Unlocking data with document capture and imaging
sponsored by Kodak
WHITE PAPER: Before your business decides to go completely paperless, there are a few steps you should keep in mind. Consult this expert E-guide to learn more about how you can practice effective document capture. Explore more about how capture and scanning tools provide improved image quality and color by reading this resource now.
Posted: 26 Oct 2012 | Published: 26 Oct 2012

Kodak

The Importance of End-User Experience to Video Collaboration Success
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchUnifiedCommunications.com explores how to calculate the value of video collaboration and why measuring end-user experience is so vital.
Posted: 26 Oct 2012 | Published: 26 Oct 2012

SearchSecurity.com

Video collaboration usage policies should consider user experiences
sponsored by SearchSecurity.com
EGUIDE: Evaluate the pros and cons of video collaboration in this expert e-guide, and discover how businesses can overcome key user experience challenges with the right policies and management tactics.
Posted: 18 Jul 2012 | Published: 18 Jul 2012

SearchSecurity.com

Data Centre to Cloud
sponsored by Juniper Networks, Inc.
VIDEO: Leave the complexity of your legacy data center network and upgrade to a revolutionary 3-2-1 data center network architecture that will help make your organization cloud-ready today and for years to come.
Posted: 17 May 2013 | Premiered: 17 May 2013

Juniper Networks, Inc.

IDC Buyer Case Study: Customer-Centric, User-Friendly Videoconferencing
sponsored by Vidyo, Inc.
WHITE PAPER: This IDC Buyer Case Study explores which videoconferencing solution Mydin, Malaysia's largest retailer enterprise, put in place to help connect and communicate, reduce costs, and achieve an optimal ROI.
Posted: 07 May 2013 | Published: 31 Jul 2012

Vidyo, Inc.

Defining VDI users: Who should really be using virtual desktops?
sponsored by VMware, Inc.
EGUIDE: This expert guide from SearchVirtualDesktops.com can help you define your VDI users so that you can determine who in your organization benefits the most from virtual desktops, allowing you to provide them to the workers who would get the most value from them.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

VMware, Inc.

MOBILE OPTIMIZATION: How Testing on Smartphones and Tablets Lifts Conversion
sponsored by WebTrends
WHITE PAPER: In this white paper, discover a new set of best practices for optimizing and monetizing mobile development, focusing on CRM, layout, and usability. Read on for more information and best practices on testing and optimization, segmentation and targeting, case studies of successful mobile migrations, and more.
Posted: 16 Apr 2013 | Published: 16 Apr 2013

WebTrends

UC's Impact on the Network
sponsored by SearchUnifiedCommunications.com
EZINE: This TechGuide from SearchUnifiedCommunications.com looks at how UC applications affect network performance and explains the importance of coordinating deployments with other enterprise IT plans.
Posted: 14 Mar 2013 | Published: 14 Mar 2013

SearchUnifiedCommunications.com

Presentation Transcript: Content Monitoring in the Enterprise
sponsored by Lumension
PRESENTATION TRANSCRIPT: This presentation transcript will help readers learn key strategies to meet both business security needs and user demands. Discover more about topics such as setting content monitoring goals, data loss prevention technologies, database activity monitoring, and more.
Posted: 04 Jan 2013 | Published: 04 Jan 2013

Lumension

End-to-End Network Application Performance Monitoring
sponsored by Ixia
EGUIDE: This quick E-Guide from SearchNetworking.com explores why multiple tools are necessary for true end-to-end monitoring and offers tips that will help you deal with multiple tools.
Posted: 14 Dec 2012 | Published: 14 Dec 2012

Ixia

Magic Quadrant for Security Information and Event Management
sponsored by Hewlett-Packard Limited
WHITE PAPER: View this helpful white paper to learn more about analyzing security event data in real time for effective threat management. It outlines some of the top vendors who have technologies that are designed to help collect, store, analyze and report log data.
Posted: 19 Sep 2012 | Published: 19 Sep 2012

Hewlett-Packard Limited

Securely Enable Online Business
sponsored by CA Technologies.
WHITE PAPER: Historically, security practices meant less productivity and growth for businesses, but it no longer has to be a trade-off. In order for organizations to effectively grow their business, protection and efficiency need to go hand in hand. Read this white paper to find out more about improving security without sacrificing productivity.
Posted: 10 Sep 2012 | Published: 10 Sep 2012

CA Technologies.

