Usability Recommendations For TV Everywhere
|
|
|
- Lewis Clark
- 9 years ago
- Views:
Transcription
1 Open Authentication Technology Committee Usability Recommendations For TV Everywhere OATC TV Everywhere Usability Working Group 8/25/2015 Version 2.1
2 Contents Introduction... 3 Overview... 3 Usability Recommendations... 3 Legal Notice... 8 Open Authentication Technology Committee 2 August 25, 2015
3 Introduction The purpose of this document is to outline the OATC-endorsed Usability Recommendations for the TV Everywhere authentication experience. This document represents an initial set of recommendations based on Usability Testing that was conducted by the OATC in April This set of OATC TVE Usability Guidelines are aligned with CTAM s TVE Usability Recommendations and extend them in some areas. To reference the most current CTAM TVE Usability Recommendations, please refer to this link: Overview The objective of the OATC Usability Testing was to explore consumer reactions, both rational and emotional, to multiple aspects of the TV Everywhere authentication process, including but not limited to: TV Service Provider Picker, TV Service Provider sign in confirmation, Help/FAQs, tutorials, and iconography. Results of this research should be used by Programmers and Distributors to refine these elements, the authentication process, and more broadly, to inform the OATC s efforts at increasing adoption of TV Everywhere. Usability Recommendations 1.0 TV Service Provider Picker 1.1 Desktop / Tablet Present the top 9 TV Service Providers in a grid display using logos, as a default view, with the option to See All Providers in an alphabetical list view also with the use of logos. The logos should be presented in a way that the user understands they are clickable objects. The option to search for a provider should be on the default view and should filter results based on letters as they are typed. Include a link for Provider Not Found to display messaging to explain to the user the product is only available through participating TV Service Providers. The testing for desktop and tablets did not indicate a strong preference of displaying 9 logos or 12 logos by default, however 12 choices presents the user with a higher cognitive load therefore for simplicity sake, presenting 9 logos in the default view is a simplified user experience. As the underlying technology of presenting TV Service Providers based on a user s location or presenting a last used TV Service Provider is adopted, the recommendation will be to make the default view more dynamic to support a UI with fewer choices including the option to see all providers. Open Authentication Technology Committee 3 August 25, 2015
4 1.2 Phone Present the top 9 TV Service Providers in a list view display using logos, as a default view, with the option to See All Providers in an alphabetical list view also with the use of logos. The logos should be presented in a way that the user understands they are selectable objects. The option to search for a provider should be on the default view and should filter results based on letters as they are typed. Include a link for Provider Not Found to display messaging to explain to the user the product is only available through participating TV Service Providers. 1.3 Help / FAQ / Tutorials In terms of presenting the user with supporting information on how to sign in, the recommendation is to have a Help, FAQ, or a Tutorial option (with click to play not auto start) easily accessible during the first step of the authentication flow. Also, present the Help in an interactive and contextual manner. When a user makes a wrong selection or encounters an error the Help content should be displayed automatically. 1.4 Formatting Icons and logos of both Programmers and TV Service Providers should be featured in full color to create additional contrast that helps increase brand recognition for users. Background color should be brand neutral in order to clearly identify logos. Users stated that large selectable logos were preferred on the smaller devices as well as the larger screens to help limit fat finger mistakes of selecting the wrong option. In testing the Help, FAQ or Tutorial options, users did not feel they needed these presented upfront but wanted to have the option visible in case they had questions during the process. Users did not react well to video tutorials that auto-play, so if using a video tutorial, the user should have to select it to play. Users stated that consistency in presenting logos across sites and products helps aid in brand awareness and brand recognition for the user, allowing them to identify their TV Service Provider more easily. Open Authentication Technology Committee 4 August 25, 2015
5 2.0 TV Everywhere Labels and Iconography 3.0 Messaging 2.1 Identifying Content Requiring Entitlement 3.1 Authentication Success / Post Successful Sign-in Behavior The recommendation for icons to be used to indicate TV Everywhere content, i.e. content that requires entitlement, is in line with the CTAM recommendation of using a key icon. The use of colors as the primary indicator of a state change does not meet ADA standards, but can be used as a secondary indication that an asset requires entitlement. Again in line with CTAM, the recommendation is to use the colors of orange to red in the key icon to indicate locked content. The placement of the red key icon should be clearly visible and associated with the sign in option to access TV Everywhere. The recommendation is to minimize the clicks for a user who has successfully authenticated to begin watching video. A confirmation of a successful sign in such as displaying a written confirmation or displaying the user s TV Service Provider logo on a Programmer s TVE site/app should appear after the user has successfully authenticated however it should not require a click to continue. 3.2 Errors For all errors which can be presented to a user during the authentication flow, the recommendation is that error messages use plain, For users to understand what assets require verification, iconography is the recommended approach to quickly interpret accessible content. Through testing, users understood that both a key and a lock indicated that they would have to take action to access the content. This confirmation message should be displayed while the video is loading - both to reinforce to the user they have successfully authenticated and to mask buffering of the video upon start up. This confirmation screen should not require a click to continue, instead should disappear after a few seconds. Through usability testing, users were presented with two authorization error messages: one which was very generic, the other was more conversational Open Authentication Technology Committee 5 August 25, 2015
6 conversational language as opposed to system generated generic error messaging to describe the problem as specifically as possible to the user in terms they can understand, and also to provide an error recovery path. The best structure for the error messages, from UX point of view: and explained why the error occurred. The result was half of the participants misinterpreted the generic message but all of the participants understood the conversational message and what to do to resolve the error. 1. Explain the problem in terms that can be understood by users; 2. Apologize and express sympathy; 3. Provide workaround/solution. 3.3 Benefits of TV Everywhere 4.0 Social Login The recommendation is to clearly state, within the authentication user flow, that signing into TV Everywhere extends viewing options in and outside of the home and provides additional content options at no additional cost to the user s monthly service plans with their TV Service Providers. 4.1 Social Login Social Login for TVE has a lot of potential, especially if the benefits and scope are clearly messaged, however the recommendation at this point is to conduct further testing around messaging and positioning of this feature before a formal product implementation Through usability testing, it was confirmed that the participants did not understand the user benefits and value of authenticating to watch video. They were confused by the process and were questioning why they had to sign in. By reinforcing the value proposition to the user to sign in to watch content, it will help educate and inform the user about TV Everywhere and therefore increase adoption rates. Through usability testing, users did not express a desire to link their TV Everywhere login to a Social Media login because of privacy concerns, potential spam, or concerns about having posts show up on their social media site about their viewing behavior. Open Authentication Technology Committee 6 August 25, 2015
7 recommendation can be made. The user experience of Social Login and Social Media integration within TV Everywhere products should be addressed in a combined approach whereby the user is not confused as to why they may be presented with multiple social login options across their TV Service Provider login page and a Programmer s TVE site. Information gathering of adoption rates from TV Service Providers who have already implemented Social Login will help to inform the priority of pursuing Social Login solutions. Other options for creating a sign in alias such as a user-created username and password that links to a user s TV Service Provider account might have a broader appeal than logging in with a Social Media site. Open Authentication Technology Committee 7 August 25, 2015
8 Legal Notice Copyright Open Authentication Technology Committee All rights reserved. This recommended practice ( Recommended Practice ) may be copied in its entirety and displayed or distributed to others, provided that the above copyright notice and this legal notice section are preserved on all such copies. No license is granted to modify the Recommended Practice. This recommended practice is provided on an as-is basis, without any express or implied warranty of any kind, including without limitation any warranty of merchantability, fitness for a particular purpose or non-infringement of any party s intellectual property. OATC hereby disclaims any and all liability for personal injury or property or other damage, of any nature whatsoever, whether special, indirect, consequential or compensatory, directly or indirectly resulting from the publication or use of, or any reliance upon, this recommended practice. Implementation of this Recommended Practice is voluntary. Subject to the rights granted to OATC s members under the OATC IPR Policy, no rights or licenses under any patent claims are granted hereby. OATC takes no position regarding the validity or scope of any intellectual property or other rights that might be claimed to be infringed by the implementation of this Recommended Practice or the extent to which any license under such rights might or might not be available, and OATC does not represent that it has made any effort to identify any such rights or conduct any inquiries into the validity or scope of any such rights. Open Authentication Technology Committee 8 August 25, 2015
SafeNet Cisco AnyConnect Client. Configuration Guide
SafeNet Cisco AnyConnect Client Configuration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and
BES10 Self-Service. Version: 10.2. User Guide
BES10 Self-Service Version: 10.2 User Guide Published: 2014-09-10 SWD-20140908171306471 Contents 1 BES10 Self-Service overview... 4 2 Log in to BES10 Self-Service... 5 3 Activating your device...6 Create
Intel HTML5 Development Environment. Tutorial Test & Submit a Microsoft Windows Phone 8* App (BETA)
Intel HTML5 Development Environment Tutorial Test & Submit a Microsoft Windows Phone 8* App v1.00 : 04.09.2013 Legal Information INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS.
Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability
Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability May 2015 Cloning the database Cloning the STS host Cloning the proxy host This guide describes how to extend a typical
Instant Messaging Nokia N76-1
Instant Messaging Nokia N76-1 NO WARRANTY The third-party applications provided with your device may have been created and may be owned by persons or entities not affiliated with or related to Nokia. Nokia
Spam Manager. Quarantine Administrator Guide
Spam Manager Quarantine Administrator Guide Spam Manager Quarantine Administrator Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec,
Intel Storage System SSR212CC Enclosure Management Software Installation Guide For Red Hat* Enterprise Linux
Intel Storage System SSR212CC Enclosure Management Software Installation Guide For Red Hat* Enterprise Linux Order Number: D58855-002 Disclaimer Information in this document is provided in connection with
What s New in LANDESK Service Desk Version 7.8. Abstract
What s New in LANDESK Service Desk Version 7.8 Abstract This document highlights the new features and enhancements introduced in versions 7.8 of LANDESK Service Desk. Document Creation: December, 19 2014.
Intel HTML5 Development Environment. Tutorial Building an Apple ios* Application Binary
Intel HTML5 Development Environment Tutorial Building an Apple ios* Application Binary V1.02 : 08.08.2013 Legal Information INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO
Intel Active Management Technology with System Defense Feature Quick Start Guide
Intel Active Management Technology with System Defense Feature Quick Start Guide Introduction...3 Basic Functions... 3 System Requirements... 3 Configuring the Client System...4 Intel Management Engine
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 May 2015 About this guide Prerequisites and requirements NetWeaver configuration Legal notices About
Security Analytics Engine 1.0. Help Desk User Guide
2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.
Self Help Guides. Create a New User in a Domain
Self Help Guides Create a New User in a Domain Creating Users & Groups This document is to be used as a guide to creating users and/or groups in a Domain Server environment; 1. Windows Server Domain exists,
with PKI Use Case Guide
Intel Identity Protection Technology (Intel IPT) with PKI Use Case Guide Version 1.0 Document Release Date: February 29, 2012 Intel IPT with PKI Use Case Guide i Legal Notices and Disclaimers INFORMATION
BlackBerry World Storefront. Version: 4.3. User Guide
BlackBerry World Storefront Version: 4.3 User Guide Published: 2013-02-21 SWD-20130221142618627 Contents About BlackBerry World... 5 New features and enhancements... 6 Browsing and searching... 7 Search
Dell Spotlight on Active Directory 6.8.3. Server Health Wizard Configuration Guide
Dell Spotlight on Active Directory 6.8.3 Server Health Wizard Configuration Guide 2013 Dell Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software
Dell One Identity Manager 7.0. Help Desk Module Administration Guide
Dell 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure
Dell InTrust 11.0. Preparing for Auditing Microsoft SQL Server
2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.
Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration
Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration February 2015 This guide describes how to configure Dell One Identity Cloud Access Manager to communicate with a Dell
Intel HTML5 Development Environment Article Using the App Dev Center
Intel HTML5 Development Environment Article Using the App Dev Center v1.06 : 06.04.2013 Legal Information INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS
Spotlight Management Pack for SCOM
Spotlight Management Pack for SCOM User Guide March 2015 The Spotlight Management Pack for SCOM is used to display data from alarms raised by Spotlight on SQL Server Enterprise in SCOM (System Center Operations
Android Driver s App Update Version 1.89 Samsung Galaxy Tab 4
Android Driver s App Update Version 1.89 Samsung Galaxy Tab 4 August 2015 COPYRIGHT NOTICE This is an unpublished work protected by the United States copyright laws and is proprietary to Teletrac, Inc.
Dell InTrust 11.0. Preparing for Auditing Cisco PIX Firewall
2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.
