RSS feed Get our RSS feed

News by Topic

scribe

Results 576 - 600 of 854Sort Results By: Published Date | Title | Company Name
By: LogLogic     Published Date: Mar 15, 2012
Garnering critical IT insight helps organizations and individuals make the right decisions to better serve customers, partners, regulatory bodies and internal employees and answer many important business challenges. This whitepaper describes LogLogic's philosophy and evolution of IT Data Management.
Tags : log management, siem, big data, storage, sem, pci compliance, it operations, data storage
     LogLogic
By: SAS     Published Date: Mar 01, 2012
How does an organization make the best use of data, and what is the proper role of IT? This paper describes how organizations can foster a culture of data analytics that promotes cooperation and collaboration between IT and business.
Tags : sas, analytics, business analytics, business intelligence, customer intelligence, data management, fraud & financial crimes, high-performance analytics
     SAS
By: SAS     Published Date: Feb 29, 2012
In a webcast co-hosted by the AMA and SAS, presenters described three areas of focus for using social media, and the five best practices for being effective in social media. This paper provides a summary of that webcast.
Tags : sas, analytics, business analytics, business intelligence, customer intelligence, data management, fraud & financial crimes, high-performance analytics
     SAS
By: SAS     Published Date: Feb 29, 2012
In this white paper, Ian Henderson of Sword Ciboodle and Retha Keyser of SAS describe what that ideal can look like and how to achieve it.
Tags : sas, analytics, business analytics, business intelligence, customer intelligence, data management, fraud & financial crimes, high-performance analytics
     SAS
By: Oracle     Published Date: Feb 28, 2012
This white paper describes how B2B organizations can use B2B online commerce to lower costs, retain customers, grow the business, and reduce complexity for customers-all essential activities for competing in the evolving marketplace.
Tags : on demand, oracle on demand, instant gratification, crm, customer relationship management, deployment, saas, software-as-service
     Oracle
By: IBM Software     Published Date: Feb 03, 2012
This paper from IBM describes how to build a proactive threat and risk strategy based on predictive analytics; examples of how organizations used predictive analytics to minimize the negative impact of risk and maximize positive results; and steps to advance your organization's use of predictive analytics to combat threat and risk.
Tags : predictive threat, security, technology, risk management, security policy, ibm, intrustion protection
     IBM Software
By: Taleo     Published Date: Jan 25, 2012
This paper outlines a 12 step methodology for building critical talent pipelines and provides insights into strategy and initiatives. It also describes the process and technology support that delivers Talent Intelligence information from defining roles to refining execution.
Tags : taleo, human resources, talent, employee, talent management, hr management
     Taleo
By: Brainloop     Published Date: Jan 04, 2012
This white paper by Michael Rasmussen, J.D., CCEP, OCEG Fellow, describes the risks introduced by current document sharing practices, and how compliance and IT security must work together to mitigate information risk while improving their organizations' efficiency and competitiveness.
Tags : brainloop, technology, security, it security, end users
     Brainloop
By: Oracle     Published Date: Dec 13, 2011
This white paper describes and analyzes the 5 most popular deployment scenarios to help IT and business decision makers pick the best options
Tags : on demand, oracle on demand, instant gratification, crm, customer relationship management, deployment, saas, software-as-service
     Oracle
By: Liaison Technologies     Published Date: Nov 21, 2011
In this whitepaper, we describe how executive and IT management can get and maintain control of their company's data architecture to help meet business objectives. We describe the relationship between data integration projects and data architecture concepts and practices. We describe how the business planning and IT development processes that direct and leverage data integration projects depend on tooling. We describe breakthrough ways in which data architects, business analysts, programmers, and business users can collaborate to address their organization's pressing business challenges.
Tags : enterprise, soa, technology, liaison, business, data integration, data architecture, it management
     Liaison Technologies
By: Gleanster     Published Date: Nov 10, 2011
This Gleansight benchmark report is based on the experiences of 387 companies and includes the following sections: Reasons to Implement, Challenges, Value Drivers, Core Technologies and Success Story. It also includes a Vendor Landscape with descriptions, rankings and analysis of 39 solution providers. Social intelligence is being increasingly used today to describe the next rung on the evolutionary ladder of listening to and acting upon consumer conversation on the social web. That rung maps to a number of technology innovations. Chief among them are improved capabilities around analyzing and integrating all sources of voice-of-the-customer data to generate more actionable insights. Social intelligence also speaks to an emerging corporate mindset regarding the strategic importance of social data and the need to better capitalize upon it. This Gleansight benchmark report reveals how Top Performers are achieving success when it comes to the incessant quest to extract customer insights and take actions that ultimately translate into revenue growth, cost reduction, risk reduction and relationship enhancement.
Tags : social intelligence, marketing, social media, gleanster, business intelligence, market research, usability, social media marketing
     Gleanster
By: Dell Storage     Published Date: Nov 08, 2011
This white paper describes how Fluid Data storage reduces the capacity required to support VMware and maximizes system performance and efficiency.
Tags : dell compellent, vmware server virtualization, compellent san, virtualized storage platform, fluid data storage, system performance, resource management, disaster recovery
     Dell Storage
By: IBM Software     Published Date: Oct 24, 2011
This paper describes how to build a proactive threat and risk strategy based on predictive analytics and provides real life examples of the benefits.
Tags : ibm, predictive analytics, collaboration, insights, integration, automation, smarter, data analysis
     IBM Software
By: Nimsoft     Published Date: Oct 24, 2011
This paper describes unique characteristics of cloud service delivery models; details distinct monitoring responsibilities & challenges of each model
Tags : nimsoft, cloud service, delivery, models, monitor, monitoring, challenges
     Nimsoft
By: Adaptive Planning     Published Date: Oct 19, 2011
It's inefficient, ages too quickly, and is out of sync with the strategic plan. No wonder so many executives hate toiling over the annual budget. But, says Peter Horvath, don't look to the budget as the sole management system. Horvath and his associate Ralf Sauter describe six ways to fix budgeting, including integrating it with such systems as the Balanced Scorecard, so that it supports strategy execution in today's fast-changing environment.
Tags : adaptive, marketry, business, finance, accounting, budget
     Adaptive Planning
By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 15, 2011
"The Shortcut Guide to Business Security Measures Using SSL" examines current information security threats to business and describes techniques for developing a security management strategy that leverages established best practices.
Tags : extended validation, measures, green bar, online security, optimize, sgc, server gated cryptography, verisign
     VeriSign Authentication Services, now a part of Symantec Corp.
By: GoToWebinar     Published Date: Oct 05, 2011
"So you drank the Kool-Aid and subscribed to the idea that your presentations need to ""tell a story"" and ""be more visual."" But how do you translate dry information into something that's compelling to your audience? When you get back to the basics and focus on the structure of the information you present, you'll find a new way to lay the groundwork for a clean and clear storyboard that will deliver the story and visuals you want. Watch this on-demand webinar to hear Cliff Atkinson, author of Beyond Bullet Points, talk about how you can turn dry content into a compelling presentation. "
Tags : citrix, webinar, presentations, visuals, technology, marketing, structure, on-demand
     GoToWebinar
By: Silverpop     Published Date: Sep 19, 2011
The most successful marketers will be those who stand out by infusing their content with a more human feel. Here are five tips and tactics guaranteed to strengthen your messages and delight your subscribers.
Tags : silverpop, humanizing content, personal attention, social media, web analytics, customer experience/engagement, social media marketing
     Silverpop
By: LifeSize, a division of Logitech     Published Date: Aug 25, 2011
This briefing from the Government Business Council (GBC) describes the growth of telework and how agencies can identify key indicators for success...
Tags : lifesize, video conferencing, multimedia presentation, productivity, high definition
     LifeSize, a division of Logitech
By: Trend Micro Inc.     Published Date: Aug 25, 2011
This white paper describes the evolution of these changes as enterprises adopt virtualization and then cloud computing. It then describes Trend Micro's vision for the evolution of security as a facilitator of mobility, virtualization, and cloud computing.
Tags : trend micro, virtualization, cloud computing, security, internet content security, smart protection network, trend micro internet security, enterprise business security
     Trend Micro Inc.
By: Cisco Webex     Published Date: Aug 16, 2011
Cisco WebEx supports 10 million subscribers each month with easy-to-use web applications. It's free, it's easy, it's WebEx . . . try it today.
Tags : cisco webex, webex meeting center, free trial, sales cycle, customer interaction, video, imenterprise im solution, meeting online
     Cisco Webex
By: Fortinet, Inc.     Published Date: Jul 27, 2011
As many network administrators initiate their IPv6 migration projects, other IT professionals do not know where to begin. This white paper first describes the importance of securing the network against IPv6 threats well before the introduction of any IPv6 traffic. It then outlines the steps involved to begin securing a transitional IPv4/IPv6 network.
Tags : fortinet, fortigatet, ipv6 migration, network security, ipv6 transition, ipv6 translation, performance management, threat management
     Fortinet, Inc.
By: Fortinet, Inc.     Published Date: Jul 27, 2011
This white paper describes common DoS techniques, explains the technology integrated into every FortiGate consolidated security platform that helps in blocking DoS attacks, and offers suggestions on how to prevent an organization's network from being used to attack another organization.
Tags : fortinet, fortigate dos protection, malicious traffic, denial of service, ddos protection, network security, fortios, attacks
     Fortinet, Inc.
By: Red Hat Government     Published Date: Jul 21, 2011
This whitepaper describes the various forms that cloud computing can take and how different types of technology relate to each other.
Tags : red hat, open source, enterprise linux, enterprise solutions, virtualization, linux, unix, redhat
     Red Hat Government
By: IBM Cloud Business     Published Date: Jul 13, 2011
Cloud computing doesn't just change where applications are run. It changes the processes used to build, deploy and ultimately manage them. Hear industry experts describe how cloud computing can modernize app development and testing to make your business more dynamic!
Tags : ibm, application, cloud, development, agile, smart, work, panelists
     IBM Cloud Business
Start   Previous    17 18 19 20 21 22 23 24 25 26 27 28 29 30 31    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics