Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

web based

Results 176 - 200 of 310Sort Results By: Published Date | Title | Company Name
Published By: IBM ILOG.     Published Date: Oct 26, 2009
This case study will showcase the challenges of clinical trial data management, but the highlighted techniques are applicable to any business needing smart, dynamic and adaptive Web-based user interfaces.
Tags : 
brms, business logic, business rules, claims management, data management, data validation, healthcare, productivity, web-based applications
    
IBM ILOG.
Published By: White Horse     Published Date: Oct 07, 2009
Learn how to tap powerful real-time brand conversations taking place in social media by investing in the proper tool to aggregate and share the data across your organization. Download this Webinar for a standards-based benchmarking review of the top social media monitoring tools and practical knowledge that will equip you to make a business case for the single best social media investment.
Tags : 
brand marketing, brand research, social media monitoring, crisis management, social marketing, brand management
    
White Horse
Published By: White Horse     Published Date: Sep 27, 2010
Identify the global website strategy that makes the most sense for your brand based on a few simple criteria. Clearly articulate what your company's global presence actually is. Understand your company's global organizational structure. How are your web budgets allocated? Once you have this criteria you can begin to determine your evolutionary stage and what the next steps are in creating your global web presence.
Tags : 
website strategy, global website, interactive marketing, digital marketing
    
White Horse
Published By: Cornerstone OnDemand     Published Date: Oct 15, 2010
Grass Valley, the world's second largest broadcast and professional solutionssupplier, is a leading provider and innovator in media production services and technology. Their cameras, production equipment, servers and other systems are the choice of many of the largest broadcast networks and production/post-production facilities around the globe. Read this case study to find out why they chose Cornerstone OnDemand.
Tags : 
cornerstone, grass valley, training, web-based training
    
Cornerstone OnDemand
Published By: Cornerstone OnDemand     Published Date: Feb 24, 2011
GECU has the challenge of operating within one of the nation's most highly regulated industries, and as a result, has long understood that efficient processes for employee training, development and performance management are critical pillars for supporting long-term financial growth within a strict regulatory and compliance environment. Read more to find out why GECU chose Cornerstone OnDemand.
Tags : 
cornerstone, gecu, compliance, employee development, training, web-based training
    
Cornerstone OnDemand
Published By: Cornerstone OnDemand     Published Date: Aug 01, 2009
Insurance is a highly regulated industry that maintains strict licensing requirements. All Aon employees must be trained on certication and licensing requirements as mandated by government, industry associations and Aon's internal corporate governance. Download now to find out why they chose Cornerstone OnDemand.
Tags : 
cornerstone, aon, compliance, employee development, training, web-based training
    
Cornerstone OnDemand
Published By: Citrix Online     Published Date: Jun 09, 2010
This white paper explores the benefits and ROI of online training and takes an in-depth look at how two innovative companies successfully implemented Web-based training.
Tags : 
citrix gototraining, web-based training, roi, elearning, customer training
    
Citrix Online
Published By: EchoSign     Published Date: Apr 19, 2011
This Buyer's Guide covers the basics and benefits of eSignatures as well as what to look for in an eSignature solutions vendor.
Tags : 
echosign, esignature solutions, sales buyer's guide, smart selling tools, web-based scheduling, electronic signature, esignature solutions vendor
    
EchoSign
Published By: Webtrends     Published Date: May 12, 2010
Whether you're new to email retargeting or a certified segmentation genius, Webtrends Email Exchange makes it easy to send timely, relevant and targeted emails based on your customers' web activity.
Tags : 
webtrends, mobile strategy, app downloads, apps, performance indicators
    
Webtrends
Published By: Webroot     Published Date: Sep 18, 2013
This whitepaper discusses a major new threat vector — “phishing 2.0.” While many IT professionals have become less concerned with phishing as it seems these attacks only fool naive consumers, a new generation of sophisticated phishing attacks now target businesses. These phish evade traditional antivirus and antiphishing products. Using targeted information — often gathered from social media sites — they fool even security-savvy employees into divulging sensitive information or visiting websites that infect machines with dangerous malware. Learn more about: • Uncovering phishing emails and phishing websites in real time • Limiting the amount of personal information employees expose on social media sites • Leveraging the world’s largest cloud-based threat network
Tags : 
phishing, web threat, web security, malware, security
    
