RSS feed Get our RSS feed

News by Topic

graph

Results 1001 - 1025 of 1025Sort Results By: Published Date | Title | Company Name
By: Quova     Published Date: Oct 27, 2008
Learn what real-time geolocation technology can do for online businesses. Discover how companies like yours are achieving cost-per-click improvements of up to 30 percent, while lowering home page drop-off rates by as much as 70 percent—and how you can do the same. Also, discover how knowing a Web visitor’s location can help you sell more product; increase customer loyalty; comply with state and country regulations; and track campaign effectiveness. Download your copy now.
Tags : quova, geolocation technology, quova, geolocation data, geographically targeted advertisement, content management systems
     Quova
By: Godfrey     Published Date: Oct 02, 2008
Branding has always been about much more than logos and graphics. It comprises the total experience customers and prospects have with your company. By adding newer, richer choices, today’s new communications technologies – everything from blogs and podcasts to wikis and mobile – are changing the fundamental basis of business-to-business marketing. Almost daily. While some are saying that branding is no longer relevant in that increasingly fragmented media world, we believe branding actually is more important than ever. In fact, it’s critical to your success.
Tags : godfrey, b-to-b branding, business-to-business branding, b-to-b branding in web 2.0, b-to-b interactive media, brand guardians, brand ambassadors, media proliferation
     Godfrey
By: Godfrey     Published Date: Oct 02, 2008
One of the most important questions a company can ask itself is “what is our differentiation?” The reason is simple: it’s how you define yourself in the minds of your customers and beat the competition. Beyond that, it’s what guides business strategy as you face decisions and choices on a daily basis. A company that knows who it is and how it adds value for customers and prospects has a solid foundation for making those decisions. One that has an unclear position or, worse yet, constantly shifts position, has a difficult path in a challenging market. That’s why branding discussions need to go well beyond graphics and touch on the values and identity that are at the core of any successful company.
Tags : godfrey, b-to-b, business-to-business, web 2.0, branding, b-to-b branding, b-to-b differentiation, brand differentiation
     Godfrey
By: YouSendIt     Published Date: Sep 17, 2008
Sending presentations, audio, video, or graphics files can jeopardize your network’s security. Now learn why you should never use FTP or conventional email to send oversize files; how managed file transfer makes networks safer; and how to avoid email compliance hassles. Don’t let large files become a security issue—download this white paper now.
Tags : promo code: wp1, file transfer, attachment, email, ftp, security, powerpoint attachment, mp3 attachment
     YouSendIt
By: YouSendIt, Inc.     Published Date: Sep 17, 2008
Sending presentations, audio, video, or graphics files can jeopardize your network’s security. Now learn why you should never use FTP or conventional email to send oversize files; how managed file transfer can make your network safer; and 7 key criteria to look for. Plus, find out how to avoid email compliance hassles using tracking and traceability. Transferring large files could be a potential security issue. Download this white paper now and learn how to prevent it.
Tags : promo code: wp1, file transfer, attachment, email, ftp, security, powerpoint attachment, mp3 attachment
     YouSendIt, Inc.
By: thawte     Published Date: Aug 27, 2008
Learn about how digital certificates with SGC technology are able to step-up encryption levels for certain browsers to 128-bits. A discussion of the business benefits of deploying SGC certificates is also included.
Tags : thawte, ssl, encryption
     thawte
By: Quocirca     Published Date: Aug 05, 2008
As the EU continues to expand, European businesses must look to how they can trade across increasing numbers of regional boundaries, languages, cultures and laws, both within the EU and across the greater Europe. The opportunities are huge – but the problems will daunt many who wish to enter into a pan-European trading environment.
Tags : quocirca
     Quocirca
By: HP     Published Date: Jul 29, 2008
This white paper describes an energy audit tool which can lead to significant decreases in the costs of running a data center.  Thermal Zone Mapping (TZM) is a visualization tool developed to present in graphical format high level thermal metrics developed by HP and targeted for use as part of the HP Data Center Thermal Assessment service. This tool uses data generated from computer models of the data center and generates metrics, which are then post-processed and visualized in the three-dimensional data center space.
Tags : heat, data center, heat monitoring, hardware, datacenter, mission critical
     HP
By: AT&T     Published Date: Jun 25, 2008
Quantum Cryptography is an emerging technology that may offer new forms of security protection. Relying on the laws of quantum mechanics, transmission is carried by a single particle that can only be measured one time, making encryption and decryption difficult to compromise. Businesses are evaluating architectural solutions using Quantum Cryptography to understand its potential benefits. Future implementations of the technology may soon make it more available for enterprise business.
Tags : att, at&t, encryption, decryption, quantum, quantum cryptography, cryptography, qkd
     AT&T
By: Arcot     Published Date: Jun 04, 2008
In the past, authentication solutions were either easy to use and inexpensive, but insecure (such as username/password) or very secure but expensive or difficult to implement (such as OTP tokens and smart cards). Arcot offers a third option: WebFort, a software-only, two-factor authentication solution. It delivers the right balance of cost, convenience, and strength.
Tags : arcotid, pki, multi-factor authentication, strong authentication, cryptographic camouflage, webfort x.509 certificate, public key infrastructure, authentication
     Arcot
By: CA WA     Published Date: May 12, 2008
All things that can be automated will be automated. Beyond the careful choreography of sophisticated workflow, managing myriad simultaneous requests puts unprecedented demand on the software that must schedule and perpetually deliver against well-defined service levels, in real time. Gone are the days of simple batch processing. Welcome to the oh-so-very-flat world that is embracing service-oriented architectures, grid architectures, expansive ecosystems, and end-to-end processing. Workload scheduling has got to grow up.
Tags : ca wa, workload automation, soa, service oriented, scheduling
     CA WA
By: Extensis     Published Date: Mar 07, 2008
The Photography Department at The National Gallery of London wanted to give other Gallery departments better visibility into its archived library of images and reduce the administrative workload for its photographers. Read how Portfolio Server and Portfolio SQL-Connect painted the perfect solution to this challenge.
Tags : extensis, portfolio server, sql, asa, dam, digital asset management, other
     Extensis
By: ProofSpace     Published Date: Mar 04, 2008
The ProofMark software solution is a broadly applicable system that operates on a computer, server, network, system, or infrastructure. This system utilizes public-key cryptography to create an irrefutable record of the time-existence and exact composition of any digital data. This document, the ProofMark System Concepts, Architecture, and Planning Guide, provides you with a broad technical overview of the ProofMark system.
Tags : public key, secure content, encryption, proofspace, proofmark
     ProofSpace
By: ESET     Published Date: Jan 30, 2008
Steganography is the science of hiding data inside of items, such as sound and picture files.  Listen to this podcast to learn more about steganography and the potential IT security concerns it poses.
Tags : embedded files, steganography, hiding data, secret files, coding, av signatures, traditional antivirus, norton
     ESET
By: Quocirca     Published Date: Oct 05, 2007
Knowledge of the location of customers, property, products or any other asset is invaluable intelligence for improving competitive advantage and operational efficiency.  However, despite the proliferation of data that businesses generate today, the potential value of this location dimension is often overlooked in the business intelligence process.
Tags : business intelligence, business analytics, historical data, data analysis, gis, geospacial, geographic information system, geocoding
     Quocirca
By: ProofSpace     Published Date: Sep 10, 2007
Read this paper and learn the principles that are prerequisites to enforceable electronic agreements as required by existing legal standards and electronic signature legislation.  This paper will also specify sixteen measurement criteria that can be used as metrics to assess whether the architecture of an electronic transaction will meet the requirements of admissibility.
Tags : proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography
     ProofSpace
By: Asentria Corporation     Published Date: Sep 04, 2007
Organizations today depend upon their networks to increase productivity and reduce network infrastructure and maintenance costs. Accordingly, these networks must be secure and perform reliably in order to accommodate geographically dispersed users. Unplanned remote site downtime due to equipment failure or adverse environmental conditions can severely impair network service.
Tags : telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures
     Asentria Corporation
By: Arial Software     Published Date: Aug 22, 2007
Email marketing should be considered a key component of a company’s overall marketing strategy. In the past many companies treated email marketing as an afterthought, failing to devote the talent and resources needed to affect an appreciable return on investment. To get the most out of an ongoing email marketing campaign, a quality team of knowledgeable professionals must be assembled.
Tags : staffing, hiring, marketing, marketing manager, email marketing, email marketing manager, marketing director, staff
     Arial Software
By: ProofSpace     Published Date: Aug 17, 2007
This white paper defines the life cycle of an electronically signed record and describes  the requirements for handwritten signature-equivalence throughout its retention period.
Tags : proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography
     ProofSpace
By: ProofSpace     Published Date: Jul 31, 2007
This paper details the processes by which ProofMark tags electronic records with a self-validating cryptographic seal that acts as a "tamper indicator" based on a true and provable time-reference datum.  With this it is able to provide instantaneous and irrefutable proof of authenticity, no matter where the data resides or who has controlled it.
Tags : proofspace, proofmark, proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data
     ProofSpace
By: Baystate Health / Baystate Medical Center     Published Date: Jul 16, 2007
Get this free white paper to read why mass casualty and other public health emergencies create a demand for information within hospitals, between hospitals, between hospitals and local incident command centers, and between local, statewide and multi-state incident command centers and agencies.
Tags : hospital, healthcare, health care, medical records, fema, disaster, natural disaster, business continuity
     Baystate Health / Baystate Medical Center
By: Cognos     Published Date: Jun 19, 2007
This paper looks at research into the link between visual perception and understanding, and translates the findings into practical techniques that you can use to communicate more clearly with your data.
Tags : visual communication, visual perception, graph, graphical representation, graphs, presentations, evaluation, presentation
     Cognos
By: Cyberoam     Published Date: Apr 19, 2007
Protecting students from the millions of sites that house pornography, adult chat rooms, violence & hacking can provide not just a safe surfing atmosphere to minors in schools and libraries, but also qualify the institutions for federal E-rate funding through compliance with CIPA - the Children's Internet Protection Act.
Tags : cipa, cipa compliance, cyberoam, cyberroam, chat room, hacking, childrends internet protection act
     Cyberoam
By: [x+1]     Published Date: Jan 24, 2007
Publishers spend millions generating content, designing user experiences, and promoting themselves as the destination of choice when people open up their browsers. In order to pay for the user's attention, they sell impressions. But who should publishers sell to? Be sure to consider the key points explained in this paper.
Tags : online ad sale, ad sales, online ad sales, ad serving, graphical/cpm, banner advertising, prestitials, interactive/pr agencies
     [x+1]
By: Online Insight     Published Date: Dec 12, 2006
This white paper describes Online Insight's vision for the next generation in sales and marketing, driven not by guesstimates about a customer based on ancient demographics and historical purchases, but by up-to-the second needs and preferences measured real-time in a first-hand "collaborative customer conversation."
Tags : marketing, crm, customer relationship management, customer support, customer service, customer interaction, customer experience, csr
     Online Insight
Start   Previous    27 28 29 30 31 32 33 34 35 36 37 38 39 40 41     Next   End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics