RSS feed Get our RSS feed

News by Topic

act

Results 13326 - 13350 of 14600Sort Results By: Published Date | Title | Company Name
By: SDL Web Content Management Solutions     Published Date: Jan 22, 2010
This paper examines the ways in which organizations can tap into Web 2.0 interaction as part of the marketing strategy and tactics to create customer engagement by matching your visitors' passion and to figure out the "best fit" for the new opportunities that present themselves.
Tags : sdl tridion, a/b, crm, ecm, web 2.0, social networks, dam, wcm
     SDL Web Content Management Solutions
By: SAP     Published Date: Jan 21, 2010
The goal of this article will be to contribute to the emerging dialog on the subject of business value by extrapolating from BI lessons learned and from DecisionPath Consultings experience working with Fortune 1000 customers and Government agencies.
Tags : sap, business intelligence, data warehousing, enterprise application, erp, scm, crm, manufacturing
     SAP
By: Tripwire     Published Date: Jan 20, 2010
Gene Kim, CTO of Tripwire, describes seven practical steps owners and operators of the bulk power system can take to meet the mandatory IT configuration requirements set forth in the NERC-CIP standards. These steps help owners and operators avoid costly penalties for non-compliance while also protecting the Critical Cyber Assets that control or affect the reliability of North America's bulk electric power system.
Tags : tripwire, gene kim, nerc compliance, critical infrastructure protection, cip, cyber security standards, nerc-cip standard, information security
     Tripwire
By: Unica Corporation     Published Date: Jan 19, 2010
Most web analytics solutions were initially architected to generate reports using only aggregate data. Next generation web analytics solutions use both aggregate and individual level data to achieve interactive marketing success. This free interactive infographic, includes live links that will guide you through a valuable framework for web analysis and gives insight into your overall website performance and visitors' behaviors. Learn how to optimize your visitors' website experiences and turn those experiences into actions.
Tags : interactive web analytics map, next generation web analytics, website optimization, multi-channel analytics, aggregate level analytics, individual level analytics, website performance, behaviorial targeting
     Unica Corporation
By: Cornerstone OnDemand     Published Date: Jan 13, 2010
In this research bulletin, we will outline the approach HR organizations must take to identify, cost-justify, develop and implement the highest impact talent management strategy.
Tags : cornerstone ondemand, talent planning, human resource, workforce, recruiting, performance management, learning and development, roi
     Cornerstone OnDemand
By: MoreVisibility     Published Date: Jan 11, 2010
This recorded webinar is ideal for marketers who want to boost their natural ranking on Google, and covers: Google Webmaster Tools, Google Site Map / External Site Maps, Content / Keyword Targeting, Leveraging Additional Google Channels, Tracking Results / Analytics and many more!
Tags : google, webmaster, keyword targeting, webinar, morevisibility, seo, targeting, rankings
     MoreVisibility
By: Net Atlantic     Published Date: Jan 08, 2010
Email Marketing Best Practices
Tags : webinar
     Net Atlantic
By: Lumension     Published Date: Jan 08, 2010
The use of portable devices can also potentially infect public systems with malware, inadvertently expose classified information and citizens' personally identifiable information, and otherwise breach the public's trust. Learn how to prevent this breach.
Tags : usb, flash drive, mobile security, pii, personal information, malware, government information security
     Lumension
By: IGLOO Software     Published Date: Jan 07, 2010
This case study describes how the MIN facilitates local and international transactions, establishes vital business connections and provides a knowledge exchange for sharing information, ideas and expertise.
Tags : igloo software, manufacturing innovation network, knowledge sharing, content management, online manufacturing, supplier networking, social networking, e-commerce
     IGLOO Software
By: NetApp     Published Date: Jan 07, 2010
NetApp best practices cover important new features of Microsoft® HyperV™ as well as lessons learned from numerous deployments. Learn how to configure networks, set appropriate iGroups and LUN types, avoid alignment problems, and configure CSVs.
Tags : netapp, microsoft hyper-v virtualization, configure network, deployment, igroups, lun, tech ontap, storage
     NetApp
By: Neustar Webmetrics Services     Published Date: Jan 06, 2010
Internal testing only allows you to see potential issues from within your own controlled environment, and does not test for the countless different scenarios in which a customer could be accessing your site. Find out the benefits of external load testing.
Tags : webmetrics neustar, external load testing, global load testing, bandwidth, transaction speed
     Neustar Webmetrics Services
By: IBM     Published Date: Jan 05, 2010
Find out where you stand on the path to PCI compliance with our checklist of the"digital dozen" requirements.
Tags : ibm mmdg, credit card security, pci compliance, secure network, cardholder data
     IBM
By: Compendium Blogware     Published Date: Jan 05, 2010
Compendium has the answers and is ready to share. Two significant online trends are directly impacting the present and future of Business-to-Business Marketing, and you'll want to find out how organizational blogging can dramatically impact search engine results and serve as an entry into the world of social media.
Tags : compendium, blogging, blogware, corporate blog, business to business marketing, website development, leads, social media
     Compendium Blogware
By: SAP     Published Date: Jan 04, 2010
There is growing evidence that more pervasive BI and analytics have a direct impact on competitiveness. Better decision making is more important when resources become restricted during a recession, so BI and analytics projects will still appeal to management. However, justifying large capital outlays for software will be challenging unless short-term benefits can be directly correlated with the investment.
Tags : sap, data mart, business intelligence, analytics, business objects, supply chain, compliance, safety
     SAP
By: Numara Software     Published Date: Jan 04, 2010
This white paper moves beyond the hype of green IT and provides substantial support for implementing practical, yet cost effective power management policies and tools to "green" your IT environment and boost your bottom line.
Tags : numara, green it, energy efficient, green policies, power management, energy consumption, power, cooling
     Numara Software
By: NetApp     Published Date: Jan 01, 2010
This report examines the impact that virtualization has on data protection and disaster recovery and the need for highly virtualized servers and storage within this context.
Tags : netapp, data protection, virtualization deployments, disaster recovery, networked storage, backup
     NetApp
By: SAP     Published Date: Dec 31, 2009
Many US companies find themselves acting like Wait-and-See, Inc. They interpret the switch from US Generally Accepted Accounting Principles (GAAP) to IFRS as a matter of compliance rather than an opportunity to become more globally competitive by improving key internal processes.
Tags : sap, business intelligence, sap businessobjects, explorer, gaap, ifrs, xbrl
     SAP
By: Tripwire     Published Date: Dec 16, 2009
This Prescriptive Guide outlines the steps information security managers can take to break the compliance blame cycle and build an information security program that works. It also describes how they can achieve alignment among all stakeholders so that information security and compliance activities become integrated into daily business operations.
Tags : tripwire, information security, audit fatigue, compliance, security risk
     Tripwire
By: Ounce Labs, an IBM Company     Published Date: Dec 15, 2009
Today, when you make decisions about information technology (IT) security priorities, you must often strike a careful balance between business risk, impact, and likelihood of incidents, and the costs of prevention or cleanup. Historically, the most well-understood variable in this equation was the methods that hackers used to disrupt or invade the system.
Tags : ounce labs, it securitym it risk, software applications, pci dss, hipaa, glba, data security, source code vulnerabilities
     Ounce Labs, an IBM Company
By: SAP     Published Date: Dec 14, 2009
Consider how you can gain control of cost structures by taking systematic steps to improve operational efficiency. By using efficient, automated processes, you can reduce waste, unnecessary overtime, and other cost factors. Integrated business software systems put this efficiency overhaul within reach, quickly, and affordably.
Tags : sap, efficiency, infrastructure, capital, structure, integration, automation, erp
     SAP
By: IBM ILOG.     Published Date: Dec 11, 2009
Learn how WebSphere ILOG Business Rules Management System (BRMS) allows organizations to easily adapt business rules while ensuring compliance with policy requirements and analyzing the business impact of changes against key performance indicators. You will see how the BRMS is used in the back office to create eligibility rules that will be used to automatically screen auto insurance applicants.
Tags : ibm ilog, brm, business rules management system, brms, websphere, test, simulate rules
     IBM ILOG.
By: McAfee     Published Date: Dec 09, 2009
Despite the six-year-old CAN-SPAM Act, spammers routinely abuse the law and continue to deliver their obnoxious email. One year ago, a major spam-hosting ISP was shut down, causing an impressive drop in botnet activity. Today, however, spam authors are more active and smarter than ever. Spammers love to tailor their messages to the news and the season. Read this report to gain a greater understanding of current spam threats.
Tags : mcafee, spam, risk management, vulnerability, can-spam, anti-spam, virus, botnet
     McAfee
By: Net Atlantic     Published Date: Dec 08, 2009
How to Keep Compliant, Avoid Mistakes, and Manage a Healthy Member List. Net Atlantic's whitepaper, "Email Compliance & Best Practices for Healthcare" helps healthcare providers and healthcare product and service vendors understand email communications compliance issues. It illustrates how CAN-SPAM forms the foundation of compliance, and also explains why healthcare organizations have to go beyond CAN-SPAM to sustain a truly effective email communications strategy. Healthcare users of email for communications should know how to use these best practices before building their email campaigns.
Tags : net atlantic, email compliance, spam, can-spam, healthcare, members, hmtl messages, email marketing
     Net Atlantic
By: Gomez IT     Published Date: Dec 04, 2009
Any business considering cloud computing to support its customer-facing Web applications must look beyond the cloud's cost savings and scalability and evaluate how cloud adoption will impact the end-user experience. This whitepaper addresses the Web experience challenges companies must address when adopting the cloud. It offers perspective and best practices to achieve world class Web performance and assist in the evaluation of cloud providers and development of cloud performance SLAs.
Tags : gomez, web performance, site performance, ecommerce, online shopping, web performance, usability, e-commerce solutions
     Gomez IT
By: Extensis     Published Date: Dec 03, 2009
A straightforward guide to defining an efficient workflow, creating catalogs, organizing your files and more.
Tags : extensis, dam, digital asset management, workflow, efficient work, metadata, digital asset management'
     Extensis
Start   Previous    527 528 529 530 531 532 533 534 535 536 537 538 539 540 541    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics