base

Results 4301 - 4325 of 4745Sort Results By: Published Date | Title | Company Name
Published By: Aprimo, Inc.     Published Date: Dec 19, 2008
Financial Company Marketing maintains all key functions of marketing in-house to include: marketing strategy, creative services, direct mail, lead management, eCommerce, emerging markets, database, reporting analytics, strategic partnerships & cross-sell, and print vendor management.
Tags : 
marketing process improvement, marketing resource management, aprimo, marketing productivity, data management
    
Aprimo, Inc.
Published By: Aprimo, Inc.     Published Date: Dec 23, 2008
Planning & Financial Management addresses this broad business issue. Planning & Financial Management is one component within the Aprimo Suite. The entire suite is based on our Enterprise Marketing Backbone that reduces total cost of ownership and connects your marketing technology with the rest of the enterprise.
Tags : 
aprimo, financial management, financial planning, marketing technology, marketing spend, it management
    
Aprimo, Inc.
Published By: Prodiance Corp.     Published Date: Dec 22, 2008
According to Baseline Consulting, approximately 32% of corporate data is contained in enduser computing (EUC) applications and approximately 68% is stored in IT controlled applications. These EUCs – primarily spreadsheets, PC databases (e.g. Access databases), BI reports, and word documents – are often stored on employee desktops and corporate file shares, and for the most part, are uncontrolled. They lack the proper safeguards and controls one would expect with IT controlled applications, including documentation, version control, back-up and archival, change control, testing, security and access control, and more.
Tags : 
prodiance, end-user computing (euc), risk assessment, automation, monitoring, spreadsheet, link migration, networking, security
    
Prodiance Corp.
Published By: Enhancement Software     Published Date: Jan 30, 2009
This white paper is intended to explore the process of secure and efficient paperā€based document marking and printing using Microsoft® Word. At the same time it will explore the savings that can be realized by implementing an automated practice that reduces risk of unintended use.
Tags : 
enhancement software, stampit, automated document marking, document integrity, corporate accountability, compliance, risk management, roi
    
Enhancement Software
Published By: OwlPoint, LLC     Published Date: Feb 11, 2009
IT Service Management (ITSM) is a proven, mature framework that can be utilized to support Green IT programs. Green IT and ITSM share common goals, such as operational efficiencies and metrics based improvements. Existing processes and supporting ITSM tools can easily be adapted to support Green IT initiatives. ITSM provides the structure to be successful as well as for documenting and sharing the achievements. This white paper explains how a service management framework can contribute to you.
Tags : 
owlpoint, itsm, green it, it service management, service management framework, it management
    
OwlPoint, LLC
Published By: SPSS     Published Date: Jun 29, 2009
This paper will focus on how a company might identify its best customers, but the same process could be used for other customer segments.
Tags : 
spss, customer management, consumer behavior, customer retention, crm, customer service, cost-effective strategies, customer database, statistical analysis, data management, data analysis, recency, frequency, and monetary value, rfm, best customers, customer lifetime value, chi-square, customer experience, enterprise applications
    
SPSS
Published By: Subrago     Published Date: Apr 30, 2009
The key objective of this white paper is to highlight the key issues and discuss processes and controls required to build a high performing IT support organization.
Tags : 
it support, subrago, it costs, customer transaction, high performing it support, it dependency, tolerance level, production services, change management, itil, itil v3, efficiency, it infrastructure, cab, change advisory board, segregation of duties, zero down, metrics, hardware performance, database performance
    
Subrago
Published By: Ping Identity     Published Date: May 05, 2009
Web Services are emerging as the preeminent method for program-to-program communication across corporate networks as well as the Internet. Securing web Services has been a challenge until recently, as typical Web authentication and authorization techniques employed browser-to-server architectures (not program-to-program). This resulted in user identity ending at the Web Application Server, forcing the Web Services Provider to trust blindly that the Web Services Requester had established identity and trust with the end user.
Tags : 
pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml, security assertion markup language, pki, public key infrastructure, soa, oasis, ws-trust, sso, single sign-on, service oriented architecture, rest, user identity mapping, ldap
    
Ping Identity
Published By: Data Guard Systems, Inc     Published Date: May 06, 2009
Whether and organization or an individual, identity theft spells a long, expensive, and complex recovery process. However, online identity theft can be prevented with encryption software and advanced password protection.
Tags : 
online identity theft, encryption software, advanced password protection, alertboot, identity, theft, dataguard, credit card, payment, fraud, anti-virus, anti-spam, pre-boot authentication, advanced password protection, file-based password protection, encryption, full disk, file encryption, data security, security
    
