Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

asp

Results 351 - 375 of 542Sort Results By: Published Date | Title | Company Name
Published By: Aprimo, Inc.     Published Date: Dec 23, 2008
Aprimo manages the financial aspects of your marketing process and captures information about each marketing project, which facilitates Sarbanes-Oxley compliance. It puts into place detailed procedures to manage access rights, to create and document business rules that apply to marketing projects and to ensure appropriate review and approval.
Tags : 
aprimo, marketing process, financial control, digital asset management, data management
    
Aprimo, Inc.
Published By: Silverpop     Published Date: Mar 07, 2013
It seems as if mobile email has become the new hot topic among digital marketers. While email itself is full of important questions to as, this is only one aspect of an effective multi-screen email marketing strategy. Watch this video to learn more.
Tags : 
mobile email, mobile email marketing, digital marketing, email marketing strategy
    
Silverpop
Published By: OutSystems     Published Date: Oct 12, 2015
This guide will help you grasp the vast and growing landscape of point solutions that exist to accelerate mobile app dev. A functional matrix will help you navigate the app lifecycle and better understand the challenges each tool addresses.
Tags : 
outsystems, mobile app, application development, app lifecycle, operating system, networking, software development, wireless
    
OutSystems
Published By: Gigya     Published Date: Jun 08, 2015
Download this guide to get a grasp of the latest trends in user data management.
Tags : 
user data management, big data, identity and access management, compliance, mobilizing identity data, enterprise applications
    
Gigya
Published By: Kaspersky     Published Date: Jan 22, 2016
Hardly a day goes by without the discovery of a new cyber threat somewhere in the world! But how do you keep up with new malware and evolving cybercriminal tricks?
Tags : 
kaspersky, cybercrime, hackers, malware, threat protection, network security
    
Kaspersky
Published By: Jeppesen     Published Date: Aug 05, 2019
Aircraft routing and tail assignment are two critical aspects of airline scheduling. Learn how Jeppesen’s Aircraft Routing and Tail Assignment solutions work together holistically across your operations to support improved airline scheduling.
Tags : 
aircraft routing, fleet solutions, tail assignment, fuel savings, crew integration, aircraft operations, airline scheduling
    
Jeppesen
Published By: Aternity     Published Date: May 22, 2015
“ This 30-minute webinar that will help you navigate the EUEM landscape and learn how traditional APM and device monitoring products provide some aspects of End User Experience Monitoring, but can often leave enterprise IT Ops teams blind to what their users are actually experiencing.
Tags : 
enterprise mobility, enterprise mobility management, application performance analytics, application performance monitoring, desktop management, desktop monitoring, end user experience, end user experience monitoring
    
Aternity
Published By: Aspect Software     Published Date: Nov 06, 2014
Learn how Trupanion reduced ongoing IT costs while increasing staff utilization, sales and customer satisfaction. This case study and research conducted by Nucleus Research outlines how Trupanion, using Aspect’s hosted contact center, achieved a payback in five months and an average annual benefit that exceeds $1.3M.
Tags : 
aspect, trupanion, roi, return on investment, it costs, strategy, visibility, customer satisfaction
    
Aspect Software
Published By: CA Technologies     Published Date: Aug 24, 2017
Mit OAuth kann der Benutzer den Zugriff an eine API delegieren. So kann für diesen Benutzer ein Service in einen anderen integriert werden. Die gleichen Social Web-Anbieter, die dafür gesorgt haben, dass APIs verfügbar gemacht werden, damit externe Entwickler ihre Plattformen optimieren können, waren auch die ersten, die solche Mechanismen für die delegierte Autorisierung angewendet haben. OAuth wurde im Jahr 2006 definiert, um derartige Mechanismen zu standardisieren.
Tags : 
    
CA Technologies
Published By: Oracle     Published Date: Nov 25, 2016
Digital disruption impacts every aspect of modern business. Access to peer opinion, knowledge, and self-service capabilities, from almost anywhere and from almost any device, has hugely transformed the way we run our businesses and lead our lives.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Nov 25, 2016
Digital disruption impacts every aspect of modern business. Access to peer opinion, knowledge, and self-service capabilities, from almost anywhere and from almost any device, has hugely transformed the way we run our businesses and lead our lives.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Nov 15, 2016
Digital disruption impacts every aspect of modern business. Access to peer opinion, knowledge, and self-service capabilities, from almost anywhere and from almost any device, has hugely transformed the way we run our businesses and lead our lives.
Tags : 
    
Oracle
Published By: Quocirca     Published Date: Apr 23, 2007
Many independent software vendors (ISVs) are recognising the benefits of offering software as a service (SaaS) as an alternative for their customers and once the teething problems have been overcome there are a number of long term benefits for both parties.
Tags : 
isv, isvs, saas, software as a service, business model, software service, aspiren, independent software vendor
    
Quocirca
Published By: Kaspersky     Published Date: Feb 05, 2015
This paper reveals how important is effective security software for banking threats.
Tags : 
online and mobile banking threats, online e-payments, security of online payments, cybercriminals, protection mechanisms used by banks
    
Kaspersky
Published By: Netviewer     Published Date: Jul 10, 2009
Business travel is coming under closer scrutiny: In Germany alone, companies spend approximately 50 billion euros on business travel every year. To partially offset this expense, many companies are replacing business trips with online meetings. With this technology, customers and partners are able to communicate with images and audio over the Internet, while special presentation functions reinforce the personal aspects of a meeting. Software licenses, Webcams, and headsets are worth the investments. Companies that use Web meetings discover new methods of collaboration and reduce their own output of greenhouse gases.
Tags : 
netviewer, vdr, german travel management, online meetings, roi, business travel, greener, webcams
    
