Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

mes

Results 3326 - 3350 of 3607Sort Results By: Published Date | Title | Company Name
Published By: SAP Inc.     Published Date: Jun 16, 2009
Gain insight into how you can meet organizational readiness challenges facing your company as you adopt new technology. Take the right steps and implement change management strategies to ensure that your organization adapts effectively to change and ultimately becomes a best-run business.
Tags : 
sap, organizational readiness, organizational change management, ocm, change management, enterprise applications
    
SAP Inc.
Published By: IBM     Published Date: Jun 15, 2009
In this white paper, you'll see how Lotus Notes 8.5 boosts bandwidth by storing one copy of attachments, rather than allowing duplicate via threads. You'll also discover how upgrading lets you elevate collaboration and enhance efficiency with tools that empower users to take action, create and share knowledge, and collaborate with teams.
Tags : 
ibm lotus, domino, 8.5, collaboration, green, empower, access, connect, domino, notes, ibm, 8.5, server, enterprise-class messaging, collaborative capabilities, lotus, lotus notes, lotus domino, it performance, collaboration
    
IBM
Published By: IBM     Published Date: Jun 15, 2009
Read this astounding case study to see how migrating to IBM Lotus software with a broadly functional messaging platform increased the efficiency and support of mobile users for the Kentucky Baptist Convention. Then you'll learn how your own business can improve communications, drive down costs and eliminate the need for additional Web software.
Tags : 
kentucky baptist convention, case study, nonprofit, lotus software, messaging platform, ibm lotus, domino, 8.5, collaboration, green, empower, access, connect, domino, notes, ibm, 8.5, server, enterprise-class messaging, collaborative capabilities
    
IBM
Published By: Neolane, Inc.     Published Date: Jun 03, 2009
Let’s face it: In this economy, justifying new investments can be tough. Most companies are in belt-tightening mode, not shopping mode. And budgets are getting leaner. But sometimes it makes sense to invest. The recession won’t last forever. Forward thinking companies are already thinking about how to prepare for the upturn — in fact, many are marketing their way through the recession, taking advantage of low media prices and a relatively stark competitive landscape in order to better stand out and gain market share. Learn more today!
Tags : 
enterprise marketing software, neolane, economy, investments, cost cutting, lean, recession, competitive landscape, validation, situation analysis, infrastructure, implementation, revenue, automation, marketing automation platform, map, best practices
    
Neolane, Inc.
Published By: MessageLabs     Published Date: Jun 03, 2009
Planning to implement an email archiving system? There are many issues to consider – legal risks, storage concerns and data security – it can seem a complex topic!Download this guide to help you make informed decisions about your archiving requirements
Tags : 
email archiving, it manager, symantec, messagelabs, search, retrieval, communications, retention, messaging, mailbox, find emails, e-mail, data protection, archiving, archive, outlook, it management
    
MessageLabs
Published By: MessageLabs     Published Date: Jun 03, 2009
Does your email and web Acceptable Usage Policy (AUP) need a refresh? Shoosmiths Solicitors and MessageLabs combine to provide you with some top tips to ensuring your policy is fit for purpose. Click here.
Tags : 
aup, acceptable usage policy, message labs, shoosmiths solicitors, copyright, security provisions, guidance, email usage, etiquette, personal use, blogging, security, wireless
    
MessageLabs
Published By: SRC,LLC     Published Date: Jun 01, 2009
Today, organizations are collecting data at every level of their business and in volumes that in the past were unimaginable. Data sets are stored in different database systems or in files with distinctive formats, all reflecting business process, application, program software, or information type dependencies. Adding to this complexity is the distribution of these data sets across the enterprise in silos requiring a varied set of tools and/or specialized business rules for data transformation, classification, matching, and integration. Because of the massive amounts of data stored in a variety of representation formats, decision makers strain to derive insights and create business solutions that adequately span and integrate information from these disparate technology islands. Learn more today!
Tags : 
src, data transformation, classification, business value, geographic business intelligence, geo-bi, etl, extract, transform, load, spatial analysis, operational data stores, ods, spatial data, etl, cdi, point of sale, retail floor space management, rfsm, alteryx
    
SRC,LLC
Published By: BlackBerry     Published Date: May 20, 2009
Mobility is no longer considered a luxury within enterprise but a critical part of a networking strategy as firms look to increase productivity and remain competitive in a rapidly changing environment. As mobility becomes an integral part of the infrastructure, IT must deal with supporting numerous devices including laptops, smartphones and other mobile handhelds. The challenge for IT will be enabling productivity improvements while mitigating the risk of numerous types of devices. The devices and their memory cards may hold sensitive organizational and personal information, including information about product announcements, 9inancial statements, or customer records.
Tags : 
blackberry, mobile applications, cio, deployments, pim, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: Quocirca     Published Date: May 15, 2009
Most organisations have had to supplement their IT capability with some form of external help at one time or another. However, as financial pressures mount and technology continues to evolve and its relationship with the business becomes increasingly complex, how does this change the expectations and needs of those external relationships? Learn more today!
Tags : 
quocirca, software as a service (saas), it function, it staff, business process, customer service, it budget, it management
    
Quocirca
Published By: Tippit, CRM     Published Date: May 15, 2009
CRM has proven its ability to enhance business performance time and time again. However, the path to eff ective implementation is not always easy — complexities often arise as a result of trying to align an entire company behind the concept. You can fi nd the success that comes from leveraging customer knowledge to the fullest measure by following these 10 steps. Learn more today!
Tags : 
tippit, crm implementation, roi, enterprise applications
    
Tippit, CRM
Published By: Trend Micro SPN     Published Date: May 15, 2009
Measuring the effectiveness of your security infrastructure is key to any enterprise as threats change on a minute by minute basis. See an example of the report you would receive following a Trend Micro Threat Discovery Assessment.
Tags : 
trend micro, trend, cloud-client, malware, anti-virus, hijacked, fraud, virus, security, threat discovery assessment, secure, threat discovery, worms, trojans, infected, recovering, instant messaging
    
Trend Micro SPN
Published By: Site Pro PPC     Published Date: May 14, 2009
Often times hiring a professional to manage your PPC accounts actually saves you money. Check out our free whitepaper to find out why!
Tags : 
site pro, ppc, ppc management, adwords, google, yahoo, msn
    
Site Pro PPC
Published By: SAGE     Published Date: May 11, 2009
It's a scary climate for small and mid-size businesses. Besides economic, many growing businesses also experience problems and frustrations when it comes to data management and business software integration. Sage has introduced an eBook, On the Hotseat: How Your Peers Are Tackling the Questions That Matter Now, that provides insight on how other businesses are handling these problems.
Tags : 
sage, smb, small medium size business, software solutions, fortune magazine, roi, crm, customer relationship management, data management, erp software, enterprise applications, competitive advantage, unified solutions, software integration, dedicated it staff
    
SAGE
Published By: Data Guard Systems, Inc     Published Date: May 06, 2009
The data security challenges for financial services providers—from the solo accounting professional to the midsize accounting firm to world’s largest corporation, from CPAs to CFPs to credit counselors—have never been as challenging as they are in today’s turbulent times. And although the large data breaches at the most recognizable companies receive the most publicity, small companies and solo offices can also be victims, according to the Better Business Bureau.
Tags : 
online identity theft, encryption software, advanced password protection, alertboot, identity, theft, dataguard, credit card, payment, fraud, anti-virus, anti-spam, pre-boot authentication, advanced password protection, file-based password protection, encryption, full disk, file encryption, breach, breaches
    
Data Guard Systems, Inc
Published By: Data Guard Systems, Inc     Published Date: May 06, 2009
The data security challenges for financial enterprises have never been as challenging as they are in today's turbulent times. Not only must financial enterprises comply with regulations such as SOX, GBLA and PCI along with a multitude of state regulations concerning customer privacy and electronic data security, they must also guard against the staggering costs—both tangible and intangible—that a security breach can incur.
Tags : 
online identity theft, encryption software, advanced password protection, alertboot, identity, theft, dataguard, credit card, payment, fraud, anti-virus, anti-spam, pre-boot authentication, advanced password protection, file-based password protection, encryption, full disk, file encryption, breach, breaches
    
Data Guard Systems, Inc
Published By: SAP     Published Date: May 04, 2009
Discover specific actions companies can take to ensure high cash-flow velocity and vital liquidity. Get answers to these key questions: How can I protect the health of my commercial cash flows? How can I gain better visibility into sources and uses of cash? And how can I increase control over my global cash balances?
Tags : 
cash, sap, cash-flow, sap executive, dso, cash conversions, accounts receivable
    
SAP
Published By: SAP     Published Date: May 04, 2009
Learn how core corporate processes can help your company meet financial objectives and mitigate risk in troubled economic times. Discover how streamlining common processes can reduce costs, and how you can increase the effectiveness and efficiency of the processes that differentiate you from the competition.
Tags : 
sap, lean enterprise, erp, enterprise resource planning, financial objectives, integrated platforms
    
SAP
Published By: Pardot     Published Date: Apr 29, 2009
B2B marketers have specific needs when it comes to email campaigns. Learn how implementing  an email system designed for B2B can bring together all of your lead generation efforts to create an integrated campaign with automated messaging personalized from your sales reps, CRM syncing and triggered nurturing emails.   
Tags : 
pardot, b2b specific, b2b email solution, email marketing, lead generation, integrated campaign, crm syncing, nurturing emails, personalization, scoring, lead gen, leads, sales, sales team, suspects, prospects, web marketing, micro-level, autoresponder, drip
    
Pardot
Published By: Pardot     Published Date: Apr 29, 2009
You've laid the groundwork and attracted the visitors, now conversion is key. As a B2B marketer, you typically have a very limited window to prove your value proposition. Learn eight simple techniques, including progressive profiling, form validation and multivariate testing, that will help you fine tune your landing pages and increase conversion rates.
Tags : 
pardot, b2b conversions, double b2b conversions, b2b marketer, groundwork, landing pages, conversion rates, ctr, click-thru, form validation, multivariate testing, b2c, website caller id, jigsaw, whois, prospect, suspect, lead source, error messages, drop off
    
Pardot
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Protecting individual and financial data, retaining data, and meeting e-discovery requirements are common compliance requirements across geographies and industries. Finding accurate, usable, and cost-effective solutions for meeting these requirements can make the difference between achieving compliance goals or leaving the organization vulnerable through unsecured use of sensitive data. Trend Micro Data Protection solutions for endpoint data leak protection, email encryption, and email archiving help organizations meet their compliance requirements – easily and cost-effectively.
Tags : 
trend micro, trend, information technology, security, security requirements, compliance, e-discovery, customer churn, litigation, fines, personally identifiable information, pii, pci, payment card industry, phi, protected health information, pfi, personal financial information, pfi access control, audit
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
The greatest threat to enterprise data security comes from inside threats. Securing the enterprise requires an understanding of the data leak points, environment, people, and processes for managing sensitive information. This white paper explains how network-based and endpoint-based solutions can work together to provide the broadest protection available while ensuring scalability and manageability, and that employee productivity is not impacted.
Tags : 
trend micro, datadna, data leak, threat, leak, network boundaries, vulnerability threats, data leak, laptop, environment, data loss, data protection, data management, data leak prevention, dlp, agent-based technology, remote computing, leakproof, monitoring, enforcement
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Data breaches can carry very serious consequences, such as the revelation in February 2008 that that the Hannaford Brothers chain of supermarkets lost more than four million debit and credit card numbers to hackers. The bottom line is that organizations must implement Data Loss Prevention (DLP) systems to protect themselves against the growing array of threats they face from inadvertent and malicious data leaks from email, instant messaging and other systems.
Tags : 
trend micro, data breach, dlp, credit cards, breaches, data breaches, data loss prevention, dlp, hackers, sensitive information, malicious data leaks, threats, confidential information, data loss, data protection, encryption, ip loss, intellectual property, loss of intellectual property, loss of reputation
    
Trend Micro, Inc.
Published By: VeriSign Incorp.     Published Date: Apr 15, 2009
Stay on top of the current trends in today's phishing schemes, the potential impact on companies, and insight into how you can apply technology to protect your business and customers.
Tags : 
extended validation, green bar, online security, optimize, sgc, server gated cryptography, phishing, malware, ssl, verisign, consumer protection, internet security, spear-phishing, man-in-the-middle ssl stripping, encryption, https, certificate authority
    
VeriSign Incorp.
Published By: Lane Telecommunications     Published Date: Apr 14, 2009
There is little doubt that Multi Function Peripherals (MFP) offer businesses of all sizes significant benefits: they combine printing, scanning, copying and fax functions in one machine and deliver considerable cost and space savings. They also address some very important business process, management and legal issues faced by virtually every business. Within this discussion document we concentrate on the fax element and look specifically at the integration of MFPs with network fax run through a fax server such as Lane’s Passport Fax Server.
Tags : 
fax over internet protocol, mfp, multi function peripherals, network fax, erp applications, off-the-shelf, compliance, fragmented audit trail, optimum mfp, smtp, secure messaging, latency, lane, kudos, enterprise applications
    
Lane Telecommunications
Published By: Citrix Online     Published Date: Apr 08, 2009
There's no "one size fits all" when it comes to telecommuting. This new Forrester white paper explores how implementing best practices to create a telecommuting program and standardized policy significantly reduces operational costs and increases employee productivity - a winning combination in a tough economy.
Tags : 
telecommuting, citrix, forrester, telecommute, employee productivity, citrix, human resources, travel, expenditure
    
Citrix Online
Start   Previous    127 128 129 130 131 132 133 134 135 136 137 138 139 140 141    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.