RSS feed Get our RSS feed

News by Topic

scribe

Results 576 - 600 of 846Sort Results By: Published Date | Title | Company Name
By: Oracle     Published Date: Dec 13, 2011
This white paper describes and analyzes the 5 most popular deployment scenarios to help IT and business decision makers pick the best options
Tags : on demand, oracle on demand, instant gratification, crm, customer relationship management, deployment, saas, software-as-service
     Oracle
By: Liaison Technologies     Published Date: Nov 21, 2011
In this whitepaper, we describe how executive and IT management can get and maintain control of their company's data architecture to help meet business objectives. We describe the relationship between data integration projects and data architecture concepts and practices. We describe how the business planning and IT development processes that direct and leverage data integration projects depend on tooling. We describe breakthrough ways in which data architects, business analysts, programmers, and business users can collaborate to address their organization's pressing business challenges.
Tags : enterprise, soa, technology, liaison, business, data integration, data architecture, it management
     Liaison Technologies
By: Gleanster     Published Date: Nov 10, 2011
This Gleansight benchmark report is based on the experiences of 387 companies and includes the following sections: Reasons to Implement, Challenges, Value Drivers, Core Technologies and Success Story. It also includes a Vendor Landscape with descriptions, rankings and analysis of 39 solution providers. Social intelligence is being increasingly used today to describe the next rung on the evolutionary ladder of listening to and acting upon consumer conversation on the social web. That rung maps to a number of technology innovations. Chief among them are improved capabilities around analyzing and integrating all sources of voice-of-the-customer data to generate more actionable insights. Social intelligence also speaks to an emerging corporate mindset regarding the strategic importance of social data and the need to better capitalize upon it. This Gleansight benchmark report reveals how Top Performers are achieving success when it comes to the incessant quest to extract customer insights and take actions that ultimately translate into revenue growth, cost reduction, risk reduction and relationship enhancement.
Tags : social intelligence, marketing, social media, gleanster, business intelligence, market research, usability, social media marketing
     Gleanster
By: Dell Storage     Published Date: Nov 08, 2011
This white paper describes how Fluid Data storage reduces the capacity required to support VMware and maximizes system performance and efficiency.
Tags : dell compellent, vmware server virtualization, compellent san, virtualized storage platform, fluid data storage, system performance, resource management, disaster recovery
     Dell Storage
By: IBM Software     Published Date: Oct 24, 2011
This paper describes how to build a proactive threat and risk strategy based on predictive analytics and provides real life examples of the benefits.
Tags : ibm, predictive analytics, collaboration, insights, integration, automation, smarter, data analysis
     IBM Software
By: Nimsoft     Published Date: Oct 24, 2011
This paper describes unique characteristics of cloud service delivery models; details distinct monitoring responsibilities & challenges of each model
Tags : nimsoft, cloud service, delivery, models, monitor, monitoring, challenges
     Nimsoft
By: Adaptive Planning     Published Date: Oct 19, 2011
It's inefficient, ages too quickly, and is out of sync with the strategic plan. No wonder so many executives hate toiling over the annual budget. But, says Peter Horvath, don't look to the budget as the sole management system. Horvath and his associate Ralf Sauter describe six ways to fix budgeting, including integrating it with such systems as the Balanced Scorecard, so that it supports strategy execution in today's fast-changing environment.
Tags : adaptive, marketry, business, finance, accounting, budget
     Adaptive Planning
By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 15, 2011
"The Shortcut Guide to Business Security Measures Using SSL" examines current information security threats to business and describes techniques for developing a security management strategy that leverages established best practices.
Tags : extended validation, measures, green bar, online security, optimize, sgc, server gated cryptography, verisign
     VeriSign Authentication Services, now a part of Symantec Corp.
By: GoToWebinar     Published Date: Oct 05, 2011
"So you drank the Kool-Aid and subscribed to the idea that your presentations need to ""tell a story"" and ""be more visual."" But how do you translate dry information into something that's compelling to your audience? When you get back to the basics and focus on the structure of the information you present, you'll find a new way to lay the groundwork for a clean and clear storyboard that will deliver the story and visuals you want. Watch this on-demand webinar to hear Cliff Atkinson, author of Beyond Bullet Points, talk about how you can turn dry content into a compelling presentation. "
Tags : citrix, webinar, presentations, visuals, technology, marketing, structure, on-demand
     GoToWebinar
By: Silverpop     Published Date: Sep 19, 2011
The most successful marketers will be those who stand out by infusing their content with a more human feel. Here are five tips and tactics guaranteed to strengthen your messages and delight your subscribers.
Tags : silverpop, humanizing content, personal attention, social media, web analytics, customer experience/engagement, social media marketing
     Silverpop
By: LifeSize, a division of Logitech     Published Date: Aug 25, 2011
This briefing from the Government Business Council (GBC) describes the growth of telework and how agencies can identify key indicators for success...
Tags : lifesize, video conferencing, multimedia presentation, productivity, high definition
     LifeSize, a division of Logitech
By: Trend Micro Inc.     Published Date: Aug 25, 2011
This white paper describes the evolution of these changes as enterprises adopt virtualization and then cloud computing. It then describes Trend Micro's vision for the evolution of security as a facilitator of mobility, virtualization, and cloud computing.
Tags : trend micro, virtualization, cloud computing, security, internet content security, smart protection network, trend micro internet security, enterprise business security
     Trend Micro Inc.
By: Cisco Webex     Published Date: Aug 16, 2011
Cisco WebEx supports 10 million subscribers each month with easy-to-use web applications. It's free, it's easy, it's WebEx . . . try it today.
Tags : cisco webex, webex meeting center, free trial, sales cycle, customer interaction, video, imenterprise im solution, meeting online
     Cisco Webex
By: Fortinet, Inc.     Published Date: Jul 27, 2011
As many network administrators initiate their IPv6 migration projects, other IT professionals do not know where to begin. This white paper first describes the importance of securing the network against IPv6 threats well before the introduction of any IPv6 traffic. It then outlines the steps involved to begin securing a transitional IPv4/IPv6 network.
Tags : fortinet, fortigatet, ipv6 migration, network security, ipv6 transition, ipv6 translation, performance management, threat management
     Fortinet, Inc.
By: Fortinet, Inc.     Published Date: Jul 27, 2011
This white paper describes common DoS techniques, explains the technology integrated into every FortiGate consolidated security platform that helps in blocking DoS attacks, and offers suggestions on how to prevent an organization's network from being used to attack another organization.
Tags : fortinet, fortigate dos protection, malicious traffic, denial of service, ddos protection, network security, fortios, attacks
     Fortinet, Inc.
By: Red Hat Government     Published Date: Jul 21, 2011
This whitepaper describes the various forms that cloud computing can take and how different types of technology relate to each other.
Tags : red hat, open source, enterprise linux, enterprise solutions, virtualization, linux, unix, redhat
     Red Hat Government
By: IBM Cloud Business     Published Date: Jul 13, 2011
Cloud computing doesn't just change where applications are run. It changes the processes used to build, deploy and ultimately manage them. Hear industry experts describe how cloud computing can modernize app development and testing to make your business more dynamic!
Tags : ibm, application, cloud, development, agile, smart, work, panelists
     IBM Cloud Business
By: IBM Cloud Business     Published Date: Jul 12, 2011
Get under the hood: This technical note describes how to transform XML response into a JavaT-usable response by creating Plain Old Java Objects (POJOs) and calling JAXB's unmarshal method. Simplify how to send requests to create new instances based on images that request parameters from Java classes.
Tags : ibm corp., java, programming languages, software development, software/web development
     IBM Cloud Business
By: Webroot     Published Date: Jul 08, 2011
This paper describes the evolution and future of the online threat environment, and outlines the security, economy, performance, and control available to smaller businesses who act now to adopt Security as a Service.
Tags : webroot, saas, security as a service, computer security software, antispyware software, home internet security, enterprise internet security, solution center
     Webroot
By: IBM Corporation     Published Date: Jun 28, 2011
The internal staff at Ptak, Noel & Associates determined that their ability to deliver services was highly dependent upon their capability to operate with highly reliable and efficient IT operations. The changes described in this case study explain how Service Desk Management help them to achieve that goal.
Tags : service desk management, problem management, incident and access management, incident management process, incident management software, ptak noel & associates, it operations, service desk management
     IBM Corporation
By: IBM Corporation     Published Date: Jun 28, 2011
Their ability to deliver services is highly dependent upon their capability to operate with highly reliable and efficient IT operations. The changes described in this case study will help to assure they will be able to achieve that goal.
Tags : ibm, service management, tivoli, automation, it asset management, service request management, infrastructure, itil
     IBM Corporation
By: Liaison Technologies     Published Date: Jun 03, 2011
This white paper describes best practices in encryption, key management and tokenization and how an integrated, multi-level solution can effectively meet these best practices.
Tags : liaison, nubridges, data protection, encryption, key management, tokenization, data security, audit trails
     Liaison Technologies
By: EMC Corporation     Published Date: May 27, 2011
This ESG paper describes how through consistent individual product innovation and integration EMC backup and recovery solutions tackle the issues that prevent customers from transforming data protection.
Tags : esg analyst report, emc, data protection, backup, brian babineau, david a. chapa, data growth, infrastructure
     EMC Corporation
By: CA Virtualization/Automation     Published Date: May 25, 2011
This video describes that maturity lifecycle and the key management activities you will need to get past these tipping points, drive virtualization maturity and deliver virtualization success, at every stage of your virtualization lifecycle.
Tags : virtualization project, private cloud, virtualization video, virtualization lifecycle, lifecycle management, data center design
     CA Virtualization/Automation
By: Adobe Systems, Inc.     Published Date: May 17, 2011
This paper highlights the advances in closed-loop marketing that enable measurement and optimization of digital marketing efforts. It also describes the challenges that CMOs face when pursuing digital marketing strategies and how next-generation WCM solutions help CMOs overcome those challenges.
Tags : adobe, cmo, digital marketing, organization transformation, chief marketing officer, customer experience management, wcm, multichannel pipeline growth
     Adobe Systems, Inc.
Start   Previous    17 18 19 20 21 22 23 24 25 26 27 28 29 30 31    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics