Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

sign act

Results 126 - 150 of 908Sort Results By: Published Date | Title | Company Name
Published By: Microsoft Azure     Published Date: Apr 11, 2018
While itís clear what the potentials of cloud computing are for your organization, it may be unclear the adjustments your IT organization will need to make in transitioning to the cloud. This guide is designed to help your IT team more effectively implement and integrate cloud technologies. Youíll explore key cloud concepts as well as Azure-specific tips and tactics around: General architectures that incorporate security, identity, and cloud design principles. DevOps and how it fits with cloud technologies. Integrating, planning, and managing cloud resources. Microsoft Azure governance.
Tags : 
    
Microsoft Azure
Published By: Microsoft     Published Date: Jul 20, 2018
Each organization has a unique journey to the cloud based on its own starting point, its history, its culture, and its goals. This document is designed to meet you wherever you are on that journey and help you build or reinforce a solid foundation around cloud application development and operations, service management, and governance. At Microsoft, we have been on our own journey for the past decade, and over the past years we have learned important lessons by developing our own internal and customer-facing systems. At the same time, we've been fortunate to share the experiences of thousands of customers on their own journeys. This document is designed to share those experiences and distill them into proactive guidance. You do not need to follow these recommendations to the letter, but you ignore them at your peril. Our experience has shown that a careful approach to these topics will speed you along on your organizationís journey and avoid well understood pitfalls. For the past severa
Tags : 
    
Microsoft
Published By: The Mx Group     Published Date: Jul 12, 2017
As the number of tactics available to marketers has multiplied, it has become harder and harder for many to determine where they should focus their resources. Digital marketing, in particular, is becoming increasingly sophisticated and offers opportunities for highly targeted and effective campaigns. But as B2B marketers are designing integrated programs, many overlook a tactic that has successfully generated leads and closed sales for decades: telemarketing. Strategically deploying telemarketing to enhance engagement, nurture prospects and improve your data can make the difference between revenue that goes to your bottom line and revenue that goes out the door. This kind of direct, one-to-one communication has a natural connection with the B2B world, a field built around relationships and tightly targeted audiences.
Tags : 
digital marketing, telemarketing, lead generation, sales, engagement
    
The Mx Group
Published By: Cisco     Published Date: Apr 08, 2015
Zero-day attacks and advanced persistent threats have outstripped the capabilities of traditional security methods that rely exclusively on detection and blocking for protection. In fact, 100 percent of companies surveyed by Cisco, as part of our Annual Security Report, have connections to domains that are known to host malicious files or services. At the same time, the Internet of Everything (IoE) is accelerating, creating significant opportunities for businesses and attackers alike as more things come online - along with the people, processes, and data that interact with them.
Tags : 
security, attacks, data, domain, zero-day, capabilities, malicious files, blocking
    
Cisco
Published By: Cisco     Published Date: Apr 08, 2015
Zero-day attacks and advanced persistent threats have outstripped the capabilities of traditional security methods that rely exclusively on detection and blocking for protection. In fact, 100 percent of companies surveyed by Cisco, as part of our Annual Security Report, have connections to domains that are known to host malicious files or services. At the same time, the Internet of Everything (IoE) is accelerating, creating significant opportunities for businesses and attackers alike as more things come online - along with the people, processes, and data that interact with them.
Tags : 
security, attacks, data, domain, zero-day, capabilities, malicious files, blocking
    
Cisco
Published By: goTransverse     Published Date: Oct 15, 2015
Billing is a key moment of truth for all businesses. Every interaction with the customer ultimately gets filtered through billing. Itís an endless combination of quotes, account creation, orders, pricing, payments, settlement and subscriber management. If your company is looking to evaluate billing and subscription management vendors, this paper covers five must-ask questions your peers wished they had uncovered before signing the contract.
Tags : 
    
goTransverse
Published By: E-SignLive by Silanis     Published Date: Oct 02, 2013
An introduction to electronic signature technology for banks: What it is, why you need it, how it works and who in the banking industry is using e-signature solutions to automate customer-facing transactions. This guide answers common questions, shares ROI metrics and outlines best practices based on 20 years of transforming business processes and customer experience with electronic signatures.
Tags : 
banking, financial services, credit unions, bandwidth management
    
E-SignLive by Silanis
Published By: Polycom     Published Date: Dec 02, 2014
Bene is a European company setting trends in office furnishing with its concepts, products and services. The brand is associated with top quality and functionality, modern design and innovative technology. Bene engages in development and manufacture and provides sales and consultancy services under one umbrella. The Austrian firm is a leader in their market, a major player in Europe, and proud to create a forward looking office concepts.
Tags : 
bene, top quality, functionality, modern design, innovative technology, manufacture, sales, platforms
    
Polycom
Published By: Polycom     Published Date: Mar 13, 2015
Bene is a European company setting trends in office furnishing with its concepts, products and services. The brand is associated with top quality and functionality, modern design and innovative technology. Bene engages in development and manufacture and provides sales and consultancy services under one umbrella. The Austrian firm is a leader in their market, a major player in Europe, and proud to create a forward looking office concepts.
Tags : 
mobile, unified communication, concept, brand, enterprise, voice, products, services
    
Polycom
Published By: Zebra Technologies     Published Date: Sep 12, 2018
Labeling blood and other samples at the time they are collected improves patient safety and helps prevent a host of problems related to misidentification ó including many of the estimated 160,900 adverse events that occur in U.S. hospitals annually because of sample identification errors.1 There is a strong and growing body of evidence within medical literature that creating specimen identification labels on demand at the patient bedside with a mobile printer can significantly reduce errors. The Joint Commissionís National Patient Safety Goals (NPSG) for 2010 advocate the use of two patient-specific identifiers, such as name and birthdate, whenever taking blood or other samples from a patient, and to label the sample collection container in the presence of the patient. Producing specimen labels at the patient bedside and encoding patient identification in a barcode satisfies both The Joint Commissionís NPSG and Health Insurance Portability and Accountability Act (HIPAA) requirements. T
Tags : 
    
Zebra Technologies
Published By: Cyphort     Published Date: Jun 28, 2016
Computer viruses have plagued personal computers since the original Brain virus began infecting boot sectors in 1986. Originally, these early viruses were annoying, but fundamentally benign in nature. However, once the initial concept of malicious propagating code became established, the actors creating viruses became more sophisticated in their approach. Ultimately, the results of a successful infection were more significant and the impact on an enterprise more severe.
Tags : 
technology, security, best practices, solutions, network management
    
Cyphort
Published By: VeriSign, Inc.     Published Date: Aug 03, 2011
This paper will explore how TLS works, best practices for its use, and the various applications in which it can secure business computing.
Tags : 
verisign, larry seltzer, best practices, ssl, tls, transport layer security, secure lockets layer, authentication
    
VeriSign, Inc.
Published By: SAP     Published Date: Jul 17, 2012
Although IDC is expecting worldwide spending on business analytics software to be $33 billion in 2012, technology is only part of the story. The growing demand for faster response and deeper business insight is forcing companies to adopt a more pervasive approach to business intelligence (BI) that supports evidence-based decision making. Higher BI and analytics competency and pervasiveness are achieved when organizational culture, business processes, and technologies are designed and implemented with the goal of improving or automating all strategic, operational, and tactical decision making capabilities of all stakeholders. Access this paper to learn essential best practices for creating a solid BI and analytics strategy.
Tags : 
sap, best practices, business intelligence, analytics strategy, technology
    
SAP
Published By: Kenexa     Published Date: Aug 30, 2011
This white paper outlines the best practices for designing and implementing salary structures.
Tags : 
kenexa, designing salary structures, merit planning, merit matrix, compensation planning, job-worth hierarchy, job evaluation structure, pay grades
    
Kenexa
Published By: IBM     Published Date: Apr 20, 2017
Security from design through deployment. Mobile devices are now a reality in many organizations. Building on Mobile Device Management (MDM) and Mobile Application Management (MAM), organizations are increasingly developing their own enterprise apps for specific job tasks to improve productivity, business partnerships, customer satisfaction and bottom-line performance. However, to achieve these benefits, it is imperative that mobile security best practices are incorporated throughout the lifecycle of the application.
Tags : 
application management, application development, organization optimization, authentication, application security, enterprise applications, app blocking
    
IBM
Published By: Stratus Technologies     Published Date: Jul 29, 2008
Protect the availability of business-critical processes while keeping costs in line. This e-book takes you from business analysis to design and deployment to an actual case study using recognized industry best practices and governance guidelines.
Tags : 
stratus, best practices, business process, bpm
    
Stratus Technologies
Published By: Cisco     Published Date: Oct 08, 2015
This document consolidates the enterprise campus network design and deployment guidelines with various best practices from multiple deeply focused Cisco Validated Design Guides. The best practices conclusions are derived from thorough solution-level end-to-end characterization of various levels of system types, network design alternatives, and enterprise applications.
Tags : 
cisco infrastructure, enterprise network, network design, infrastructure, migration, network architecture, network management, network performance
    
Cisco
Published By: Docusign     Published Date: Feb 17, 2015
This paper explores the essential tools and technologies that empower HR to create positive interactions that lead to greater engagement while enhancing workflow processes.
Tags : 
electronic signature, esignature, best practices in hr technology, hr technology, technologies allow engagement, human resources technology, consequences of technology for hr
    
Docusign
Published By: DocuSign     Published Date: Aug 09, 2016
This white paper is a guide to using eSignature on Office 365.
Tags : 
docusign, client satisfaction, office 365, technology, electronic contract, paperless, reduce costs
    
DocuSign
Published By: MarkLogic     Published Date: Mar 13, 2015
Big Data has been in the spotlight recently, as businesses seek to leverage their untapped information resources and win big on the promise of big data. However, the problem with big data initiatives are that organizations try using existing information management practices and legacy relational database technologies, which often collapse under the sheer weight of the data. In this paper, MarkLogic explains how a new approach is needed to handle the volume, velocity, and variety of big data because the current relational model that has been the status quo is not working. Learn about the NoSQL paradigm shift, and why NoSQL is gaining significant market traction because it solves the fundamental challenges of big data, achieving better performance, scalability, and flexibility. Learn how MarkLogicís customers are reimagining their data to: - Make the world more secure - Provide access to valuable information - Create new revenue streams - Gain insights to increase market share - Reduce b
Tags : 
enterprise, nosql, relational, databases, data storage, management system, application, scalable
    
MarkLogic
Published By: Cisco EMEA     Published Date: Nov 13, 2017
Big data and analytics is a rapidly expanding field of information technology. Big data incorporates technologies and practices designed to support the collection, storage, and management of a wide variety of data types that are produced at ever increasing rates. Analytics combine statistics, machine learning, and data preprocessing in order to extract valuable information and insights from big data.
Tags : 
big data, analytics, virtualization, cloudera, ibm, sas, sap, splunk
    
Cisco EMEA
Published By: BlackBerry     Published Date: Apr 13, 2010
The BlackBerry Enterprise Server Express is designed to be a secure, centralized link between an organization's wireless network, communications software, applications, and BlackBerry devices. The BlackBerry Enterprise Server Express integrates with your organization's existing infrastructure, which can include messaging software, calendar and contact information, wireless Internet and intranet access, and custom applications, to provide BlackBerry device users with mobile access to your organization's resources. You can install the BlackBerry Enterprise Server Express on the same server as Microsoft Exchange or Windows Small Business Server, or you can install the BlackBerry Enterprise Server Express on a separate server.
Tags : 
blackberry, server express, microsoft exchange, v5.0.1, administration guide, mobile applications, cio, pim
    
BlackBerry
Published By: BlackBerry     Published Date: Apr 13, 2010
The BlackBerry Enterprise Server is designed to be a secure, centralized link between an organization's wireless network, communications software, applications, and BlackBerry devices. The BlackBerry Enterprise Server integrates with your organization's existing infrastructure, which can include messaging and collaboration software, calendar and contact information, wireless Internet and intranet access, and custom applications, to provide BlackBerry device users with mobile access to your organization's resources.
Tags : 
blackberry, enterprise server, desktop manager, communications software, rim, microsoft exchange, mobile device management, mobile device management software
    
BlackBerry
Published By: BlackBerry     Published Date: Apr 13, 2010
The BlackBerry Enterprise Server is designed to be a secure, centralized link between an organization's wireless network, communications software, applications, and BlackBerry devices. The BlackBerry Enterprise Server integrates with your organization's existing infrastructure, which can include messaging and collaboration software, calendar and contact information, wireless Internet and intranet access, and custom applications, to provide BlackBerry device users with mobile access to your organization's resources.
Tags : 
blackberry, mobile applications, enterprise server, planning guide, aes, des, cio, pim
    
BlackBerry
Published By: IBM     Published Date: Apr 18, 2018
How IBM can help As one of the worldís leading research organizations, and one of the worldís top contributors to open source projects, IBM is committed to fostering the collaborative effort required to transform how people, governments and businesses transact and interact. IBM provides clients the blockchain technology fabric, consulting and systems integration capabilities to design and rapidly adopt distributed ledgers, digital identity and blockchain solutions. IBM helps clients leverage the global scale, business domain expertise and deep cloud integration experience required for the application of these technologies. Learn more at ibm.com/blockchain. The IBM Global Electronics practice uniquely combines IBM and partner services, hardware, software and research into integrated solutions that can help you deliver innovation, create differentiated customer experiences and optimize your global operations. Please visit ibm.com/electronics
Tags : 
ibm, blockchain, electronics
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.