Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

sam

Results 151 - 175 of 1103Sort Results By: Published Date | Title | Company Name
Published By: Symantec     Published Date: Oct 02, 2012
Whether you are an individual or a company, you should approach online security in the same way that you would approach physical security for your home or business.
Tags : 
ssl certificates, online security options
    
Symantec
Published By: Symantec Corporation     Published Date: Oct 03, 2013
Whether you are an individual or a company, you should approach online security in the same way that you would approach physical security for your home or business. Not only does it make you feel safer but it also protects people who visit your home, place of business, or website. It is important to understand the potential risks and then make sure you are fully protected against them. In the fast-paced world of technology, it is not always easy to stay abreast of the latest advancements. For this reason it is wise to partner with a reputable Internet security company. This guide will de-mystify the technology involved and give you the information you need to make the best decision when considering your online security options. For a glossary of terms, please see “Tech Talk Made Simple” at the end of this document.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: Zebra Technologies     Published Date: Sep 12, 2018
Labeling blood and other samples at the time they are collected improves patient safety and helps prevent a host of problems related to misidentification — including many of the estimated 160,900 adverse events that occur in U.S. hospitals annually because of sample identification errors.1 There is a strong and growing body of evidence within medical literature that creating specimen identification labels on demand at the patient bedside with a mobile printer can significantly reduce errors. The Joint Commission’s National Patient Safety Goals (NPSG) for 2010 advocate the use of two patient-specific identifiers, such as name and birthdate, whenever taking blood or other samples from a patient, and to label the sample collection container in the presence of the patient. Producing specimen labels at the patient bedside and encoding patient identification in a barcode satisfies both The Joint Commission’s NPSG and Health Insurance Portability and Accountability Act (HIPAA) requirements. T
Tags : 
    
Zebra Technologies
Published By: Akamai Technologies     Published Date: Jul 25, 2019
Das Customer Identity and Access Management (CIAM) spielt für Marken, die ihren anspruchsvollen Kunden ein nahtloses, sicheres digitales Erlebnis bieten wollen, eine immer größere Rolle. Als Teil des Identity and Access Management Playbook bietet Forrester Research Unterstützung beim Aufbau eines kundenorientierten IAM-Teams, das über die nötigen technischen Fähigkeiten, Geschäftspraktiken und zwischenmenschlichen Eigenschaften verfügt, um eine CIAM-Strategie zu entwerfen und sie über verschiedene Funktionsgruppen hinweg zu implementieren. Lesen Sie den vollständigen Bericht, um zu erfahren, was Sie bei der effektiven Gestaltung eines CIAM-Teams berücksichtigen sollten. Die Kernpunkte des Berichts: ? Vier wichtige Rollen für Ihr CIAM-Team ? Warum die gemeinsame Nutzung und Integration von Kundendaten über Unternehmensgrenzen hinweg entscheidend für den Erfolg ist ? Die wichtigsten technischen, geschäftlichen und zwischenmenschlichen Fähigkeiten, die die Mitglieder Ihres CIAM-Teams mit
Tags : 
    
Akamai Technologies
Published By: Centrify     Published Date: Sep 08, 2015
Adding Macs to a Microsoft-based corporate network can be a challenge. This paper will explore how Centrify can quickly and easily provide the necessary tools to allow Macs to be managed in the same way PCs are managed today.
Tags : 
device management, security management, mobility, application security, management solutions
    
Centrify
Published By: SambaSaftey     Published Date: Mar 15, 2019
What you don't know could hurt your bottom line Let’s begin with a question: Do you know who is behind the wheel? The reality is that for many enterprises with employees who drive as part of their job, the answer is, “I think so,” or maybe, “no.” Driver risk management has recently become a top issue for many organizations since it directly affects budgets and the bottom line. The fact that there are more than 100 million people driving for work-related activities on U.S. roads and many of them have invalid, suspended or no driver’s license at all should be cause enough for concern. But combining this with the facts that: • most organizations’ budgets are at best flat • P&C insurance rates are rising 14% every 2 years • 90% of crashes are due to human error • there are fewer qualified drivers available today • the number of lawsuits around negligence are skyrocketing • and it becomes clear that understanding exposure to driver risk is imperative for every organization. So what do
Tags : 
    
SambaSaftey
Published By: BlueHornet     Published Date: Apr 12, 2010
Every popular email client will display HTML content sent in email. However, not every email client has a "web standards" compliant HTML rendering engine. Therefore, the same email may render differently across different email clients. This whitepaper offers practical solutions to help designers, coders, and non-designers alike build a successful email that will render well across all email platforms.
Tags : 
bluehornet, html email rendering, email platforms, best practices, css, coding
    
BlueHornet
Published By: Hewlett Packard Enterprise     Published Date: Oct 23, 2017
Midsized firms operate in the same hypercompetitive, digital environment as large enterprises—but with fewer technical and budget resources to draw from. That’s why it is essential for IT leaders to leverage best-practice processes and models that can help them support strategic business goals such as agility, innovation, speed-tomarket, and always-on business operations. A hybrid IT implementation can provide the infrastructure flexibility to support the next generation of high-performance, data-intensive applications. A hybrid foundation can also facilitate new, collaborative processes that bring together IT and business stakeholders.
Tags : 
digital environment, hyper competitive, business goals, hybrid it, technology, hpe
    
Hewlett Packard Enterprise
Published By: Kenexa     Published Date: Aug 30, 2011
White paper examining the importance of accurately written job descriptions and how they affect an organization with some practical steps to writing effective job descriptions.
Tags : 
kenexa, writing job descriptions, competencies, competency, job role, position descriptions, sample job descriptions, guideline for writing job descriptions, job description templates, job requirements, job qualifications, job worth hierarchy, job analysis, job evaluation, job description outline, performance management
    
Kenexa
Published By: Quest Software     Published Date: Apr 19, 2012
In this Quest white paper, discover best practices for a successful post-migration operation. See why you MUST have the same level of post-migration planning that you had for pre-migration, and learn four key aspects of post-migration management.
Tags : 
scriptlogic, quest, desktop authority, best practices, post-migration, operation, pre-migration, security, enterprise applications
    
Quest Software
Published By: BlueHornet     Published Date: Jun 06, 2008
Applying opt-in email marketing strategies and best practices to transactional emails can be a win-win for customers and marketers. But the two types of communications are not the same. This white paper is written to help email marketers and online retailers understand: What sets transactional emails apart from commercial messages; how they must comply with all federal regulations; and where to take advantage of opportunities to optimize their transactional email program.
Tags : 
email marketing, email messaging, blue hornet, bluehornet
    
BlueHornet
Published By: VMware AirWatch     Published Date: Nov 12, 2015
Es ist noch nicht einmal ein Jahr her, dass analytische Prognosen für den Bereich Mobile Device Management (MDM) nichts Gutes verhießen. Auf einer Veranstaltung im Jahr 2013 verkündete ein Ausschuss von Analysten, dass das BYOD-Phänomen (Bring Your Own Device) zu stark herabgesetzten Preisen führen würde, was wiederum Umsatzeinbußen und schlussendlich den Untergang der gesamten Branche zur Folge haben könnte. "Die Mobile Device Management-Branche befindet sich in einem chaotischen Zustand und ich denke, dieser Markt wird untergehen“, teilte Gartner-Analyst John Girard (laut Bericht von CRN.com) dem Publikum mit. Girard prognostizierte einen Trend zum Management auf Anwendungsebene, verursacht durch das BYOD-Phänomen und die ablehnende Haltung von Mitarbeitern gegenüber dem Management ihrer persönlichen Geräte.
Tags : 
mdm, containerization, security, enterprise mobility, enterprise applications
    
VMware AirWatch
Published By: Act-On     Published Date: Aug 28, 2012
You'll improve your marketing results when you target your messaging to segments, rather than blasting the same campaign out to all your prospects. Learn how to segment your prospects into groups with shared needs and concerns.
Tags : 
customer engagement, segmentation, online marketing, segmenting prospects, dynamic content, dynamic segmentation
    
Act-On
Published By: Salesforce     Published Date: Dec 02, 2015
When Salesforce CEO Marc Benioff co-founded the cloud computing company back in 1999, one of the first things he did was define his management process. As he shares in his book Beyond the Cloud, Benioff wanted to put into words what his focus was and then clearly communicate it to the rest of the business. The result was the V2MOM (pronounced “V2 mom”), an acronym that stands for vision, values, methods, obstacles, and measures. Benioff says this system has helped keep everyone at the fast-growing company on the same page over the years. Below are the basic steps of Benioff’s V2MOM system. You can use them to start defining your management process.
Tags : 
    
Salesforce
Published By: Citrix Systems     Published Date: Jan 29, 2013
This paper provides IT executives with guidance to develop a complete BYOD strategy which gives people optimal freedom of choice while helping IT adapt to consumerization - at the same time addressing requirements for security, simplicity and more.
Tags : 
ipad, android, tablet, mobility, byo, smartphone, citrix, data center
    
Citrix Systems
Published By: Thismoment     Published Date: Oct 08, 2014
Content marketing has changed the landscape of brand marketing and digital advertising, so why hasn’t it done the same for rep enablement across your sales and customer support channels? Here are our 4 tips on how to empower your sales reps with better, smarter, real-time, mobile content.
Tags : 
content marketing, content marketing tactics, best practices, rep enablement
    
Thismoment
Published By: NCM Fathom     Published Date: Dec 09, 2011
Content is king online and on screen, right? Then the same must be true for in-person gatherings. Attendance is the key element to a successful event. Read this great guide to getting people to your event.
Tags : 
ncm fathom, business events, attendance, events
    
NCM Fathom
Published By: BlackBerry     Published Date: Apr 13, 2010
The BlackBerry Enterprise Server Express is designed to be a secure, centralized link between an organization's wireless network, communications software, applications, and BlackBerry devices. The BlackBerry Enterprise Server Express integrates with your organization's existing infrastructure, which can include messaging software, calendar and contact information, wireless Internet and intranet access, and custom applications, to provide BlackBerry device users with mobile access to your organization's resources. You can install the BlackBerry Enterprise Server Express on the same server as Microsoft Exchange or Windows Small Business Server, or you can install the BlackBerry Enterprise Server Express on a separate server.
Tags : 
blackberry, server express, microsoft exchange, v5.0.1, administration guide, mobile applications, cio, pim, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: BlackLine     Published Date: Aug 06, 2018
The biotechnology and pharmaceutical industry is among the most heavily regulated industries in the world, challenged by evolving regulations, complex compliance requirements and close regulatory scrutiny. At the same time, companies must address the market pressures of globalization, the use of predictive data analytics and digital technologies, and the industry’s ongoing consolidation. In this challenging environment, confidence in internal controls is crucial.
Tags : 
    
BlackLine
Published By: Quocirca     Published Date: Nov 09, 2006
This paper looks at the particular challenges in public sector IT – the need to find efficiency savings at the same time as offering better service to citizens – and discusses the particular circumstances in which blade computing will be right for the public sector IT manager.
Tags : 
blade, blade server, blade servers, government, citizen, constituents, server selection, server implementation, service management, quocirca, infrastructure, server hardware, servers, power and cooling
    
Quocirca
Published By: ThreatMetrix     Published Date: Jan 21, 2009
This white paper highlights a surprising new approach to fraud prevention: remotely recognizing a fraudster’s PC (or other device). Even with identity (password/credit card) theft, the device stays the same!
Tags : 
threatmetrix, online fraudsters, identity thieves, fraud prevention, device intelligence
    
ThreatMetrix
Published By: ThreatMetrix.     Published Date: Jan 30, 2009
This white paper highlights a surprising new approach to fraud prevention: remotely recognizing a fraudster’s PC (or other device). Even with identity (password/credit card) theft, the device stays the same!
Tags : 
threatmetrix, online fraudsters, identity thieves, fraud prevention, device intelligence, security
    
ThreatMetrix.
Published By: Bluecore     Published Date: Sep 27, 2018
Review a sampling of behavioral and catalog triggers as well as personalized batch sends used by a variety of retailers during the holiday season.
Tags : 
bluecore, email marketing, holiday shopping, holiday season
    
Bluecore
Published By: Bluecore     Published Date: Dec 14, 2018
A sampling of marketing campaigns launched by our retail customers that showcase the variety of ways you can engage consumers to create a truly relevant shopping experience.
Tags : 
    
Bluecore
Published By: NCM Fathom     Published Date: Feb 23, 2010
The same elements of powerful storytelling that captivate us in our everyday lives can benefit companies and their brands. NCM Fathom's white paper explores how businesses can tell their story to engage audiences, build brand preference and loyalty and deliver results that meet objectives. Bold companies like Kleenex and Siemens have shared their brand's story with customers and employees in cinemas nationwide. Download the white paper to learn more.
Tags : 
ncm, fathom, revenue, branding, advertising, ad management, digital cinema network
    
NCM Fathom
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.