Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

edition

Results 126 - 150 of 211Sort Results By: Published Date | Title | Company Name
Published By: Kenshoo     Published Date: Oct 30, 2012
Kenshoo Global Search Advertising Trends is the first in a new series of reports reflecting aggregate campaign data across search engines like Google, Yahoo!, Bing, and Baidu. Read on to learn about paid search trends by search engines and more.
Tags : 
kenshoo, global search trends, search engines, search, enterprise search
    
Kenshoo
Published By: IBM     Published Date: Apr 15, 2015
Business Process Management For Dummies, IBM Limited Edition, shows you what BPM is and how it can help your organization. You see how the BPM solutions from IBM help you gain many benefits from higher customer satisfaction to greater agility in adapting to changing market conditions. Chapter 1:Understanding BPM Chapter 2: Getting Started with BPM Chapter 3: Putting BPM to Work for your Organization Chapter 4: Improving BPM Automation and Decision Management Chapter 5: Checking out BPM Success Stories Chapter 6: Reasons to Choose BPM from IBM
Tags : 
ibm, dummies, business process management, business intelligence, best practices, automation
    
IBM
Published By: BlackBerry     Published Date: Apr 13, 2010
The Blackberry Java Development Environment (BlackBerry JDE) is a fully integrated development environment and simulation tool for building Java Micro Edition (Java MET) applications for Java-based Blackberry smartphones.
Tags : 
blackberry, java, jde, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: Arcserve     Published Date: Feb 26, 2015
In typical organizations, most data resides outside the data center, so it is important that the protection of desktop and laptop computers is given the same priority as file servers and application servers. Have you deployed the right data protection strategy for endpoints? We’re here to help! Arcserve UDP offers a FREE Workstation edition product that specifically focuses on backing up data on endpoints. Not only can desktops and laptops be protected for FREE with award-winning technology that minimizes bandwidth and storage requirements, but they can participate in the global deduplication schema offered by UDP (for 30 days), and have their data protected in public and private clouds, and more! This is too good to pass up! Get your FREE Arcserve UDP Workstation edition now.
Tags : 
arcserve, unified data protection, software download, bandwidth, deduplication, it management, enterprise applications
    
Arcserve
Published By: IBM     Published Date: Jun 25, 2013
This new edition has a wider scope than the previous one, with 17 participants while retaining a similar maturity model as the previous one in order to help participants measure their progress year -on-year.
Tags : 
hpc, maturity, risk management, maturity model
    
IBM
Published By: Cisco     Published Date: Sep 07, 2016
This white paper highlights the maturation of big data technologies and strategies, and how companies are transitioning from one-off pilot projects to powerful enterprise capabilities that can be leveraged on a daily basis.
Tags : 
    
Cisco
Published By: Webroot Inc     Published Date: Jan 14, 2015
PassMark Software® conducted objective performance testing on eight (8) security software products, on Windows 7 Ultimate Edition (64-bit) during January 2014. This report presents our results and findings as a result of performance benchmark testing conducted for these endpoint security products. The aim of this benchmark was to compare the performance impact of Webroot’s SecureAnywhere Business Endpoint Protection product with seven (7) competitor products.
Tags : 
endpoint performance, performance testing, security software, security
    
Webroot Inc
Published By: Engineering360 Media Solutions     Published Date: Jul 07, 2016
Engineering360 is pleased to bring you this selection of marketing articles compiled from recent editions of the Marketing Maven, our monthly e-newsletter created exclusively for business-to-business sales and marketing professionals in the industrial sector.
Tags : 
marketing, engineering360, sales, b2b marketing, marketing strategy, social media
    
Engineering360 Media Solutions
Published By: HireRight     Published Date: Jul 31, 2013
HireRight Employment Screening Benchmarking Survey 2013 Edition.
Tags : 
hireright, background checks, talent management, screening employees, small business report
    
HireRight
Published By: Dell     Published Date: Aug 29, 2013
Virtualization helps you get the most from your investments, and is a flexible, powerful way to get things done. But what happens when you encounter problems with virtualization? Native tools aren’t powerful enough when you have questions about your virtual infrastructure and its capacity. In this new technical brief, see how you can properly size your VMs, measure VM density, find virtual infrastructure waste, measure storage latency – and more! – with a free, powerful tool. Discover the top 10 ways Foglight for Virtualization, Free Edition, can help you with virtualization challenges. Read this technical brief today.
Tags : 
virtualization, foglight, infrastructure, vms
    
Dell
Published By: IBM     Published Date: Mar 11, 2015
Cyber attacks are growing every day and become serious threats to your organization, but how do you know and understand the threats out there? Download a copy of this book, and you discover the zero-day exploits and threats used to compromise your enterprise. You also learn about a promising new technology developed by Trusteer, an IBM company, which provides effective yet transparent protection to enterprise endpoints. Start reading Stopping Zero-Day Exploits For Dummies, Trusteer Special Edition, today!
Tags : 
ibm, cybercrime prevention, it security solutions, trusteer, security, it management
    
IBM
Published By: IBM     Published Date: Jul 31, 2015
New endpoint solution.
Tags : 
    
IBM
Published By: IBM     Published Date: Oct 13, 2015
This e-book examines today’s enterprise threat landscape and introduces IBM Security’s new endpoint solution to help stop exploits & targeted attacks.
Tags : 
ibm, zero-day, enterprise, threat, security, endpoint solution, malware, advanced persistent threats, cybercriminal, enterprise applications
    
IBM
Published By: IBM     Published Date: Jan 07, 2016
Integrated Threat Management for Dummies lays the foundation for effective tools and techniques that work together to counter today's advanced threats.
Tags : 
ibm, threat, prevention, protection, system, security
    
IBM
Published By: IBM     Published Date: Jan 22, 2016
IBM® DB2® is a multi-workload database software that improves business agility and reduces cost by better managing your company's core asset - data. Let's explore which edition of DB2 is the best fit for your needs.
Tags : 
networking, it management, data center
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
"Integrated Threat Management for Dummies lays the foundation for effective tools and techniques that work together to counter today's advanced threats. Read the ebook to learn: The principles of attack prevention How security tools work together to protect an organization IBM's tools for prevention, detection, and response"
Tags : 
ibm, integrated threat management, threat mitigation, threat management, security, network security
    
IBM
Published By: IBM     Published Date: May 09, 2016
Reliable Transportation For Dummies, IBM Limited Edition, shows you what you need to know about what it takes to keep a fleet operating efficiently while keeping maintenance expenses in check. In other words, this book provides information and ideas about what you can do to have a reliable fleet operation that doesn’t break the bank with either unforeseen breakdowns or out-of-control maintenance expenditures.
Tags : 
ibm, watson, internet of things, iot, transportation, reliable transportation, operational efficiency
    
IBM
Published By: IBM     Published Date: May 25, 2016
In this IBM limited-edition Dummies book, you’ll learn what operational decision management (ODM) is and how it can benefit your organization by helping to: - Enable faster and more agile change so your business can react more quickly to opportunities and threats - Automatically capture knowledge so it can be reused to make better business decisions - Manage compliance better by providing a clear record of the rules that govern business operations - Make operational decisions more predictable and repeatable while also allowing you to model, measure, collaborate on and refine these decisions as your business needs change - Improve customer service with more consistent and accurate rules-based decisions, as well as by personalizing the user experience
Tags : 
ibm, odm, operational decision management, odm, middleware, connect, enterprise applications
    
IBM
Published By: IBM     Published Date: Apr 18, 2017
Are you looking to add new data domains or solve new business problems? IBM InfoSphere MDM comprises a complete MDM suite with multi-domain MDM capabilities and built-in domain patterns. IBM offers several editions of InfoSphere MDM, each designed to integrate with your existing architectures and business processes. You can choose the platform that best meets your immediate and long-term needs.
Tags : 
cloud data, online marketing, customer acquisition, mobile marketing, social marketing, data warehouse, data storage, data collection
    
IBM
Published By: Group M_IBM Q418     Published Date: Oct 28, 2018
This book is your guide to applying the power of APIs to business challenges from changing business models to embracing a world of devices.
Tags : 
    
Group M_IBM Q418
Published By: Cisco     Published Date: Jul 11, 2016
Big data presents tremendous opportunities for every company in every industry. It’s purely a matter of finding the right use cases, the right strategies, and the right partners that can turn those opportunities into real business value. This edition of Unleashing IT highlights the strategies, solutions, and providers that can help you unlock your competitive edge.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jul 11, 2016
Operational efficiency and cost savings. Datadriven business insights. Organizational agility and market differentiation. Enterprises in every industry are pursuing such gains, but they cannot be achieved with a fragmented, siloed technology infrastructure. Technological integration doesn’t happen overnight, of course. It takes years of behind-the-scenes teamwork and engineering—backed by decades of expertise, research, and development—to have a broad and lasting impact. This special edition of Unleashing IT highlights the fruits of those labors, showcasing the unparalleled alignment of Microsoft, Cisco, and Intel technologies. In the following pages, you’ll read about the advancement and unique value of integrated solutions, spanning cloud environments, data centers, and management tools. You’ll also hear from organizations that are aking advantage of these converged technologies, including King County, Provincia Net, and Swinburne University.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jul 11, 2016
This edition of Unleashing IT showcases the groundswell of momentum surrounding Cisco® Application Centric Infrastructure (Cisco ACI™), which fundamentally transforms the way technology is delivered in support of business priorities. Hundreds of organizations are already using the year-old architecture, and we could not have achieved such rapid and widespread adoption without the enthusiasm and support of Intel®, our networking and application partners, and customers.
Tags : 
    
Cisco
Published By: IBM     Published Date: Oct 13, 2017
Integrated Threat Management For Dummies, IBM Security Limited Edition, lays the foundation for effective tools and techniques that work together to help counter today’s advanced threats. Regardless of your role in the IT security organization, threat management tools and techniques will influence your job. Your role determines the part you play to effectively manage threats, including those targeting the cloud and your company’s data. If you are a Chief Information Security Officer (CISO) or security manager, this book explains in detail the types of tools you need to effectively prevent, detect, and respond to security incidents. If you’re in general business management, you’ll better understand the risks associated with enterprise computing and the reasons why a comprehensive portfolio of security tools that work well together is so important.
Tags : 
malware prevention, network intrusion prevention, malware protection, ibm, firewall, mutating malware, cyber threats
    
IBM
Published By: Group M_IBM Q1'18     Published Date: Feb 27, 2018
Overview of unified endpoint management (UEM)–why it’s necessary and addresses complex problems encountered by IT in the modern enterprise
Tags : 
uem, modern enterprise, unified endpoint management
    
Group M_IBM Q1'18
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.