Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

digital sign

Results 326 - 350 of 356Sort Results By: Published Date | Title | Company Name
Published By: TruSignal     Published Date: Jun 03, 2013
This white paper aims to provide B2C digital marketers with a better understanding of why you may need an audience expansion technique and what questions to ask yourself before you get started. We hope to not only build an imperative for audience expansion techniques, but also to offer a guide that will help you choose the right data and right techniques for reaching more of your desired prospects online. Specifically, this white paper will discuss and differentiate two specific expansion approaches: lookalike and act-alike audiences including how they are built, the problems they solve and how to use them effectively throughout the marketing funnel.
Tags : 
audience expansion, lookalike, act-alike, audience targeting, predictive analytics, big data, profile data, behavioral data, third-party data, first-party data, digital marketing, single factor correlation, multiple factor correlation, predictive audience models, custom audiences, offline data, effective marketing practices, digital marketers, marketing funnel, trusignal
    
TruSignal
Published By: Salesforce.com     Published Date: Apr 16, 2013
By 2014, smartphones and tablets will put power in the pockets of a billion global consumers, including your employees and partners and customers. However, mobile is not simply another device for IT to support with a shrunken website or a screen-scraped application. Rather, mobile is the visible manifestation of a much broader shift to systems of engagement that marry physical context and digital intelligence to deliver service directly into a person's hands. This shift will add value and take cost out of every business service, workflow process, and business application. But mobile engagement will also require wholesale changes to your app design, service delivery, IT skills, technology assets, and even your business model. This report lays out a vision for mobile engagement and introduces the strategic elements developed further in The CIO's Mobile Engagement playbook.
Tags : 
mobile, smartphones, tablets, engagement, experience, applications
    
Salesforce.com
Published By: Texas Memory Systems     Published Date: Feb 25, 2012
In this final piece on server virtualization and SSD, Storage Switzerland discusses the power of performance, specifically, the dramatic impact that latent-free storage can make on the virtual environment. Read on to find out more!
Tags : 
desktop virtualization, architecture, design, zero-latency, retrieval, solid state storage, bandwidth, high bandwidth, flash controllers, applications, data warehousing, tbs, tb capacity, storage, ramsan, texas memory systems, high availability, performance, solid state, enterprise
    
Texas Memory Systems
Published By: Texas Memory Systems     Published Date: Feb 25, 2012
For data centers looking to get the maximum performance from Flash-based storage supporting their virtual infrastructure, the RamSan-720 should be given strong consideration.
Tags : 
ramsan-720, integrated ssd, ssd, virtual server, infrastructure, desktop infrastructure, server virtualization, desktop virtualization, architecture, design, zero-latency, retrieval, solid state storage, bandwidth, high bandwidth, flash controllers, applications, data warehousing, tbs, tb capacity
    
Texas Memory Systems
Published By: Texas Memory Systems     Published Date: Feb 25, 2012
In this part II of Enhancing Server And Desktop Virtualization With SSD, Storage Switzerland focuses on the next challenge of integrating SSD into a virtual server or desktop infrastructure and effectively using the technology in this environment.
Tags : 
integrated ssd, ssd, virtual server, infrastructure, desktop infrastructure, server virtualization, desktop virtualization, architecture, design, zero-latency, retrieval, solid state storage, bandwidth, high bandwidth, flash controllers, applications, data warehousing, tbs, tb capacity, storage
    
Texas Memory Systems
Published By: Texas Memory Systems     Published Date: Feb 25, 2012
It is common knowledge that PCIe SSD is faster, right? Maybe not, says George Crump from Storage Switzerland. Read on to find out why.
Tags : 
pcie, pcie ssd, ssd, architecture, design, zero-latency, retrieval, solid state storage, bandwidth, high bandwidth, flash controllers, applications, data warehousing, tbs, tb capacity, storage, ramsan, texas memory systems, high availability, performance
    
Texas Memory Systems
Published By: Texas Memory Systems     Published Date: Feb 25, 2012
Most companies have only put limited effort toward the system architecture that surrounds the flash memory modules. In this white paper, Storage Switzerland focuses on the importance of architecture design in solid state storage systems.
Tags : 
ssd, architecture, design, zero-latency, retrieval, solid state storage, bandwidth, high bandwidth, flash controllers, applications, data warehousing, tbs, tb capacity, storage, ramsan, texas memory systems, high availability, performance, solid state, enterprise
    
Texas Memory Systems
Published By: Texas Memory Systems     Published Date: Feb 25, 2012
With flash based systems now commonly in the TBs of capacity and rapidly becoming more affordable, it may be time to look at using solid state storage with high bandwidth applications. Read this white paper to find out more.
Tags : 
solid state storage, bandwidth, high bandwidth, applications, data warehousing, tbs, tb capacity, storage, ramsan, texas memory systems, high availability, performance, solid state, enterprise, racks, data storage, digital signal, low latency, enterprise data storage, ssds
    
Texas Memory Systems
Published By: Echosign     Published Date: Oct 07, 2011
Adobe EchoSign is the leading esignature provider, delivering efficiency and security to any signing process. Learn more at a free webinar.
Tags : 
digital signature, electronic signature, electronic signatures, digital signatures, e-signature, real sign, realsign, realsign signatures, signature pad, real signatures, easysign, sign pdfs, paperless signing
    
Echosign
Published By: Echosign     Published Date: Sep 19, 2011
Leading companies recognize the importance of eSignatures. This Buyer's Guide lets you know what to look for in an eSignature solutions vendor.
Tags : 
digital signature, electronic signature, electronic signatures, digital signatures, e-signature, real sign, realsign, realsign signatures, signature pad, real signatures, easysign, sign pdfs, paperless signing
    
Echosign
Published By: DigitalPersona UK     Published Date: Jul 21, 2011
This whitepaper outlines the problems of traditional password-based authentication systems, and sets out how they can implement strong authentication systems that are secure and easy to use.
Tags : 
digital persona, password, fingerprint authentication, identity management, identity protection, data security, identity theft, loss prevention, compliance, biometrics, fraud prevention, transaction authentication, identification, cloud security, cloud based security saas security, strong authentication, fingerprint, full disk encryption, single sign-on, cloud management
    
DigitalPersona UK
Published By: DigitalPersona UK     Published Date: Jul 21, 2011
This whitepaper takes a deeper look at the steps you can take to protect your critical data and provide secure access to that data via the cloud to improve your security posture and reduce cost.
Tags : 
end point security, digitalpersona, saas, security as a service, cloud, cloud security, cloud based security, saas security, strong authentication, fingerprint authentication, identity management, identity protection, data security, identity theft, loss prevention, compliance, biometrics, fraud prevention, transaction authentication, identification
    
DigitalPersona UK
Published By: Cactus Commerce     Published Date: Jul 20, 2011
Download this whitepaper to gain insight into retailers that were faced with the challenge of presenting the best possible online experience and how they were able to offer extended features and functionality to their customers.
Tags : 
cactus commerce, commercelive, microsoft e-commerce, cross channel e-commerce solution, e-commerce platform, digital e-commerce solution, e-commerce web design, sharepoint ecommerce solution, digital commerce, user experience
    
Cactus Commerce
Published By: Xolido Systems     Published Date: Mar 09, 2011
Free desktop application to e-Sign, Smart verify and TimeStamp documents and files
Tags : 
    
Xolido Systems
Published By: Recombo     Published Date: Feb 13, 2011
"Agreement Express helps us be more efficient and save our most valuable resources - time and money. Not only did we eliminate lost productivity..."
Tags : 
contract management software, i-9, digital signature
    
