RSS feed Get our RSS feed

News by Topic

scribe

Results 651 - 675 of 854Sort Results By: Published Date | Title | Company Name
By: Net Atlantic     Published Date: Sep 10, 2010
Net Atlantic's free on-demand webinar, Solutions for Email Subscriber Management, covers several ways to manage your subscribers to maximize deliverability, including permission options, suppression files, re-engagement campaigns, and more. Your relationship with your clients is the most important factor in your success. A good email service provider should provide you with the tools to help you engage your subscribers successfully. View It Now - On Demand! Recorded Live on September 2, 2010
Tags : net atlantic, subscriber email, email management, deliverability, webinar, esp, crm, social media
     Net Atlantic
By: SAS     Published Date: Sep 08, 2010
This paper describes five business analytics styles used today and the building blocks required in implementing these styles. It is important to consider which of these styles is valid for your organization now and into the future.
Tags : sas, reporting, data warehouses, business activity monitoring, data integration
     SAS
By: Mentor Graphics     Published Date: Sep 01, 2010
This paper will examine current methods used to eliminate waived errors at the chip level and describe a new automatable method for identifying and removing waived errors from DRC results.
Tags : mentor graphics, automated drc, violation waiver management, ip block integration, design rule checking
     Mentor Graphics
By: Mentor Graphics     Published Date: Sep 01, 2010
What Is CFA and Why Do I Need It? This five-part paper series examines the conditions that led to the development of recommended rules, and describes the process by which automated design analysis and rule verification can help designers optimize designs to the fullest and most efficient use of area, while still ensuring manufacturability.
Tags : mentor graphics, critical feature analysis, cfa, design for manufacturing, dfm, automated design analysis, rule verification
     Mentor Graphics
By: Symantec.cloud     Published Date: Sep 01, 2010
Part 1 describes the threat landscape as seen by SMBs, and describes the security controls that belong in Stage 1.
Tags : messagelabs us, it security, smb, risk management, protection, malware, anti-spam, anti-virus
     Symantec.cloud
By: Symantec.cloud     Published Date: Sep 01, 2010
This is the second part of a three-part white paper series. Part 2 describes how organizations can develop a security profile for themselves that will show them which of the Stage 1 controls they most need to build up and strengthen.
Tags : messagelabs us, it security, smb, security profile, anti virus, anti spam, firewalls, vulnerability
     Symantec.cloud
By: Symantec.cloud     Published Date: Sep 01, 2010
This is the third part of a three-part white paper series. Part 3 describes how to move on from the basic controls and how each organization should decide which, of all the extra security controls available, are right to be brought in next.
Tags : messagelabs us, it security, smb, activity logging, vulnerability check
     Symantec.cloud
By: Citrix Online     Published Date: Aug 31, 2010
In this brief white paper we will describe the economic "reset" that is changing the rules for creating value.
Tags : citrix online marketing, distributed workforce, mobile work, interactive/pr agencies, search marketing agencies, interactive marketing, marketing software, webinars & web conferencing
     Citrix Online
By: Polystar     Published Date: Aug 31, 2010
This article describes the problems of monitoring modern 10Gbps telecom networks and some of the solutions.
Tags : polystar, 10gbps, network monitoring
     Polystar
By: SAS     Published Date: Aug 27, 2010
This report describes a research project that investigated how organizations are attempting to improve specific decisions.
Tags : sas, data management, decision making, tom davenport, decision making, iia, international institute of analytics
     SAS
By: Washco Consulting     Published Date: Aug 19, 2010
This article describes the five basic principles through which you can begin your journey to becoming a "black belt" in business.
Tags : achieving success, career advancement tips, business success, success in business, skills for success
     Washco Consulting
By: NetApp     Published Date: Aug 18, 2010
In this article hear from Keith Alioto, IT Director at Osiris Therapeutics discuss the evolution of their infrastructure and describe where they are now and where they're headed.
Tags : netapp, storage, consolidating windows storage, vmware, data management
     NetApp
By: Korenix Technology     Published Date: Aug 03, 2010
This white paper describes the surveillance video multicasting technology, highlights the benefits of IGMP as well as its integration in Korenix devices for assuring high quality video communication in surveillance applications.
Tags : igmp, igmp snooping, igmp query, ip surveillance, video surveillance, video multicast, video multicasting, video transmission
     Korenix Technology
By: Arcserve     Published Date: Jul 23, 2010
This white paper describes an approach that provides these performance metrics for specific IT stakeholders, all drawn from data collection and analytics that support a holistic, integrated approach to optimizing IT service delivery.
Tags : ca technologies, performance metric, it service, monitoring, productivity, customer retention, service assurance
     Arcserve
By: Savvis     Published Date: Jul 07, 2010
This paper describes the Symphony VPDC enterprise-grade infrastructure service that provides true high availability enterprise IT environments, supporting development to production, with automated provisioning of servers, network, storage, software and security.
Tags : savvis, virtual private data center, cloud computing, virtualization, vpdc, hosting management service
     Savvis
By: Bell Micro     Published Date: Jun 14, 2010
This paper describes the benefits, features and best practices using a XIV in a SAP environment.
Tags : bell micro, sap application, best practices, ibm xiv, storage system
     Bell Micro
By: Bell Micro     Published Date: Jun 14, 2010
In this white paper, we describe the XIV snapshot architecture and explain its underlying advantages in terms of performance, ease of use, flexibility and reliability.
Tags : bell micro, hardware, storage management, vmware, ibm xiv
     Bell Micro
By: Citrix Online     Published Date: Jun 09, 2010
This eBook describes techniques to maximize the effectiveness of training delivered online "live" and in real time--in terms of planning and execution to maximize engagement and retention--and to achieve measurable results.
Tags : citrix gototraining, live online training, elearning, best practices
     Citrix Online
By: WhatCounts     Published Date: Apr 30, 2010
There's no reason overseeing and managing a million-plus subscriber email database should be a discombobulated and overbearing task. Start being an effective email marketer by creating a plan, brushing up on your skills, and cleaning house. Implementing these six simple tweaks will go a long way towards maximizing the return, response, and revenue from your email program.
Tags : whatcounts, email marketing, subscriber lists, email database, databasing, email marketing services/software
     WhatCounts
By: EMC Backup & Recovery Solutions     Published Date: Apr 29, 2010
This white paper describes components of the VMware vSphere and VMware View solutions and discusses options for protecting these environments using EMC Avamar with global source-based data deduplication.
Tags : emc, data domain, efficiency, vmware, server consolidation, servers, data integrity, backup
     EMC Backup & Recovery Solutions
By: EMC Backup & Recovery Solutions     Published Date: Apr 28, 2010
This document showcases EMC's portfolio of backup and recovery products and describes how they provide the flexibility and scalability to meet the data protection needs of enterprises of all sizes.
Tags : emc, data domain, efficiency, api, disk backup, recovery, vmware, server consolidation
     EMC Backup & Recovery Solutions
By: Proofpoint     Published Date: Apr 22, 2010
This whitepaper addresses the key e-discovery challenges facing legal and IT departments today, form the impact of regulations such as the Federal Rules of Civil Procedure (FRCP) to the technology required to deal with them. Finally, this paper describes how businesses can develop a proactive strategy to deal with e-discovery requests in the event of litigation, saving time and money in the process.
Tags : proofpoint, email archiving, e-discovery, federal rules of civil procedure, frcp, electronic data, search and retrieval of messages
     Proofpoint
By: ASG Software Solutions     Published Date: Apr 20, 2010
This paper can help you achieve successful legacy modernization projects. It presents practical steps for starting application modernization projects and describes the benefits of three high payback strategies. It also reviews the criteria for evaluating a variety of modernization tools.
Tags : asg, application modernization, clarity consulting, apo, application performance optimization, business intelligence
     ASG Software Solutions
By: BlueHornet     Published Date: Apr 12, 2010
Email marketing service provider BlueHornet recently partnered with mobile marketing solutions provider SmartReply to develop an automated sign up process via mobile text messaging for email marketing communications. In this free case study, learn how Chuck E. Cheese's, a nationally recognized leader in full-service family entertainment and dining, used text messaging as a sign up method for their Chuck E-Club email program to grow their email list and increase engagement levels.
Tags : bluehornet, email marketing, mobile text messaging, email marketing services/software
     BlueHornet
By: APC     Published Date: Apr 08, 2010
Many of the mysteries of equipment failure, downtime, software and data corruption, are the result of a problematic supply of power. There is also a common problem with describing power problems in a standard way. This white paper will describe the most common types of power disturbances, what can cause them, what they can do to your critical equipment, and how to safeguard your equipment, using the IEEE standards for describing power quality problems.
Tags : apc, power, cooling, it wiring, heat removal, green computing, ieee, equipment failure
     APC
Start   Previous    16 17 18 19 20 21 22 23 24 25 26 27 28 29 30    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics