RSS feed Get our RSS feed

News by Topic

mmo

Results 1 - 25 of 730Sort Results By: Published Date | Title | Company Name
By: Schneider Electric     Published Date: Oct 17, 2016
This white paper analyzes these costs and presents a flexible architecture to accommodate a well-specified density, and discusses the importance of operational policies in enforcing the specification.
Tags : 
     Schneider Electric
By: Schneider Electric     Published Date: Oct 17, 2016
This paper explains how the requirements for building management are affected by the presence of a mission critical data center or IT room (data rooms) and describes key attributes to look for in an effective BMS system. Common pitfalls of implementing and using a BMS for sites with IT along with advice on how to avoid them are also provided.
Tags : 
     Schneider Electric
By: Xactly     Published Date: Feb 10, 2017
To help you determine the right compensation, here are the most common sales roles, best practices on how they should be rewarded through pay mix, and recommended plan components.
Tags : compensation, sales, sales team, sales management, performance management, sales performance management
     Xactly
By: CrowdStrike     Published Date: Feb 01, 2017
The frequency of “mega breaches” continues to rise at an alarming rate. In fact, crippling incidents involving tens of millions of customer records, theft of highly valuable intellectual property, and related criminal activity have become commonplace. This report asserts that many such breaches could be prevented by deploying next-generation endpoint protection technology in concert with an aggressive proactive hunting strategy. This potent combination provides the most effective means to reduce attack surfaces and defend against advanced adversaries.
Tags : 
     CrowdStrike
By: Esker     Published Date: Dec 19, 2016
Electronic Data Interchange, commonly referred to as EDI, is a process that allows data to be exchanged between businesses in a standard electronic format. Sales order processing is an area of business where EDI is used extensively. However, up to one-third of EDI orders can contain exceptions — this is where problems surface. Traditional handling methods cause a host of challenges for customer service professionals and the business as a whole. This eBook aims to expose these issues, while showing how order processing automation can work with existing EDI environments to streamline exception handling and fix any potential problems before they mess up your ERP system and bottom line. Learn more about EDI Exceptions, download now!
Tags : 
     Esker
By: FICO     Published Date: Feb 06, 2017
IFRS 9 impairment calculations are orders of magnitude more complex than IAS39 calculations. Not all frameworks will process data quickly enough to produce accurate provisions within strict, month-end reporting deadlines. Download now to learn more.
Tags : 
     FICO
By: Acxiom Corporation     Published Date: Feb 24, 2011
A Chief Marketing Officer's Roadmap. In this paper Acxiom shows how Media Mix Optimization can help overcome the complex challenges of today's marketing. Herein we not only detail both the "Journey" of MMO and its rewards but also how to avoid several key hurdles along the way.
Tags : acxiom, optimization, media mix, mmo, halo effects, cmo, chief marketing officer, mobile marketing
     Acxiom Corporation
By: Akamai Technologies     Published Date: Apr 26, 2010
Collaboration in the enterprise requires a triumvirate of people, process and technology to be successful. With the plethora of collaboration applications available today, both IT professionals and collaboration business users alike need to take a holistic approach to be successful with collaboration. This paper lets you know about some of the common pitfalls and how to avoid them.
Tags : akamai, collaboration, collaboration software, firewall, enterprise software, web conferencing, travel costs, twitter
     Akamai Technologies
By: Fujitsu     Published Date: Feb 06, 2017
When you embark on an SAP HANA transformation, your goals should include simplifying operations and empowering your business to compete and win in the digital economy. But big transformation projects like this are extremely complex. Learn key insights into common speed bumps and roadblocks that may slow you down, as well as valuable tips to help you along your transformation journey.
Tags : sap hana, hana cloud platform, sap hana cloud platform, sap hana platform, sap hana analytics
     Fujitsu
By: IBM     Published Date: Jan 09, 2017
According to the 2016 State of Endpoint Security Survey released by the SANS™ Institute 44% of respondents report that one or more of their endpoints have been breached in the past 24 months. - Desktops, laptops and servers are the most compromised endpoints - Login and access credentials are the most commonly exfiltrated information - 55% of respondents spend 3 or more hours per compromised endpoint - Over 70% of respondents find it difficult or impossible to determine when an incident is fully remediated These statistics encompass a wide set of industries, from financial services to education. So while each network is uniquely built to support your particular business, none is immune from being breached."
Tags : ibm, security, big fix, endpoint security, sans report, network security
     IBM
By: WhatCounts     Published Date: May 05, 2010
Lifecycle marketing is changing the way companies interact with prospects and customers through the email channel. This white paper explores five common questions and some ideas on how to jumpstart your lifecycle marketing efforts.
Tags : lifecycle, email marketing, whatcounts, emarketing, roi, segmentation, nurturing, lead generation
     WhatCounts
By: Zynapse     Published Date: Sep 10, 2010
UNSPSC enables preference item management, better spend analysis, supply standardization and information control. Whether you are deliberating on the need for a common product and classification standard for your company, or are an advanced UNSPSC adopter, we hope that "Adopting UNSPSC" will answer some of your questions and perhaps help you in some way to improve your purchasing and supply management processes.
Tags : zynapse, erp projects, unspsc, data information, data management, governance, mdm, master data management
     Zynapse
By: Levene Strategies     Published Date: Oct 25, 2011
Writing effective Federal proposals is a necessary component of doing business with the Government. Learn how to avoid several common mistakes.
Tags : 
     Levene Strategies
By: Eaton     Published Date: Feb 09, 2017
Budgeting for electricity, securing adequate supplies of it and finding ways to use less of it are all common topics of conversation among data center operators. Ensuring that the power their IT resources rely on is both dependable and clean, sadly, can sometimes be an afterthought.
Tags : 
     Eaton
By: Entrust Datacard     Published Date: Oct 24, 2016
The mobile device is part and parcel of daily life. It’s fundamentally changed the way consumers behave, and this influence has spread to the enterprise sector as well. For instance, patron-owned mobile devices have largely helped pave the way for the widespread emergence of bring-your-own-device (BYOD) policies. Ten years ago, the idea of a company employee logging into the enterprise system while they’re on an airplane over the Atlantic would seem far-fetched, but today such behavior is relatively commonplace. Mobility is changing how we shop, work and live our daily lives.
Tags : 
     Entrust Datacard
By: Dell EMC     Published Date: Nov 03, 2016
What place should solid-state storage assume in your IT architecture? And what are the best options for the average data center to maximize the value of flash? This paper explores the current state of the technology, its common applications, innovations in solid-state chip technology, choices in solid-state drives and dispels the four most common myths surrounding flash. Discover how you can cost-effectively leverage this rapidly maturing technology.
Tags : solid-storage, nvm, nand, ssd
     Dell EMC
By: Dell EMC     Published Date: Nov 08, 2016
Time-to-market, consolidation, and complexity struggles are a thing of the past. Join yourpeers in database storage nirvana with the Dell EMC All-Flash portfolio, powered by Intel® Xeon® processors.
Tags : database, consolidation, capacity, storage, complexity
     Dell EMC
By: Dell EMC     Published Date: Nov 08, 2016
Are you considering a new VDI solution? Check out the key questions you'll want to consider in order to find the VDI platform that solves your biggest challenges.
Tags : storage, vdi, virtual desktop, flash, processors
     Dell EMC
By: Frontier Communications     Published Date: Dec 22, 2016
This infographic highlights a few common misconceptions about protecting yourself when Mother Nature wreaks vengeance, your workplace becomes a no man’s land, or cybercriminals attack.
Tags : 
     Frontier Communications
By: Commvault     Published Date: Jul 06, 2016
Think of a wildfire that quickly spreads as it increases in speed and power. That is what is happening today as data growth increases the volume and management complexity of storage, backup and recovery. Now think of trying to stop that fire with a garden hose. Your traditional backup and recovery process is equally under-equipped to manage and facilitate operations that need more speed, efficiency, scalability and reliability to handle today’s 24/7, always-on environment. Here we examine the benefits of moving from a solution comprised of multiple point products to a holistic data protection platform designed to serve today’s enterprise.
Tags : commvault, data protection, storage, backup, recovery, holistic data protection, singe pane of glass, common code base
     Commvault
By: Commvault     Published Date: Jul 06, 2016
Today, nearly every datacenter has become heavily virtualized. In fact, according to Gartner as many as 75% of X86 server workloads are already virtualized in the enterprise datacenter. Yet even with the growth rate of virtual machines outpacing the rate of physical servers, industry wide, most virtual environments continue to be protected by backup systems designed for physical servers, not the virtual infrastructure they are used on. Even still, data protection products that are virtualization-focused may deliver additional support for virtual processes, but there are pitfalls in selecting the right approach. This paper will discuss five common costs that can remain hidden until after a virtualization backup system has been fully deployed.
Tags : storage, backup, recovery, best practices
     Commvault
By: Cisco     Published Date: Jan 08, 2016
Cisco Validated Designs (CVDs) present systems that are based on common use cases or engineering priorities.
Tags : cisco, wan, design guide, dmvpn, qos, security
     Cisco
By: Cisco     Published Date: Feb 23, 2016
Cisco Validated Designs (CVDs) present systems that are based on common use cases or engineering priorities. CVDs incorporate a broad set of technologies, features, and applications that address customer needs. Cisco engineers have comprehensively tested and documented each design in order to ensure faster, more reliable, and fully predictable deployment.
Tags : customer engagement, business practices, technology, design management
     Cisco
By: Cisco     Published Date: Feb 23, 2016
Cisco Validated Designs (CVDs) present systems that are based on common use cases or engineering priorities. CVDs incorporate a broad set of technologies, features, and applications that address customer needs. Cisco engineers have comprehensively tested and documented each design in order to ensure faster, more reliable, and fully predictable deployment.
Tags : design guide, customer engagement, design management, system management, website/graphic design
     Cisco
By: Cisco     Published Date: Jun 21, 2016
Cisco® Validated Designs provide the foundation for systems design based on common use cases or current engineering system priorities. They incorporate a broad set of technologies, features, and applications to address customer needs. Cisco engineers have comprehensively tested and documented each Cisco Validated Design in order to ensure faster, more reliable, and fully predictable deployment. This design guide summary provides you with an overview of the Cisco Intelligent WAN Design Guide, the key technology, the use cases it provides, and additional and related resources.
Tags : 
     Cisco
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics