RSS feed Get our RSS feed

News by Topic

scribe

Results 751 - 775 of 854Sort Results By: Published Date | Title | Company Name
By: SubscriberMail     Published Date: Dec 12, 2008
The growing complexity of today's email market has created a deeper need to carefully consider the creative aspects of your email messages. While the need for quality and effective design has always existed from a pure marketing standpoint, challenges unique to the email space require a different look at creative from the perspective of accomplishing specific goals via email. This white paper introduces several of the numerous critical parameters that should be given consideration when preparing email creative, and provides real-world tactics to optimize email creative for maximum results. Normal 0 false false false EN-US X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;}
Tags : subscribermail, email creative, email copy, email marketing, email marketing services/software
     SubscriberMail
By: Platform Computing     Published Date: Dec 11, 2008
Studies show that data centers are doubling their total power consumption every 5 years.  But have most data centers optimized their energy consumption with the current available solutions? Platform Computing knows there is room in data centers to reduce energy costs by 10-30%. This paper describes strategies for dynamically managing the energy consumption to achieve similar results.
Tags : platform computing, high performance computing, power & cool servers, data centers, blade technology, system management, green strategies, storage
     Platform Computing
By: LockLizard     Published Date: Dec 08, 2008
This white paper describes the differences between information, IPR and trade secrets, and where these might apply. 
Tags : ipr/drm protection, locklizard, drm controls, digital rights management, security
     LockLizard
By: IBM     Published Date: Dec 03, 2008
With the IBM® System Storage™ DS3400 storage server, SAP customers can increase the efficiency of their storage infrastructure while reducing costs at the same time. This white paper describes the advantages of using the DS3400 storage server in an SAP® environment, and how to get the performance you need with the right layout for your SAP system.
Tags : ibm, express seller, sap performance, ds3400 storage server, storage efficiency, ibm system storage, storage
     IBM
By: Melissa Data Corp.     Published Date: Nov 18, 2008
This white paper describes the seven steps you need to develop a plan for data quality – one that scales to your growing business needs.
Tags : melissa data, data quality, contact data verification, address verification, validate address, address verification software, address verify, address validation software
     Melissa Data Corp.
By: Melissa Data     Published Date: Nov 18, 2008
This white paper describes the seven steps you need to develop a plan for data quality – one that scales to your growing business needs.
Tags : melissa data, data quality, contact data verification, address verification, validate address, address verification software, address verify, address validation software
     Melissa Data
By: Melissa Data     Published Date: Nov 18, 2008
Tom Brennan and John Nydam explain the Melissa Data and Stalworth partnership, discuss the business problems caused by bad data, and describe how DQ*Plus provides a complete data quality solution for enterprise applications and commercial databases.
Tags : melissa data, data quality, contact data verification, address verification, validate address, address verification software, address verify, address validation software
     Melissa Data
By: BLADE Network Technologies     Published Date: Nov 18, 2008
This document describes enterprise virtualization today and the anticipated uses of this technology, particularly leveraging the capabilities provided by widespread adoption of 10 Gigabit Ethernet (10GbE) as a single, converged network fabric.
Tags : blade network technologies, next-generation datacenter networks, virtualization today, 10gbe, network virtualization
     BLADE Network Technologies
By: IBM     Published Date: Nov 13, 2008
To grow your subscriber base, reduce churn and control costs, it is imperative that you achieve and maintain a deep understanding of the customer experience throughout your organization. This white paper highlights IBM Tivoli® Netcool® Service Quality Manager Service Solutions — how it can change the way telecommunications providers are taking new services to market and helping to crystallize.
Tags : ibm, tivoli, voip, iptv, blackberry, service level agreement
     IBM
By: Microsoft Office     Published Date: Nov 07, 2008
To allow organizations and individuals the flexibility to address their specific challenges, Microsoft has a variety of Microsoft® Office suites to select from. This paper describes the commonalities and differences among the suites of the 2007 Microsoft Office system: Microsoft Office Standard 2007, Microsoft Office Professional Plus 2007, Microsoft Office Enterprise 2007, and Microsoft Office Ultimate 2007. Each suite provides the core Microsoft Office applications as well as features that support integrated content management, information rights and policy, and integrated electronic forms; however, they differ in the selection of included applications and the ways in which advanced features are implemented.
Tags : microsoft, office, office suites 2007
     Microsoft Office
By: TRUSTe     Published Date: Oct 28, 2008
See how Cheapflights improved lead quality while gathering over one million opt-in newsletter registrations and increasing monthly site registrations by 26%.
Tags : truste, cheapflights, email privacy, opt-in, newsletter, bounce rates, privacy policy, truste
     TRUSTe
By: HP     Published Date: Oct 22, 2008
HP is pleased to introduce disk encryption for the HP StorageWorks XP24000 and HP StorageWorks XP20000 Disk Arrays. This white paper describes the encryption feature including the background of what the challenge is that the product addresses, what the feature consists of and how it is ordered.
Tags : disaster proof, 4aa2-2629enw, xp24000, xp20000, disk arrays, encryption, storageworks, security
     HP
By: Likewise Software     Published Date: Oct 07, 2008
This document describes how Likewise and Microsoft Active Directory can foster compliance with the Payment Card Industry Data Security Standard, a set of requirements for businesses that process payment card information. Developed by Visa, American Express, Discover Financial Services, and other members of the PCI Security Standards Council, the standard sets forth policies, procedures, and practices to protect customer account data. The standard includes specific requirements for strictly controlling access to customer data, authenticating business users, monitoring access, maintaining a secure network, and auditing system resources. Likewise integrates Linux, Unix, and Mac OS X workstations and servers into Active Directory, providing the basis to assign each user a unique ID for authentication, authorization, monitoring, and tracking. Likewise also provides group policies for non-Windows computers so that their security settings and other configurations can be centrally managed in the same way as Windows computers.
Tags : likewise, pci data security, linux, unix, mac os x, windows
     Likewise Software
By: Likewise Software     Published Date: Oct 07, 2008
This document describes how Likewise improves the security of Linux and UNIX computers by allowing computers to authenticate and authorize users through Microsoft Active Directory.
Tags : likewise, linux, unix, microsoft active directory, microsoft windows, security
     Likewise Software
By: Likewise Software     Published Date: Oct 07, 2008
This document describes how Likewise facilitates the implementation of enterprise single sign-on (SSO). It explains how Kerberos-aware applications can be configured to exploit the authentication infrastructure provided by Likewise. It explains the concepts as well as outlining the specific steps that must be taken to enable single sign-on support in applications.
Tags : likewise, linux, unix, (sso), kerberos, open ssh, security
     Likewise Software
By: CA WA 2     Published Date: Oct 01, 2008
Virtualization and clustering can bring many benefits to your business—better IT asset utilization, improved business continuity and improved operational efficiency. At the same time, virtualization can create a new level of complexity for IT. This white paper describes some of the technical challenges inherent in managing these complex environments and recommends strategies for successful deployment that will maximize the value of virtualization technology in your organization.
Tags : virtual, virtual machine, virtual storage, virtual server, virtualization, ca wa, ca wa 2
     CA WA 2
By: NeighborhoodAmerica     Published Date: Oct 01, 2008
Virtually all organizations are realizing the importance of customer engagement. But in order to benefit, we must subscribe to the idea that consumers really can add value to our organization. And sometimes, that means removing the notion that we are the experts in exchange for the belief that we can learn a thing or two from our customers. The collective intelligence of the communities we serve is largely an untapped asset - a stream of valuable input that can help improve the decisions we make and shape the products we sell. This book explores the value of many - and the role that customer engagement will play in shaping the future of our businesses, our government, and our economy.
Tags : neighborhood america, social network, web 2.0, data integration, customer experience/engagement
     NeighborhoodAmerica
By: VMware Dell     Published Date: Sep 30, 2008
This white paper describes a virtualized infrastructure that applies storage and server virtualization technologies to cost-effectively achieve a flexible, high performance, dynamic IT infrastructure that is simple to manage and scale.
Tags : vmware, dell, virtual server, virtual storage, equallogic, iscsi san, esx server, internet engineering task force (ietf)
     VMware Dell
By: TowerData     Published Date: Sep 18, 2008
Is the success of your email marketing program limited by the size of your subscriber list? Email append, the process of adding email addresses to a postal customer database, is a quick and affordable way to expand the size of your email list. If you haven’t considered it in the past, it’s time to take a look. Perceptions about email append and the methods for doing it have matured over the past few years, and it’s now a predictable and reliable email list growth tactic. This white paper provides guidelines and best practices for consumer email appending.
Tags : customer acquisition, email marketing, database, email database, leads, lead, towerdata, tower data
     TowerData
By: Tail-f Systems     Published Date: Sep 16, 2008
This whitepaper describes how NETCONF and YANG can help drastically simplify network configuration management. The IETF has recently standardized the NETCONF configuration management protocol and is currently in the process of standardizing a NETCONF-oriented data modeling language called YANG. These two new technologies promise to drastically simplify network configuration management.
Tags : configuration management, netconf, yang, next-generation network management, next-generation networks, netconf protocol, tail-f, tailf
     Tail-f Systems
By: Dell EqualLogic     Published Date: Sep 15, 2008
This white paper describes a virtualized infrastructure that applies storage and server virtualization technologies to cost-effectively achieve a flexible, high-performance, dynamic IT infrastructure that is simple to manage and scale.
Tags : dell equallogic, dell, equallogic, infrastructure, virtual, virtualization, virtual infrastructure
     Dell EqualLogic
By: CA Mainframe     Published Date: Sep 12, 2008
This paper describes the approaches in MDD, explains how CA Gen fits into the larger picture of application development, and relates customer experiences to underpin the quiet success. Access this White Paper now to learn how to CA Gen goes one step further!
Tags : model, application development, software development, ca mainframe, mainframe
     CA Mainframe
By: CA Mainframe     Published Date: Sep 12, 2008
This white paper describes the trends that are not only keeping the mainframe market alive but are supporting its growth. The growing complexity of IT makes consolidation and simplification of IT asset management essential. At the same time, increases in energy costs and concern about the environment are also impacting markets. Mainframes are uniquely positioned to provide the automation and virtualization today's complex infrastructures require while using less energy.
Tags : ca mainframe, mainframe
     CA Mainframe
By: CA ITAM     Published Date: Sep 09, 2008
In this white paper, EMA discusses the evolution of asset management and asset analytics in the context of overall IT objectives, and describes the need for a standardized environment that is automatically discovered and holistically visualized.
Tags : 
     CA ITAM
By: IBM     Published Date: Aug 21, 2008
Reliability Centered Maintenance (RCM) is an advanced maintenance strategy for increasing asset availability by minimizing downtime caused by failures, reducing an asset’s total cost of ownership and increasing overall equipment effectiveness (OEE).This white paper describes the Reliability Centered Maintenance (RCM) process, breaking it down into seven steps including supporting information on how IBM Maximo® Asset Management supports each step of the process.
Tags : rcm, reliability centered maintenance, asset-intensive, maximo asset management, it management, infrastructure, network management, ibm mi
     IBM
Start   Previous    21 22 23 24 25 26 27 28 29 30 31 32 33 34 35    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics