Searching all of TechTarget| 105,810 results for "user"

Conversations: CPYFRMQRYF ends in Error for some users

See all conversation search results provided by ITKE.

SearchEnterpriseDesktop

By Robert Sheldon Get Started May 21, 2015

Group applications, users with Windows Apportals

With Windows Apportals, IT administrators can build custom environments -- which include specific applications and data -- for groups of users, which lets users skip the Start menu and get right to the tools they ... Continue Reading

MicroscopeUK

By Simon Quicke Jul 01, 2015

No support means just that for Windows Server 2003 users

Vendors, resellers and analysts are all warning that after 14 July those users still on Windows Server 2003 will be in a lonely place Continue Reading

ComputerWeekly

By Warwick Ashford Jun 30, 2015

Most VPNs leak user details, study shows

Researchers have found nearly 80% of popular VPN providers leak information about the user because of a vulnerability known as IPv6 leakage Continue Reading

SearchContentManagement

By Dan Sullivan Manage Jun 23, 2015

How to define user access controls for cloud content services

As companies move content to the cloud, they need to sort out how to secure access to that information. Continue Reading

MicroscopeUK

By Simon Quicke Jun 22, 2015

Business users are still taking the tablets

Figures from IDC have indicated that the corporate market remains a healthy customer of tablets as mobility continues to spread across the enterprise Continue Reading

SearchSecurity

By Randall Gamby Get Started Jun 17, 2015

What does bimodal IAM mean for user credentials?

Bimodal IAM may be a new term, but this new way to use user credentials should probably already be in practice among secure organizations. Continue Reading

ComputerWeekly

By Clare McDonald Jun 09, 2015

HMRC denies reports of Verify causing users problems

HMRC has denied that problems faced by the public attempting to claim marriage tax breaks are caused by the Gov.uk Verify scheme Continue Reading

SearchSecurity

By Kathleen Richards Evaluate Jun 02, 2015

User behavior analytics: Conquering the human vulnerability factor

How do they know it’s really you? New behavioral technologies use data science to monitor user activity within the network. Continue Reading

ComputerWeekly

By Kayleigh Bateman May 29, 2015

Computer Weekly European User Awards 2015 shortlist

Find out who made the Computer Weekly European User Awards 2015 shortlist Continue Reading

SearchEnterpriseDesktop

By Eddie Lockhart Manage May 28, 2015

Strong BYOD strategy balances IT, user needs

The BYOD movement marked a major transition in the enterprise. Instead of managing a fixed number of in-office desktops, IT now has to control an unending stream of endpoints while delivering the performance its ... Continue Reading