Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

art

Results 8401 - 8425 of 9574Sort Results By: Published Date | Title | Company Name
Published By: Nimsoft     Published Date: Oct 24, 2011
This paper describes unique characteristics of cloud service delivery models; details distinct monitoring responsibilities & challenges of each model
Tags : 
nimsoft, cloud service, delivery, models, monitor, monitoring, challenges
    
Nimsoft
Published By: PR Newswire     Published Date: Oct 21, 2011
In this white paper, learn how three pioneering companies - Dell, IBM and Zendesk - created and evolved their social media marketing practices to powerful effect with their customers, partners and prospects.
Tags : 
dell, ibm, zendesk, active social listening, social echo, social media monitoring, social media marketing, brand-generated content, multi-channel content syndication, content marketing, engagement, big data
    
PR Newswire
Published By: Kofax     Published Date: Oct 20, 2011
At this free, one-hour webcast, moderated by Bank System & Technology Editorial Director Kathy Burger, you will learn how intelligent capture and exchange capabilities can help your organization automate the entire mortgage loan process - linking back-office information processes, front-office knowledge workers, customers and partners to enable financial institutions to exchange information automatically with anyone, anywhere, in any format.
Tags : 
webinar, kofax, kinecta, finance, business, mortgage, loan, money, capital, business finance
    
Kofax
Published By: Adaptive Planning     Published Date: Oct 19, 2011
Grounded in extensive research, Reinventing the CFO outlines seven critical roles--from streamlining redundant processes to regulating risk to identifying a few key measures--that CFOs must take on to transform the finance operation successfully. Challenging many of the finance field's accepted practices and systems, this bold book revolutionizes the role of financial managers and frees them to make smart, ethical, strategic decisions that add real value to the firm.
Tags : 
adaptive, marketry, cfo, harvard review, business, finance, finance operations
    
Adaptive Planning
Published By: Adaptive Planning     Published Date: Oct 19, 2011
This article includes a one-page preview that quickly summarizes the key ideas and provides an overview of how the concepts work in practice along with suggestions for further reading.
Tags : 
harvard business, finance, business, analytics, data, adaptive, marketry
    
Adaptive Planning
Published By: Adaptive Planning     Published Date: Oct 19, 2011
Surveys show that most CFOs want to upgrade their role from accounting specialists to strategic or business partners. But few CFOs have actually made the change, primarily because they have neither the time nor the necessary capabilities within the current finance team. But for those who do make the change, the rewards are tangible. This chapter lays out a number of important steps that the CFO and the finance team need to take to position themselves as trusted and valued business partners within the organization.
Tags : 
harvard, adaptive, marketry, cfo, analyst, financial managers, financial planning, budget, business, finance
    
Adaptive Planning
Published By: Aberdeen Group     Published Date: Oct 19, 2011
A true 360 degree view of the customer is a win-win situation for all parties involved: buyers benefit from better service and efficiency, and sellers derive improved loyalty and, inevitably, more repeat business from established customers. This report will explore how Best-in-Class companies take a holistic approach to providing a complete, accurate and integrated view of customers to improve satisfaction and retention without losing sight of customer profitability. As a result of these strategies, companies with more accurate and timely information about their prospect or customer can more efficiently respond to communications, ensure customer satisfaction with better service, and drive toward a larger lifetime value of each account, customer or client.
Tags : 
aberdeen, technology, customer, up-sell, best in class companies, communications, customer satisfaction
    
Aberdeen Group
Published By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 15, 2011
"The Shortcut Guide to Business Security Measures Using SSL" examines current information security threats to business and describes techniques for developing a security management strategy that leverages established best practices.
Tags : 
extended validation, measures, green bar, online security, optimize, sgc, server gated cryptography, verisign, trust marks, security, ssl technology, malware, it infrastructure, operating systems, hacking, phishing, dos, cybercrime, bot herders, cloud computing
    
VeriSign Authentication Services, now a part of Symantec Corp.
Published By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 13, 2011
This report looks at the challenges in the new world of EHR as well as security breaches and other risks that come with storing web-based information.
Tags : 
verisign, health, ehr, security, breaches, risks, web-based, information, patient, privacy, confidential, protect, security, healthcare industry
    
VeriSign Authentication Services, now a part of Symantec Corp.
Published By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 13, 2011
In this must read white paper, you will learn about cloud computing, new opportunities, new security challenges and how to ensure your data is safe.
Tags : 
cloud, hosting company, security, ssl certificate, verisign inc., verisign ssl certificate
    
VeriSign Authentication Services, now a part of Symantec Corp.
Published By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 13, 2011
Download Protecting Users From Firesheep and other Sidejacking Attacks with SSL to learn how to avoid HTTP attacks.
Tags : 
verisign, firesheep, sidejacking, attacks, security, http, ssl, wifi, wi-fi, tls, protect
    
VeriSign Authentication Services, now a part of Symantec Corp.
Published By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 13, 2011
Read this white paper to learn how TLS works, best practices for its use and the various applications in which it can secure business computing.
Tags : 
best, practices, applications, tls, ssl, secure, business computing, transport layer security, secure sockets layer
    
VeriSign Authentication Services, now a part of Symantec Corp.
Published By: iDirect     Published Date: Oct 13, 2011
Find out why utilities are expanding their use of satellite communications to provide reliable, intelligent connectivity to remote locations-and how it can work in your organization. Download the report.
Tags : 
idirect, pike research, technology, satellite, smart grid, communications, grid applications
    
iDirect
Published By: iDirect     Published Date: Oct 13, 2011
In an insightful report from iDirect, find out why satellite is the best option for delivering cost-effective, reliable, broadband connectivity to any location. Today's satellite networks are enterprise-class platforms built on IP; offering seamless integration with existing communications technology. In addition, satellite now delivers up to 99.99 percent network availability and meets new security regulations, such as AES encryption. Get the facts on satellite for the smart grid and learn how satellite services can deliver the security, latency, and reliability required for all core utility applications. Download the report.
Tags : 
idirect, satellite communications, technology, smart grid, utility companies
    
iDirect
Published By: Skillsoft     Published Date: Oct 13, 2011
From understanding the potential of e-learning to understanding how to measure its ROI, Dorman Woodall, director of Skillsoft Learning addresses the eight key questions to ask of your e-learning strategy.
Tags : 
skillsoft, technology, human resources, e-learning, roi, dorman woodall
    
Skillsoft
Published By: Skillsoft     Published Date: Oct 13, 2011
Today's IT departments must be true business partners, actively engaged in serving internal and external customers, and aligned with company goals. IT leaders discuss how educating and training IT professionals for leadership leads to high-performance, business-savvy tech teams.
Tags : 
skillsoft, human resources, execblueprints, staff, experience, skill sets, it staff, technology
    
Skillsoft
Published By: Skillsoft     Published Date: Oct 13, 2011
The IT department for Christiana Care Health Care Systems supports various projects throughout the health system that often require specialized training or expertise in particular IT areas, as well as project management skills. Following a recent reorganization and re-evaluation of job roles, the IT department needed to find a way to train existing staff quickly and cost-effectively to support various information technology needs.
Tags : 
skillsoft, technology, human resources, christiana care, health care systems, case study
    
Skillsoft
Published By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 13, 2011
Gaining the trust of online customers is vital for the success of any company that transfers sensitive data over the Web. When shopping online, consumers are concerned about identity theft and are therefore wary of providing untrusted sources with their personal information, especially their credit card details. Other types of online businesses require different but equally sensitive information. People are reluctant to provide their national insurance numbers, passwords, or other confidential personal information, or sometimes even just name, address, and phone number. Perhaps the information will be intercepted in transit, they fear, or perhaps the destination itself is manned by imposters with ill intent.  The result is an abandoned transaction.
Tags : 
security, ssl, trust, authentication, online security, online business, ssl certificates, ssl certificate, certificate authority, code signing, 128-bit, 256-bit, 128-bit encryption, 256-bit encryption, secured seal, extended validation, extended validation ssl, extended validation ssl certificates, extended validation ssl certificate, extended validation certificate
    
VeriSign Authentication Services, now a part of Symantec Corp.
Published By: Aerohive     Published Date: Oct 12, 2011
Virtualization, cloud computing, and wireless technology are fundamentally changing enterprise computing, providing revolutionary gains in productivity and cost savings. Powerful enterprise applications can now be delivered to almost any device, anywhere, at any time.
Tags : 
aerohive, virtualization, cloud computing, wireless technology, access points, mobile internet devices, wi-fi devices, routing, mobile device access management, network management, wlan policy, network access layer, wireless mobility, iphone, smart phones, wlan, layer 2 roaming, vpn, byod
    
Aerohive
Published By: Dell Mobility     Published Date: Oct 12, 2011
Download this report and learn where you need to invest your mobile money.
Tags : 
dell, mobility, solutions, servers, storage, datacenter, client refresh, wireless, mobility, workstation productivity, mobile phones, smartphones, smart phones, touch screen phones, pda phones, infrastructure, consumerization
    
Dell Mobility
Published By: Dell Mobility     Published Date: Oct 12, 2011
Download this report and learn how to build your mobile consumerization strategy
Tags : 
dell, mobility, solutions, servers, storage, datacenter, client refresh, wireless, mobility, workstation productivity, mobile phones, smartphones, smart phones, touch screen phones, pda phones, infrastructure, consumerization, strategy
    
Dell Mobility
Published By: Dell Mobility     Published Date: Oct 12, 2011
Download this report and learn which mobile initiatives IT organizations are investing in most aggressively and what's driving those decisions.
Tags : 
dell, mobility, solutions, servers, storage, datacenter, client refresh, wireless, mobility, workstation productivity, mobile phones, smartphones, smart phones, touch screen phones, pda phones, lifecycle, decisions, refresh, rates
    
Dell Mobility
Published By: Dell Mobility     Published Date: Oct 12, 2011
Download this report to find out how technology professionals rate factors like security, integration with existing infrastructure, ease of use, etc.
Tags : 
dell, mobility, solutions, servers, storage, datacenter, client refresh, wireless, mobility, workstation productivity, mobile phones, smartphones, smart phones, touch screen phones, pda phones
    
Dell Mobility
Published By: Secunia     Published Date: Oct 12, 2011
This study identifies the 3rd party program vulnerabilities and the threat they represent.
Tags : 
vulnerability assessment, internet security, windows patching, exploit definition, endpoint security, microsoft patch management, patch management policy, vulnerability intelligence, solutions, inspector, software, secure, vital, protect, networks, endpoints, zeroboard, patch, patch manager, tools
    
Secunia
Start   Previous    330 331 332 333 334 335 336 337 338 339 340 341 342 343 344    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.