Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

sam

Results 976 - 1000 of 1090Sort Results By: Published Date | Title | Company Name
Published By: Vocalocity     Published Date: Apr 18, 2007
Hosted PBX phone solutions are revolutionizing how small and medium-sized businesses (SMBs) serve their customers, grow their business, and support their employees. Delivering the same enterprise level, professional phone system capabilities large businesses use at a much lower cost, hosted PBX is helping SMBs save money while putting their customer services on par with much larger organizations.
Tags : 
pbx, phone, phone system, ip telephony, telecom, telecommunications, voip, voice over ip, networking, network management, vocalocity
    
Vocalocity
Published By: eFax     Published Date: May 15, 2007
Fax servers promise easier administration and cheaper faxing but most deployments fail to meet their goals because of unexpected, ongoing costs and unpredictable capacity needs. This paper offers information on why outsourced fax services eliminate the time, effort and cost issues associated with fax servers, but retain all of the same functionality.
Tags : 
fax, faxing, ip faxing, fax server, fax servers, ip networking, ip networks, converged communications, integrated communications, communications convergence, convergence, communication, communications, protus, protus ip solutions, infrastructure, ip telephony, servers
    
eFax
Published By: Interactive Intelligence     Published Date: Feb 26, 2013
Insurers are renewing their focus on top line growth-seeking ways to increase premium volumes while at the same time improving profitability. Properly interacting with customers creates revenue on all ends. Read on to learn about key user interaction
Tags : 
integrated content, communications, key business issues, points of contact, upselling, account management, client services, enterprise applications
    
Interactive Intelligence
Published By: Netwrix     Published Date: Apr 22, 2008
Password practices that improve security are by their nature burdensome to the user, resulting in passwords difficult to remember which are often changed about the same time they have finally become memorized. Yet password security remains a cornerstone of system security: as much as 80% of security breaches take place not through arcane hacking and virus attacks, but through system infiltration facilitated by use of a password.
Tags : 
netwrix, authentication, passwords, password management, identity theft, fraud, login
    
Netwrix
Published By: ElcomSoft     Published Date: Dec 06, 2007
These days we’re always hearing about the "information age," "information technology," and how "information rules the world." We have come to feel that information is everything. But what does that mean, and is information in itself so important? Not completely. We need information to make decisions – that's what is truly important. A proper decision lights the way to success in any situation. That's why having access to information is a competitive advantage in any business environment.
Tags : 
passwords, password, password protected, password management, access control, data protection, information management, elcomsoft
    
ElcomSoft
Published By: Integration New Media     Published Date: Apr 01, 2008
This new white paper by Integration New Media looks at the benefits achieved through adding richness to eCommerce sites, with an emphasis on the impact that this change can have on a retailer’s bottom line. In addition, it presents samples of successful integrations and options for moving forward that leverage current technology, providing retailers with the biggest bang for the smallest investment.
Tags : 
inm, integration new media
    
Integration New Media
Published By: UsedCisco.com     Published Date: May 14, 2008
An incredible array of organizations from both the public and private sector are buying pre-owned. These organizations include global public commercial enterprises, small businesses, ISP's, telecoms, non-profits, local and US government, military and educational institutions of all kinds. An overwhelming majority of the customers we've surveyed mention the same fact - they just didn't know pre-owned was a real, safe and viable option. In this guide, we'll present you with critical information you need to make the switch.
Tags : 
pre-owned, used, cisco, usedcisco, used cisco, green, cost, usedcisco.com, infrastructure, internetworking hardware, server hardware, green computing
    
UsedCisco.com
Published By: Arcot     Published Date: Jun 04, 2008
Solutions including one-time-password (OTP) generator tokens, do not offer the same level of protection as the ArcotID against attacks such as the man-in-the-middle attack. The ArcotID secure software credential provides protection against common Internet threats and several futuristic attacks that are becoming popular among fraudsters.
Tags : 
authentication, digital signature, password management, cardholder authentication, arcot, smartcard
    
Arcot
Published By: BlueHornet     Published Date: Apr 12, 2010
Every popular email client will display HTML content sent in email. However, not every email client has a "web standards" compliant HTML rendering engine. Therefore, the same email may render differently across different email clients. This whitepaper offers practical solutions to help designers, coders, and non-designers alike build a successful email that will render well across all email platforms.
Tags : 
bluehornet, html email rendering, email platforms, best practices, css, coding
    
BlueHornet
Published By: NuSphere     Published Date: Jul 31, 2008
The problem of providing remote access to the files is nothing new, but the implementation of the solution quite often also determines reliability, safety and productivity. In this article we will look at accessing a remote computer (Unix, Linux or Windows) over non-trusted network.
Tags : 
remote files sharing, samba, ssh tunnel, nusphere, remote access
    
NuSphere
Published By: KEMP Technologies     Published Date: Aug 04, 2008
Today’s small-to-medium sized businesses (SMB) are undergoing the same IT evolution as their enterprise counterparts, only on a smaller scale. For SMBs, website reliability, flexible scalability, performance and ease of management are as essential to SMB website infrastructure as they are to an enterprise. It’s fare to say that these capabilities are an important operational imperative for businesses of all sizes.
Tags : 
load balancer, load balancing, application delivery, ssl acceleration, application optimization, windows terminal services, terminal services, content switching, server load balancing, application security, network security, kemp, kemp technologies, servers, small business networks
    
KEMP Technologies
Published By: Marketo     Published Date: Nov 04, 2011
Marketo has created a sample RFP consisting entirely of actual questions from real RFPs submitted to Marketo. Learn the 12 key areas for marketing automation success and ensure you make the right choice today!
Tags : 
marketo, marketing, marketing automation, proposal, rfp, request for proposal, whitepaper
    
Marketo
Published By: Tail-f Systems     Published Date: Sep 16, 2008
The key issues involved in developing on-device network management systems for carrier-grade enterprise and operator networks are the same for any other networked resource, only with more complexity and built-in restrictions due to the limited space and processing capabilities inherent to these types of devices.
Tags : 
network management, on-device network management systems, carrier-grade requirements, high availability, network scalability, tail-f, tailf, networking, network performance management
    
Tail-f Systems
Published By: Integration New Media, Inc.     Published Date: Sep 18, 2008
This new white paper by Integration New Media looks at the benefits achieved through adding richness to eCommerce sites, with an emphasis on the impact that this change can have on a retailer’s bottom line. In addition, it presents samples of successful integrations and options for moving forward that leverage current technology, providing retailers with the biggest bang for the smallest investment.
Tags : 
inm, integration new media
    
Integration New Media, Inc.
Published By: Likewise Software     Published Date: Oct 07, 2008
This document describes how Likewise and Microsoft Active Directory can foster compliance with the Payment Card Industry Data Security Standard, a set of requirements for businesses that process payment card information. Developed by Visa, American Express, Discover Financial Services, and other members of the PCI Security Standards Council, the standard sets forth policies, procedures, and practices to protect customer account data. The standard includes specific requirements for strictly controlling access to customer data, authenticating business users, monitoring access, maintaining a secure network, and auditing system resources. Likewise integrates Linux, Unix, and Mac OS X workstations and servers into Active Directory, providing the basis to assign each user a unique ID for authentication, authorization, monitoring, and tracking. Likewise also provides group policies for non-Windows computers so that their security settings and other configurations can be centrally managed in the same way as Windows computers.
Tags : 
likewise, pci data security, linux, unix, mac os x, windows
    
Likewise Software
Published By: Likewise Software     Published Date: Oct 07, 2008
This paper begins by exploring why SOX compliance continues to be so difficult when it is treated as an annual project rather than a continuous process. Then the paper discusses how Likewise Enterprise can help your company make the shift to continuous compliance for identity and access management in a mixed network. Likewise joins Linux, Unix, and Mac OS X computers to Active Directory, providing the basis to assign each user a unique ID for authentication, authorization, and monitoring. Likewise also includes group policies for non-Windows computers so that you can centrally manage their security settings in the same way as Windows computers.
Tags : 
likewise, risk, compliance, sox, security
    
Likewise Software
Published By: Network Automation     Published Date: Oct 23, 2008
In good economic times, success simply means keeping pace. After all, the market is demanding your company’s products and services, and your responsibility is simple: keep up with the demand no matter what it takes. Most managers, whether they are business managers or technology managers respond to this situation the same way. They hire more people to shoulder the increased load. Sales managers seek out more sales reps. Foremen bring more assembly workers online. Customer service beefs up the call center. And IT managers hire more administrators to maintain the constant flux of demands from users, applications, systems, and networks.
Tags : 
network automation, business, process, automation, processes, tough economy, bad economy, workflow, process improvement, streamline it, strategies, networking, network management, network performance, network performance management
    
Network Automation
Published By: Enhancement Software     Published Date: Jan 30, 2009
This white paper is intended to explore the process of secure and efficient paperā€based document marking and printing using Microsoft® Word. At the same time it will explore the savings that can be realized by implementing an automated practice that reduces risk of unintended use.
Tags : 
enhancement software, stampit, automated document marking, document integrity, corporate accountability, compliance, risk management, roi
    
Enhancement Software
Published By: CDI     Published Date: Feb 10, 2009
Discover how to get the most from your Google AdWords campaign. Learn the key pitfalls that hundreds of high-technology and other B2B companies encounter when setting up their search program, and how to avoid making the same mistakes.
Tags : 
connectdirect, cdi, google adwords, paid search, google campaign, ad copy, conversion rate
    
CDI
Published By: Motorola, Inc.     Published Date: Mar 10, 2009
Enterprise mobility has emerged as a top strategic initiative among leading global organizations. To benchmark the current state of Enterprise Mobility adoption, Motorola’s Enterprise Mobility business conducted independent research among a representative sample of enterprise mobility decision-makers, the chief purchasers of enterprise mobility solutions and various mobile workers within enterprise and commercial businesses.
Tags : 
enterprise mobility, motorola, manufacturing industry, mobile workers, digital two-way radio, voice-over-wlan, vowlan, tdma modulation
    
Motorola, Inc.
Published By: Ecessa Corporation     Published Date: Mar 11, 2009
Today’s Wide Area Networks (WANs) are experiencing increased saturation with the deployment of bandwidth-intensive applications, increased numbers of users, and the need for reliable security transmissions. IT personnel responsible for these issues acknowledge the increased congestion and have strived to maintain high levels of network performance. At the same time, IT departments are tasked with the job of lowering the cost of network infrastructure and ongoing operations. Network administrators continually face the challenge of balancing the increased use of critical applications on the Internet, while eliminating downtime and congestion from affecting user quality and day-to-day business operations.
Tags : 
adsl load balancing, vpn load balancing and redundancy, bandwidth aggregation, qos, bandwidth control, bandwidth management, multi-homing, bgp multihoming, broadband bonding, broadband failover, disaster recovery, business continuity, wan load balancing, wan failover, dsl failover, dsl load balancing, disaster recovery solutions, dual wan router, wan failover, isp failover
    
Ecessa Corporation
Published By: BatchBlue Software     Published Date: Mar 27, 2009
Every small business has some system for organizing and documenting its relationships. If that system is no longer working, or could be improved upon, a new contact management system is in order. This Blue Paper will help small business owners research, select and implement the system that will work effectively for them.
Tags : 
batchbook, matternow, blue paper, contact management, small business, document management, relationships, manage leads, lead generation, sample size, communications management, task events management, project management, usability, customization, scalability, mobility, crm, sales tools, vendor management
    
BatchBlue Software
Published By: SPSS     Published Date: Jun 29, 2009
This paper will focus on how a company might identify its best customers, but the same process could be used for other customer segments.
Tags : 
spss, customer management, consumer behavior, customer retention, crm, customer service, cost-effective strategies, customer database, statistical analysis, data management, data analysis, recency, frequency, and monetary value, rfm, best customers, customer lifetime value, chi-square, customer experience, enterprise applications
    
SPSS
Published By: Ping Identity     Published Date: May 05, 2009
Web Services are emerging as the preeminent method for program-to-program communication across corporate networks as well as the Internet. Securing web Services has been a challenge until recently, as typical Web authentication and authorization techniques employed browser-to-server architectures (not program-to-program). This resulted in user identity ending at the Web Application Server, forcing the Web Services Provider to trust blindly that the Web Services Requester had established identity and trust with the end user.
Tags : 
pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml, security assertion markup language, pki, public key infrastructure, soa, oasis, ws-trust, sso, single sign-on, service oriented architecture, rest, user identity mapping, ldap
    
Ping Identity
Published By: Jive Software     Published Date: Mar 09, 2012
Social Customer Service offers a new approach that doesn't just tweak the existing trade-offs. It rewrites the entire equation, so companies can boost customer satisfaction, improve rep productivity, and reduce support costs at the same time. Download this whitepaper and learn how Jive can transform your customer service & support teams.
Tags : 
customer satisfaction, customer service, jive, technology, support, technical support
    
Jive Software
Start   Previous    30 31 32 33 34 35 36 37 38 39 40 41 42 43 44    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.