IT Management  >   Systems Design and Development  >   Application Development  >   Graphic Design  >   Interface Design  >  

User Needs Assessments

RSS Feed    Add to Google    Add to My Yahoo!
User Needs AssessmentsReports
1 - 25 of 32 Matches Previous Page  | Next Page
How to Take Advantage of User Response Monitoring
sponsored by CA Technologies.
WHITE PAPER: This white paper underscores the importance of user response monitoring and explores three reasons why many organizations fail to capture this critical insight. Discover the capabilities and characteristics to look for as you evaluate your options and gain insight into  use cases where your monitoring solution will prove especially valuable.
Posted: 31 Jul 2013 | Published: 31 Dec 2013

CA Technologies.

The Importance of End-User Experience to Video Collaboration Success
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchUnifiedCommunications.com explores how to calculate the value of video collaboration and why measuring end-user experience is so vital.
Posted: 26 Oct 2012 | Published: 26 Oct 2012

SearchSecurity.com

Get the Whole Picture: Why Most Organizations Miss User Response Monitoring—and What to Do about It
sponsored by CA Technologies.
WHITE PAPER: This whitepaper details the importance of user response time monitoring.
Posted: 06 Jun 2014 | Published: 06 Jun 2013

CA Technologies.

End User Services - Experience true collaboration & business agility
sponsored by Fujitsu
WHITE PAPER: This whitepaper reviews a portfolio of management solutions that simplifies end-user management and service delivery through workplace assessment tools, managed mobile services, managed file services, and much more.
Posted: 03 Apr 2014 | Published: 03 Apr 2014

Fujitsu

Internet-Scale Identity Systems:An Overview and Comparison
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper provides an overview of the benefits of implementing an Internet-based identity system and explores the similarities, differences and synergies among the top technologies and initiatives available.
Posted: 27 Mar 2014 | Published: 04 Mar 2014

Ping Identity Corporation

Application Performance for Business Efficiency
sponsored by IPANEMA TECHNOLOGIES
VIDEO: This quick video reveals how you can regain control of your network and the applications using it with an innovative application performance management solution.
Posted: 29 Aug 2013 | Premiered: 29 Aug 2013

IPANEMA TECHNOLOGIES

Citrix Xendesktop : Desktop Virtualization for all – Technical overview
sponsored by Citrix
WHITE PAPER: In this whitepaper, you’ll find a discussion of the various options that FlexCast provides to help meet the computing requirements of various user types.
Posted: 26 Aug 2013 | Published: 26 Aug 2013

Citrix

Ensuring Quality of Experience: Monitor networks or applications?
sponsored by CA Technologies.
EGUIDE: Experts often debate whether enterprises should focus on network monitoring or on application performance monitoring to measure quality. In this expert e-guide from SearchEnterpriseWAN.com, Gina Narcisi will take you through the steps; helping your organization to decide what they are actually looking to achieve before making the final choice.
Posted: 21 Aug 2013 | Published: 21 Aug 2013

CA Technologies.

PassMark Report: Enterprise Endpoint Security Performance Benchmarks
sponsored by Symantec Corporation
ANALYST REPORT: This PassMark Software report details how six endpoint security solutions fared in a Windows 7 environment. Uncover how each product fared when tested upon sixteen benchmark metrics to get help finding the ideal solution for your enterprise.
Posted: 29 Jul 2013 | Published: 30 Nov 2012

Symantec Corporation

How to Improve Migrations with User and Desktop Virtualization
sponsored by AppSense
VIDEO: Watch this quick video to learn how user and desktop virtualization can not only help make Windows 7 migration simpler, but can make management easier for your IT department while creating a much better user experience.
Posted: 27 Jul 2013 | Premiered: 27 Jul 2013

AppSense

McHenry County College: AppSense helps McHenry County College scale IT smoothly to meet increased growth
sponsored by AppSense
CASE STUDY: In this solution case-study, you’ll learn more about McHenry County College, an Illinois-based community college that serves a large number of traditional and adult students, and the steps they took after experiencing problems with their Active Directory roaming profile environment following a rapid growth in student enrollment.
Posted: 22 Jul 2013 | Published: 22 Jul 2013

AppSense

User Provisioning: The Business Imperative
sponsored by CA Technologies.
WHITE PAPER: Did you know utilizing a comprehensive provisioning tool can help you improve compliance, reduce costs, and improve operational efficiency? Read now to learn more!
Posted: 15 Jul 2013 | Published: 29 Feb 2012

CA Technologies.

Accelerate App Delivery, Improve App Performance, and Spur Innovation
sponsored by CA Technologies.
WHITE PAPER: Learn about a set of application performance management (APM) and capacity management solutions that together facilitate information sharing between your DevOps teams, in end leading to better app deployments, improved monitoring, lowered number of risks, and reduced repair times.
Posted: 28 Jun 2013 | Published: 31 Aug 2012

CA Technologies.

Presentation Transcript: Content Monitoring in the Enterprise
sponsored by Lumension
PRESENTATION TRANSCRIPT: This presentation transcript will help readers learn key strategies to meet both business security needs and user demands. Discover more about topics such as setting content monitoring goals, data loss prevention technologies, database activity monitoring, and more.
Posted: 04 Jan 2013 | Published: 04 Jan 2013

Lumension

End-to-End Network Application Performance Monitoring
sponsored by Ixia
EGUIDE: This quick E-Guide from SearchNetworking.com explores why multiple tools are necessary for true end-to-end monitoring and offers tips that will help you deal with multiple tools.
Posted: 14 Dec 2012 | Published: 14 Dec 2012

Ixia

Virtual Desktop Foundations e-Book: Chapter 1, Restructuring for virtual desktops
sponsored by Citrix
EBOOK: Access this exclusive resource to discover expert advice on introducing virtual desktopsto your work environment.
Posted: 28 Aug 2012 | Published: 01 Dec 2012

Citrix

Top 10 Benefits of Modernizing Your Desktop
sponsored by VMware
WHITE PAPER: Faced with a growing number of client devices, new user requirements, and the challenges of desktop management, many companies are determining that the conventional PC-centric model is no longer effective. This white paper explores the concept behind desktop modernization and outlines ten reasons you should start adopting it.
Posted: 25 Jun 2012 | Published: 22 Jun 2012

VMware

User Experience Monitoring
sponsored by Visual Network Systems
WHITE PAPER: User experience monitoring is vital to your workplace. Learn about the issues that affect the user experience in today’s computing environment and how to monitor that experience, pre-empt problems, and decide what actions you need to take when the user experience is unacceptable.
Posted: 14 Mar 2012 | Published: 31 Mar 2010

Visual Network Systems

End-user Experience Monitoring
sponsored by Nimsoft, Inc.
WHITE PAPER: What exactly is End-user Monitoring (EUM) and why should businesses care? In this resource, discover why it's increasingly important to assess system performance from the end-user perspective in the age of IT as a service, and how you can effectively measure and quantify end-user experiences.
Posted: 13 Feb 2012 | Published: 13 Feb 2012

Nimsoft, Inc.

What Type of Virtualization Should You Use For Each User Segment?
sponsored by Dell, Inc. and Intel®
PRESENTATION TRANSCRIPT: In lesson two of this desktop virtualization classroom, Brian Madden discusses how to segment your users and group them together to figure out what type of desktop virtualization you should use for different groups or users. Then he covers the specific desktop virtualization technologies and the pros and cons of each.
Posted: 23 Dec 2011 | Published: 23 Dec 2011

Dell, Inc. and Intel®

Which Users Should You Virtualize?
sponsored by Dell, Inc. and Intel®
PRESENTATION TRANSCRIPT: Examine your desktop virtualization goals and determine which users you want to virtualize in this expert discussion with Brian Madden. Discover how your goals will change the way you implement your desktop virtualization initiative.
Posted: 22 Dec 2011 | Published: 22 Dec 2011

Dell, Inc. and Intel®

The Great Software Mind Meld: How “The Cloud” Is Helping Vendors Peer Inside the Heads of Prospective Buyers
sponsored by Runaware
WHITE PAPER: The difference between intriguing software and best-selling software is customer insight from feedback. Read this white paper to learn about a cloud-based analytics solution that for the first time allows software vendors to cull actionable intelligence from reliable, untainted customer feedback.
Posted: 14 Jul 2011 | Published: 30 Jun 2011

Runaware

Is your user management process getting you down? Improving efficiency and security through automation
sponsored by NetIQ Europe
WHITE PAPER: Access control is something that has hindered business for years. There can be a variety of different levels of access a user may posses at a company. Some users may need to access different programs than others, so they would require a different level of access.
Posted: 04 May 2011 | Published: 02 May 2011

NetIQ Europe

E-Guide: Developing a Strategy for and Implementing Real-time BI and Analytics
sponsored by Tableau Software
EGUIDE: Many organizations are realizing the interesting and paradoxical pattern that exists with BI applications: the more you use them, the more new and different requirements keep pouring in. Read this E-Guide and learn to gain a stronger understanding of your customers and business as well as to excel in today’s competitive market with real-time BI.
Posted: 15 Apr 2011 | Published: 15 Apr 2011

Tableau Software

Tackling the Top Five Network Access Control Challenges
sponsored by Juniper Networks, Inc.
WHITE PAPER: In this document we explore five common networking challenges that enterprises face—network protection, guest user access, network visibility and monitoring, application access control, and identity-based Quality of Service (QoS)—and discuss how UAC can be used to address each
Posted: 28 Mar 2011 | Published: 28 Mar 2011

Juniper Networks, Inc.
1 - 25 of 32 Matches Previous Page    1 2    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement