app users

Results 176 - 200 of 461Sort Results By: Published Date | Title | Company Name
Published By: NetApp     Published Date: Dec 09, 2014
This paper examines that there are all sorts of elements—differing applications, attitudes, budgets, outcomes for the business—that go into the decision of how much and what type of solid-state storage to use. And how this large range of use cases inherently means that users are going to need a portfolio of solid-state deployment options because no single product is going to solve everything for everyone. The paper then examines NetApp’s flash portfolio and belief that the right storage solution at all times balances performance, capacity, functionality and manageability: this means that for flash too, multiple approaches will become the standard for enterprises as they evolve their long-term IT strategies.
Tags : 
flash storage, flash solutions, it-strategies, netapp, business objectives, solid-state storage, it strategies
    
NetApp
Published By: Forcepoint     Published Date: Jun 06, 2019
Your people access and share data using a myriad of different cloud apps. The bad news is, you probably have no idea how your data is used, where it travels to and the level of associated risk. You’ve lost visibility and control. The good news is, we can help get it back. Register now for a FREE Cloud Threat Assessment and detailed report of your cloud-application risk posture. This in-depth assessment will show you: Cloud usage patterns. How potentially harmful activities happen in cloud applications across your organization. Geographical usage. Which countries your data is traveling to and from (you may be surprised). Privileged users. Do you have more administrators than you need? Dormant users. Are you overspending on unused licenses? Riskiest users. Who are your riskiest users and why? You'll receive customized assessments on Office365, Box, G Suite, and Salesforce.com.
Tags : 
    
Forcepoint
Published By: Akamai Technologies     Published Date: Apr 13, 2018
In The Top Technologies to Cure Mobile Performance, Forrester’s Mark Grannan elaborates on this reality and explains how firms can tackle the device, bandwidth, and location challenges to appeal to a users perception of performance. In this paper, Mark explains: Why a Delivery Tier is Necessary Why Perception of Performance is the Key Metric of Mobile Success How User Context Steers Performance Optimization Whether to Build or Buy Delivery Capabilities Why the Delivery Tier Alone is Not Enough to Improve Performance.
Tags : 
technology, mobile, forrester, performance, optimization, device, bandwidth
    
Akamai Technologies
Published By: Entrust Datacard     Published Date: Sep 14, 2018
Digital is changing the face of business, and your security needs are evolving along with it. The widespread adoption of technologies and applications like mobile, VPN and Office 365 have enabled your users a more frictionless work experience. But how can you ensure those experiences are also secure? Forrester recently surveyed 100 IT and security executives to understand their current approaches to user authentication and access management. Check out the 2018 Forrester Opportunity Snapshot — Modern Authentication Methods Protect and Enable study to learn what authentication methods other companies are using and which of these methods are most effective.
Tags : 
authentication, knowledge-based authentication (kba), multifactor authentication, out-of-band authentication, two-factor authentication, identity as a service (idaas), enterprise mobility
    
Entrust Datacard
Published By: Oracle Analytics     Published Date: Oct 06, 2017
Empowered with mobile and cloud-based access to a myriad of products and services, customers now have a variety of options at their fingertips with regards to partnerships. Enterprises that do not follow the ever-changing tastes and preferences of their customers, or that wait too long to react, will fall behind and fail. Across functions, business professionals readily require big data tools and insights to understand and serve these customers. It is no longer an option for business users to rely on IT to deliver customer and other relevant analytics. On the flipside, handing the analytics reins entirely to business users can make governance nearly impossible. Organizations must find balance in a new approach in which IT mostly governs and curates data while business users are empowered to derive insights from data mostly ontheir own without delay.
Tags : 
    
Oracle Analytics
Published By: Cherwell Software     Published Date: Sep 22, 2015
The next generation user expects more do-it-yourself IT offerings. Whether it’s self-service portals with interfaces to rival Amazon or personal mobile devices with 24/7 business access, users are requesting more self-service functions and capability. To the modern user of technology “consumer-grade” has become a standard, and it’s ITs’ job to not only appease but genuinely satisfy contemporary users. This research highlights four ways to satisfy the modern user who brings their own knowledge, devices, applications and technical expectations to the workplace.
Tags : 
business enablement, cloud applications, cloud computing, cloud infrastructure, cloud strategy
    
Cherwell Software
Published By: Menlo Security     Published Date: Nov 11, 2019
"Digital Transformation Is Changing How Enterprises Provide Secure Web Access to Users. According to Gartner, “Digital business and edge computing have inverted access requirements, with more users, devices, applications, services, and data located outside of an enterprise than inside.” A New Approach to Enterprise Security in the Cloud Is Needed. Gartner recommends, “Complexity, latency and the need to decrypt and inspect encrypted traffic once will increase demand for consolidation of networking and security-as-a-service capabilities into a cloud-delivered secure access service edge (SASE, pronounced “sassy”).” This new approach requires an Internet isolation solution that: - Provides 100 percent malware-free email and web browsing - Preserves the native email and web browsing experience - Gives users ubiquitous yet secure access wherever they work Menlo already offers the solution that delivers on Gartner’s vision of network security in the cloud. Find out more by downloading t
Tags : 
    
Menlo Security
Published By: SecureAuth     Published Date: Aug 08, 2017
Office 365 has eclipsed all other cloud applications to emerge as the most widely used enterprise cloud service by user count. It’s easy to understand why: With Office 365, organizations no longer have to pay for hardware or resources to manage software in their own data centers, and their users always have the latest versions of applications. But Office 365 comes with significant security concerns, especially as organizations store more and more sensitive and business-critical data there. One study reports that virtually every organization experiences at least one cloud-based threat each month — and the average has soared to nearly 6 incidents every week. What can organizations do to protect their Office 365 environments? Read the white paper to learn.
Tags : 
    
SecureAuth
Published By: Riverbed DE     Published Date: Oct 16, 2017
GHD, a global company employing over 8500 people across 10 countries providing engineering, architecture, environment, and construction services to public and private sector clients, anticipates a cost savings of USD 1 million per year after implementing Riverbed’s SteelConnect across their organization. Understand how GHD: • Reduced their networking overhaul from 3 months to just 4 weeks • Enabled zero-touch network deployments to 50+ branch offices • Seamlessly integrated SteelConnect into existing Riverbed WAN and application optimization solutions • Reduced global telecommunications costs by 75% • Provided access to their entire business services offering to all connected end users • Shifted costs from expensive MPLS connections
Tags : 
engineering, architecture, environment, public sector, private sector, ghd
    
Riverbed DE
Published By: GlobalSCAPE     Published Date: Jan 08, 2008
Jordan & Skala Engineers is a growing company with 5 offices.  It needed a scalable solution to optimize their network and their resources as more and more work was distributed across sites. Using GlobalSCAPE WAFS files mirror instantly in real time using byte-level differencing.  So as soon as a file is saved or closed, the file deltas appear in every other location on the network. Users are never waiting for files to upload, download, or open across a network.
Tags : 
wide area networks, wan, wans, wafs, wafs, file transfer, file transmission, globalscape, ftp, eft, mft, managed file transfer, case study
    
GlobalSCAPE
Published By: Commvault     Published Date: Jul 06, 2016
How do you maintain the security and confidentiality of your organization’s data in a world in which your employees, contractors and partners are now working, file sharing and collaborating on a growing number of mobile devices? Makes you long for the day when data could be kept behind firewalls and employees were, more or less, working on standardized equipment. Now, people literally work on the edge, using various devices and sending often unprotected data to the cloud. This dramatic shift to this diversified way of working has made secure backup, recovery and sharing of data an exponentially more difficult problem to solve. The best approach is to start with a complete solution that can intelligently protect, manage and access data and information across users, heterogeneous devices and infrastructure from a single console - one that can efficiently manage your data for today's mobile environment and that applies rigorous security standards to this function.
Tags : 
commvault, mobile data, file sharing, backup recovery, access, personal cloud approach, data protection, endpoint, end user recovery, control governance
    
Commvault
Published By: IBM     Published Date: Jul 09, 2015
This webinar talks about actionable insights through sentiment analysis of app ratings and reviews, as well as continuous and frictionless quality feedback loop from testers, beta users to end users in both pre-production and production.
Tags : 
application control, application management, quality feedback, sentiment analysis, user experience, mobility, mobile
    
IBM
Published By: Urban Airship     Published Date: Apr 17, 2014
In our latest Good Push Index data study (examining more than 2,400 apps and 500 million push notifications), we reveal how push messaging influences mobile app users’ behavior, measuring both engagement and retention over a six-month period.
Tags : 
urban airship, gpi, good push index, mobile marketing, mobile, mobile app, push notifications, customer engagement, smartphone, app engagement, mobile strategy
    
Urban Airship
Published By: Cloud Sherpas     Published Date: Nov 11, 2015
Are you considering Office 365 because it is what your users are used to? Do you think a move to Google Apps for Business is too big of a change for your users? Watch this webinar featuring Derik VanVleet, Director of Cloud Strategy of Cloud Sherpas to see why moving to Office 365 is actually more disruptive to your users.
Tags : 
    
Cloud Sherpas
Published By: Cloud Sherpas     Published Date: Nov 11, 2015
Are you considering Office 365 because it is what your users are used to? Do you think a move to Google Apps for Business is too big of a change for your users? Watch this webinar featuring Derik VanVleet, Director of Cloud Strategy of Cloud Sherpas to see why moving to Office 365 is actually more disruptive to your users.
Tags : 
go google, google, google apps, cloud sherpas, innovation with cloud sherpas, google for work, enterprise organisations, security, it solutions
    
Cloud Sherpas
Published By: Dell     Published Date: Oct 20, 2008
Managing applications is a big busi¬ness challenge today. When applications must be updated, installed or migrated, companies must ensure disruptions are minimized to keep users productive throughout the pro-cess. Dell provides ser¬vices that can help every step of the way.
Tags : 
dell, application management, application migration, application installation, application testing, vista migration
    
Dell
Published By: Aerohive     Published Date: Jun 15, 2015
Ce document explique comment éliminer la complexité et les coûts des réseaux sans fil traditionnels et créer un réseau prêt pour la mobilité.
Tags : 
mobility, wireless, wlan, wi-fi, mobile applications, mobile users, networks, wireless networks, mobility network
    
Aerohive
Published By: BMC Software     Published Date: Jun 25, 2013
Enterprise users today are busier than ever and have grown accustomed to convenience and simplicity when they use technology in their personal lives. To stay productive at work, they demand faster, easier access to IT services, no matter where they are. BMC Software is meeting the changing demands of service delivery with a new approach to IT self-service. MyIT lets you give them everything they need — all from one simple, intuitive app. Imagine a world where users help themselves and you spent less time on trouble tickets and more time on strategic IT initiatives. No need to imagine, this world exists. Try MyIT today!
Tags : 
enterprise, technology, it services, self-service, technology, software, strategy
    
BMC Software
Published By: Urban Airship     Published Date: Jul 24, 2017
Have you ever wondered how push notifications impact app user retention rates? This first of its kind study analyzed the 90-days after first app open for 63 million new app users, comparing retention rates of those who received push notifications with those who did not. We uncovered surprising, and critical, insights as well as devised recommendations on how to keep users engaged and decrease user churn. This 61 page benchmark report is full of data points, insights and recommendations. Download it to learn about: • The impact of messaging at different intervals in the app user lifecycle • Recommendations on when & what to message to increase new user retention rates • Insights on the data specific to four key verticals - retail, media, sports & recreation and utility & productivity.
Tags : 
retention rates, push notifications, app traffic, user engagement, user churn
    
Urban Airship
Published By: Teradata     Published Date: Jan 27, 2015
There is little question about the role that SAP® BW has historically played in the SAP® infrastructure. It has been a key element in unlocking SAP’s vast and complex store of operational data housed in their ERP applications. One can easily think of BW as the original Rosetta Stone for this data. For without it, end users and IT shops would have faced daunting coding tasks attempting to cull the proper elements out of the SAP® ERP code for reporting. However, BW and the associated tools around it were rudimentary to begin with, and have not advanced to where it meets the pressing demands of todays’ end users. The New Rosetta Stone 2.0 for SAP® ERP Data —And More. Download now!
Tags : 
rosetta stone, data, erp, sap®, teradata
    
Teradata
Published By: Gomez IT     Published Date: Apr 01, 2011
Explore key strategies for monitoring complex Java and .NET applications to ensure IT operations maintains performance and availability end users demand.
Tags : 
java application performance, net application performance, apm, compuware
    
Gomez IT
Published By: AlienVault     Published Date: Oct 21, 2014
Two of the oldest and most common attacks used against web applications, SQL injection attacks and cross-site scripting attacks (XSS), continue to impact thousands of websites and millions of users each year. Finding these exposures quickly is essential in order to prevent system compromise and avoid information leakage. SIEM solutions can be invaluable in this effort by collecting and correlating the data you need to identify patterns that signal an attack.
Tags : 
alienvault, sql injection, web security, cyber attacks, siem solutions, xss, cross site scripting attacks, siem, threat protection
    
AlienVault
Published By: AWS     Published Date: Nov 15, 2018
It isn’t always easy to keep pace with today’s high volume of data, especially when it’s coming at you from a diverse number of sources. Tracking these analytics can place a strain on IT, who must provide the requested information to C-suite and analysts. Unless this process can happen quickly, the insights grow stale. Download your complimentary ebook now to see how Matillion ETL for Amazon Redshift makes it easy for technical and business users alike to participate and own the entire data and analysis process. With Matillion ETL for Amazon Redshift, everyone from CTOs to marketing analysts can generate valuable business intelligence by automating data and analytics orchestrations.
Tags : 
    
AWS
Published By: Keynote     Published Date: Nov 13, 2013
Enterprises are increasingly looking to expand their ALM capabilities to include mobile application testing. Users of HP’s Unified Functional Testing (UFT), formerly QuickTest Pro, now have an option to perform mobile functional testing (regression) with access to real mobile devices hosted in the cloud, leveraging the native test automation capabilities found in UFT.
Tags : 
cell phone app development, mobile phone test, device anywhere, mobile phone testing, testing mobile phone, mobile web test, deviceanywhere, testing for mobile devices, test mobile phones, iphone app testing, mobile site testing, "smartphone testing", mobile website testing, mobile software testing, test mobile applications, "automated mobile testing", application testing software, mobile automation, mobile testing automation, mobile app testing
    
Keynote
Published By: F5 Networks Inc     Published Date: Dec 22, 2014
The new requirements for application delivery mean adopting the principles behind cloud, DevOps, and SDN, and enabling emerging security models. Now you must provision apps in minutes instead of months, and with significantly reduced operational costs. Read this whitepaper to learn how you can manage every delivery aspect of users, applications, systems and infrastructure with an elastic, dynamic infrastructure designed to support these requirements.
Tags : 
application delivery, cloud, devops, sdn, operational costs
    
F5 Networks Inc
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library