Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

art

Results 9076 - 9100 of 9189Sort Results By: Published Date | Title | Company Name
Published By: Informatica     Published Date: Oct 26, 2007
The goal of pervasive BI applications is to take the data that produced the back office ROI of more than 400% and deliver it to front-line employees in a form appropriate to their job functions – with similar results. There are thousands of business process steps in a typical enterprise where pervasive BI insights can be added. What are leading companies doing with pervasive BI?
Tags : 
business intelligence, database, enterprise data warehouse, data mart, data warehouse, data mining, active data warehousing, active data warehouse
    
Informatica
Published By: PKWARE     Published Date: Oct 22, 2007
Text-messaging, or SMS, usage is on the rise while email usage is falling. Meanwhile many more mobile phones than personal computers are sold around the world. Long story short: Marketers who want to reach consumers with targeted campaigns had better put an SMS strategy in place. mobileStorm's new white paper, "SMS Or Die," explains why mobile marketing, particularly SMS marketing, is the ideal platform to reach consumers.
Tags : 
sms marketing, mobile marketing, email marketing, text messaging, text marketing, sms, sms, mobile
    
PKWARE
Published By: eGain     Published Date: Oct 12, 2007
The Internet, years after its emergence, continues to be a challenge for most organizations. This paper examines the notion of eService and the need for it in large, global organizations in particular. It also provides guidelines for developing an effective eService plan, and concludes with a discussion of the most significant benefits of implementing such a plan.
Tags : 
eservice, customer service, online customer service, online help, helpdesk, help desk, e-service, online support
    
eGain
Published By: 6th Sense Analytics     Published Date: Oct 11, 2007
This whitepaper asserts that moving to the next generation of software development and sourcing requires moving from art to science. Given how dependent we are on software as a foundation for every product and service, anything less creates a climate of risk, uncertainty, and unjustifiable costs that undermines our ability to compete in a global marketplace.
Tags : 
development, software development, offshore, offshoring, outsource, outsourcing, programming, 6th sense
    
6th Sense Analytics
Published By: Technolytics     Published Date: Oct 05, 2007
Recently, a series of cyber attacks on the Defense Department and Defense contractors in the United States as well as the Ministry of Defense and Parliament in the U.K. have created significant cause-for-concern by computer security experts. It is imperative you read this brief and learn how we're all vulnerable and what is being done to prevent these Cyber Attacks.
Tags : 
spy ops, spy-ops, cyber attack, hacker, hackers, government, internet security, national security
    
Technolytics
Published By: Gold Lasso     Published Date: Oct 02, 2007
Many email marketers look for the lowest price point and equate that to the best value, but the lowest cost may not be the best value. Understanding how Email Service Providers determine price and what features you're paying for is an important part of being a successful email marketer.
Tags : 
marketing, email marketing, vendors, esp, esps, marketing solutions, vendor selection, gold lasso
    
Gold Lasso
Published By: Gold Lasso     Published Date: Oct 02, 2007
Many email marketers look for the lowest price point and equate that to the best value, but the lowest cost may not be the best value. Understanding how Email Service Providers determine price and what features you're paying for is an important part of being a successful email marketer.
Tags : 
marketing, email marketing, vendors, esp, esps, marketing solutions, vendor selection, gold lasso
    
Gold Lasso
Published By: Solution Publishing     Published Date: Oct 02, 2007
In point of fact, a lead that does not result in a sale has negative value to the company since resources must be spent to determine its futility. In this whitepaper we have endeavored to demonstrate a technological method to predict a lead's probability of becoming a sale and propose solutions for those targeting HR or IT professionals. Download this free whitepaper to learn how to improve your lead quality when targeting HR or IT professionals.
Tags : 
solution publishing, lead gen, lead generation, lead quality, b2b, b-to-b, smartstream, sas
    
Solution Publishing
Published By: Informatica     Published Date: Sep 28, 2007
On-demand computing is apparently in demand, at least in the eyes of data integration specialist Informatica Corp. The Switzerland of data integration, as some have called it, just announced availability of its first on-demand offering, which is specifically designed to handle data from Software-as-a-Service (SaaS) stalwart, Salesforce.com.
Tags : 
salesforce, crm tools, crm, customer relationship management, salesforce.com, crm tool, on-demand, ondemand
    
Informatica
Published By: Informatica     Published Date: Sep 28, 2007
In Informatica's data migration podcast, Arvind Parthasarathi spoke with editorial director, James E. Powell.  He explores "the seven steps", what IT does wrong, what keeps IT from getting started and what one can do to improve the odds of data migration success.
Tags : 
data migration, podcast, crm, customer relationship management, informatica
    
Informatica
Published By: 6th Sense Analytics     Published Date: Sep 19, 2007
Do you have a software development metrics program? Does it work? SD Times, 6th Sense Analytics and Rally Software Development Corp. participate in this recorded Roundtable Discussion focused on developing a metrics program that gives you the information you need to make informed decisions regarding your software development efforts.
Tags : 
productivity, software development, quality assurance, quality control, metrics, 6th sense, 6th sense analytics
    
6th Sense Analytics
Published By: 6th Sense Analytics     Published Date: Sep 17, 2007
During this podcast, you’ll hear from Thomas Koulopoulos, founder of Delphi Group, managing director of Perot Systems Innovation Labs, and author of Smartsourcing. A widely recognized authority on IT, innovation and the globalization of business, Tom was named one of the industry’s six most influential consultants by InformationWeek magazine.
Tags : 
offshore, offshoring, outsource, outsourcing, cost, costs, cost savings, spend management
    
6th Sense Analytics
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
Chartered in 1973, San Francisco-based Spectrum Federal Credit Union serves over 12,000 members. When the issue arose on how to protect their members’ personal data residing on backup tapes, Spectrum FCU took no chances – they and their Techical Advisory Board made the decision to encrypt this important information with the help of NeoScale Systems, an undisputed leader in this emerging market.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management
    
Neoscale Systems, Inc.
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
With horror stories in the news every week about lost or stolen laptops and backup tapes, the senior management team at Oregon Community Credit Union knew they had to do everything within their powers to protect their critical data as it traveled offsite to a third-party tape vaulting vendor. They were tasked with finding an affordable solution that would strike a balance between security, ease of use, and scalability.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management
    
Neoscale Systems, Inc.
Published By: Quocirca     Published Date: Sep 13, 2007
File servers continue to proliferate, and email has moved from a basic tool for exchanging documents to an inherent part of an organization’s communication and collaboration portfolio. With such ad-hoc information sources now being a mission critical function, the need for data management and archival is becoming critical.
Tags : 
information management, servers, storage, quocirca
    
Quocirca
Published By: ProofSpace     Published Date: Sep 10, 2007
Read this paper and learn the principles that are prerequisites to enforceable electronic agreements as required by existing legal standards and electronic signature legislation.  This paper will also specify sixteen measurement criteria that can be used as metrics to assess whether the architecture of an electronic transaction will meet the requirements of admissibility.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography
    
ProofSpace
Published By: Quocirca     Published Date: Sep 07, 2007
Social Networking tools have proliferated in the recent past, and many individuals are now utilizing such tools as a core part of their day-to-day lives.  If these tools can be harnessed as a means of interaction by the public sector, constituency involvement will rise, while costs can be minimized.
Tags : 
social networking, blog, blogging, blog marketing, wiki, wikis, wiki marketing, emerging marketing
    
Quocirca
Published By: Asentria Corporation     Published Date: Sep 04, 2007
As an equipment provider for worldwide, national and regional radio and television facilities, Transcom Corporation, headquartered in Huntingdon Valley, Pa., has been meeting the broadcasting capability needs of stations worldwide since 1978. Transcom specializes in distributing new TV transmitters, antenna, cable, Studio Transmitter Link (STL) and audio equipment that enable television and radio stations to transmit sound and video from the studio to the antenna.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures
    
Asentria Corporation
Published By: Asentria Corporation     Published Date: Sep 04, 2007
Simple voicemail has evolved into complex integrated messaging platforms and the generic black handset has been replaced by a plethora of devices. Service providers can become critical partners for companies looking to ensure availability of their voice network.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures
    
Asentria Corporation
Published By: OneNeck IT Services     Published Date: Aug 24, 2007
ERP Outsourcing for the Mid-Market discusses the nuances of outsourcing and critical success factors for mid-market companies.  Specifically, how companies can effectively select a compatible outsourcing partner who understands both parts of the equation - business and technology - and how to create a governance environment that fosters a successful outsourcing relationship.
Tags : 
oneneck, erp hosting, erp outsourcing, it outsourcing, it hosting, j.d. edwards, oracle, baan
    
OneNeck IT Services
Published By: OneNeck IT Services     Published Date: Aug 24, 2007
The nature of corporate accounting and financial controls has forever been changed by Sarbanes-Oxley legislation. This white paper discusses the ripple effect of the Act on the IT outsourcing community and the new responsibilities and ethics that rest on companies, both public and private, that entrust all or part of their IT environment to an external third party.
Tags : 
oneneck, erp hosting, erp outsourcing, it outsourcing, it hosting, j.d. edwards, oracle, baan
    
OneNeck IT Services
Published By: PEAK Technologies, Inc.     Published Date: Aug 20, 2007
Wherever there is a label on a product, there is a potential need for printer applicators. Download this whitepaper now for a thorough analysis of the complete labeling requirement, from part production to end user application, which must to be completed to determine the correct printer applicator.
Tags : 
barcode, barcodes, bar code, bar codes, upc, upc symbol, inventory, scan
    
PEAK Technologies, Inc.
Published By: IAG Consulting     Published Date: Aug 17, 2007
Before your company launches its next package selection, implementation or upgrade, make sure you don’t cripple the project from the start by failing to identify your requirements – the number one reason that projects spin out of control. This white paper summarizes some of the key lessons we have learned through our industry-leading requirements definition practice.
Tags : 
systems development, system development, sdlc, business requirements, project planning, defining, definition, define the problem
    
IAG Consulting
Published By: ProofSpace     Published Date: Aug 17, 2007
This white paper defines the life cycle of an electronically signed record and describes  the requirements for handwritten signature-equivalence throughout its retention period.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography
    
ProofSpace
Published By: Ecora Software     Published Date: Aug 16, 2007
Deep dive into the first 4 PCI DSS requirements. Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial
    
Ecora Software
Start   Previous    354 355 356 357 358 359 360 361 362 363 364 365 366 367 368    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.