RSS feed Get our RSS feed

News by Topic

act

Results 13701 - 13725 of 14370Sort Results By: Published Date | Title | Company Name
By: Microsoft Office SharePoint Server     Published Date: Nov 07, 2008
Until recently, St. Vincent Heart Center used an HTML-based intranet to disseminate various types of information to its 470 employees and 200 contract workers. But information on that system wasn’t easy to find. Microsoft® Office SharePoint® Server 2007 offers the organization easy access to information—and it enhances productivity and supports increased security for confidential information. Read more about the benefits.
Tags : microsoft office, sharepoint server, hp proliant
     Microsoft Office SharePoint Server
By: Demand Metric     Published Date: Nov 06, 2008
Lead Generation is the top priority for marketing directors in 2009. More importantly, marketers are being charged with defending their budgets and demonstrating real ROI for their marketing programs. Use this How-To Guide to learn how other world-class companies are developing lead generation infrastructures that automate key processes, measure results, and provide a steady flow of qualified leads their sales organizations.
Tags : demand metric, lead generation, lead generation & automation
     Demand Metric
By: Progress Software BTA Financial     Published Date: Nov 04, 2008
The right software for managing critical applications can actually optimize your business results. Consider this... your critical applications are those that are vital to increasing revenue or productivity. In other words, they execute your key business transactions and are key business assets that support revenue generation, productivity, and customer satisfaction.
Tags : progress actional buyers guide, business critical applications, manage critical applications, manage business applications, managing mission critical applications, managing business applications, mission critical applications, progress software
     Progress Software BTA Financial
By: Progress Software BTA Telecommunications     Published Date: Nov 04, 2008
The right software for managing critical applications can actually optimize your business results. Consider this... your critical applications are those that are vital to increasing revenue or productivity. In other words, they execute your key business transactions and are key business assets that support revenue generation, productivity, and customer satisfaction.
Tags : progress actional buyers guide, business critical applications, manage critical applications, manage business applications, managing mission critical applications, managing business applications, mission critical applications, progress software
     Progress Software BTA Telecommunications
By: Diskeeper Corporation     Published Date: Oct 30, 2008
Virtualization does have its dangers, as it incurs greater stress on physical resources. While under utilization of CPU may be a driving factor to virtualize servers, other hardware resources may become overtaxed. Given that a host system has limited ability (depends on application) to page memory used by the guest systems, the most recognized bottleneck to address is physical memory (RAM). Options to programmatically alleviate memory bottlenecks incur performance issues when the disk is re-introduced. Another major component and perhaps less acknowledged is the disk subsystem. In many cases, depending the purpose and application of the guest/virtual systems, the disk bottleneck will be the most significant barrier to performance. Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4
Tags : diskeeper corporation, virtualize servers, virtualizations, divergence, convergence, storage
     Diskeeper Corporation
By: Quocirca     Published Date: Oct 29, 2008
Outsourcing is a strategy increasingly being used by organizations to reduce costs and increase value. Outsourcing, however, has its risks. As organizations look to push out more of their custom software application development needs to outsourcing partners, careful planning is required in terms of building stringent software security requirements into contracts and creating a process and metrics to ensure that those requirements are met. This report examines outsourcing practices from 200 of the largest organizations in the UK and the US and provides pointers as to how the most experienced outsourcers are putting in place effective processes to drive the risk out of outsourcing.
Tags : quocirca, outsourcing, security
     Quocirca
By: TRUSTe     Published Date: Oct 28, 2008
See how Cheapflights improved lead quality while gathering over one million opt-in newsletter registrations and increasing monthly site registrations by 26%.
Tags : truste, cheapflights, email privacy, opt-in, newsletter, bounce rates, privacy policy, truste
     TRUSTe
By: Godfrey     Published Date: Oct 24, 2008
B-to-B Strategic Search has been created by Godfrey to provide the customer-centric, content-driven approach needed for successful business-to-business search performance. It uses all available tools to help B-to-B marketers achieve a presence in the search results of users who are looking for their technology or product. It thus includes both search engine optimization (SEO), the practice of modifying your site to improve organic search results, and search engine marketing (SEM), or paid search.
Tags : godfrey, search, b-to-b search, b-to-b strategic search, business-to-business search, search engine optimization, seo, search engine marketing
     Godfrey
By: Godfrey     Published Date: Oct 24, 2008
Direct marketing has always played a role in B2B marketing programs. But new technologies and audience dynamics are inspiring fresh ways to use strategic, actively-managed and highly-agile database marketing to bring new results. Being successful simply requires a different way of thinking.
Tags : godfrey, b2b direct marketing, management thinking, marketer’s thinking, editor’s thinking, web strategist’s thinking
     Godfrey
By: Godfrey     Published Date: Oct 24, 2008
Recently, however, the explosive growth of online media has changed the PR game, creating a deeper, richer two-way communication between a marketer and its target audiences. Now, marketers can use social media strategies and tactics to engage their audiences directly. Those tactics include press release optimization, online media monitoring and reporting, social media press releases, RSS feeds, blogs, podcasts, webcasts and a host of other emerging technologies.
Tags : godfrey, convergent, public relations, business-to-business, traditional pr, media relations, press kits, trade show support
     Godfrey
By: Godfrey     Published Date: Oct 24, 2008
 Recently, however, the explosive growth of online media has changed the PR game, creating a deeper, richer two-way communication between a marketer and its target audiences. Now, marketers can use social media strategies and tactics to engage their audiences directly. Those tactics include press release optimization, online media monitoring and reporting, social media press releases, RSS feeds, blogs, podcasts, webcasts and a host of other emerging technologies.
Tags : godfrey, b-to-b search, search, search engine optimization, seo, search engine marketing, sem, keywords
     Godfrey
By: Godfrey     Published Date: Oct 24, 2008
With the constantly-changing media landscape and the growing demand for media communication via 2.0 channels, you need to reconsider both your news and the vendor partners on whom you rely to distribute it. It could mean the difference between a purposeful, engaging and long interactive life for even the "smallest" news item, and a costly yet low-impact news distribution program that saps valuable resources. This white paper tells you some key considerations to help guide your selection process.
Tags : godfrey, white paper, b to b, business to business, 2.0, vendor, analytics, brand management
     Godfrey
By: HP - Enterprise     Published Date: Oct 23, 2008
Fortify's report summarizes electronic as well as traditional methods of voting including absentee ballots.  This voting guide will provide recommendations for voters who want to make sure their vote counts and for federal and state governments on how to devise efficient and accurate voting processes and systems.
Tags : fortify, application security, security risks, voting, fortify, fortify software, election process, local government
     HP - Enterprise
By: Dell     Published Date: Oct 23, 2008
ITIL has proven to be a veritable blueprint for repeatable best practices in the data center. Windows Vista migration features provide support for ITIL fundamental operations, as you’ll hear about in this informative podcast with Dell ITIL expert Don Bui.
Tags : dell, itil fundamental operations, itil vista migration, windows vista migration
     Dell
By: Dell     Published Date: Oct 23, 2008
The Dell Deployment Optimization Calculator is a TCO tool designed to analyze current PC deployment practices, make recommendations and quantify the value of improving practices.
Tags : dell, deployment optimization calculator, deployment assessment, deployment optimization practices
     Dell
By: Waymedia     Published Date: Oct 23, 2008
Millions of  handsets are sold around the world daily. Handsets are by far the preferred platform of communication there is.  People spend more time using their mobile phones than any other device or gadget, and they pay special attention to everything stored in those handsets. In a few words:  If brands want to have a presence in their consumers’ environment, and if they want their message to be heard and seen, then they imperatively need to put some value content on users mobile phones. Mobile marketing is typically understood as SMS Marketing, which is managed from a distant point and it impacts the user at random times.
Tags : waymedia, mobile marketing, sms, interactive marketing
     Waymedia
By: Dell     Published Date: Oct 21, 2008
Practicing good image management is important in any customer's OS environment, but it comes even more into focus as companies prepare for a migration to Windows Vista.
Tags : dell, image management, company image for vista migration., security
     Dell
By: SyberWorks     Published Date: Oct 21, 2008
The e-Learning industry has grown tremendously since the early days of computers and the Internet. Today there are lots of products and services out in the market place from which to choose. This white paper will provide some basic information to help you as you begin your research into e-Learning and learning management systems. The document is not meant to be the complete source of information on e-Learning nor will these guidelines be suitable for every single situation. This white paper has been created as a learning aid help you get started. These findings represent the research, experience, and techniques gleaned from working in e-Learning since its infancy in the late 80’s to today. At the end of the paper, Bob Goldschneider, Director of Business Development at SyberWorks, Inc., will provide a summary and closing remarks.
Tags : syberworks, e-learning, internet, aicc, scorm, learning management systems, learning management system, e-learning
     SyberWorks
By: SyberWorks     Published Date: Oct 21, 2008
In most cases, the biggest quandary an organization must solve is to put together a rational, i.e., a cost justified, business case why they should spend capital to invest in a learning management system. The focus of this white paper will outline the benefits of web-based training along with a practical framework for developing ROI when looking at the cost of traditional training methods verses e-Learning.
Tags : syberworks, e-learning, roi, global workforce, just-in-time learning, learning management systems, learning management system, e-learning
     SyberWorks
By: LeadLife Solutions     Published Date: Oct 20, 2008
Being first in mind with leads, prospects, and customers means maximizing your sales and marketing resources and your revenue. Many of us think that interacting early with a lead is enough. But the reality is nurturing leads can create more sales than the initial lead generation itself. It's also about nurturing your customer base. Being first in mind has a tremendous impact on business...
Tags : leadlife solutions, demand generation, revenue retention, lead generation & automation
     LeadLife Solutions
By: LeadLife Solutions     Published Date: Oct 20, 2008
If your sales team loves your ABC lead-ranking system because it really works, good for you. However, if your Hot-Warm-Whatever system is leaving the sales team cold, there is a better way. A robust database and campaign management application helps marketing score every interaction by every lead, online and offline, and prioritize leads automatically for appropriate next steps...
Tags : leadlife solutions, e-newsletter, blog, telemarketing, trade show, direct mail, webinar, lead generation & automation
     LeadLife Solutions
By: Dell     Published Date: Oct 20, 2008
Dell has improved PC deployment activities through patent-pending automation technology and offers an array of services from planning a Windows Vista migration to post-deployment management.
Tags : dell, deploying vista, dell deployment framework, dell deployment model, deployment automation toolset, optimized deployment, security
     Dell
By: Dell     Published Date: Oct 20, 2008
Dell can help corporations to properly dispose of old PCs in a secure and cost-effective manner that is also environmentally friendly.
Tags : dell, hardware asset recovery, safe hardware disposal, asset recovery, environmental liability, dell asset recovery services, security
     Dell
By: Dell     Published Date: Oct 20, 2008
Windows Vista includes deployment tools that help you manage your migration. Dell Services extends the reach of those tools with time-saving automated deployments based on best practices.
Tags : dell, automated deployment, deployment tools, dell deployment services, vista deployment enhancements
     Dell
By: Lumension     Published Date: Oct 17, 2008
Vulnerability management can be a powerful means toward reducing the threat surface within an enterprise IT environment. But because vulnerability management technology has been around in some form or another for so long there has been plenty of time for the din of marketing-speak from various vendors to confuse users about the true nature of vulnerability management tools and practices.
Tags : lumension, it environment
     Lumension
Start   Previous    542 543 544 545 546 547 548 549 550 551 552 553 554 555 556    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics