Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

improving

Results 826 - 850 of 892Sort Results By: Published Date | Title | Company Name
Published By: SAP     Published Date: Jun 18, 2009
Examine the importance of improving visibility into asset performance - and review four activities that can form the basis for getting more out of the assets in your portfolio to drive better decisions in allocating scarce capital to new asset investments.
Tags : 
sap, asset visibility, asset management, performance, asug
    
SAP
Published By: SAP Inc.     Published Date: Jun 16, 2009
Innovation is no stranger to the information technology function. Armed with increasingly sophisticated applications, IT-led teams have consistently found new ways to streamline enterprise business processes, vastly improving operating efficiency and reducing costs. Corporate leaders, however, are raising the bar: they expect IT’s core mission to expand from cost-cutting to enabling revenue generation within a short period of time.
Tags : 
sap, new mandate for it, global technology forum, capgemini, cisco systems, deploying information technology, enterprise applications
    
SAP Inc.
Published By: SAP Inc.     Published Date: Jun 16, 2009
Improving your call center may be more easily attainable — and more important — now than ever before. Recognizing that customer interaction is an important differentiator, organizations can increase the focus on their customers’ experience while keeping a firm grip on costs by leveraging the full potential of state-of-the-art technology.
Tags : 
customer service, customer satisfaction, customer retention, retention, loyalty, crm, customer, client, customer interaction, sap, enterprise applications
    
SAP Inc.
Published By: Safari Books Online     Published Date: Jun 08, 2009
This white paper outlines some of the most salient challenges and demonstrates how technology managers can enable their development teams to streamline application development and troubleshooting, while keeping them current on emerging technology, new product versions, and changing market trends-allowing them to move right past the gotchas.
Tags : 
safari books, technology, development, streamline, product, branding, market trends, design, needs, developer, challenges, target, critical data, ruby, software development, it management
    
Safari Books Online
Published By: Safari Books     Published Date: Jun 08, 2009
ITIL Version 3 Best Practices has expanded the concept of IT service delivery from day-to-day operations of those services to the Service Lifecycle. ITIL Version 3 Best Practices includes five lifecycle phases (each with its own guidebook): Strategy, Design, Transition (which covers implementation and change), Operations and Continual Improvement.
Tags : 
safari books online, government, it service management, itil, version 3, best practices, strategy, design, transition, maintenance, office of management and budget, omb, sox, sarbanes-oxley, it operations, service strategy, service design, service level management, slm, operational level agreements
    
Safari Books
Published By: Safari Books     Published Date: Jun 08, 2009
IT and business leaders today can no longer look at IT simply as a cost center, it is now a vital part of business success. Improving the efficiency of IT and improving the measurement of its impact on business performance are at the forefront of managers' concerns. Access to ITIL books can be instrumental in providing the methodology for IT improvement. Learn more today!
Tags : 
safari books online, government, it service management, itil, version 3, best practices, strategy, design, transition, maintenance, office of management and budget, omb, sox, sarbanes-oxley, it operations, service strategy, service design, service level management, slm, operational level agreements
    
Safari Books
Published By: Business.com     Published Date: Jun 03, 2009
Learn the 9 keys to improving the quality of your leads from your B2B search marketing efforts - simply and effectively - with this Business.com whitepaper. Download to learn more today!
Tags : 
business.com, b2b, search marketing, b2c, toolkit, key relevance, jumpfly, sales cycle, ignite, sales, product, service, pdf, rational, enquiro, search solutions, target audience, seo, search engine, keyword
    
Business.com
Published By: Business.com     Published Date: Jun 03, 2009
Download B2B search marketing tips from over 140 top B2B search marketing agencies and the experts at Business.com. This whitepaper offers key insights and tips to help B2B marketing professionals quickly deliver better search marketing ROI.
Tags : 
business.com, b2b, search marketing, b2c, toolkit, key relevance, jumpfly, sales cycle, ignite, sales, product, service, pdf, rational, enquiro, search solutions, target audience, seo, search engine, keyword
    
Business.com
Published By: VeriSign Incorp.     Published Date: May 08, 2009
Web Application Threats Are Evolving. Are Your Security Efforts Keeping Pace? Today, Web application security threats are not only becoming more abundant than ever, but also more difficult to detect, and more complex to solve. Many organizations are responding to these unique vulnerabilities with traditional network security approaches. However, sophisticated Web applications threats require a more sophisticated security strategy. What’s worked in the past won’t necessarily work today; and what’s more, Web application security requires a comprehensive solution, not simply a series of a la carte provisions. For detailed steps toward improving your Web application security strategy, download the VeriSign® Enterprise Security Services white paper, Best Practices That Improve Web Application Security.
Tags : 
verisign, web application security, sensitive data, intellectual property, business processes, operational costs, verisign enterprise security services, point-of-sale, pos, application-layer vulnerabilities, web 2.0, virtual servers, service oriented architecture (soa), lightweight technologies, insider threat, holistic control model, software development lifecycle, sdlc, wafs
    
VeriSign Incorp.
Published By: Epicor     Published Date: Apr 01, 2009
This white paper details how Web 2.0 technologies support business strategies by improving efficiency, productivity, and collaboration.
Tags : 
epicor, web 2.0 technologies, enterprise applications, epicor 9 solution, enhancing search results, rss
    
Epicor
Published By: SPSS, Inc.     Published Date: Mar 31, 2009
This paper describes why and how Enterprise Feedback Management (EFM) is a critical component in solving the problem of enhancing customer-driven innovation and improving the predictive capabilities of the IT organization.
Tags : 
predictive enterprise, spss, enterprise feedback management, efm, customer-driven innovation, crm, customer relationship management, customer experience, consumer behavior, actionable insight, centralized system, feedback programs, push orientation, lifecycle-based approach, customer retention, churn rate, compliance, internal r&d, behavioral data, descriptive data
    
SPSS, Inc.
Published By: Neolane, Inc.     Published Date: Mar 12, 2009
Enterprise marketing software is widely recognized as a key enabler for improving effectiveness and efficiency of marketing teams. However, for marketers who are already facing intense scrutiny over budgets and campaign effectiveness, few are willing to stick their necks out to recommend implementing a marketing automation system.
Tags : 
cmo, neolane, enterprise marketing software, return on investment, roi, customer experience, right deployment, on premise software solutions, total cost of ownership, tco, cross- channel marketing
    
Neolane, Inc.
Published By: Microsoft Visual Studio Team System     Published Date: Feb 25, 2009
ALM is much more than just writing code. All three aspects—governance, development, and operations are important. Maximizing the value of the applications we create means doing all three aspects of ALM well. Achieving this goal isn’t easy, especially when today’s ALM tools aren’t as well integrated as they could be. Yet there’s no way around it: Taking a broad, holistic view of ALM is essential for improving this critical business process.
Tags : 
vsts, alm, application lifecycle management, software development lifecycle, sdlc, governance, it management
    
Microsoft Visual Studio Team System
Published By: VMware     Published Date: Feb 20, 2009
According to the National Archives and Records Administration, 93 percent of companies that lost their data center for 10 days or more due to a disaster filed for bankruptcy within one year of the disaster. Don't let that happen to you, learn more today!
Tags : 
vmware, vmware virtualization, business continuity, it infrastructure, vmware esx platform, distributed resource scheduler, drs, recovery infrastructure, server failures, vmwarehigh availability, overloaded servers, vmware vmotion, rapid recovery, network and storage interface failures, affordable recovery, networking, security
    
VMware
Published By: Trend Micro SaaS     Published Date: Feb 20, 2009
Hosted, or "in-the-cloud", messaging security capabilities are becoming increasingly popular with organizations of all sizes. Some have already adopted hosted services, while others are becoming more receptive to the notion of using third party services to manage their security infrastructure than they were just a year ago. Particularly driven by the current economic recession, decision makers are realizing that hosted email security can provide a cost-effective solution while actually improving security.
Tags : 
saas, trend, trend micro, software as a service, on-premise, cloud, trendlabs, email security, security, interscan messaging, service level agreement, sla, virus, spam, phishing, distributed denial of service, ddos, filtering, worry free, security
    
Trend Micro SaaS
Published By: QuinStreet     Published Date: Feb 05, 2009
This white paper details how Web 2.0 technologies support business strategies by improving efficiency and productivity as well as harnessing knowledge through collaboration. They also reduce IT costs by simplifying integration and improving IT administration and maintenance.
Tags : 
quinstreet, web 2.0, social computing technologies, erp applications, enterprise applications, technology applications
    
QuinStreet
Published By: Cisco     Published Date: Jan 28, 2009
Whatever the size of your organization, a business-class network is within your reach. By understanding and taking some simple steps, you can implement a network infrastructure that provides your company with significant and substantive benefits. From empowering your employees to greatly improving customer service, networking technology can have a lasting impact on your business.
Tags : 
cisco, network, routing, operational efficiency, switches, lan, wan, vpn, virtual private network, network foundation, networking, infrastructure, local area networking, wide area networks
    
Cisco
Published By: Dell Storage     Published Date: Jan 16, 2009
Storage area networks (SAN) deliver consolidated storage and advanced storage management features. One advanced SAN configuration involves booting servers directly from the SAN, eliminating all locally attached storage, and improving server operations. Several server boot options are available. To select the right boot option for your environment, you should weigh the benefits and drawbacks of each.
Tags : 
dell, san, storage area networks, consolidated storage, storage management, san configuration, server operations
    
Dell Storage
Published By: Dell Storage     Published Date: Jan 16, 2009
Call it growth, scaling, or expansion – whatever you call it, increasing your storage resources often strikes fear and loathing in the heart of the IT administrator. It conjures up visions of downtime, extra management tasks, frustrated users, and working nights and weekends. In addition, since capacity and performance are intimately connected, increasing storage resources can require balancing changes that affects the entire the SAN.
Tags : 
dell, san, storage area networks, increasing storage resources, downtime, expanding storage
    
Dell Storage
Published By: SAP     Published Date: Jan 06, 2009
This paper offers concrete practices, processes, and recommendations to drive the ROI of a company's IT investment (ROIT) via key areas for improvement and the value of improvement.
Tags : 
sap, business transformation, enterprise applications, market leadership, business value, roi, roit
    
SAP
Published By: IBM     Published Date: Dec 30, 2008
Research giant Forrester estimates that on average, data repositories for large applications grow by fifty percent annually. However, up to half of all that data can be duplicate or otherwise unnecessary. With no end in sight for the increase of raw data (both structured and unstructured), organizations must be ever more strategic about where and how to store enterprise information. Meanwhile, a tightening economy is putting pressure on costs, just as compliance mandates call for greater visibility into processes and data. What to do? Register for this Web Seminar to learn the four pillars of strategic storage, and how they can be used to simultaneously reduce costs, while improving speed, accuracy and accountability. The four pillars will be discussed in detail, with real-world examples of each: deep compression, database archiving,de-duplication thin provisioning.
Tags : 
strategic storage, ibm, enterprise information, deep compression, database archiving, de-duplication, thin provisioning
    
IBM
Published By: Neolane, Inc.     Published Date: Dec 30, 2008
This study reveals astounding results about the strategic value of closed-loop marketing. Top performing organizations are improving message relevancy, conversion, and Return on Marketing Investments (ROMI) with closed-loop marketing practices and processes.  Learn what the best-in-class steps are required in achieving closed-loop marketing success.
Tags : 
neolane, closed-loop marketing, message relevancy, romi, return on marketing investments, closed loop, ian michiels, clm, marketing, convergence sales and marketing, integration, marketing technology, mom, web analytics, multi-variant, unica, aprimo, neolane, crm software, custom content
    
Neolane, Inc.
Published By: Neolane, Inc.     Published Date: Dec 30, 2008
The late 1990s marked AXA Bank’s foray into email marketing. For the first phase of this project, AXA Bank management decided to use a bulk email tool to push Web content to customers. However, this tool rapidly showed its limitations in terms of scalability and functionality. No personalization, tracking or reporting functionality was available, and many operations (such as list management) had to be performed outside the tool, by hand. Marketing teams also required constant IT support, especially as email volumes increased.  By 2002, ready for a more sophisticated approach, the bank sought to personalize and expand its online marketing to improve effectiveness.
Tags : 
email marketing, neolane, axa bank, personalizing online marketing, list management, crm software, custom content, deliverability, e-commerce, email marketing, emerging marketing, international marketing, lead generation, rich media
    
Neolane, Inc.
Published By: Citrix Online     Published Date: Dec 08, 2008
By 2011, IDC expects mobile workers to make up 73 percent of the total U.S. workforce. Whether mobile employees are out in the field or at home, sitting in a satellite office or constantly on the go within a corporate campus environment, they're going to need an effective way to stay connected and productive.
Tags : 
collaboration, mobile workforce, mobile workers, expense, travel, citrix online, productivity management, web conferencing, virtual employees, citrix, collaborative, productivity
    
Citrix Online
Published By: Network Automation     Published Date: Dec 02, 2008
Businesses today are under constant pressure to lower costs while improving overall operational efficiency. Enterprises of all sizes can reduce costs and improve business agility if they can automate various operational aspects of their IT and business processes.
Tags : 
network automation, automation, systems integration, networking, it management, network management, network performance management
    
Network Automation
Start   Previous    22 23 24 25 26 27 28 29 30 31 32 33 34 35 36    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.