Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

mes

Results 3276 - 3300 of 3596Sort Results By: Published Date | Title | Company Name
Published By: SAP Inc.     Published Date: Jul 28, 2009
Learn how core corporate processes can help your company meet financial objectives and mitigate risk in troubled economic times.
Tags : 
sap, lean, lean enterprise, three-tierd, operations, lehman, costs, operations, shared services level, corporate level, division level, leadership, crisis management, corporate strategy, enterprise visibility, enterprise applications, governance, united pipe, benchmark, procurement
    
SAP Inc.
Published By: SAP Inc.     Published Date: Jul 28, 2009
In this paper, Frank Dravis, Six Factors Consulting, discusses how even with the finest marketing organizations, the success of marketing ultimately comes down to the data.
Tags : 
single platform, data integration, data quality, quality management, soa, architecture, soa, sap businessobjects data services, platform, sap, service-oriented architecture, xl 3.0, data management, developer, source, data integration, business intelligence, legacy, crm, customer relationship management
    
SAP Inc.
Published By: Fathom SEO.     Published Date: Jul 27, 2009
View Fathom SEO's Multilateral Online Marketing (MOM) demo and learn about Internet marketing strategies such as cutting-edge integrated Internet marketing for tough financial times.
Tags : 
fathom seo, mom, search engine optimization, multilateral online marketing, calls to action, phone call tracking, online pr, social media, reputation building, branding, sales tools, sales, paid search, link building, online video, email marketing, conversion data
    
Fathom SEO.
Published By: BMC Control M     Published Date: Jul 22, 2009
L’automatisation de la charge de travail (Workload Automation ou WLA) est une version aboutie de la planification des tâches qui permet d’automatiser des traitements informatiques complexes et qui accepte des charges de travail basées sur des événements, des plates-formes multiples, des services Web, des applications composites, des architectures orientées services (SOA), des systèmes virtuels, l’intégration des systèmes et des applications, l’alignement des services métier, etc.
Tags : 
wla, ema, bmc control-m, soa
    
BMC Control M
Published By: Social Text     Published Date: Jul 21, 2009
Read this paper to learn 5 practices that ensure the collaboration solution you choose will give you the significant business results you are seeking. Collaboration solutions can accelerate cycle times by 30% across virtually every business function. These results may be critical to survival in difficult economic times, and the right collaboration solution is the single most effective way to get them.
Tags : 
social text, enterprise collaboration, collaboration, enterprise, tco, total cost of ownership, social networking, blogging, twitter, facebook, adoption rate, adoption, ldap, email integration, mobile, budget
    
Social Text
Published By: Social Text.     Published Date: Jul 21, 2009
Read this paper to learn 5 practices that ensure the collaboration solution you choose will give you the significant business results you are seeking. Collaboration solutions can accelerate cycle times by 30% across virtually every business function. These results may be critical to survival in difficult economic times, and the right collaboration solution is the single most effective way to get them.
Tags : 
social text, enterprise collaboration, collaboration, enterprise, tco, total cost of ownership, social networking, blogging, twitter, facebook, adoption rate, adoption, ldap, email integration, mobile, budget, human resource technology
    
Social Text.
Published By: Bulldog Solutions     Published Date: Jul 20, 2009
With competition growing for your prospects’ attention, it’s never been more important to create powerful messaging that builds a bridge between an issue that’s on their minds and your company’s solution or service. This white paper outlines three steps for creating relevant messages and effective calls to action.
Tags : 
calls to action, bds, bulldog solutions, messaging, planning, promotion planning, lead gen, topics, messages, effective calls to action, audience, audit, gap, compliance, black box
    
Bulldog Solutions
Published By: Bulldog Solutions     Published Date: Jul 20, 2009
If you’re under increasing pressure to be as efficient as possible with your marketing spend, you need to avoid wasting resources on strategies and messages targeted at the wrong audience. This white paper is a step-by-step guide on creating buyer personas to help focus your marketing efforts.
Tags : 
audience, bds, bulldog solutions, client list, pain points, motivators, validation, map, mapping, audience development, resources, buyer personas, sales development, sales leads, in-person environment, audience segmentation, promotion planning, audience, b2b, btob
    
Bulldog Solutions
Published By: AdMob     Published Date: Jul 20, 2009
Devices like the iPhone have made the mobile Internet a massively valuable new advertising medium, with a worldwide audience of 546 million consumers and 10 times higher brand awareness and 10 times higher click-through rates than online advertising. The mobile Internet is changing the face of advertising, and marketers must adapt to stay ahead of the competition. This White Paper is an introduction to mobile advertising and the key things marketers need to know to run successful mobile campaigns. What you'll learn: 1) The Basics: An introduction to mobile advertising; 2) Who you can reach: Demographics and statistics; 3) Spotlight on the iPhone: What it means for marketers; 4) Results you can expect with mobile advertising; 5) Case studies: Examples of Brand and Performance mobile campaigns; 6) What you need to know to extend your campaigns to mobile.
Tags : 
iphone, mobile, internet, pda, mobile phone, cpc, cost per click, blackberry, mobile advertising, cpm, click through rate, ctr, click through rates, sms
    
AdMob
Published By: BMC ESM     Published Date: Jul 17, 2009
Are you looking for new inspiration to move forward with ITIL in these tough economic times? Join us as we talk with Erin Casteel, Solutions Architect with BMC Software and draw on Erin's wealth of experience as an ITIL consultant for tips on leading change in the organization. Learn how you can avoid reinventing the wheel, what it really means to sell ITIL in the organization, and why it pays to find opportunities in crises.
Tags : 
itil, bmc, tough times, economy, organization, software, iso, architecture, change, crises, recession, cost cutting, strategy, itil adoption, it infrastructure library
    
BMC ESM
Published By: MessageLabs     Published Date: Jul 16, 2009
What you don't know can destroy your business. It's hard to imagine modern business without the internet but in the last few years it has become fraught with danger. Internet crooks are the dotcom entrepreneurs of crime, using the power of computers and the interconnections of the network against innocent businesses to make money. Learn more today!
Tags : 
messagelabs, email security, web security, virus, spam, spyware, phishing
    
MessageLabs
Published By: MessageLabs     Published Date: Jul 16, 2009
This White Paper explains what image spam is and how it tries to escape detection. But it also describes how the filter provided by MessageLabs hosted services uses subtle clues to expose image spam - and so delivers a cost-effective solution to what can be an irritating and business-compromising problem. Learn more today!
Tags : 
messagelabs, threats, spam, image spam
    
MessageLabs
Published By: VMS     Published Date: Jul 16, 2009
This paper analyzes case studies aimed to determine how changes in public discussion (unpaid media) correlate to changes in business outcomes. It focuses on analyzing tonality and message, and how they modify the effect of pure media coverage volume in correlations against outcomes.
Tags : 
vms, media coverage, public relations, business outcomes, product sales, prescription volumes, medical procedure codes, customer preference, cpt, vms, tonality, survey, statistics, correlations, preference, advertising
    
VMS
Published By: BMC Control M     Published Date: Jul 16, 2009
L’automatisation de la charge de travail (Workload Automation ou WLA) est une version aboutie de la planification des tâches qui permet d’automatiser des traitements informatiques complexes et qui accepte des charges de travail basées sur des événements, des plates-formes multiples, des services Web, des applications composites, des architectures orientées services (SOA), des systèmes virtuels, l’intégration des systèmes et des applications, l’alignement des services métier, etc.
Tags : 
wla, ema, bmc control-m, soa
    
BMC Control M
Published By: IBM ILOG.     Published Date: Jul 14, 2009
This white paper explains how a business rule management system can make business process automation easier to understand, maintain and manage. Compare BRMS with other business automation schemes, like traditonal software coding or standard business rule engines. Learn how the Welsh Assembly Government and a United States commercial lender have implemented business rules to make a difference in their business processes.
Tags : 
ibm, bpm, business, business rule management, brms, hipaa, risk, operational cost, software coding, business rules engine, bre, business rule management system, brms, throughput, enterprise applications
    
IBM ILOG.
Published By: IBM     Published Date: Jul 10, 2009
A complex IT infrastructure is a stumbling block for many businesses seeking greater agility in these uncertain times. This white paper shows how a service oriented architecture (SOA) helps align the infrastructure with business needs in order to achieve maximum flexibility.
Tags : 
soa, service oriented architecture, ibm smart soa, it infrastructure, integration, websphere, change management, costs, connectivity, messaging-oriented middleware, mom, middleware, api, application programming interface, enterprise service bus, esb, web services description language, wsdl, java, it management
    
IBM
Published By: LeapFrog Interactive     Published Date: Jul 09, 2009
For a brand's online destination to be effective, for its marketing message to connect with its audience, it has to be properly constructed. To reach this state, the right blending of interactivity, usability, and design needs to be determined and then achieved. Otherwise, a brand runs the risk of an off target, off-putting interactive experience.
Tags : 
leapfrog, utilize, interaction, usability, design, marketing, online, strategy, audience, experience, interactive, target
    
LeapFrog Interactive
Published By: LeapFrog Interactive     Published Date: Jul 09, 2009
A wise brand uses many marketing channels to reach its target audience. But a successful one will integrate its multi-channel efforts into one cohesive marketing campaign where all the parts work together to better each other's performance and drive the campaign to success. The following white paper breaks down why integrated marketing should be a strategy that a brand employs and offers some examples of what makes a successful integrated campaign run.
Tags : 
leapfrog, channel, integration, consumer, marketing, audience, performance, success, solution, white paper, strategy, campaign
    
LeapFrog Interactive
Published By: LeapFrog Interactive     Published Date: Jul 09, 2009
The links below will provide you with access to the latest research and expert recommendations. This information has been customized by industry to best reflect the ways in which you can improve your marketing campaigns by integrating landing pages into your offline marketing activities. Learn more today!
Tags : 
leapfrog, utilize, online, offline, advertising, integration, marketing, consumer, industry, success, messaging
    
LeapFrog Interactive
Published By: HP     Published Date: Jul 08, 2009
Today's economic climate has heightened the goal of every IT department to provide high-quality IT service to the business, at the lowest possible cost, while improving business outcomes. Looking outside of the infrastructure itself, there are two key challenges related to data storage: provisioning capacity for applications and reducing risk through a sound data protection strategy. This white paper discusses the challenges of creating the right storage infrastructure, provides an overview of data storage options, and examines a storage solution that combines blade servers and network-attached storage.
Tags : 
storage, storageworks, hp bladesystem, server, infrastructure, nas, network-attached storage, blade servers, data protection, san, fibre channel, iscsi, serial attached scsi, sas, proliant, msa, disk arrays, ethernet, rack, servers
    
HP
Published By: HP     Published Date: Jul 08, 2009
In these days of rampant data growth, a technology that can increase the effective capacity of a disk-based backup system by a ratio of up to 50:1 is big news. Data deduplication allows you to store up to 50 times more backup data into the same disk footprint — giving you a better chance of restoring your users' lost data from exactly the point they need it. This white paper explains how this innovative data deduplication solution works and also establishes how a 50:1 deduplication ratio may be achieved.
Tags : 
dynamic deduplication, 50:1, disk based backup, data, storage, rack, dedupe, data deduplication, hp storageworks, d2d backup systems, backup, data change
    
HP
Published By: Ounce Labs, an IBM Company     Published Date: Jul 08, 2009
The Business Case for Data Protection, conducted by Ponemon Institute and sponsored by Ounce Labs, is the first study to determine what senior executives think about the value proposition of corporate data protection efforts within their organizations. In times of shrinking budgets, it is important for those individuals charged with managing a data protection program to understand how key decision makers in organizations perceive the importance of safeguarding sensitive and confidential information.
Tags : 
ounce labs, it securitym it risk, software applications, ciso, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography
    
Ounce Labs, an IBM Company
Published By: F5 Networks Inc     Published Date: Jul 08, 2009
Application health monitors are now a tried and true technology of the Application Delivery Controller, yet traditional monitors require interaction with the application. Inband passive monitors change that requirement and monitor applications transparently.Inband passive monitors finally fuse together intelligence and performance; it's no longer an "or" decision, now it becomes an "and," enabling both application intelligence and performance to co-exist.
Tags : 
application, health monitors, health, technology, application delivery controller, monitor, monitors, performance, intelligence, device, system, proficiency, networking, network performance, network performance management
    
F5 Networks Inc
Published By: Sitecore     Published Date: Jul 08, 2009
This whitepaper discusses the need to target outcomes and focus on building a complete, 360-degree view of your customers -- who they are, where they came from, what they do, and how you can best meet their needs.
Tags : 
sitecore, customer experience, lifecycle management, web content management, analytics, crm, emarketing, email marketing, cms, lead generation
    
Sitecore
Published By: MessageLabs     Published Date: Jul 02, 2009
Get to grips with hosted security: Hosted security? Managed security? Cloud security? SaaS? The latest hype, or the secret to hassle free IT Security? Understand how Hosted Security can save you time & money whilst delivering highly accurate threat protection. Download today!
Tags : 
messagelabs, security, it management, email security, web security, email archive, continuity, ‘software as a service’, data centers
    
MessageLabs
Start   Previous    125 126 127 128 129 130 131 132 133 134 135 136 137 138 139    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.