Netviewer
Published By: Schneider Electric     Published Date: Jun 03, 2019
Industrial process safety management has evolved beyond simple functional safety. Some companies are at risk because management and business process aspects are not integrated into the overall safety plan. Such gaps can impact both operational integrity and profitable performance. Explore the change drivers affecting plant process safety management and learn how operators can find, measure, and manage gaps to maintain safe conditions and improve profitability. Download the white paper to learn more.
Tags : 
smart control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability
    
Schneider Electric
Published By: Oracle Corporation     Published Date: May 11, 2012
Download this whitepaper for a summary of the complete and integrated aspect of Oracle's strategy and where OBIEE 11g, the Oracle database, and the Oracle Exadata Database Machine have several key integration points.
Tags : 
oracle, business intelligence, database, exadata, integration, machine, integrate, performance
    
Oracle Corporation
Published By: HP     Published Date: Oct 01, 2014
The role and purpose of IT in an organization is undergoing significant change, driven by the need for businesses to become more agile and have greater control over cost levers when using technology. This transformation of IT involves many different aspects, not all of which are technology-related, but the one thing they all share is that IT modernization is about making changes to meet the current and future demands of business. This report provides a side-by-side comparison of leading virtualization and cloud management solutions, looking at IT modernization from a data center infrastructure perspective, with the findings delivered as the Ovum Decision Matrix (ODM). It considers the significance of management in the virtualization and cloud environments and how this influences the way in which technology is deployed, used, and controlled.
Tags : 
decision, matrix, virtualization, cloud, management, businesses, technology, modernization
    
HP
Published By: Webroot     Published Date: Sep 18, 2013
In today’s challenging security environment, using the best products that fulfill your business needs is of the essence. So when evaluating solutions, be sure to look at all aspects of a product—including performance benchmark testing. PassMark Software is a leading authority in software and hardware performance benchmarking, providing independent testing and analysis. In this recent PassMark report, discover how eight different endpoint security software products compare on a variety of metrics—from performance to malware protection—to help you determine which would work best in your organization
Tags : 
security, benchmark, software, hardware, endpoint security, performance metrics, protection, software development
    
Webroot
Published By: Dell Storage     Published Date: Aug 14, 2012
Engagement with customers online has evolved from novelty to necessity, with an estimated $202 billion spent in 2011 and projected 10% growth to $327 billion in 2016, according to Forrester Research. Businesses are maneuvering to connect with the growing pool of online customers, but the move to eCommerce brings new security risks with the exchange of sensitive consumer information, including cardholder data and personally identifiable information that can enable identity theft. At stake is reputation of brand, ongoing access to merchant credit lines, and substantial penalties and remediation in the event of a breach. This white paper elucidates the aspects of PCI DSS (Payment Card Industry Data Security Standards) compliance that must be considered when choosing a secure environment for servers involved in eCommerce. Whether deciding to outsource or keep data hosting in-house, any company collecting, storing or transmitting customer cardholder data needs to be compliant, and this document helps pinpoint the specific concerns and standards a company should be aware of when choosing how to keep their data secure. Understanding requirements and best practices for security policies and procedures, physical safeguards, and security technologies is essential to establishing cardholder data security and meeting QSA and SAQ audit requirements.
Tags : 
pci, compliant, data, centers, engagement, connect, ecommerce, compliance
    
Dell Storage
Published By: Oracle APAC ZO OD Prime Volume SCM ABM Leads June 2017     Published Date: Jul 12, 2017
Corporations today are focused on employee engagement – but the task of keeping employees engaged is not that easy. Recent research shows that 38 percent of the respondents to PwC’s Annual CEO Survey see effective performance management as a critical factor when they were asked “what aspects of their talent strategy would make the greatest impact on attracting, retaining and engaging the people you need to remain relevant and competitive.”1 Achieving simultaneous growth in top-line revenue and bottom-line profitability has come, and likely will continue to come, through greater levels of workforce efficiency.
Tags : 
cloud, cloud computing, performance management, survey, employee engagement, efficiency
    
Oracle APAC ZO OD Prime Volume SCM ABM Leads June 2017
Published By: CSB by Cornerstone on Demand     Published Date: Aug 10, 2012
When all my good work and planning has been undone, I like to visit pinterest, where I've built a utopian world filled with "when I grow up" aspirations.
Tags : 
performance management, sonar6, pinterest
    
CSB by Cornerstone on Demand
Published By: IBM     Published Date: Mar 04, 2009
Web Application Security Podcast featuring Paul Kaspian. This PodCast touches on how to meet application security compliance deadlines.
Tags : 
ibm, podcast, rational appscan, application security, security
    
IBM
Published By: IBM     Published Date: Mar 07, 2016
Predictive Maintenance for Dummies helps you grasp the concepts of predictive maintenance and put the benefits to use.
Tags : 
ibm, predictive maintenance, operations, data, competitive advantage, enterprise applications
    
IBM
Published By: LogMeIn     Published Date: Oct 08, 2015
In this eBook evaluates trends in Millennial mobile habits, career aspirations, and workplace behavior to help determine what to expect as the generational scales begin to tip – and how you can prepare for the future of work.
Tags : 
millennial workplace invasion, future of business, millennial generation
    
LogMeIn
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.