Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

rules

Results 226 - 250 of 277Sort Results By: Published Date | Title | Company Name
Published By: ActiveProspect, Inc.     Published Date: Sep 19, 2013
In this whitepaper, provided by the law firm of Klein Moynihan Turco LLP (KMT) and ActiveProspect, a marketing SaaS provider, offers a comprehensive overview of the legal aspects of the new TCPA regulations and simple solution to verify and store proof of consent for Internet leads in order to comply with the new regulations.
Tags : 
tcpa, tcpa regulations, tcpa compliance, tcpa class action, telemarketing, telemarketing compliance, telemarketing regulations, telemarketing rules, call center compliance, do not call, prior express written consent, prior express consent, proof of opt-in, consent to call, outbound marketing, autodialed calls, prerecorded call, robocalls, autodialer, leadid
    
ActiveProspect, Inc.
Published By: ActiveProspect, Inc.     Published Date: Sep 19, 2013
In this whitepaper, provided by the law firm of Klein Moynihan Turco LLP (KMT) and ActiveProspect, a marketing SaaS provider, offers a comprehensive overview of the legal aspects of the new TCPA regulations and simple solution to verify and store proof of consent for Internet leads in order to comply with the new regulations.
Tags : 
tcpa, tcpa regulations, tcpa compliance, tcpa class action, telemarketing, telemarketing compliance, telemarketing regulations, telemarketing rules, call center compliance, do not call, prior express written consent, prior express consent, proof of opt-in, consent to call, outbound marketing, autodialed calls, prerecorded call, robocalls, autodialer, leadid
    
ActiveProspect, Inc.
Published By: Symantec     Published Date: Oct 01, 2015
The acquisition of SSL certificates should always be a relatively easy experience; however, the purchasing decision should never be regarded lightly. When businesses consider SSL certificates; there six Golden Rules a purchaser should keep in mind. This whitepaper provides an overview of the SSL certificated market, the six golden rules of purchasing SSL certificates and how Symantec addresses each of the golden rules. At the end of the day, people want to make sure their Web sites are secured with as little friction as possible—Symantec gives businesses every opportunity to achieve that goal.
Tags : 
e-commerce, ssl certificate, ssl golden rules, hidden dangers, website security, security
    
Symantec
Published By: Symantec     Published Date: Oct 01, 2015
The foundation of trusted Internet communications are Secure Socket Link (SSL) certificates, an encryption technology installed on Web servers that permits transmission of sensitive data through an encrypted connection. Using a public-key infrastructure (PKI), SSL certificates authenticate the end-use Website and the endpoint server, making it difficult for those sites to be imitated or forged.The acquisition of SSL certificates should always be a relatively easy experience; however, the purchasing decision should never be regarded lightly. When businesses consider SSL certificates; there six Golden Rules a purchaser should keep in mind. This whitepaper provides an overview of the SSL certificated market, the six golden rules of purchasing SSL certificates and how Symantec addresses each of the golden rules. At the end of the day, people want to make sure their Web sites are secured with as little friction as possible—Symantec gives businesses every opportunity to achieve that goal.
Tags : 
ssl certificates, public-key infrastructure, web servers, website security, sensitive data, encrypted connection, security
    
Symantec
Published By: Act-On     Published Date: Jan 08, 2015
Learn Facebook’s Rules of Engagement so you can make your content more sharable and searchable – and avoid violating the terms of service. This eBook will give you a thorough understanding of Facebook principles, and the general rules that apply to content and behavior.
Tags : 
act-on, facebook, social, media, rules, engagement, b2b, marketing, search, tags, post, data, feed, news, algorithm, branding, control
    
Act-On
Published By: Act-On     Published Date: Jul 08, 2015
The old rules of relying on metrics like brand awareness, cost per lead, and lead-to-sales conversion rate are in need of an update. So what metrics should you focus on today? Find out with this guide.
Tags : 
b2b, metrics, marketing strategy
    
Act-On
Published By: Seamless     Published Date: Jun 18, 2013
Michael Farino is the Hospitality Manager for the New York office of DLA Piper (DLA), one of the world’s largest business law firms.Michael and his team oversee the firm’s meal program and all caterin gand special events. With 500 employees in the office and dozens of client meetings and special events each month, this is no small task. DLA worked with Seamless to create a set of rules that would govern when and how employees could order food. Each and every one of DLA’s 500 NYC-based employees was given a username and password. Everyone was free to log-in and order their own meals. Everyone was also assigned to a specific budget group. These budget groups are based each person’s role at the Firm and can accommodate different spending limits and permission levels. As Michael notes, “right away, Seamless gave us the power to enforce our rules,but still be flexible so people get what they need. It’s a win-win.”
Tags : 
    
Seamless
Published By: AppSense     Published Date: May 02, 2008
Email marketing provides a lot more flexibility as the delivery schedule isn't dependent on outside factors. However, just because email gives you instant access to your subscribers doesn't mean you can email them impulsively or impetuously. Your emails must follow a plan that is as well thought-out and deliberate as all of your other marketing initiatives in order to remain effective.
Tags : 
marketing plan, email marketing, email marketing plan, email strategy, loyalty, email frequency, listrak
    
AppSense
Published By: IBM     Published Date: May 30, 2008
In the age of Web 2.0, Internet users are rewriting the rules of social interaction, using blogs, forums, and social bookmarking for sharing information and sustaining relationships across borders. This IBM white paper looks at how organizations can achieve tangible business benefits through embracing these technologies.
Tags : 
ibm, collaboration, ibm ep, ep campaign, ibm
    
IBM
Published By: Internet Security Systems     Published Date: Aug 21, 2009
Protecting desktop and server, or host systems has rapidly become a high priority for organizations that want to ensure uptime and the availability of day-to-day business applications. Today's hybrid threats are growing faster, more complex and more destructive.
Tags : 
intrusion prevention, high availability, network security, iss, internet security, web security, malware, internet security systems, security
    
Internet Security Systems
Published By: Internet Security Systems     Published Date: Aug 21, 2009
Intrusion Prevention Systems (IPS) are rapidly becoming an integral part of an effective network defense solution. Unfortunately, finding the truth in today's often overhyped market of network-based IPS offerings is no easy task.
Tags : 
intrusion prevention, network security
    
Internet Security Systems
Published By: RuleStream     Published Date: Aug 21, 2009
The ability to harness intellectual property and product know-how is a key to competitive advantage. RuleStream appears to have broken through past technological barriers in rules-driven knowledge capture and reuse.
Tags : 
product development, market intelligence, business intelligence, competitive, business process automation, business process management, bpm, bpa, rulestream, enterprise applications
    
RuleStream
Published By: RuleStream     Published Date: Aug 21, 2009
Capturing product knowledge has proven to be very difficult and early attempts at building systems to capture and reuse knowledge have failed because they were too limited technically, required users to be able to develop computer codes (or programs) to embody knowledge rules and actions, and they did not work with common product design tools such as CAD and PDM systems.
Tags : 
product design, product development, product information, pim, product information management, product lifecycle management, computer aided design, computer-aided design, rulestream
    
RuleStream
Published By: RuleStream     Published Date: Aug 21, 2009
This white paper from Managing Automation Research Services addresses how these ideas can be applied by engineer-to-order manufacturers.
Tags : 
product design, product development, made to order, make to order, made-to-order, make-to-order, engineer to order, engineer-to-order, engineering, mars, manufacturing, supply chain, rulestream
    
RuleStream
Published By: RuleStream     Published Date: Aug 21, 2009
Manufacturers of products with highly configurable and ever-changing customer requirements must confront specific challenges and operate far differently than traditional product development environments.
Tags : 
business process automation, business process management, bpm, bpa, scm, enterprise software, productivity, supply chain management, product development, make to order, made-to-order, made to order, rulestream, enterprise applications
    
RuleStream
Published By: Sigaba     Published Date: Aug 21, 2009
This document details the mandated and proposed rules generally referred to as the "HIPAA requirements" and how they affect healthcare organizations and their business partners transmit medical information electronically.
Tags : 
compliance, policy based management, business management, hipaa compliance, health, hipaa, privacy, sigaba, security
    
Sigaba
Published By: IAG Consulting     Published Date: Jul 27, 2010
Requirements quality is tangible. This hard-hitting 10 minute video microcast presents the concrete rules that will allow you to quickly assess a requirements document and determine if it will likely lead to an effective implementation.
Tags : 
iag, project management, project management, maturity, consulting, model
    
IAG Consulting
Published By: NetIQ Corporation     Published Date: Nov 18, 2006
This white paper is a must read for those involved in the process of log management for legal use. You'll examine the admissibility of log data in court cases; maintaining the authenticity of log data; and how log data can be attacked and stand up to scrutiny. And, learn legal terms like Hearsay, Best Evident Rules, etc.
Tags : 
log file, data protection, log management, legal log, log data, log law, authenticated log, netiq, net iq, networking, governance, local area networking, monitoring, network management, network performance management, network security, remote network management, servers, tcp/ip protocol, test and measurement
    
NetIQ Corporation
Published By: Xactis     Published Date: Feb 02, 2007
Learn the 'bottom-up' approach to start Business Rules Extracting, Migrating and Auto Re-architecting your current mission-critical legacy system and their data, into an SOA.  This is a "how-to" presentation addressing how to get started and eventually establish an internal L2S Center of Excellence.
Tags : 
soa, service oriented architecture, service-oriented architecture, business rules extracting, legacy system, erp, enterprise resource planning, mainframe, citrix, xactis, data center design and management
    
Xactis
Published By: Xactis     Published Date: Feb 05, 2007
Learn the ‘bottom-up’ approach to start Business Rules Extracting, Migrating and Auto Re-architecting your current mission-critical legacy system and their data, into an SOA.
Tags : 
soa, service oriented architecture, service-oriented architecture, business rules extracting, software development, c++, quality assurance, legacy system, xactis, active directory, data center design and management
    
Xactis
Published By: ElcomSoft     Published Date: Dec 06, 2007
These days we’re always hearing about the "information age," "information technology," and how "information rules the world." We have come to feel that information is everything. But what does that mean, and is information in itself so important? Not completely. We need information to make decisions – that's what is truly important. A proper decision lights the way to success in any situation. That's why having access to information is a competitive advantage in any business environment.
Tags : 
passwords, password, password protected, password management, access control, data protection, information management, elcomsoft
    
ElcomSoft
Published By: LogRhythm     Published Date: Sep 26, 2008
Is your organization adequately meeting the rules and regulations set forth in the Accountability Act of 1996 (HIPAA)? Learn how LogRhythm’s comprehensive log management and analysis solution can help your organization meet or exceed HIPAA regulatory requirements.
Tags : 
hipaa, hipaa compliance, health it, health regulations, compliance, comply, security, information technology, information security management, log management, log analysis, log collection, log analyzer, log tool, logrhythm, security event management, web logs, log collection, regulatory, regulations
    
LogRhythm
Published By: Aprimo, Inc.     Published Date: Dec 23, 2008
Aprimo manages the financial aspects of your marketing process and captures information about each marketing project, which facilitates Sarbanes-Oxley compliance. It puts into place detailed procedures to manage access rights, to create and document business rules that apply to marketing projects and to ensure appropriate review and approval.
Tags : 
aprimo, marketing process, financial control, digital asset management, data management
    
Aprimo, Inc.
Published By: IBM ILOG.     Published Date: Dec 11, 2009
Learn how the WebSphere ILOG JRules Business Rules Management System (JRules BRMS) can automate decision making for data validation, eligibility and pricing in a real-world scenario. This demo shows how JRules BRMS allows organizations to gain a competitive advantage by adapting business systems to evolve with changing business policies and decisions. Click to view this demo!
Tags : 
ibm ilog, brm, business rule management system, jrules, websphere, author, deploy rules, business rules management
    
IBM ILOG.
Published By: IBM ILOG.     Published Date: Dec 11, 2009
Learn how WebSphere ILOG Business Rules Management System (BRMS) allows organizations to easily adapt business rules while ensuring compliance with policy requirements and analyzing the business impact of changes against key performance indicators. You will see how the BRMS is used in the back office to create eligibility rules that will be used to automatically screen auto insurance applicants.
Tags : 
ibm ilog, brm, business rules management system, brms, websphere, test, simulate rules
    
IBM ILOG.
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.