Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

critical

Results 2376 - 2400 of 2621Sort Results By: Published Date | Title | Company Name
Published By: Marketo     Published Date: Nov 04, 2011
Knowing the right questions to ask makes a world of difference when making a purchase. To ensure you make the most out of your reference calls, use this list of valuable questions you should always ask. Topics range from CRM integration, support experience and implementing functions like lead scoring, lead nurturing and data quality.
Tags : 
marketo, reference call, crm integration, white paper, marketing, data quality
    
Marketo
Published By: Marketo     Published Date: Nov 04, 2011
Did you learn everything you needed to during your marketing automation demo? Use this checklist to feel confident about the six critical areas of marketing automation. This checklist covers topics including functionality, branding and design control, and marketing campaign creation.
Tags : 
marketo, marketing automation, demo, whitepaper, checklist, branding, design control
    
Marketo
Published By: YouSendIt     Published Date: Jul 18, 2011
This case study illustrates how AMAG drastically cut completion time of critical projects by eliminating e-mail transfer of large files, ultimately improving security, increasing cost-savings and accelerating time to market.
Tags : 
amag, pharmaceuticals, intravenous drugs, anemia, online file sharing, ftp replacement, send large files, secure file transfer, managed file transfer, file transfer, online file storage, large email attachment, upload, upload files, send it on, yousendit, file sharing, yousendit file sharing
    
YouSendIt
Published By: YouSendIt     Published Date: Sep 08, 2011
This helps to answer the critical question about what are the best opportunities for IT to deliver short- and long-term business value without diverting limited resources from IT's front-line goals of keeping business running.
Tags : 
yousendit, it leaders, dortch, business value, front-line goals, growth strategy, collaborative application
    
YouSendIt
Published By: LogRhythm     Published Date: Sep 26, 2008
LogRhythm, the leader in Log and Security Event Management Solutions, has prepared a "Quick Read" whitepaper to help you understand what's required to ensure compliance with: CIP- 003-1 – Cyber Security – Security Management controls; CIP- 005-1 – Cyber Security – Electronic Security Perimeter(s); CIP- 006-1 – Cyber Security – Physical Security of Critical Cyber Assets; CIP -007-1 – Cyber Security – Systems Security Management; CIP -008-1 – Cyber Security – Incident Reporting and Response PlanningThe whitepaper also contains a compliance reference chart with the specific CIP requirements matched with recommended steps to ensure compliance.
Tags : 
nerc, nerc cip, nerc cip requirements, critical cyber assets, electronic security perimeter, critical cyber assets, compliance, comply, security, information technology, information security management, log management, log analysis, log collection, log analyzer, log tool, logrhythm, security event management, web logs, log collection
    
LogRhythm
Published By: Alt-N Technologies     Published Date: Sep 26, 2008
Email has become today's most mission-critical communication channel. Each and every day, 800 million business users worldwide use email during the course of their work day and about 80 percent of a company's intellectual property passes though its email server. Email is a vital component of both internal communication between employees and external communication with customers and business partners. It has become such an integral part of normal day-to-day business operations that most companies simply cannot function without it: when email stops, your ability to conduct business also stops.
Tags : 
alt-n technologies, email, exchange server, mdaemon, smtp, pop, imap, syncml, pocket pc, sender policy framework (spf), sender id
    
Alt-N Technologies
Published By: Godfrey     Published Date: Oct 02, 2008
Branding has always been about much more than logos and graphics. It comprises the total experience customers and prospects have with your company. By adding newer, richer choices, today’s new communications technologies – everything from blogs and podcasts to wikis and mobile – are changing the fundamental basis of business-to-business marketing. Almost daily. While some are saying that branding is no longer relevant in that increasingly fragmented media world, we believe branding actually is more important than ever. In fact, it’s critical to your success.
Tags : 
godfrey, b-to-b branding, business-to-business branding, b-to-b branding in web 2.0, b-to-b interactive media, brand guardians, brand ambassadors, media proliferation, brand fragmentation, business-to-business marketing
    
Godfrey
Published By: Godfrey     Published Date: Oct 24, 2008
Media Channel Planning is the process of selecting the proper media channels to achieve the desired marketing outcomes. Godfrey believes Media Channel Planning is a critical part of any marketer’s strategic program, and should be an important part of annual planning as well as continuous improvement efforts throughout the program year.
Tags : 
godfrey, media channel planning, media fragmentation, media lobotomy, b2b marketing media, b-to-b, b2b, business-to-business, media, media channel planning, media planning, media placement, b-to-b strategy, integration, advertising, search, podcasts, media
    
Godfrey
Published By: ConcertTech     Published Date: Dec 16, 2008
When you have a technology rollout to deploy on a nationwide or global scale, service efficiency is critical. While missed deadlines and unbudgeted project costs are always a concern, they should never be a likely outcome. By understanding the details of the Rollout Services Model (the second part of the Technology Rollout System), you can avoid the potential nightmares of project implementation and ensure that your project is completed on time and within budget.
Tags : 
concert technologies, rollout service model, project management, networking, enterprise applications
    
ConcertTech
Published By: HP - Enterprise     Published Date: Oct 16, 2008
As the military and US government rely more heavily on custom-built applications for communications and management, they also become more vulnerable to cyber attacks. Worse, according to the Dept. of Homeland Security, the number of attacks on custom-built applications is doubling every year. Learn about critical threats, methods that military and civilian agencies can use to deal with cyber attacks and technologies that improve security for custom-built applications.
Tags : 
security, application security, audit, risk, vulnerabilities, fortify, fortify software, hackers, cyber threats, application security standards, threats, assessment, remediation, department of homeland security, us government, military agency, civilian agency, military
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Jun 05, 2013
The term “network management” encompasses a broad range of solutions from single point products to element managers to large enterprise-class solutions. For the purpose of this ENTERPRISE MANAGEMENT ASSOCIATES® (EMA™) report, the term Enterprise Network Management Systems (ENMS) includes network-centric management solutions that are used by large organizations’ operations and engineering teams to discover, monitor, assess, troubleshoot, and generally maintain highly distributed enterprise networks. For this EMA™ Radar, the focus was put specifically on core capabilities and features primarily associated with network operations’ need to ensure health and availability of the network. Supporting functional capabilities such as performance monitoring, configuration management, asset management, as well as integrated management of connected non-network devices were also considered, but as non-critical (albeit helpful/valuable) extensions.
Tags : 
ema radar, network management, systems, network, management, infrastructure, network architecture, network performance, network performance management
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Jun 05, 2013
There is no question that mobile computing is growing at an exponential rate. This rapid transformation has seen security concerns outpaced by the ease of use, flexibility, and productivity of mobile devices. When vulnerabilities are exploited, the security of mission-critical data becomes a serious concern. Here we take a look at three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Tags : 
mobile apps, applications, security threats, mobile computing, security vulnerabilities
    
HP - Enterprise
Published By: Network Automation     Published Date: Dec 08, 2008
Often, the insurance underwriters stay late that last day of the month to enter new policies. This means that IT staff have a very small window to execute the applications critical to successful and error-free closing of the accounting books. IT staff had to run and baby sit the applications – one application requiring manual operation took over three hours to complete, another that uploads premium and claim information to the data warehouse took up to six hours.
Tags : 
network automation, application execution, process automation, networking, it management, network management, network performance management
    
Network Automation
Published By: Network Automation     Published Date: Dec 08, 2008
In order to deliver quality patient care, Health First must exchange information with a large number of partners, customers, and vendors on a timely basis. Complicating this enormous task is the fact that Health First has over 15 business units using a variety of mission-critical applications.
Tags : 
network automation, mission critical applications, process automation, automate, it management, network management, network performance management
    
Network Automation
Published By: Network Automation     Published Date: Dec 10, 2008
The Auxiliary IT Operation center at the Indiana University has a lot of responsibility on its plate. It is in charge of the majority of for-profit activities the university is engaged in, namely the halls of residence, parking, dining facilities, campus transportation and much more. Additionally, this unit supports many critical IT processes including the secure distribution of student photos for identification cards.
Tags : 
network automation, data security, data transfer, disaster recovery, networking, security, it management, network management, network performance management
    
Network Automation
Published By: Oracle Corp.     Published Date: May 30, 2008
Current trends show that the vast majority of companies are moving to services-oriented architectures (SOAs) and deploying Web services within and across their IT infrastructure.However, the success of those deployments is determined by the integrations and innovations that Web services make possible and how Web services affect the quality and performance of the mission-critical applications with which they interface.
Tags : 
soa, soas, oracle, application testing suite, web services, mission-critical, enterprise java beans-based, quality assurance, ejb, user interface, infrastructure
    
Oracle Corp.
Published By: Oracle Corp.     Published Date: Sep 07, 2012
San Joaquin County in California modernized a critical, but difficult to maintain, information systems infrastructure by transforming to BPM on a SOA foundation. San Joaquin County gained efficiency and greater visibility of mission-critical citizen
Tags : 
oracle, business process management, bpm, soa, service-oriented architecture, case study
    
Oracle Corp.
Published By: F5 Networks Inc     Published Date: Jul 22, 2016
Traditional datacenter perimeters are dissolving as users access applications from a multitude of environments on a variety of devices. Secure, centralized application management throughout the hybrid cloud network will give an enterprise greater agility to succeed in today’s digital world. Read the whitepaper to learn how.
Tags : 
f5 big-ip platform, performance, applications, application delivery, integrated systems, networking, it management, enterprise applications, telecom
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Aug 16, 2016
Data center refresh cycles and new initiatives tied to business growth and revenue opportunities are leading more organizations to deploy integrated systems, including both converged and hyper-converged infrastructures. IT leaders can see the potential benefits of converged, integrated systems but as applications increase in complexity, virtual workloads grow, and resource demands expand, managing these applications becomes a critical and often stubborn challenge.
Tags : 
application delivery services, systems deployments, integration, idg research, integrated system approach, networking, security, enterprise applications
    
F5 Networks Inc
Published By: Prodiance Corp.     Published Date: Dec 22, 2008
According to Baseline Consulting, approximately 32% of corporate data is contained in enduser computing (EUC) applications and approximately 68% is stored in IT controlled applications. These EUCs – primarily spreadsheets, PC databases (e.g. Access databases), BI reports, and word documents – are often stored on employee desktops and corporate file shares, and for the most part, are uncontrolled. They lack the proper safeguards and controls one would expect with IT controlled applications, including documentation, version control, back-up and archival, change control, testing, security and access control, and more.
Tags : 
prodiance, end-user computing (euc), risk assessment, automation, monitoring, spreadsheet, link migration, networking, security, migration
    
Prodiance Corp.
Published By: ChoiceStream     Published Date: Feb 04, 2009
ChoiceStream’s “Seven Key Requirements for Personalized Recommendation Services” white paper outlines e-commerce recommendation services and key capabilities that can improve sales revenue and customer engagement.  You’ll also receive a Recommendation Evaluation Scorecard to help you objectively summarize critical core requirements in order to maximize your return on investment.
Tags : 
choicestream, personalized recommendation services, quality recommendations, collaborative filtering, in-session click analysis, cohorts, cross-sells, cross-promotions, blacklists, seamless multi-channel support
    
ChoiceStream
Published By: Mimosa Systems     Published Date: Jan 14, 2009
Email archiving is emerging as a critical new IT application for managing email. For legal discovery, storage management, and regulatory compliance, email archiving provides important benefits that cannot be achieved with native email applications. The purpose of this “Email Archiving 101” paper is to provide a basic introduction to email archiving and explain how it benefits management of the email application server. The leading enterprise email application is Microsoft® Exchange Server, and this paper is geared toward this application; however, the principles discussed apply to all messaging applications.
Tags : 
mimosa systems, email archiving, mimosa nearpoint, microsoft exchange server, email applications, enterprise email application, it management, enterprise applications, platforms
    
Mimosa Systems
Published By: Microsoft Visual Studio Team System     Published Date: Feb 25, 2009
ALM is much more than just writing code. All three aspects—governance, development, and operations are important. Maximizing the value of the applications we create means doing all three aspects of ALM well. Achieving this goal isn’t easy, especially when today’s ALM tools aren’t as well integrated as they could be. Yet there’s no way around it: Taking a broad, holistic view of ALM is essential for improving this critical business process.
Tags : 
vsts, alm, application lifecycle management, software development lifecycle, sdlc, governance, it management
    
Microsoft Visual Studio Team System
Published By: MessageLabs     Published Date: Jul 02, 2009
This whitepaper looks at the value of email and outlines the issues and concerns of IT Managers involved in managing and maintaining business critical emails systems. Learn more today!
Tags : 
messagelabs, email manager, email, it management, microsoft exchange server, viruses, spyware, spam, disaster recovery, compliance
    
MessageLabs
Published By: Ecessa Corporation     Published Date: Mar 11, 2009
Today’s Wide Area Networks (WANs) are experiencing increased saturation with the deployment of bandwidth-intensive applications, increased numbers of users, and the need for reliable security transmissions. IT personnel responsible for these issues acknowledge the increased congestion and have strived to maintain high levels of network performance. At the same time, IT departments are tasked with the job of lowering the cost of network infrastructure and ongoing operations. Network administrators continually face the challenge of balancing the increased use of critical applications on the Internet, while eliminating downtime and congestion from affecting user quality and day-to-day business operations.
Tags : 
adsl load balancing, vpn load balancing and redundancy, bandwidth aggregation, qos, bandwidth control, bandwidth management, multi-homing, bgp multihoming, broadband bonding, broadband failover, disaster recovery, business continuity, wan load balancing, wan failover, dsl failover, dsl load balancing, disaster recovery solutions, dual wan router, wan failover, isp failover
    
Ecessa Corporation
Start   Previous    89 90 91 92 93 94 95 96 97 98 99 100 101 102 103    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.