ComputerWeekly.com Research Library

Powered by Bitpipe.com

User Interfaces Research

  • E-Book: New Enterprise Desktop Chapter 3: Windows 7 Security: Strengths and Weaknesses

    Sponsored by: TechTarget Data Center

    Each new OS is touted as the “Holy Grail” of features that every IT pro has been waiting for. Windows 7 is no different. This chapter looks at the Windows 7 security features such as BitLocker and Action Center, and separates those that really count from those that sound better on paper.

  • Optimizing Intelligent Clients for Desktop Virtualization

    Sponsored by: Intel

    There are many options available for desktop virtualization today. In this expert video, learn about the intelligent client approach to desktop virtualization.

  • Presentation Transcript:  Best Practices for Windows 7 Migration

    Sponsored by: Dell KACE

    With a Windows 7 migration likely in the near future, preparation and planning are essential. Access this exclusive presentation transcript to learn some actionable best practices for the Windows 7 migration, including using clean installations, categorizing applications, and virtualizing applications and desktops.

  • AppSense User Virtualization Platform

    Sponsored by: AppSense

    Among a number of important changes to the enterprise computing environment, none are perhaps as impactful as those surrounding the end user. Take a look at this resource to learn how user virtualization is the key to offering your end-user community an effective and consistent computing experience, no matter the location, device or application.

  • AppSense The Low down: What does user virtualization boil down to?

    Sponsored by: AppSense

    Traditional roaming profiles can no longer provide one, consistent and stable platform for your users. Access this exclusive resource to uncover the 10 reasons for adopting user virtualisation.

  • Addressing Outlook Security Concerns and Preparing Mobile Users for an Exchange Migration

    Sponsored by: Thawte Inc.

    Users enticed by the ability to check email at a glance increasingly log onto Exchange 2010 remotely and cause new security risks. This expert e-guide from SearchExchange.com explains how to address these Outlook security concerns by creating a buffer zone between your internal network and the Internet.

  • eBook: The Shortcut Guide to User Workspace Management - Chapter 2: Personalization Equals Content + Context

    Sponsored by: RES Software

    That’s why personality - and the preservation of personality, no matter how our users might connect—is so incredibly important. Read Chapter 2 of this series to learn more about the importance of personalization.

  • eBook: The Shortcut Guide to User Workspace Management - Chapter 3: Tying Security to People, Not Devices

    Sponsored by: RES Software

    Today’s unpredictable user needn't necessarily complicate the application of security configurations. In fact, with the right technology in place, the idea of where security is applied grows less important. Replacing it is a new focus on how that security is applied. With User Workspace Management, that how  ties security to...

  • E-Book: Taking Mobile CRM Beyond the Sales Force

    Sponsored by: Sybase, an SAP company

    Mobility was going to be "the next big thing" in CRM but didn’t pan out, with "road warriors" frustrated with user interfaces meant for a PC. But the success of smart phones has changed the game. This e-book helps enterprises understand the marketplace for devices, applications and managing it all in order to create a mobile CRM program.

  • BlackBerry Developer Labs

    Sponsored by: BlackBerry

    Learn more about developing for the BlackBerry platforms with these hands-on exercises: BlackBerry® Browser labs, Rapid Application Development labs, and BlackBerry® Java® Development Environment labs.

  • SharePoint Conference 2009: Steve Ballmer Keynote Address

    Sponsored by: Microsoft Corporation India Pvt Ltd

    This video covers highlights from the Microsoft SharePoint Conference in 2009, including Microsoft CEO Steve Ballmer's keynote address.

  • Presentation Transcript: The Importance of User Workspace Virtualization in Desktop Virtualization

    Sponsored by: RES Software

    In this presentation transcript featuring industry expert, Brian Madden, learn how to meet user needs when virtualizing desktops. Discover how to reduce costs and simplify desktop management by installing a master operating system that all users share. Learn how to get a personalized user workspace even when sharing a master virtual desktop image.

  • Guide: Desktop Authority

    Sponsored by: ScriptLogic Corporation

    Desktop Authority comprehensively manages the Windows desktop throughout the desktop lifecycle, reducing the total cost of desktop and application ownership.

  • Oracle WebLogic Server - A Solid Foundation for SOA

    Sponsored by: Oracle Corporation

    This white paper shows how Oracle WebLogic Server supports the next generation of enterprise applications and services. Learn how to leverage the Java EE 5 advantage and dramatically speed development of SOA applications.

  • Nucleus RTOS

    Sponsored by: Mentor Graphics

    Complex microprocessors lie at the heart of every electronic device and embedded system in use today - from mobile phones to brain scanners. Such products demand sophisticated software to get the job done, and that's where operating systems come in.

  • Prototyping Data Warehouses Using Visual Analytics: Presentation Transcript

    Sponsored by: Tableau Software

    Read this presentation transcript of the “Prototyping Data Warehouses using Visual Analytics” webinar that includes a case study demonstrating how the City of Charlotte is administering Tableau Server to reduce IT intervention, reduce costs and increase collaboration between business units.

  • Usability as an ERP Selection Criteria

    Sponsored by: IFS

    ERP software is often criticized for being complex and difficult to use. Read this paper to learn how to evaluate ERP software for usability.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.