RSS feed Get our RSS feed

News by Topic

graph

Results 926 - 950 of 1038Sort Results By: Published Date | Title | Company Name
By: Online Insight     Published Date: Dec 12, 2006
This white paper describes Online Insight's vision for the next generation in sales and marketing, driven not by guesstimates about a customer based on ancient demographics and historical purchases, but by up-to-the second needs and preferences measured real-time in a first-hand "collaborative customer conversation."
Tags : marketing, crm, customer relationship management, customer support, customer service, customer interaction, customer experience, csr
     Online Insight
By: Cyberoam     Published Date: Apr 19, 2007
Protecting students from the millions of sites that house pornography, adult chat rooms, violence & hacking can provide not just a safe surfing atmosphere to minors in schools and libraries, but also qualify the institutions for federal E-rate funding through compliance with CIPA - the Children's Internet Protection Act.
Tags : cipa, cipa compliance, cyberoam, cyberroam, chat room, hacking, childrends internet protection act
     Cyberoam
By: ProofSpace     Published Date: Jul 31, 2007
This paper details the processes by which ProofMark tags electronic records with a self-validating cryptographic seal that acts as a "tamper indicator" based on a true and provable time-reference datum.  With this it is able to provide instantaneous and irrefutable proof of authenticity, no matter where the data resides or who has controlled it.
Tags : proofspace, proofmark, proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data
     ProofSpace
By: ProofSpace     Published Date: Aug 17, 2007
This white paper defines the life cycle of an electronically signed record and describes  the requirements for handwritten signature-equivalence throughout its retention period.
Tags : proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography
     ProofSpace
By: ProofSpace     Published Date: Sep 10, 2007
Read this paper and learn the principles that are prerequisites to enforceable electronic agreements as required by existing legal standards and electronic signature legislation.  This paper will also specify sixteen measurement criteria that can be used as metrics to assess whether the architecture of an electronic transaction will meet the requirements of admissibility.
Tags : proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography
     ProofSpace
By: ProofSpace     Published Date: Mar 04, 2008
The ProofMark software solution is a broadly applicable system that operates on a computer, server, network, system, or infrastructure. This system utilizes public-key cryptography to create an irrefutable record of the time-existence and exact composition of any digital data. This document, the ProofMark System Concepts, Architecture, and Planning Guide, provides you with a broad technical overview of the ProofMark system.
Tags : public key, secure content, encryption, proofspace, proofmark
     ProofSpace
By: AT&T     Published Date: Jun 25, 2008
Quantum Cryptography is an emerging technology that may offer new forms of security protection. Relying on the laws of quantum mechanics, transmission is carried by a single particle that can only be measured one time, making encryption and decryption difficult to compromise. Businesses are evaluating architectural solutions using Quantum Cryptography to understand its potential benefits. Future implementations of the technology may soon make it more available for enterprise business.
Tags : att, at&t, encryption, decryption, quantum, quantum cryptography, cryptography, qkd
     AT&T
By: Asentria Corporation     Published Date: Sep 04, 2007
Organizations today depend upon their networks to increase productivity and reduce network infrastructure and maintenance costs. Accordingly, these networks must be secure and perform reliably in order to accommodate geographically dispersed users. Unplanned remote site downtime due to equipment failure or adverse environmental conditions can severely impair network service.
Tags : telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures
     Asentria Corporation
By: Arcot     Published Date: Jun 04, 2008
In the past, authentication solutions were either easy to use and inexpensive, but insecure (such as username/password) or very secure but expensive or difficult to implement (such as OTP tokens and smart cards). Arcot offers a third option: WebFort, a software-only, two-factor authentication solution. It delivers the right balance of cost, convenience, and strength.
Tags : arcotid, pki, multi-factor authentication, strong authentication, cryptographic camouflage, webfort x.509 certificate, public key infrastructure, authentication
     Arcot
By: Godfrey     Published Date: Oct 02, 2008
Branding has always been about much more than logos and graphics. It comprises the total experience customers and prospects have with your company. By adding newer, richer choices, today’s new communications technologies – everything from blogs and podcasts to wikis and mobile – are changing the fundamental basis of business-to-business marketing. Almost daily. While some are saying that branding is no longer relevant in that increasingly fragmented media world, we believe branding actually is more important than ever. In fact, it’s critical to your success.
Tags : godfrey, b-to-b branding, business-to-business branding, b-to-b branding in web 2.0, b-to-b interactive media, brand guardians, brand ambassadors, media proliferation
     Godfrey
By: Godfrey     Published Date: Oct 02, 2008
One of the most important questions a company can ask itself is “what is our differentiation?” The reason is simple: it’s how you define yourself in the minds of your customers and beat the competition. Beyond that, it’s what guides business strategy as you face decisions and choices on a daily basis. A company that knows who it is and how it adds value for customers and prospects has a solid foundation for making those decisions. One that has an unclear position or, worse yet, constantly shifts position, has a difficult path in a challenging market. That’s why branding discussions need to go well beyond graphics and touch on the values and identity that are at the core of any successful company.
Tags : godfrey, b-to-b, business-to-business, web 2.0, branding, b-to-b branding, b-to-b differentiation, brand differentiation
     Godfrey
By: HP - Enterprise     Published Date: Jun 04, 2013
Did you know that over 64% of mobile phone time is spent on applications? Mobile apps represent a huge opportunity for your enterprise to grow your business, but in order to benefit from them you need effective methods for developing, testing, and supporting mobile apps. Take a look at this eye-opening infographic to learn more about the current state of enterprise mobility and get the information you need to equip your business for mobile app development success.
Tags : mobile phone, white paper, enterprise, growing your business, applications, mobile applications
     HP - Enterprise
By: HP - Enterprise     Published Date: Jun 05, 2013
Mobile applications have swept across geographic boundaries, cultures, and enterprises faster than any previous technology innovation. Consumers around the world use them to find their way when they travel by car and verify flight details when they travel by air. They check bank balances and sports scores, reserve theater tickets and dining reservations, shop online, pay bills, download entertainment, and participate in dozens of other everyday activities—using convenient portable devices like smart phones and tablets. The demand for this kind of convenience has spilled over into the world of work as well, and employees today expect to use their mobile devices to check email, participate in meetings, access files—even use enterprise applications, like ERP and CRM, that drive business processes.
Tags : mobile application, mobile convenience, business opportunities, travel
     HP - Enterprise
By: BMC ESM     Published Date: Jul 17, 2009
If your enterprise has multiple service desks in different geographies using disparate, disjointed tools and supporting diverse but possibly overlapping constituencies, you may be wasting hundreds of thousands of dollars every year. Service desk consolidation is a proven strategy for eliminating that waste.
Tags : service desk, consolidation, bmc, bmc software, itil, it infrastructure library, service, business service management
     BMC ESM
By: BMC ESM     Published Date: Jul 22, 2009
If your enterprise has multiple service desks in different geographies using disparate, disjointed tools and supporting diverse but possibly overlapping constituencies, you may be wasting hundreds of thousands of dollars every year. Service desk consolidation is a proven strategy for eliminating that waste.
Tags : service desk, consolidation, bmc, bmc software, itil, it infrastructure library, service, business service management
     BMC ESM
By: HiDef Corporate     Published Date: Apr 05, 2011
This Forrester infographic illustrates intriguing meeting and business communication behaviors around the globe.
Tags : citrix hidef, global business communication, business communication behavior, infographic, social networking, global marketplace, forrester
     HiDef Corporate
By: SAS     Published Date: Apr 08, 2013
An Integral Part of an Overall Marketing Operations Management Strategy.
Tags : sas, marketing operations, digital assets, graphics, advertisements, marketing process, digital asset management
     SAS
By: SAS     Published Date: Aug 03, 2016
Data visualization is the visual and interactive exploration and graphic representation of data of any size, type (structured and unstructured) or origin. Visualizations help people see things that were not obvious to them before. Even when data volumes are very large, patterns can be spotted quickly and easily. Visualizations convey information in a universal manner and make it simple to share ideas with others.
Tags : best practices, data visualization, data, technology
     SAS
By: GoToTraining     Published Date: Apr 06, 2011
This Forrester infographic illustrates intriguing meeting and business communication behaviors around the globe.
Tags : citrix gototraining, global business communication, business communication behavior, infographic, social networking, global marketplace, forrester
     GoToTraining
By: iCims     Published Date: May 15, 2013
Check out this free infographic on why it is important to connect with top talent for future positions. Build your talent pools today to optimize your workforce tomorrow.
Tags : workforce management, human resources, talent management, icims, infographic, workforce optimization
     iCims
By: GoToMeeting     Published Date: Apr 04, 2011
This new Service Performance Insight explores why professional service organizations are increasingly relying on remote service delivery and collaboration tools to expand geographic reach, attract the best talent and increase satisfaction - all while reducing costs.
Tags : citrix gotomeeting, collaboration, psos, citrix, gotomeeting, web conferencing, telecommuting
     GoToMeeting
By: GoToMeeting     Published Date: Apr 04, 2011
This Forrester infographic illustrates intriguing meeting and business communication behaviors around the globe.
Tags : citrix gotomeeting, global business communication, business communication behavior, infographic, social networking, global marketplace, forrester
     GoToMeeting
By: HP and Intel® Xeon® processors     Published Date: Sep 06, 2011
This IDC White Paper discusses the impact of the critical records management, data retention, and data protection regulations across key geographies. It concludes with recommendations for developing global information governance best practices.
Tags : hp + intel, idc, data retention, data protection regulations, records management, global records compliance
     HP and Intel® Xeon® processors
By: HP and Intel® Xeon® processors     Published Date: Aug 01, 2012
An increasingly global and mobile workforce is changing the way IT needs to support the business. Worker demographics are also changing, resulting in different expectations on how IT delivers data and applications. HP and VMware make this important move to Client Virtualization safe and easy by testing and developing the most popular solutions. On its sixth generation Client Virtualization reference architecture, HP tests many combinations of storage, networking, and blades to best handle the Client Virtualization workloads.
Tags : client virtualization, reference architecture, core design, client virtualization, active directory, local users, vdi, user data
     HP and Intel® Xeon® processors
By: Data Services     Published Date: Apr 10, 2011
A complete overview of Extensior customized list services for any business marketing needs
Tags : data services, list services, emailing lists, email append, data cleaning, list cleaning, list append, b2b lists
     Data Services
Start   Previous    28 29 30 31 32 33 34 35 36 37 38 39 40 41 42    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics