Searching all of TechTarget| 119,085 results for "user"

SearchVirtualDesktop

By Brien Posey Evaluate May 16, 2016

How to shelter users from a VDI boot storm

Boot storms bring VDI deployments to a grinding halt, but batch booting and network interface card teaming can prevent the problem without having to buy new hardware. Continue Reading

ComputerWeekly

By Cliff Saran Mar 21, 2016

Juggling a diverse user infrastructure

CISOs are facing an increasingly fluid workplace and control of modern IT systems needs to reflect this dynamism Continue Reading

SearchSAP

By Jim O'Donnell News Apr 27, 2016

User experience software helps to improve user adoption and ROI

User experience software from Knoa helps a public utility run its SAP ERP more effectively; plus, new report shows ERP projects cost less, but run longer -- and that's a good thing. Continue Reading

SearchDataCenter

By Austin Allen Evaluate Apr 29, 2016

Users, experts speak out about DCIM tools

Users and experts explore their thoughts on the usefulness and future of DCIM tools. Continue Reading

ComputerWeekly

By Bob Tarzey Mar 23, 2016

How to manage IT access for external users

Identity and access management has extended from being solely an internal IT management process to focus on external business engagement too Continue Reading

ComputerWeekly

By Philip Virgo News May 21, 2016

The battle for the heart of the Internet: advertisers versus users

The measures planned for inclusion in the Digital Economy Bill are unlikely to address the growing divide between the advertising-funded business models of global internet service providers and ... Continue Reading

SearchSecurity

By Michael Cobb ,Rob Shapland ,Johna Till Johnson Manage May 20, 2016

Learn about user authentication methods, from passwords to biometrics

The password is not dead yet: Most enterprise personnel use a password to log into a site or a device every day. This three-part technical guide looks at how passwords can be better employed, while they are still ... Continue Reading

SearchSecurity

By Nick Lewis Get Started May 19, 2016

How does SlemBunk collect Android user credentials?

An Android Trojan called SlemBunk is impersonating banking applications in order to collect user credentials. Expert Nick Lewis explains the security measures to stop this malware. Continue Reading

SearchMobileComputing

By Eddie Lockhart Manage May 16, 2016

Apple Watch pros and cons for enterprise users

The Apple Watch is no enterprise staple, but it has the potential to improve business efficiency thanks to its convenient features. Its security is an issue, however. Continue Reading

ComputerWeekly

By Brian McKenna May 09, 2016

SAP users lack clarity on cloud portfolio

The UK and Ireland SAP user group has found a majority of members to be using the supplier’s cloud portfolio, but many are unconvinced by its business value Continue Reading