Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

art

Results 8751 - 8775 of 9078Sort Results By: Published Date | Title | Company Name
Published By: LeadLife Solutions     Published Date: Oct 20, 2008
Marketing campaigns should always start with the "who?" who will you target, who has a need for your product or service? No one can optimize lead generation without specifically defining the right audience to approach. Targeting can encompass many dimensions...
Tags : 
leadlife solutions, roi, lead generation, lead optimization, crm
    
LeadLife Solutions
Published By: Citrix Online     Published Date: Oct 17, 2008
Marketing professionals continue to rate Webinars as one of the top tools for lead generation. Yet, many marketing departments still do not have a process in place to maximize Webinar results.
Tags : 
best in class, webinar, management practice, b2b, business to business, webinars, effectiveness, sales
    
Citrix Online
Published By: HP - Enterprise     Published Date: Oct 16, 2008
If your company stores or processes credit card information, you must be able to demonstrate compliance with the Payment Card Industry (PCI) Data Security Standards (DSS). These standards include requirements for security management, policies, procedures, network architecture, design, and other critical protective measures. They also include one very prescriptive requirement:  Section 6.6 mandates that organizations secure all Web applications by conducting a code review or installing an application layer firewall. Companies have had a very difficult time passing the other parts of Section 6 and they have experienced a rising number of data breaches. Unless companies take 6.6 seriously, PCI compliance failure rates, and data breaches, will continue to grow.  Read this whitepaper to gain an overview of best practices to pass Section 6.6 and an understanding of the technology available to you.
Tags : 
business risk, security, application security, audit, risk, vulnerabilities, fortify, fortify software
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Oct 16, 2008
As the military and US government rely more heavily on custom-built applications for communications and management, they also become more vulnerable to cyber attacks. Worse, according to the Dept. of Homeland Security, the number of attacks on custom-built applications is doubling every year. Learn about critical threats, methods that military and civilian agencies can use to deal with cyber attacks and technologies that improve security for custom-built applications.
Tags : 
security, application security, audit, risk, vulnerabilities, fortify, fortify software, hackers
    
HP - Enterprise
Published By: RisingMedia     Published Date: Oct 14, 2008
Starting in 2002, the first few years of the eMetrics Marketing Optimization Summit were formative for an those interested in measuring the ROI of online marketing. Technologies were revealed, processes suggested, partnerships formed and an industry found its voice.
Tags : 
emetrics, risingmedia, roi, online marketing, marketing optimization, wasp
    
RisingMedia
Published By: BlackBerry     Published Date: Oct 12, 2008
The healthcare industry has lagged behind other industry sectors in adopting wireless technologies. Is the problem one of functionality, reliability or suitability to the required tasks? Or, is it simply the conservative nature of healthcare, where a solution must be of proven value and unassail-able virtue before investments are made and policies are changed. This paper examines the characteristics of wireless mobility solutions and considers how effectively these solutions meet healthcare industry requirements.
Tags : 
blackberry, healthcare, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software
    
BlackBerry
Published By: Sparta Social Networks     Published Date: Oct 10, 2008
Available in more than 74 million homes, Oxygen Media (Oh!), the cable-television network co-founded by Oprah Winfrey, was looking for innovative ways to introduce a new weekly television program and drive viewership. The strategy: Launch an $8 million marketing campaign that included an online community where viewers would invite and encourage friends to watch the show. Because the premiere dates of television shows are fixed, the network had to get its online community up and running quickly. Download this case study to learn more.
Tags : 
sparta, social network, oxygen
    
Sparta Social Networks
Published By: Sparta Social Networks     Published Date: Oct 10, 2008
This case-study talks about how the Packet8 broadband voice over Internet protocol (VoIP) and video communications service which lets broadband Internet users add digital voice and video communications services to their high-speed Internet connection. Videophone users now account for almost 5 percent of Packet8’s 74,000 lines, and are one of several drivers in the company's quarterly growth, up 54 percent in the most period to $6 million in revenue. Download to learn more.
Tags : 
sparta, social network, packet8, internet protocol (voip)
    
Sparta Social Networks
Published By: HP     Published Date: Oct 09, 2008
Increase utilization, decrease energy costs with data center virtualization In the past, IT departments have responded to demands for new services and better performance by adding more hardware, resulting in underutilized technology silos and server sprawl. Today, many organizations are turning to virtualization technologies that facilitate consolidation and increased utilization. In short, virtualization brings the ability to pool, share and dynamically reallocate data center resources – and helps fulfill the promise of higher utilization and lower energy consumption and lower costs.Join us and learn why HP is well prepared to help you assess and address your needs. Find out what key virtualization partners -- such as VMware, Microsoft and Citrix – bring to the table and how HP can help you leverage their technology and expertise.
Tags : 
mission critical, virtualization, hewlett-packard company, enterprise applications
    
HP
Published By: Intermec     Published Date: Oct 09, 2008
Find out how to select bar code printers to maximize uptime and output. This white paper explains how different printer types, performance capabilities, features, label media compatibility, integration and support requirements can impact productivity and total cost of ownership (TCO) for users with extended printer duty cycles or harsh environments.
Tags : 
printing, tco, total cost of ownership, productivity, print, wireless, lan, wireless printing
    
Intermec
Published By: Orchid Technologies Engineering & Consulting     Published Date: Oct 07, 2008
As electronic product designs age, component parts become increasingly difficult to obtain.  Component buyers may experience difficulty in obtaining key parts within the design.  Component part prices may increase.  A point comes when component parts begin going end-of-life at an alarming rate.  Quick fixes are no longer sufficient.  Sometimes an OEM will procure a 'life-time' supply of problem parts – but this supply can be quickly wiped out should unforeseen demand develop.  Lack of component parts puts an end to production.There is an alternative.  Profitable, old products can be redesigned.  Either preserving the original form fit and function, or adding new features. Product redesign is a cost effective means by which to extend the life of a marketable product.
Tags : 
orchid technologies, texas instruments, original equipment manufacturers, (oem’s), software development, it management
    
Orchid Technologies Engineering & Consulting
Published By: BlackBerry     Published Date: Oct 04, 2008
This paper outlines the multitude of benefits that the BlackBerry solution offers to doctors, nurses, support staff and other clinical workers.
Tags : 
blackberry, healthcare, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software
    
BlackBerry
Published By: Microsoft Exchange     Published Date: Oct 02, 2008
Expedia is the world's leading online travel company, providing business and leisure travelers with tools and information to easily research, plan, book, and experience travel. As the company’s early rapid growth stabilized, its IT department sought ways to help employees become more productive and collaborate more effectively across long distances. To meet this goal, the department deployed Microsoft® Exchange Server 2007.
Tags : 
expedia, microsoft, microsoft exchange, exchange server, messaging, collaboration, it management
    
Microsoft Exchange
Published By: Quocirca     Published Date: Oct 01, 2008
The internet has grown rapidly from a random collection of mainly academic networks and military control and routing protocols into a global, integrated and sophisticated commercial utility. No longer simply an 'Information Superhighway', it has extended to embrace voice telephony, video and mobile communications as part of a converged network. Connection options and services have expanded, with opportunities for internet service providers (ISPs) to add value beyond simply forwarding bit and bytes.
Tags : 
quocirca, isp, isps, internet service provider, convergence, ip telephony, voip, networking
    
Quocirca
Published By: Tail-f Systems     Published Date: Oct 01, 2008
Network management systems must adapt to meet the requirements of next generation networks.  For example, a user interfaces may need to be refreshed with a state-of-the-art Web interface or support for the NETCONF protocol may be required to help customers deploy scalable networks. Adding functionality and integrating with existing applications and data stores has multiple trade-offs in terms of development time and system efficacy.
Tags : 
network management, next-generation networks, netconf, legacy networks, network management systems, tail f, tail-f, tailf
    
Tail-f Systems
Published By: CA WA 2     Published Date: Oct 01, 2008
Featuring an expert from Enterprise Management Associates, this webcast discusses some tactical steps towards automation of various IT processes, showing how even in processes with interdependent tasks, IT Process Automation can start IT groups down the path of reducing complexity and error rates, two of the leading drivers of cost and chaos.
Tags : 
ca wa, ca wa 2, process automation, it process, bpa, business process automation, it management, webcast
    
CA WA 2
Published By: Stratus Technologies     Published Date: Sep 30, 2008
The Choices from many reputable suppliers of IT managed services can appear very much alike. Yet when you have a mission-critical business process whose function must not be interrupted, you know your requirements call for something above and beyond. This paper serves as a field guide to help you identify key characteristics that set a critical managed IT service apart from even highly capable general-purpose offerings.
Tags : 
stratus technologies, it services, business impact analysis (bia), recovery point (rpo), recovery time objectives (rto), business continuity (bc), disaster recovery (dr) protection, service level agreement (sla)
    
Stratus Technologies
Published By: Syntapa     Published Date: Sep 30, 2008
In order to understand the key skills for your SharePoint consultant, you need to understand that SharePoint itself is not really the source of the complexity. Rather, it is the design of the deployment, the uses made of it, its part in an integrated, unified business system, and how you actually use it to deliver on business objectives which make it challenging. This understanding is ultimately going to make the difference between a happy ending and frustrated customers who end up giving SharePoint a bad name.
Tags : 
sharepoint, sharepoint server, collaboration, syntapa, consult, consultant, consultancy, it management
    
Syntapa
Published By: Mimecast     Published Date: Sep 30, 2008
Today, email management is not only a filing and storage challenge. Because law firms and attorneys must be equipped to take control of litigation, email authenticity must be unquestionable with strong chains of custody, constant availability, and tamper-proof security. This white paper summarizes the author's experiences of litigating in fractured environments, particularly as they pertain to email. Learn the 12 steps that will help you gain control of your electronically stored data.
Tags : 
mimecast, saas, email solutions, evidence, security, email managemeng, archiving, ediscovery
    
Mimecast
Published By: CA WA 2     Published Date: Sep 29, 2008
Forrester evaluated leading Data Center Automation (DCA) solutions across approximately 80 criteria. CA was named as a leader in this Wave evaluation. The report states: “Recently, CA introduced its Data Center Automation Manager, which is part of its dynamic and virtual systems management solution and is directed at the automation of the data center.
Tags : 
ca wa, computer associates, forrester, data center, datacenter, data center automation, dca, network management
    
CA WA 2
Published By: LogRhythm     Published Date: Sep 26, 2008
LogRhythm, the leader in Log and Security Event Management Solutions, has prepared a "Quick Read" whitepaper to help you understand what's required to ensure compliance with: CIP- 003-1 – Cyber Security – Security Management controls; CIP- 005-1 – Cyber Security – Electronic Security Perimeter(s); CIP- 006-1 – Cyber Security – Physical Security of Critical Cyber Assets; CIP -007-1 – Cyber Security – Systems Security Management; CIP -008-1 – Cyber Security – Incident Reporting and Response PlanningThe whitepaper also contains a compliance reference chart with the specific CIP requirements matched with recommended steps to ensure compliance.
Tags : 
nerc, nerc cip, nerc cip requirements, critical cyber assets, electronic security perimeter, critical cyber assets, compliance, comply
    
LogRhythm
Published By: Alt-N Technologies     Published Date: Sep 26, 2008
Email has become today's most mission-critical communication channel. Each and every day, 800 million business users worldwide use email during the course of their work day and about 80 percent of a company's intellectual property passes though its email server. Email is a vital component of both internal communication between employees and external communication with customers and business partners. It has become such an integral part of normal day-to-day business operations that most companies simply cannot function without it: when email stops, your ability to conduct business also stops.
Tags : 
alt-n technologies, email, exchange server, mdaemon, smtp, pop, imap, syncml
    
Alt-N Technologies
Published By: SAS     Published Date: Sep 25, 2008
This white paper provides a blueprint for action for senior marketers and decision makers across the enterprise. It provides straightforward advice on how to build a more durable and profitable customer base by building a more competitive business model, enabling customer-centric business strategies in a product-centric organization, turning expanding volumes of customer data into actionable insight for smarter decision making, and providing a roadmap for integrating technology to achieve competitive advantage.
Tags : 
competitive advantage, customer data, data collection, business intelligence, customer intelligence, sas
    
SAS
Published By: Marketo, INC.     Published Date: Sep 25, 2008
This free white paper reveals that more than half of all inside salespeople have less than 2 years of experience—with annual turnover close to 50%. You can’t change that, but you can back your team with superior planning. Learn 3 critical factors that can make or break your inside sales effort; the 6 building blocks of an effective sales team; and how formulating a strategic plan can help ensure your team’s success. Download now—and start building a world-class inside sales team.
Tags : 
sales, inside sales, marketing, sales reps, sales executives, sales team, sales motivation, prospects
    
Marketo, INC.
Published By: ZSL Inc.     Published Date: Sep 25, 2008
The hotspot in the current IT world is optimized Web Services. Now the enterprises have started their vision towards next generation Web Services. This white paper gives information for the business managers and engineers in developing and deploying Web Services using Rational Application Developer (RAD) and WebSphere Application Server (WAS), respectively. This paper explains the process to:* create a Web Service and Web Server client* build security to that web service* deploy the web service in WebSphere application server
Tags : 
zsl, soap, java, wsdl, uddi, web service security, risk exposure, security
    
ZSL Inc.
Start   Previous    344 345 346 347 348 349 350 351 352 353 354 355 356 357 358    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.