Recombo
Published By: GlobalSign     Published Date: Jan 11, 2011
White Paper explaining the growing need for Digitally Signing Adobe AIR applications, and expanding the market reach of your application by distributing trusted code.
Tags : 
code signing, digital certificate, pki, adobe air, digital signatures, secure code
    
GlobalSign
Published By: ARX (Algorithmic Research)     Published Date: Jun 10, 2010
This white paper outlines the costs associated with a paper-based approval process and can help you establish the Return on Investment (ROI) that your organization can expect by deploying a digital signature solution.
Tags : 
arx, algorithmic research, roi calculation, digital signature, tco, automated approval process
    
ARX (Algorithmic Research)
Published By: Cisco Systems, Inc.     Published Date: Jun 07, 2010
Help transform how organizations learn, grow, communicate, and collaborate with social video, digital signage, and IPTV systems.
Tags : 
cisco, show and share, social video, digital signage, iptv system, digital media suite, ip networks, ip telephony
    
Cisco Systems, Inc.
Published By: Cisco Systems, Inc.     Published Date: May 25, 2010
This document provides a technical overview of the Cisco Digital Media System for Cisco Desktop Video and its main components.
Tags : 
cisco digital media, desktop video, digital signage, multimedia, video management software
    
Cisco Systems, Inc.
Published By: Entrust Datacard     Published Date: Nov 10, 2009
This white paper examines the elements that comprise a high quality PKI and the advantages of outsourcing to Entrust Managed Services PKI.
Tags : 
pki, digital certificates, hosted certificates, managed services pki, managed certificates, authentication, digital signature, entrust
    
Entrust Datacard
Published By: RedEye On Demand     Published Date: Jun 23, 2008
Rapid manufacturing's benefits extend far beyond the upfront savings on tooling. Discover how it will improve your operations, sales and profits and why it is heralded as the next industrial revolution. In the first of a series, you will discover the benefits of the freedom to redesign your products at any stage in the life cycle.
Tags : 
plm, product design, product lifecycle management, design, redeye
    
RedEye On Demand
Published By: RedEye On Demand     Published Date: Jun 23, 2008
Adhering to the constraints and limiting design freedoms are necessary for conventional manufacturing processes. Rapid manufacturing eliminates all of the design constraints imposed by conventional manufacturing methods. It offers designers and engineers an unprecedented freedom to design a product and its components exclusively for the desired form, fit and function.
Tags : 
scm, design, product design, plm, product lifecycle management, redeye
    
RedEye On Demand
Published By: Arcot     Published Date: Jun 04, 2008
Solutions including one-time-password (OTP) generator tokens, do not offer the same level of protection as the ArcotID against attacks such as the man-in-the-middle attack. The ArcotID secure software credential provides protection against common Internet threats and several futuristic attacks that are becoming popular among fraudsters.
Tags : 
authentication, digital signature, password management, cardholder authentication, arcot, smartcard
    
Arcot
Published By: ARX (Algorithmic Research)     Published Date: Feb 14, 2008
As the traditional “paper-based” world gives way to digital documentation and transactions, enterprises are demanding innovative solutions for digitally signing and authenticating such documents, files, and forms with iron-clad protection against forgery. Solutions must guarantee non-repudiation and promise the same level of security and trust that exists with conventional documentation. At the same time, such a solution should be simple to use, easy to deploy and offer a rapid ROI.
Tags : 
digital signature, electronic signature, digital signatures, electronic signatures, digital signature, arx, algorithmic research, pki, public key, authentication, document management
    
ARX (Algorithmic Research)
Published By: Guardian Digital     Published Date: Oct 02, 2007
Guardian Digital's EnGarde Secure Linux is the world's premier secure operating platform engineered from Open Source Technologies.  Written in an easy to read, plain-language format, you will get introduced to the full range of benefits that makes EnGarde "Secure By Design."
Tags : 
open source, open source security, network security, adaptability, security management, email security, guardian digital, digital guardian, security, infrastructure
    
Guardian Digital
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.