Software License Monitoring
LANDESK Quick Start Guide Software License Monitoring VERSION 2 Introduction This guide was designed to help those users new to Software License Monitoring (SLM) introduced in LANDESK Management Suite
formerly Help Desk Authority 9.1.3 Upgrade Guide
formerly Help Desk Authority 9.1.3 Upgrade Guide 2 Contacting Quest Software Email: Mail: Web site: [email protected] Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656 USA www.quest.com
Cloud Identity Management Tool Quick Start Guide
Cloud Identity Management Tool Quick Start Guide Software version 2.0.0 October 2013 General Information: [email protected] Online Support: [email protected] Copyright 2013 CionSystems Inc., All
FAQ: How to create Effective Messages
User Experience Direct (UX Direct) FAQ: How to create Effective Messages Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and
Introduction to Version Control in
Introduction to Version Control in In you can use Version Control to work with different versions of database objects and to keep the database updated. You can review, manage, compare, and revert to any
Resetting USB drive using Windows Diskpart command
Resetting USB drive using Windows Diskpart command Simon Huang Technical Product Manager [email protected] Super Talent Technology October, 2013 Release 1.00 1 Legal Disclaimer INFORMATION IN
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 May 2015 This guide describes how to configure Microsoft Office 365 for use with Dell One Identity Cloud Access Manager
ecopy Connector for Interwoven WorkSite
ecopy Connector for Interwoven WorkSite Version 4.0 for ecopy ShareScan OP Administrator s Guide Part Number: 73-00220 (6/2007) Licensing, Copyright, and Trademark Information The information in this document
Intel Identity Protection Technology (IPT)
Intel Identity Protection Technology (IPT) Enabling improved user-friendly strong authentication in VASCO's latest generation solutions June 2013 Steve Davies Solution Architect Intel Corporation 1 Copyright
Decommissioning the original Microsoft Exchange
Decommissioning the original Microsoft Exchange Originally posted: March 2002 Affected software versions BlackBerry Enterprise Server version 2.0 and version 2.1 for Microsoft Exchange (all service pack
BlackBerry Enterprise Server for Microsoft Office 365. Version: 1.0.3. Release Notes
BlackBerry Enterprise Server for Microsoft Office 365 Version: 1.0.3 Release Notes Published: 2013-11-21 SWD-20131121133951605 Contents 1 Fixed issues...4 2 Known issues...5 3 Legal notice...8 Fixed issues
DIGIPASS as a Service. Google Apps Integration
DIGIPASS as a Service Google Apps Integration April 2011 Table of Contents 1. Introduction 1.1. Audience and Purpose of this Document 1.2. Available Guides 1.3. What is DIGIPASS as a Service? 1.4. About
Installing the BlackBerry Enterprise Server Management Software on an administrator or remote computer
Installing the BlackBerry Enterprise Server Management Software on an administrator or Introduction Some administrators want to install their administrative tools on their own Windows 2000 computer. This
Intel Media SDK Library Distribution and Dispatching Process
Intel Media SDK Library Distribution and Dispatching Process Overview Dispatching Procedure Software Libraries Platform-Specific Libraries Legal Information Overview This document describes the Intel Media
System Image Recovery* Training Foils
Intel-powered Classmate PC System Image Recovery* Training Foils Version 1.0 1 *Other names and brands may be claimed as the property of others. Legal Information INFORMATION IN THIS DOCUMENT IS PROVIDED
BCSD WebMail Documentation
BCSD WebMail Documentation Outlook Web Access is available to all BCSD account holders! Outlook Web Access provides Webbased access to your e-mail, your calendar, your contacts, and the global address
This guide explains how to install an Intel Solid-State Drive (Intel SSD) in a SATA-based desktop or notebook computer.
Installation Guide This guide explains how to install an (Intel SSD) in a SATA-based desktop or notebook computer. The instructions include migrating your data from your current storage device (such as
Virtual Contact Center
Virtual Contact Center Zendesk Integration with 8x8 Contact Center Agent Guide Revision 1.0 Copyright 2014, 8x8, Inc. All rights reserved. This document is provided for information purposes only and the
User Guide. BES12 Self-Service
User Guide BES12 Self-Service Published: 2016-01-27 SWD-20160127153905522 Contents About BES12 Self-Service...4 Log in to BES12 Self-Service... 4 Forgot your login password?... 4 Change your login password...5
COM Port Stress Test
COM Port Stress Test COM Port Stress Test All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including photocopying, recording,
Installing the BlackBerry Enterprise Server Management console with a remote database
Installing the BlackBerry Enterprise Server Originally posted: March 2002 Affected software versions BlackBerry Enterprise Server version 2.1 for Microsoft Exchange with Service Pack 1 Summary This document
Self Help Guides. Setup Exchange Email with Outlook
Self Help Guides Setup Exchange Email with Outlook Setting up Exchange Email Connection This document is to be used as a guide to setting up an Exchange Email connection with Outlook; 1. Microsoft Outlook
QNAP Plug-in for vsphere Client: A User s Guide. Updated December 2012. 2012. QNAP Systems, Inc. All Rights Reserved. V1.0
QNAP Plug-in for vsphere Client: A User s Guide Updated December 2012 2012. QNAP Systems, Inc. All Rights Reserved. V1.0 Note: The information presented is subject to change without notice. Trademarks
CompleteView Admin Console User s Manual. Version 3.8
CompleteView Admin Console User s Manual Version 3.8 Table Of Contents Introduction... 1 End User License Agreement... 1 Overview... 2 Configuration... 3 Starting the Admin Console... 3 Adding a Server...
BlackBerry Web Desktop Manager. Version: 5.0 Service Pack: 4. User Guide
BlackBerry Web Desktop Manager Version: 5.0 Service Pack: 4 User Guide Published: 2012-10-03 SWD-20121003174218242 Contents 1 Basics... 5 Log in to the BlackBerry Web Desktop Manager... 5 Connect your
Wellnomics Risk Management Software 2.7.1
User's Guide Wellnomics Risk Management Software 2.7.1 2015 Wellnomics Ltd Ref: 1088/01/032015 Note: Many of the materials referred to in this document are copyright of Wellnomics Limited. Contents of
WebSphere Commerce V7.0
IBM Software Group WebSphere Commerce V7.0 Multi-channel precision marketing overview Updated December 3, 2009 This presentation introduces multi-channel precision marketing in WebSphere Commerce version
The Case for Rack Scale Architecture
The Case for Rack Scale Architecture An introduction to the next generation of Software Defined Infrastructure Intel Data Center Group Pooled System Top of Rack Switch POD Manager Network CPU/Memory Storage
Dell One Identity Cloud Access Manager 8.0 - How To Deploy Cloud Access Manager in a Virtual Private Cloud
Dell One Identity Cloud Access Manager 8.0 - How To Deploy Cloud Access Manager in a Virtual Private Cloud February 2015 This guide describes how to deploy Dell One Identity Cloud Access Manager within
ChangeAuditor 5.6. For Windows File Servers Event Reference Guide
ChangeAuditor 5.6 For Windows File Servers Event Reference Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
FORD MOTOR COMPANY OF AUSTRALIA LTD
Microcat MARKET Ford Australia User Guide Product developed and supported by: Catalogue information provided by: FORD MOTOR COMPANY OF AUSTRALIA LTD Contents Getting started... 2 Microcat MARKET overview...
Lepide Active Directory Self Service. Installation Guide. Lepide Active Directory Self Service Tool. Lepide Software Private Limited Page 1
Installation Guide Lepide Active Directory Self Service Tool Lepide Software Private Limited Page 1 Lepide Software Private Limited, All Rights Reserved This User Guide and documentation is copyright of
DashBoard Beta Web Server
DashBoard Beta Web Server Version 6.2 Release Notes Copyright Notice 2014 Ross Video Limited. Ross and any related marks are trademarks or registered trademarks of Ross Video Limited. All other trademarks
Aras Innovator Internet Explorer Client Configuration
Aras Innovator Internet Explorer Client Configuration Aras Innovator 9.4 Document #: 9.4.012282009 Last Modified: 7/31/2013 Aras Corporation ARAS CORPORATION Copyright 2013 All rights reserved Aras Corporation
Clearview Customer Web Access
Clearview Customer Web Access This document outlines the Clearview Process flows for Logging in to Customer Web Access Service Listing o Service Order Desktop o Service Tasks o Viewing Service Schedules
Wave 4.5. Wave ViewPoint Mobile 2.0. User Guide
Wave 4.5 Wave ViewPoint Mobile 2.0 User Guide 2014 by Vertical Communications, Inc. All rights reserved. Vertical Communications and the Vertical Communications logo and combinations thereof and Applications
Intel Identity Protection Technology Enabling improved user-friendly strong authentication in VASCO's latest generation solutions
Intel Identity Protection Technology Enabling improved user-friendly strong authentication in VASCO's latest generation solutions June 2013 Dirk Roziers Market Manager PC Client Services Intel Corporation
Azure Multi-Factor Authentication. KEMP LoadMaster and Azure Multi- Factor Authentication. Technical Note
KEMP LoadMaster and Azure Multi- Factor Authentication Technical Note VERSION: 1.0 UPDATED: APRIL 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies
COMPLETING PCI CERTIFICATION IN TRUSTKEEPER PCI MANAGER
COMPLETING PCI CERTIFICATION IN TRUSTKEEPER PCI MANAGER Go to www.elavon.com/pci and click Verify Compliance at the top of the page. On the Verify Compliance page, click Register and Get Certified. (If
Email Data Protection. Administrator Guide
Email Data Protection Administrator Guide Email Data Protection Administrator Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec,
RSA Two Factor Authentication. Feature Description
RSA Two Factor Authentication Feature Description VERSION: 3.0 UPDATED: SEPTEMBER 2015 Copyright Notices Copyright 2002 2015 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP
HOTPin Integration Guide: Google Apps with Active Directory Federated Services
HOTPin Integration Guide: Google Apps with Active Directory Federated Services Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as
Software Token. Installation and User Guide. 2013 MasterCard Proprietary. All rights reserved.
Software Token Installation and User Guide 2013 MasterCard Proprietary. All rights reserved. Contents Overview... 1 Install the RSA Client Desktop Application... 1 Download and Save the RSA Desktop Application...
HOTPin Integration Guide: Microsoft Office 365 with Active Directory Federated Services
HOTPin Integration Guide: Microsoft Office 365 with Active Directory Federated Services Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided
Universal Tracking Application Reference and Training Guide
Universal Tracking Application Reference and Training Guide Software Version: 4.21 Guide Version: 2.7 Universal Tracking Application Reference and Training Guide Reference and Training Guide All Trademarks
formerly Help Desk Authority 9.1.3 HDAccess Administrator Guide
formerly Help Desk Authority 9.1.3 HDAccess Administrator Guide 2 Contacting Quest Software Email: Mail: Web site: [email protected] Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656
Object Level Authentication
Toad Intelligence Central Version 2.5 New in This Release Wednesday, 4 March 2015 New features in this release of Toad Intelligence Central: Object level authentication - Where authentication is required
SafeNet Authentication Service
SafeNet Authentication Service Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep
Application Note Gemalto Access Client for windows smart card and EFS on Microsoft Windows Vista
Application Note Gemalto Access Client for windows smart card and EFS on Microsoft Windows Vista [email protected] [email protected] November 2007 www.gemalto.com All information herein
SysInfoTools MS Access Database Recovery v3.0
SysInfoTools MS Access Database Recovery v3.0 Table Of Contents 1. SysInfoTools MS Access Database Recovery v3.0... 2 2. Overview... 2 3. Getting Started... 3 3.1 Installation procedure... 3 4. Order and
DUAL MONITOR DRIVER AND VBIOS UPDATE
DUAL MONITOR DRIVER AND VBIOS UPDATE RN-07046-001_v01 September 2013 Release Notes DOCUMENT CHANGE HISTORY RN-07046-001_v01 Version Date Authors Description of Change 01 September 30, 2013 MD, SM Initial
Spotlight Management Pack for SCOM
Spotlight Management Pack for SCOM User Guide January 2015 The is used to display data from alarms raised by Spotlight on SQL Server Enterprise in SCOM (System Center Operations Manager). About System
Dell Statistica 13.0. Statistica Enterprise Installation Instructions
Dell Statistica 13.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or
BlackBerry Web Desktop Manager. User Guide
BlackBerry Web Desktop Manager User Guide Published: 2012-01-26 SWD-1952106-0126040849-001 Contents 1 About the BlackBerry Web Desktop Manager... 3 About the BlackBerry Business Cloud Services... 3 2 Getting
axsguard Gatekeeper Internet Redundancy How To v1.2
axsguard Gatekeeper Internet Redundancy How To v1.2 axsguard Gatekeeper Internet Redundancy How To v1.2 Legal Notice VASCO Products VASCO data Security, Inc. and/or VASCO data Security International GmbH
Dell NetVault Backup Plug-in for SQL Server 6.1
Dell NetVault Backup Plug-in for SQL Server 6.1 April 2014 These release notes provide information about the Dell NetVault Backup Plug-in for SQL Server release. About Enhancements Resolved issues Known
System Requirements. Installation. Microsoft SQL Express 2008 R2 Installation
Contents System Requirements... 3 Installation... 3 Microsoft SQL Express 2008 R2 Installation... 3 Microsoft.NET Framework 4.0 Installation... 7 InFocus Management Tool Installation... 8 Log In... 10
ivms-4200 Intelligent Video Management System Quick Start Guide
ivms-4200 Intelligent Video Management System Quick Start Guide Notices The information in this documentation is subject to change without notice and does not represent any commitment on behalf of HIKVISION.
Intel Small Business Advantage (Intel SBA) Release Notes for OEMs
Intel Small Business Advantage (Intel SBA) Release Notes for OEMs Document Release Date: October 16, 2015 Legal Information INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO
Microsoft Office Live Meeting Events User s Guide
Microsoft Office Live Meeting Events User s Guide Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the companies,
BlackBerry Mobile Voice System - BlackBerry MVS Client
BlackBerry Mobile Voice System - BlackBerry MVS Client BlackBerry Device Software 5.0 User Guide Version: 5.2 SWD-1249531-0316085151-001 Contents Basics... 2 About the BlackBerry MVS Client... 2... 3 basics...
All Colleagues Landing Page
INTERNAL USE ONLY All Colleagues Landing Page User's Manual Version 5 Table of Contents Login... 2 Password Features... 4 Expired password...4 Password reset...6 Region Selection... 8 Changing Your Region...8
Intel HTML5 Development Environment. Article - Native Application Facebook* Integration
Intel HTML5 Development Environment Article - Native Application Facebook* Integration V3.06 : 07.16.2013 Legal Information INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO
Terms and Conditions of Service
Terms and Conditions of Service The following describes the terms and conditions which are applicable to users of InphoniteVoice and related software (the Service ) available under the domain and sub-domains
Table of Contents. What is Brute Force Attack? 13 How does the diskashur protect against brute force attack? 13
User s Manual Table of Contents About the istorage diskashur Secure Hard Drive 4 Package contents 4 istorage diskashur button panel 5 istorage diskashur - Getting Started 6 Before you begin 6 Connecting
Intel 845G/GL Chipset Dynamic Video Memory Technology
R Intel 845G/GL Chipset Dynamic Video Memory Technology Revision 1.2 June 2002 May 2002 1 Information in this document is provided in connection with Intel products. No license, express or implied, by
Enterprise Self Service Quick start Guide
Enterprise Self Service Quick start Guide Software version 4.0.0.0 December 2013 General Information: [email protected] Online Support: [email protected] 1 2013 CionSystems Inc. ALL RIGHTS RESERVED.
AWEBDESK LIVE CHAT SOFTWARE
AWEBDESK LIVE CHAT SOFTWARE Version 6.1.0 AwebDesk Softwares Administrator Guide Edition 1.2 January 2014 Page 1 TABLE OF CONTENTS Introduction.......... 4 Sign In as Admin...5 Admin Dashboard Overview.
Application Note. Gemalto s SA Server and OpenLDAP
Application Note Gemalto s SA Server and OpenLDAP ii Preface All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall
Using the Educator Dashboard
Reference Guide Using the Educator Dashboard What s Inside How to Create Accounts Get to Know the Educator Dashboard How to Manage Licenses and Create Educators How to Give Accommodations to Students First
Resource Scheduler (Meeting Room Manager) User s Manual
Resource Scheduler (Meeting Room Manager) User s Manual Resource Scheduler (or Meeting Room Manager) is a web based software package for reserving facilities and equipment. The NS&M web client can be run
Terms of Service. Your Information and Privacy
These terms of service (the "Terms") govern your access to and use of the Online File Storage ("OFS") websites and services (the "Service"). The Terms are between DigitalMailer, Incorporated and Digital
ChangeAuditor 6.0 For Windows File Servers. Event Reference Guide
ChangeAuditor 6.0 For Windows File Servers Event Reference Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
Dell Enterprise Reporter 2.5. Configuration Manager User Guide
Dell Enterprise Reporter 2.5 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license