SharePoint Security in Action: Best Practices Drive Secure Collaboration
sponsored by CA Technologies.
WHITE PAPER: Microsoft SharePoint is a widely deployed enterprise content management (ECM) and collaboration system because it delivers a functional user experience. However, it also presents some security concerns. Consult this informative white paper to learn more about some of the challenges and how to remedy these obstacles.
Posted: 10 Sep 2012 | Published: 10 Sep 2012

CA Technologies.

Endpoint Protection Small Business Edition
sponsored by Symantec Corporation
VIDEO: Small businesses may think they have enough protection, but they are at risk to attacks. The budget and staff for small businesses is often smaller than larger corporations, so they need a security plan that protects against a multitude of attacks. View this video to learn more about endpoint protection for small businesses.
Posted: 05 Sep 2012 | Premiered: 05 Sep 2012

Symantec Corporation

Virtual Desktop Foundations e-Book: Chapter 1, Restructuring for virtual desktops
sponsored by Citrix
EBOOK: Access this exclusive resource to discover expert advice on introducing virtual desktopsto your work environment.
Posted: 28 Aug 2012 | Published: 01 Dec 2012

Citrix

4 Steps to Creating a Mobile Strategy
sponsored by Appcelerator
WHITE PAPER: Read this white paper to learn four steps to decrease time-to-market and development costs, increase customer adoption and revenues, and enjoy greater flexibility and control when launching enterprise mobile apps.
Posted: 20 Aug 2012 | Published: 20 Aug 2012

Appcelerator

Contextual Authentication: A Multi-factor Approach
sponsored by PortalGuard
WHITE PAPER: This informative white paper offers a few solutions for remaining efficient without sacrificing security. It provides an explanation on the midpoint between better password policies and two-factor authentication processes. Your data deserves the utmost protection, access this white paper now so you can ensure security.
Posted: 17 Aug 2012 | Published: 17 Aug 2012

PortalGuard

Leveraging SAML for Federated Single Sign-on: Seamless Integration with Web-based Applications whether cloudbased, private, on-premise, or behind a firewall
sponsored by PortalGuard
WHITE PAPER: Consult this informative white paper to find out how you can resolve issues with user-accessibility. Single sign-on can eliminate problems with multiple password prompts and make accessibility easier for the user. Learn why a single sign-on process can help handle an organizations multiple cloud applications as well as provide secure accessibility.
Posted: 13 Aug 2012 | Published: 13 Aug 2012

PortalGuard

Citrix XenClient Virtual desktops… to go
sponsored by Citrix Systems, Inc.
PRODUCT OVERVIEW: This solution guide examines the computing requirements of today's highly mobile workforce and details the security and management issues that frequently accompany them. Find out how desktop virtualization can help to mitigate laptop-related risks and explore the competitive marketplace for this technology.
Posted: 06 Aug 2012 | Published: 06 Aug 2012

Citrix Systems, Inc.

Windows 7 Migrations and Beyond: Ensuring Successful OS Migrations while Boosting Productivity and Simplifying Management
sponsored by RES Software
WHITE PAPER: This white paper describes common Windows 7 migration paths and the challenges associated with them. Find out how you can successfully manage the user experience and avoid time-consuming issues as you navigate your transition.
Posted: 01 Aug 2012 | Published: 01 May 2012

RES Software

The Ten Must Haves for Secure Mobile Device Management
sponsored by Zenprise
WHITE PAPER: Businesses are changing their traditions as employees continue to adopt mobile phone practices. Enterprise mobility may be efficient, but it can also put important company data at risk. Learn more about how you can have secure mobile device management with this valuable resource.
Posted: 01 Aug 2012 | Published: 01 Aug 2012

Zenprise

Tablets Welcomed. How to Get Any Device, on Any Network Reliably and Securely
sponsored by Cisco
WHITE PAPER: Discover how you can embrace the tablet invasion into your workplace with an architectural network approach that will enhance user experience, mitigate security issues, and enforce effective management.
Posted: 24 Jul 2012 | Published: 30 Jun 2011

Cisco
76 - 100 of 241 Matches Previous Page    2 3 4 5 6 7    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement