RSS feed Get our RSS feed

News by Topic

scribe

Results 476 - 500 of 852Sort Results By: Published Date | Title | Company Name
By: Scribe     Published Date: Oct 09, 2013
The State of Customer Data Integration 2013 survey report is based on over 900 responses ranging from independent business and IT leaders to Scribe's data integration channel partners. Overall results reveal that today's businesses are still on the journey to connect their core business systems and deliver customer data to their users across the business. Customer data should be free-flowing across all business touch points to enable companies to run faster, do more, and at lower cost.
Tags : scribe, scribe software, data, data integration, business systems integration, crm, crm systems integration, cloud
     Scribe
By: IBM     Published Date: Sep 30, 2013
This interactive eBook describes how virtualization is not a device to implement, but rather a journey to realize greater and greater gains. Featuring cases from midsize companies around the world, the eBook details how to get started, the importance of consolidation, tangible ways to fully benefit from virtualization and more.
Tags : ibm, virtualization, consolidation, virtualization management
     IBM
By: IBM     Published Date: Sep 27, 2013
In this paper, Ptak/Noel describes the new IBM PureFlex system and the unique management capabilities of the IBM Flex System Manager.
Tags : ibm, data center, data center management, ibm pureflex, ibm pureflex system, expert integrated system, computing systems, ibm flex system manager
     IBM
By: Arbor     Published Date: Sep 20, 2013
In this white paper, John Pescatore of SANS Institute explores how DDoS is used as part of advanced targeted attacks (ATAs) and describes how DDoS detection and prevention tools and techniques can be used against ATAs as well. Today’s DDoS attacks, as damaging as they are, sometimes mask even more threatening and dangerous advanced targeted threats. The good news is that some of the same tools that can detect the footprints of DDoS attacks can also find the telltale signs of ATAs. To be successful, though, enterprises need to coordinate their use of both types of logs and adjust their monitoring parameters correctly. They must also eliminate operational gaps, such as unclear lines of security authority, and limit the use of managed security services that can deprive enterprise security managers of the data they need to detect and stop DDoS attacks and ATAs.
Tags : distributed denial of services, ddos attack, ddos detection, ddos mitigation, security, advanced targeted attacks, mitigation, detection
     Arbor
By: Arbor     Published Date: Sep 20, 2013
Today’s hosting provider can increase revenue by capitalizing on the growing demand of business customers for hosted online operations—provided, of course, that it can safeguard these critical operations against DDoS-related outages. Using the simple, step-by-step approach described in this paper, providers can model the financial impact of a DDoS attack on their operations and calculate the ROI of an effective DDoS defense solution.
Tags : distributed denial of services, defense solutions, security, financial management, ddos attacks, ddos protection, ddos defense system, ddos protection solutions
     Arbor
By: Webroot     Published Date: Sep 18, 2013
This whitepaper explains how exploding mobile threats challenge mobile device management (MDM) vendors, carriers, service providers, and app stores to ensure the safety of apps. Consumers and customers will hold these companies responsible for providing adequate security, and employees will expect enterprise IT departments to protect them from malicious mobile apps like they have come to expect for PC malware. The report describes how a cloud-based app reputation service protects against the risks of mobile applications in the wild: • Collects millions of applications from a variety of sources • Stores mobile app data in the world’s largest cloud-based threat database • Analyzes and scores apps on a range from malicious (e.g., known malware such as Trojans or root kits) to trustworth
Tags : mobile app, mobile threat, mobile device management, mobile application management, malicious mobile app, security
     Webroot
By: Webroot     Published Date: Sep 18, 2013
This whitepaper deals with the rise of mobility, BYOD and social networking, and how these trends have led cybercriminals to exploit vulnerabilities in browsers and mobile apps. For example, more than 30,000 mostly legitimate websites become infected with malware every day. From drive-by downloads to spearfishing to XML injection, web-borne threats represent a significant new risk for businesses. The report describes how to stay on top of this changing threat landscape and prevent damaging attacks with: • 100% protection against known viruses • Industry-leading URL filtering and IP protection via the world’s largest threat database • Extended protection for smartphones and tablets • Simplified web-based management
Tags : web security, cybercriminals, web threats, web gateway, security
     Webroot
By: Webroot     Published Date: Sep 18, 2013
This white paper describes how new threats have stretched the capabilities of “fat client” security architectures to the limit, making it impractical to keep endpoints updated with signatures for all the new viruses. It discusses how a revolutionary approach is making traditional antivirus obsolete by replacing bloated clients and large signature downloads with: • Cloud/client architecture • Journaling and rollback • Behavioral recognition of malware These improve performance and effectively address the new threat environment, which includes protecting against zero day threats.
Tags : cloud architecture, behavior recognition, security, antivirus, journaling, rollback, malware
     Webroot
By: Bronto     Published Date: Sep 09, 2013
Like any relationship, the marketing lifecycle has unique phases with appropriate (and inappropriate) actions. Reading subscriber cues is important in getting this right. Learn about the elements of a strategic email marketing program that help move subscribers from introduction to a lifelong relationship.
Tags : lifelong subscribers, marketing lifecycle, strategic email marketing, email marketing services/software, list management
     Bronto
By: TeamQuest     Published Date: Sep 09, 2013
This paper describes the fundamental steps for performing capacity planning.
Tags : teamquest, capacity planning, cost effective, fundamental
     TeamQuest
By: IBM     Published Date: Sep 03, 2013
This paper describes how workgroups and midsize companies can transform their spreadsheet-only process to create flexible and timely plans, budgets and forecasts. It outlines recommendations for implementing a complete performance management system, using IBM Cognos Express, an integrated reporting, analysis and planning solution purpose-built for workgroups and midsize companies.
Tags : transforming spreadsheets, planning, budgeting, forecasting, midsize companies, cognos express, management system, ibm
     IBM
By: Dell     Published Date: Aug 16, 2013
"IOPS (I/O operations per second) is an easily understood and communicated unit of measurement, which is why it’s so widely used. Unfortunately, it’s also easy to oversimplify. IOPS describes only the number of times an application, OS or VM is reading or writing to storage each second. More IOPS means more disk I/O, and if all IOPS are created equal, we should be able to measure disk activity with it alone. But they aren’t. Read the White Paper "
Tags : iops, i/o, disk activity
     Dell
By: Dell Software     Published Date: Aug 15, 2013
IOPS describes the number of times an application, OS or VM is reading/writing to storage each second. More IOPS means more disk I/O, but all IOPS are not created equal. Read the White Paper >>
Tags : dell, operations, iops, application, storage, disk, technology, security
     Dell Software
By: Oracle     Published Date: Aug 15, 2013
John Moxley describes the reasons behind the company’s decision to choose Oracle Taleo Cloud Service.
Tags : cricket's, oracle, taleo, cloud service, cloud
     Oracle
By: Aslan Training     Published Date: Aug 15, 2013
This paper describes the 7 key barriers to inside sales success, and typical ways that well-meaning inside sales reps unsuccessfully encounter them. But more than a description of these barriers, this paper will give you the approach, methods, and tools that will help you successfully overcome them.
Tags : inside sales, sales coaching, sales training, sales
     Aslan Training
By: Aslan Training     Published Date: Aug 14, 2013
This paper describes the 7 key barriers to successful prospecting, and typical ways that well-meaning inside sales reps unsuccessfully encounter them. But more than a description of these barriers, this paper will give you the approach, methods, and tools that will help you successfully overcome them.
Tags : sales training, sales coaching, prospecting, sales
     Aslan Training
By: CareCloud     Published Date: Aug 13, 2013
Installing your first practice management system or upgrading to a different system with the features described above is one major step toward improving your practice’s accounts receivable operations.
Tags : accounts receivable management, medical accounts, practice management systems, operations, billing
     CareCloud
By: Oracle     Published Date: Aug 08, 2013
As social media use has grown, an urgent need has emerged to correlate the information generated through social data with existing consumer information, and integrate it with sophisticated data management systems. This white paper describes how organizations can blend social insights with more-traditional data in an integrated customer data hub to optimize social strategies and create outreach efforts, new products, and campaigns grounded in real-time, repeatable, automated, and scalable analysis.
Tags : social media, business intelligence, customer hub, crm, oracle
     Oracle
By: Teradata     Published Date: Jul 30, 2013
This paper examines the obstacles that make interactive customer management a challenge for many insurance carriers. It describes how they can create a more customer-centric business by using a sophisticated analytics platform to uncover valuable insights into their business and provides concrete examples of specific areas where insurers gain value. The adoption of a customer-centric approach need not be accomplished all at once. Rather, it can be managed and self-funded by following a roadmap that delivers incremental capabilities and revenue.
Tags : insurance policies, integrated data warehousing, interactive customer management, customer management, insurance carriers
     Teradata
By: HP-Intel®     Published Date: Jul 22, 2013
The Virtual Server Environment Reference Architecture described in this white paper centers around the HP-UX 11i v2 operating environments
Tags : intel, ost, linux, operation systems, internal architecture, architecture, epic software, unix/risc architectures
     HP-Intel®
By: Canon     Published Date: Jul 15, 2013
This case study describes the common challenges faced by the Hutchinson Center and how Canon U.S.A., Inc. combined powerful imageRUNNER MFPs with uniFLOW Output Manager suite to help improve overall operations so the Center could dedicate its primary focus to the business of saving lives.
Tags : output manager, healthcare, uniflow, canon color, imagerunner
     Canon
By: UrbanCode     Published Date: Jul 09, 2013
Throughout this paper the levels of maturity of various components of Enterprise Continuous Integration will be described in the same way.
Tags : urbancode, enterprise continuous delivery, continuous integration, enterprise continuous integration
     UrbanCode
By: EMC Corporation     Published Date: Jun 14, 2013
This document describes the top 5 simple benefits of EMC VNX. Download this White Paper for more information.
Tags : automated storage, optimization, storage space, increase bandwidth, data warehouse solution, technology, security, storage
     EMC Corporation
By: HP - Enterprise     Published Date: Jun 04, 2013
Mobility services are frequently being positioned as part of broader application transformation offerings, enabling enterprises to support the bring-your-own-device (BYOD) approach, with the development of enterprise app stores and the ability to leverage personal devices for business functions. This white paper describes software and services that accelerate and simplify the creation of internally developed or “in-house” enterprise mobile applications. It also describes how to deploy and manage these mobile apps on both company-provided and “bring-your-own” smartphones and tablet computers. Solving the complete mobile app lifecycle means transforming enterprise apps for multiscreen devices; facilitating design, testing, security, performance, management, and compliance to reach new customers and employee expectations.
Tags : mobile apps, lifecycle approach, mobility services, bring-your-own-device, software
     HP - Enterprise
By: HP - Enterprise     Published Date: Jun 04, 2013
Businesses are overwhelmed with data; it’s a blessing and a curse. A curse because it can overwhelm traditional approaches to storing and processing it. A blessing because the data promises business insight that never existed earlier. The industry has spawned a new term, “big data,” to describe it. Now, IT itself is overwhelmed with its own big data. In the press to roll out new services and technologies—mobility, cloud, virtualization—applications, networks, and physical and virtual servers grow in a sprawl. With them comes an unprecedented volume of data such as logs, events, and flows. It takes too much time and resources to sift through it, so most of it lies unexplored and unexploited. Yet like business data, it contains insight that can help us solve problems, make decisions, and plan for the future.
Tags : data research, big data, virtualization, applications, networks
     HP - Enterprise
Start   Previous    13 14 15 16 17 18 19 20 21 22 23 24 25 26 27    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics