RSS feed Get our RSS feed

News by Topic

business

Results 101 - 125 of 14341Sort Results By: Published Date | Title | Company Name
By: CDW     Published Date: Dec 23, 2014
Learn the 10 reasons why the server you choose matters and how to take advantage of a decade’s worth of technology advances in order to keep up with today’s most successful businesses.
Tags : cdw, data, windows, server, infrastructure, technology, operations, compatibility
     CDW
By: Riverbed     Published Date: Jan 28, 2014
Riverbed Cascade provides enterprise-wide network and application visibility with a full set of application-centric, site-centric, and business-centric views. While Cascade can coexist or integrate with a variety of other IT management solutions, it will likely become your first line of defense against application performance problems.
Tags : application performance management, application performance monitoring, big data apm, network performance management, network performance monitoring, network performance troubleshooting
     Riverbed
By: Coupa Software     Published Date: Sep 19, 2012
Strengthen your business from the inside out by taking control of operational expenditures. Download this white paper now and learn the secret strategies to staying recession-proof.
Tags : spending, inventory management, financial stability, business solutions
     Coupa Software
By: Mimecast     Published Date: Nov 28, 2017
With the pending EU General Data Protection Regulation (GDPR), your organization must consider a wide variety of changes for compliance if you hold EU resident data. Your organization should look at GDPR as an opportunity to modernize storage, compliance and security needs. But what services should be considered? Download to learn more including: • How the right providers can help you build a business case for GDPR compliance • Ways providers can directly aid in the compliance process • Why the right tools can help with not just technology but process changes as well
Tags : software provider, cloud service provider, gdpr
     Mimecast
By: TrendKite     Published Date: Apr 25, 2018
This informative whitepaper that will help shape your PR decision making. Stats include: 43% of web traffic is driven by search engines 7 in 10 executives reported being more inclined to do business through organizations that are thought leaders Influencer campaigns did not exist 5 years ago...now brands swear by them Download now to learn more!
Tags : pr strategy, marketing, digital age
     TrendKite
By: Tippit, CRM     Published Date: May 15, 2009
CRM has proven its ability to enhance business performance time and time again. However, the path to eff ective implementation is not always easy — complexities often arise as a result of trying to align an entire company behind the concept. You can fi nd the success that comes from leveraging customer knowledge to the fullest measure by following these 10 steps. Learn more today!
Tags : tippit, crm implementation, roi
     Tippit, CRM
By: Lola Travel Company     Published Date: Jan 24, 2019
A well-thought-out, easy-to-create and easy-to-enforce business travel policy will contribute to transparency, a cultural mecca in any organization. By fostering fairness, a mutually beneficial corporate travel policy provides company travelers with the freedom they desire, without sacrificing company governance and control. As an HR or Finance leader, you've answered countless repetitive questions about per diems, business class vs. economy class, and hotel restrictions. A formalized travel policy is not as hard to create as it may seem, and it will eliminate the stress for both you and your travelers. In this ebook, you will learn the 10 easy steps to take in order to create a win-win corporate travel policy that works for you and your team.
Tags : 
     Lola Travel Company
By: Riverbed     Published Date: Sep 05, 2014
If you work on a network operations team, you know how increasingly hard it is to understand and ensure application performance for your end users. You need visibility into areas where issues may occur – end-user devices, network and infrastructure – in order to identify and diagnose problems quickly and minimize downtime. But it hasn’t been easy to gain this level of visibility across the WAN or hybrid network without deploying additional probes, packet capture devices or remote site technicians. Blind spots are everywhere making it difficult to focus on managing and monitoring the applications that matter the most to your business. And when nearly 50% of a network’s traffic is web-based and it all looks the same to the network, identifying your important applications and staying ahead of their performance problem is more difficult than ever. That could mean inefficient troubleshooting, longer time to resolution, and an overall lack of application intelligence. Who wants that?
Tags : application, network, performance, nirvana, visibility, infrastructure
     Riverbed
By: Skillsoft     Published Date: Jun 25, 2015
This paper takes you step-by-step through the process of addressing your immediate problems, building alliances throughout your organization, and making a successful business case for a learning solution, including: • Analyzing your current processes and identifying your needs • Mapping out the various processes and training requirements • Calculating the financial impact of training • Making the case and managing the project
Tags : learning solution, business case, lms, development, learning management strategy
     Skillsoft
By: sumtotal     Published Date: Jul 08, 2014
This paper provides 10 steps for developing a successful business case for a learning solution.
Tags : sumtotal, lms, developing an lms business case, learning solution business case.
     sumtotal
By: SumTotal, a Skillsoft Company     Published Date: Aug 24, 2015
This paper takes you step-by-step through the process of addressing your immediate problems, building alliances throughout your organization, and making a successful business case for a learning solution.
Tags : learning solution, business case, lms, development, learning management strategy
     SumTotal, a Skillsoft Company
By: Clearswift     Published Date: Jun 09, 2008
Every enterprise has to find a balance between security and the ability to carry on conducting business freely. This short guide is about finding that balance. By following some basic principles, there's no reason you can't let legitimate business email move into, out of and within your enterprise while stopping the things that cause damage: viruses, spam, spyware, trojans, phishing, Denial of Service attacks, the loss of sensitive data and the collection of illegal, immoral and just plain offensive material.
Tags : e-mail security, guide, clearswift, clearswift
     Clearswift
By: F5 Networks     Published Date: Mar 18, 2015
The growing number of sophisticated attacks and countless attack vectors are increasingly difficult to mitigate. Download our 10 Steps to Mitigate a DDoS Attack in Real Time Infographic to help you address current attacks and learn how to build a solution that will help you mitigate risk, lower management costs, and stay protected in the future.
Tags : f5 networks, ddos, ip security, real time attack, data protection, secure business
     F5 Networks
By: Xero     Published Date: Feb 18, 2014
You're mobile and streamlined -- or trying to be both those things -- while you provide salient financial advice to your clients, who are mostly small businesses like you. As your job is moving from traditional accounting work to involve a lot of business growth and marketing.
Tags : online accounting, marketing, small business, smb, finances, cloud, cloud computing, mobile marketing
     Xero
By: Act-On     Published Date: Oct 09, 2015
LinkedIn has evolved into a powerful lead generation tool for many businesses. Its features, like Publisher and Groups, lend themselves well to connecting businesses with prospects. With so many great features, it can be quite challenging to figure out how to use the ones that best fit your needs. To help you navigate your way through LinkedIn, we’ve put together 10 things you should be doing today to make the most of LinkedIn.
Tags : reachmail, linkedin, b2b best practices on linkedin, b2b companies, search marketing, emerging marketing, social media, internet marketing
     Act-On
By: Act-On     Published Date: Jul 08, 2015
This eBook will walk you through some best practices and tips for using Twitter for business.
Tags : social media, hashtag, marketing, strategy, best practices, guide, interactive marketing, marketing software
     Act-On
By: SunGard Availability Services     Published Date: Oct 30, 2013
Learn the 10 strategies for selecting a disaster recovery service provider to ensure that your organization will be better protected should a natural disruption occur.
Tags : sungard, sungard availability services, disaster recovery, disaster recovery provider, disaster recovery service provider, dr plan, drsp, business impact analysis
     SunGard Availability Services
By: AppDynamics     Published Date: Sep 20, 2017
DevOps has taken the IT world by storm over the last few years and continues to transform the way organizations develop, deploy, monitor, and maintain applications, as well as modifying the underlying infrastructure. DevOps has quickly evolved from a niche concept to a business imperative and companies of all sizes should be striving to incorporate DevOps tools and principles.
Tags : cio, delivers software, business, metrics, automation, digital transformation, appdynamics
     AppDynamics
By: Palo Alto Networks     Published Date: Dec 11, 2013
The 10 Things Your Next Firewall Must Do outlines the latest capabilities that a firewall should possess and helps you learn how to choose a firewall that can safely enable your business in the ever-changing world of network security. In this free booklet, you'll find an insight and practical advice on: - Considerations for choosing your next firewall - Best practices for implementing safe application enablement policies - Essential firewall capabilities for battling modern threats
Tags : firewall, palo alto, security, network security, safe applications, cyber threats
     Palo Alto Networks
By: Palo Alto Networks     Published Date: Sep 30, 2016
Your network is more complex than ever before. Your employees are accessing any application they want, using work or personal devices. Oftentimes, these applications span both personal and work-related usage, but the business and security risks are often ignored.
Tags : palo alto, firewall, applications, ssl, ssh
     Palo Alto Networks
By: Palo Alto Networks     Published Date: Nov 15, 2017
Your network is more complex than ever before. Your employees are accessing any application they want, using work or personal devices. Oftentimes, these applications span both personal and work-related usage, but the business and security risks are often ignored. Prospective employees are asking about application usage policies before accepting a job.
Tags : firewall, optimization, security risks, business, devices, employees, technology
     Palo Alto Networks
By: AppDynamics     Published Date: Sep 21, 2017
Technologies once relegated to the pages of science fiction novels—artificial intelligence, digital currency, and self-driving cars to name a few—have become a reality. Enterprises must innovate with high velocity and at massive scale to stay competitive. Cloud adoption has become a strategic imperative for enterprises—it’s the price required to transform into a digital business.
Tags : 
     AppDynamics
By: CrowdCompass by Cvent     Published Date: Jun 01, 2011
Surveys that not created using a systematic approach, the results can be inconclusive or irrelevant. These ten tips are designed to help create effective surveys that will deliver meaningful business intelligence.
Tags : cvent, web surveys, online surveys, feedback management, enterprise feedback management, create surveys, design surveys, survey design
     CrowdCompass by Cvent
By: AppDynamics     Published Date: Nov 02, 2017
Technologies once relegated to the pages of science fiction novels—artificial intelligence, digital currency, and self-driving cars to name a few—have become a reality. Enterprises must innovate with high velocity and at massive scale to stay competitive. Cloud adoption has become a strategic imperative for enterprises—it’s the price required to transform into a digital business.
Tags : 
     AppDynamics
By: AppDynamics     Published Date: Dec 08, 2017
This Whitepaper looks into the technologies once relegated to the pages of science fiction novels—artificial intelligence, digital currency, and self-driving cars to name a few—have become a reality. Enterprises must innovate with high velocity and at massive scale to stay competitive. Cloud adoption has become a strategic imperative for enterprises—it’s the price required to transform into a digital business.
Tags : 
     AppDynamics
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics