Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

art

Results 8851 - 8875 of 9078Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jun 11, 2008
Traditionally, retail promotions were handled by the merchandising, marketing and finance departments. Now companies are finding that by implementing promotions strategies deep within their infrastructure, they can increase profit uplift. Get the IBM white paper and see how optimizing retail promotions can positively affect your business.
Tags : 
promotions, optimization, aberdeen, retail research, promotions technology, promotions optimization, promotions managment, retail promotions technology, ibm, mmdg
    
IBM
Published By: IBM     Published Date: Jun 11, 2008
Today's organizations face a tough set of challenges. Markets around the world have become increasingly volatile. Competition is more intense. Mergers, acquisitions and divestitures demand revisions in business plans and the IT infrastructures that support them. And IT departments have to keep doing more-and better-with budgets and resources that are already stretched to the limit. To meet these critical challenges, your organization needs much greater flexibility in its business models and business processes.
Tags : 
ibm, ebf, ibm ebf, it management
    
IBM
Published By: IBM     Published Date: Jun 11, 2008
Good governance of a service-oriented architecture is becoming a core competency. This Magic Quadrant report by Gartner examines the market for SOA governance through a set of integrated technologies. It evaluates leaders, challengers and innovators in the SOA governance technology market, providing feature information and strengths and cautions for each.
Tags : 
soa, ibm, ebf, governance, infrastructure
    
IBM
Published By: BlueHornet     Published Date: Jun 11, 2008
The effectiveness of your targeting and personalization efforts are only as good as the data used to power them. This article will help you discover effective ways of collecting subscriber data -- allowing you to drive campaigns that evolve as your subscribers' preferences and behaviors change over time.
Tags : 
blue hornet, bluehornet, data collection, data mining, subscriber information, subscriber, newsletter design, newsletter managment, campaign managment
    
BlueHornet
Published By: SchemaLogic     Published Date: Jun 11, 2008
Chevron and its subsidiaries use Microsoft SharePoint 2007 to share and exchange information. Yet, it was still a challenge for offices in one part of the world to use materials created by an office in another part of the world. And, the amount of information, shared electronically, was growing exponentially. As a result, the company faced a bit of chaos and a productivity hurdle that begged for more muscle.
Tags : 
chevron, schemalogic, oil, gas, collaboration, sharepoint, share point
    
SchemaLogic
Published By: Clearswift     Published Date: Jun 09, 2008
In this white paper Clearswift address the question "Is it possible to build a leak free enterprise?" In addition to a Gartner research note on "Understand Data Leakage" we answer the question by describing 15 of the most common mistakes of web and email security and the associated risks and solutions.
Tags : 
data protection, clearswift, data management, network security
    
Clearswift
Published By: Clearswift     Published Date: Jun 09, 2008
Websites that did not exist five years ago are now at the top of the most visited and used sites on the Web.  Yesterday's teenagers and college students, who have grown up using MySpace, YouTube and other Web 2.0 sites are bringing their social habits into the workplace, and creating a number of challenges for employers.
Tags : 
enterprise security, web 2.0, gartner, clearswift, clearswift, social media, social networking, network security
    
Clearswift
Published By: BlueHornet     Published Date: Jun 06, 2008
Applying opt-in email marketing strategies and best practices to transactional emails can be a win-win for customers and marketers. But the two types of communications are not the same. This white paper is written to help email marketers and online retailers understand: What sets transactional emails apart from commercial messages; how they must comply with all federal regulations; and where to take advantage of opportunities to optimize their transactional email program.
Tags : 
email marketing, email messaging, blue hornet, bluehornet
    
BlueHornet
Published By: VMware Dell     Published Date: Jun 05, 2008
Radiator Express Warehouse (1800Radiator), a fast-growing automotive parts distributor, found that it was running at maximum power and its racks were full. Using VMware virtualization technology, the company was able to take 31 physical servers out of production, resulting in a 25 percent reduction in power and cooling costs.
Tags : 
virtualization, vmware, virtual infrastructure, x86, server consolidation, server containment, business continuity, disaster recovery, energy savings, vmware infrastructure 3, vi3, vmware, green computing, power and cooling
    
VMware Dell
Published By: VMware Dell     Published Date: Jun 05, 2008
IT departments constantly face demands to deploy, maintain and grow a broad array of services and applications, but this has lead to server sprawl and high energy costs. This brief discusses how VMware virtualization helps IT organizations increase utilization, lower energy costs, increase manageability and improve management of future growth.
Tags : 
servers, server consolidation, server virtualization, virtualization, virtual machine, vmware, server hardware
    
VMware Dell
Published By: VMware Dell     Published Date: Jun 05, 2008
WWF is the world’s largest independent conservation organization. As part of its IT department’s contribution to environmentally-friendly business practices, WWF-UK deployed VMware virtualization into its live production environment. They decreased server count, lessened cooling requirements, minimized the space needed to house their datacenter and significantly reduced their overall carbon footprint.
Tags : 
virtualization, vmware, virtual infrastructure, x86, server consolidation, server containment, business continuity, disaster recovery, energy savings, vmware infrastructure 3, vi3, vmware, infrastructure, green computing, power and cooling
    
VMware Dell
Published By: Arcot     Published Date: Jun 04, 2008
In the past, authentication solutions were either easy to use and inexpensive, but insecure (such as username/password) or very secure but expensive or difficult to implement (such as OTP tokens and smart cards). Arcot offers a third option: WebFort, a software-only, two-factor authentication solution. It delivers the right balance of cost, convenience, and strength.
Tags : 
arcotid, pki, multi-factor authentication, strong authentication, cryptographic camouflage, webfort x.509 certificate, public key infrastructure, authentication, arcot, security
    
Arcot
Published By: Arcot     Published Date: Jun 04, 2008
Solutions including one-time-password (OTP) generator tokens, do not offer the same level of protection as the ArcotID against attacks such as the man-in-the-middle attack. The ArcotID secure software credential provides protection against common Internet threats and several futuristic attacks that are becoming popular among fraudsters.
Tags : 
authentication, digital signature, password management, cardholder authentication, arcot, smartcard
    
Arcot
Published By: HP     Published Date: Jun 02, 2008
VMware describes their partnership with HP storage and how the HP StorageWorks EVA4400 is a great fit for many small and medium businesses that want the advantages of virtualization.
Tags : 
hp eva 4000, hp eva 4400, storage, storage virtualization, virtualization, virtual storage
    
HP
Published By: HP     Published Date: Jun 02, 2008
Hear from Oracle how the new the HP StorageWorks EVA4400 has been fully tested to be ready for full production loads, and how it is tuned to take particular advantage of Oracle VM.
Tags : 
hp eva 4000, hp eva 4400, storage, storage virtualization, virtualization, virtual storage
    
HP
Published By: RenderX     Published Date: May 27, 2008
If you're producing transactional customer communications such as statements, invoices, policy notifications, or shipping documents, you probably already have some of the basic elements you need to start using TransPromo to take your marketing campaigns to the next level. TransPromo advertising in a PDF, PostScript and AFP electronic and print format can easily be injected into your application with RenderX.
Tags : 
transpromo, xml, xsl fo, pdf, postscript, afp, xep, direct advertising, pinpoint, xsl templates, memorystream, renderx
    
RenderX
Published By: BlackBerry     Published Date: May 22, 2008
Over the past decade, wireless technology has made huge strides in security, reliability and throughput. Companies that are moving forward with business mobility initiatives must plan for wireless security and mobile device management from the start. Learn about many of the notable trends and key issues associated with Business Mobility and where to find additional resources for consideration.
Tags : 
blackberry, mobile applications, cio, pim, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: MX Logic     Published Date: May 21, 2008
Rootkits, Trojans, ransomware, Denial-of-Service and much more – this newly released white paper from MX Logic covers the everchanging security threat landscape. Learn what malicious intrusions are out there, how to identify them and how to keep your network safe.
Tags : 
botnets, dha, dos, denial of service, queen bot, malware, drive by, storm worm, blended threats, rootkits, trojans, spyware, viruses, virus, worm, worms, polymorphism, push propagation, pull propagation, zero day
    
MX Logic
Published By: MX Logic     Published Date: May 21, 2008
In this recent report, the Aberdeen Group’s research revealed that 100% of Best-in-Class companies consume some managed security services as part of their security strategy. The most widely deployed and easiest to implement managed security service is email security.
Tags : 
managed security services, managed services, email security, security solutions, web security, security incidents, data loss, malware infections, anti-botnet, denial-of-service, dha, dos, intrusion detection, security, network security
    
MX Logic
Published By: Clickatell     Published Date: May 20, 2008
In meeting the challenges of an increasingly competitive banking landscape, Standard Bank seeks to differentiate itself by providing the highest levels of service to its customer base. An integral part of achieving this goal has been its partnership with Clickatell to deliver personalized and relevant messaging to bank customers via their mobile phones.  Read this case study to learn more.
Tags : 
customer centric messaging, clickatell, standard bank
    
Clickatell
Published By: SAP     Published Date: May 15, 2008
Read this white paper by Don Tapscott and explore the criteria best-in-class hospitals use for selecting business intelligence solutions. Companies that learn to effectively harness the information generated by their IT systems will enjoy substantial productivity improvements.
Tags : 
sap, business intelligence, healthcare sector, healthcare industry, bi applications, bi tools, inter-departmental processes
    
SAP
Published By: Quocirca     Published Date: May 14, 2008
Virtual private networks (VPNs) are the technologies most widely used by organizations today in the provision of remote access to their networks for employees, business partners and suppliers. Of the VPNs available, IPSec (Internet Protocol Security) VPNs provide the most complete remote access solution, although they have traditionally been seen as costly and difficult to deploy. 
Tags : 
vpn, ipsec, remote access quocirca, remote access
    
Quocirca
Published By: Process Software     Published Date: May 14, 2008
Spyware is on the rise and has been the cause of many data breaches. Stopping it needs to be a strategic part of an organization's overall security plan. Reactive signature-based anti-virus and firewall technology is not a complete solution to prevention. Read this white paper to learn the top five behaviors associated with data theft and how advanced behavioral detection solutions is an effective technology for stopping spyware and can identify and prevent legitimate applications from being misused.
Tags : 
spyware, trojan, virus, malware, web security, internet security, process software, process, antispyware, hosts, spyware, threats, virus protection, security
    
Process Software
Published By: IBM     Published Date: May 12, 2008
You face key challenges–technological and organizational–in enterprise asset management. Every last vehicle and material is under your control, often in different software formats that only provide you with a partial view of your enterprise. We would like to share a white paper with you that explains how you can see your assets holistically and optimize their performance.
Tags : 
ibm, ibm g&rm, ibm grm, asset management, it management, tivoli
    
IBM
Published By: CA WA     Published Date: May 12, 2008
Although typically thought of as an artifact of legacy computing, batch processes remain vital to today’s real-time enterprises. Behind the real time systems that power the real time enterprise, such as customer order fulfillment, account management, supply chain scheduling and optimization, or financial trading systems, are regularly-updated back office business systems. Over the years, batch technology has evolved from script-based automation to rules or policy-driven workload automation.
Tags : 
bpa, business process automation, soa, service oriented, workload automation, ca wa
    
CA WA
Start   Previous    348 349 350 351 352 353 354 355 356 357 358 359 360 361 362    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.