Webroot
Published By: Webroot     Published Date: Sep 18, 2013
This Webroot whitepaper compares deploying secure web gateways as software or appliances on-premises vs. as a cloud-based service. Lower cost, fast implementation, rapid scalability and less administration are all good reasons to adopt SaaS and cloud-based applications. In addition to these benefits, cloud-based secure web gateways can also provide better security and faster performance than appliances or local servers. It discusses a number of advantages of cloud-based solutions that appliances cannot match, such as: • Better defense against zero-day threats and spam servers • More comprehensive signature and URL database • Supports remote users more securely and without the cost of putting servers in every location
Tags : 
web threat, content filtering, the cloud, security, web gateway, cloud-based applications
    
Webroot
Published By: Webroot     Published Date: Sep 18, 2013
This whitepaper deals with the rise of mobility, BYOD and social networking, and how these trends have led cybercriminals to exploit vulnerabilities in browsers and mobile apps. For example, more than 30,000 mostly legitimate websites become infected with malware every day. From drive-by downloads to spearfishing to XML injection, web-borne threats represent a significant new risk for businesses. The report describes how to stay on top of this changing threat landscape and prevent damaging attacks with: • 100% protection against known viruses • Industry-leading URL filtering and IP protection via the world’s largest threat database • Extended protection for smartphones and tablets • Simplified web-based management
Tags : 
web security, cybercriminals, web threats, web gateway, security
    
Webroot
Published By: Asure Software     Published Date: Sep 10, 2012
In this case study, you'll learn how DPT's research into time and attendance systems lead them to Asure Software. After reviewing various vendors, DPT selected Asure Software as their vendor and partner because they knew AsureForceT Time & Labor Management Solutions would provide accuracy and room for company growth.
Tags : 
time and attendance systems, workforce management, payroll solutions, human resources, web-based applications
    
Asure Software
Published By: Asure Software     Published Date: Sep 10, 2012
Key financial stakeholders for Lowenstein Sandler were looking for a solution for tracking employee time that would eliminate paperwork and increase efficiency and productivity. As a result, they settled on AsureForce Time & Labor Management.
Tags : 
time and labor management, human resources, payroll solutions, web-based solutions, workforce management
    
Asure Software
Published By: Asure Software     Published Date: Sep 10, 2012
In this case study, you'll learn how AsureForceT Time & Labor Management offered a comprehensive solution to all of Security First Bank's needs.
Tags : 
workforce management, human resources, payroll management, time and labor management, web-based solutions
    
Asure Software
Published By: GrapeCity, Inc.     Published Date: Feb 25, 2013
Since business-wide deployment of ad hoc reporting tools can be a resource-intensive process, this white paper offers five-step roadmap of evaluation steps to help fully assess the quality of the products under consideration.
Tags : 
ad hoc reporting, ad hoc report designer, self-service bi, business intelligence, reporting, activereports, web-based reporting, mobile bi, end user reporting, dashboards, data visualization, charts, reports, analytics, multi-tenant, self-service reporting, crystal
    
GrapeCity, Inc.
Published By: GrapeCity, Inc.     Published Date: Feb 25, 2013
Gartner predicts that by 2016, 40 percent of the global workforce will be mobile, and, by 2018, 70 percent of workers will be mobile. This white paper discusses how to choose a mobile ad hoc BI solution.
Tags : 
ad hoc reporting, ad hoc report designer, self-service bi, business intelligence, reporting, activereports, web-based reporting, mobile bi, end user reporting, dashboards, data visualization, charts, reports, analytics, multi-tenant, self-service reporting, crystal
    
GrapeCity, Inc.
Published By: GrapeCity, Inc.     Published Date: Feb 25, 2013
Getting ad hoc reporting tools into users’ hands can be a logistical challenge. This white paper offers five tips for easing that process and discusses how to effectively deploy ad hoc reporting for business users.
Tags : 
ad hoc reporting, ad hoc report designer, self-service bi, business intelligence, reporting, activereports, web-based reporting, mobile bi, end user reporting, dashboards, data visualization, charts, reports, analytics, multi-tenant, self-service reporting, crystal
    
GrapeCity, Inc.
Published By: GrapeCity, Inc.     Published Date: Feb 25, 2013
Encouraging self-service BI adoption is both a technical and a human resource effort. This white paper offers a 10-point checklist for improving this process, and includes these questions and more in this easy-to-read white paper.
Tags : 
ad hoc reporting, ad hoc report designer, self-service bi, business intelligence, reporting, activereports, web-based reporting, mobile bi, end user reporting, dashboards, data visualization, charts, reports, analytics, multi-tenant, self-service reporting, crystal
    
GrapeCity, Inc.
Published By: GrapeCity, Inc.     Published Date: Feb 25, 2013
When it comes to explaining information, this white paper outlines a few basic data visualization tips to improve the impact of visualizations, ensuring that the story in the data is expressed as effectively as possible.
Tags : 
ad hoc reporting, ad hoc report designer, self-service bi, business intelligence, reporting, activereports, web-based reporting, mobile bi, end user reporting, dashboards, data visualization, charts, reports, analytics, multi-tenant, self-service reporting, crystal
    
GrapeCity, Inc.
Published By: Lumension     Published Date: Oct 20, 2014
"Watch this on-demand webcast, as security expert Randy Franklin Smith from Ultimate Windows Security, shows you a technical and pragmatic approach to mobile security for iOS and Android. For instance, for iOS-based devices, he talks about: System security Encryption and data protection App Security Device controls Randy also discusses Android-based devices. While Android gets its kernel from Linux, it builds on Linux security in a very specialized way to isolate applications from each other. And learn about iOS and Android mobile device management needs: Password and remote wipe capabilities are obvious but there’s much more to the story. And you’ll hear Randy's list of top-10 things you need to secure and manage on mobile devices in order to protect access to your organization’s network and information. "
Tags : 
secure, ios, android, mobile security, data protection, security
    
Lumension
Published By: Dyn     Published Date: Jul 29, 2015
This whitepaper reviews three fundamental reasons to add IPM services to your performance management arsenal including: • Performance management considerations for websites and cloud-based services • The role APM and NPM solutions can play in optimizing code and enterprise IT infrastructure • How complementary IPM services can help you make educated cloud and network service provider partnering decisions to improve user experiences, customer interactions, and business outcomes
Tags : 
apm, npm, internet performance management, application performance management, network performance management, enterprise it infrastructure, user experience, customer interactions
    
Dyn
Published By: CloudEndure     Published Date: Mar 23, 2016
While a public cloud provides an easy and scalable way to manage and deploy your app or website, you also need to have a contingency plan for business continuity and disaster recovery. Often overlooked on Amazon Web Services (AWS), an extremely effective cloud disaster recovery (DR) strategy is to spread the application stack across regions versus availability zones. This eBook provides a guide for planning and implementing a robust cross-region cloud disaster recovery (CDR) plan for business continuity and critical application uptime on AWS-based applications.
Tags : 
cloudendure, aws, cloud disaster recovery plan, disaster recovery, cloud, cloud computing
    
CloudEndure
Published By: IBM     Published Date: May 17, 2016
Today as customers increasingly turn to digital channels to research products, shop and purchase--and as employees arrive in the workplace conditioned by engaging consumer Web mobile and social experiences-- organizations can't afford to be left behind because of legacy investments. Customers and employees alike expect an exceptional digital experience. The good news as our TCO study shows is that most organizations can justify the cost of IBM Exceptional Digital Experience solutions based on quantifiable savings within a short period of time.
Tags : 
ibm, idc, business value, ibm digital experience, cloud, cloud computing
    
IBM
Published By: SnowFlake     Published Date: Jul 08, 2016
Today’s data, and how that data is used, have changed dramatically in the past few years. Data now comes from everywhere—not just enterprise applications, but also websites, log files, social media, sensors, web services, and more. Organizations want to make that data available to all of their analysts as quickly as possible, not limit access to only a few highly-skilled data scientists. However, these efforts are quickly frustrated by the limitations of current data warehouse technologies. These systems simply were not built to handle the diversity of today’s data and analytics. They are based on decades-old architectures designed for a different world, a world where data was limited, users of data were few, and all processing was done in on-premises data centers.
Tags : 
snowflake, data, technology, enterprise, application, best practices, social media
    
SnowFlake
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.