Data Guard Systems, Inc
Published By: Data Guard Systems, Inc     Published Date: May 06, 2009
The data security challenges for financial services providers—from the solo accounting professional to the midsize accounting firm to world’s largest corporation, from CPAs to CFPs to credit counselors—have never been as challenging as they are in today’s turbulent times. And although the large data breaches at the most recognizable companies receive the most publicity, small companies and solo offices can also be victims, according to the Better Business Bureau.
Tags : 
online identity theft, encryption software, advanced password protection, alertboot, identity, theft, dataguard, credit card, payment, fraud, anti-virus, anti-spam, pre-boot authentication, advanced password protection, file-based password protection, encryption, full disk, file encryption, breach, breaches
    
Data Guard Systems, Inc
Published By: Data Guard Systems, Inc     Published Date: May 06, 2009
The data security challenges for financial enterprises have never been as challenging as they are in today's turbulent times. Not only must financial enterprises comply with regulations such as SOX, GBLA and PCI along with a multitude of state regulations concerning customer privacy and electronic data security, they must also guard against the staggering costs—both tangible and intangible—that a security breach can incur.
Tags : 
online identity theft, encryption software, advanced password protection, alertboot, identity, theft, dataguard, credit card, payment, fraud, anti-virus, anti-spam, pre-boot authentication, advanced password protection, file-based password protection, encryption, full disk, file encryption, breach, breaches
    
Data Guard Systems, Inc
Published By: Data Guard Systems, Inc     Published Date: May 06, 2009
The data security challenges in the healthcare industry have never been as challenging as they are today. Not only must healthcare providers comply with HIPAA regulations concerning patient privacy and electronic data security, they must also guard against identity theft as well more complex scenarios of insurance data theft, medical identity theft and the adulteration of health records.
Tags : 
online identity theft, encryption software, advanced password protection, alertboot, identity, theft, dataguard, credit card, payment, fraud, anti-virus, anti-spam, pre-boot authentication, advanced password protection, file-based password protection, encryption, full disk, file encryption, breach, breaches
    
Data Guard Systems, Inc
Published By: BMC Control M     Published Date: Apr 01, 2009
Listen in as Sentrigo interviews Dr. Charles Popper, who discusses specific data integrity and security requirements for the pharma sector. Dr. Popper will address how to enforce the proper balance of information sharing and database protection, without compromising high-quality research.
Tags : 
platforms, data management
    
BMC Control M
Published By: BMC ESM     Published Date: Mar 01, 2009
Free utility finds the fragmentation that's crippling your network! New Disk Performance Analyzer for Networks 2.0 takes the guesswork out of tracking networked system performance. This revolutionary utility scans networked systems' performance from one single access point. It equips administrators with an arsenal of performance data, so they can zero in on systems' fragmentation and slows. This second edition comes with a series of improvements which afford users more control and flexibility. Systems can be selected from the Active Directory or IP Address. And this cutting-edge tool supports custom grouping. So, repeated scans are easy to set up and run. Performance reports can also be scheduled for off-peak hours. Results will be automatically sent to your e-mail address. Performance reports are now exported to a MicrosoftT SQL database for easy sorting and querying. Don't let low-functioning systems go unnoticed. Get Disk Performance Analyzer for Networks 2.0 free now!
Tags : 
it management
    
BMC ESM
Published By: BMC ESM     Published Date: Jul 17, 2009
Join us as we talk with Atwell Williams, Solutions Architect for the Office of the CTO at BMC Software. Get insights into where to start when building and managing a CMDB and find out how to define what "done" looks like. Learn whether a bottom-up or a top-down approach will work best for you, hear important tips for training your team, and get some great practical advice from one of BMC's experts.
Tags : 
bmc, software, cto, solutions architect, cmdb, project, team, organization, implementation, successful team, project management, stage 4, configuration management database, it management, data management
    
BMC ESM
Published By: BMC ESM     Published Date: Jul 17, 2009
IT Infrastructure Library® (ITIL®) best practices promote a well-functioning, collaborative IT environment that can enable the business and your IT organization to cope with the effects of economic stress.
Tags : 
itil, it infrastructure library, bmc, bmc software, it environment, integration, business objectives, configuration management database, cmdb, business service management, bsm, mean time to repair, mttr, roi and value on investment, voi, it management
    
BMC ESM
Published By: BMC ESM     Published Date: Jul 22, 2009
Join us as we talk with Atwell Williams, Solutions Architect for the Office of the CTO at BMC Software. Get insights into where to start when building and managing a CMDB and find out how to define what "done" looks like. Learn whether a bottom-up or a top-down approach will work best for you, hear important tips for training your team, and get some great practical advice from one of BMC's experts.
Tags : 
bmc, software, cto, solutions architect, cmdb, project, team, organization, implementation, successful team, project management, stage 4, configuration management database
    
BMC ESM
Published By: BMC ESM     Published Date: Jul 22, 2009
IT Infrastructure Library® (ITIL®) best practices promote a well-functioning, collaborative IT environment that can enable the business and your IT organization to cope with the effects of economic stress.
Tags : 
itil, it infrastructure library, bmc, bmc software, it environment, integration, business objectives, configuration management database, cmdb, business service management, bsm, mean time to repair, mttr, roi and value on investment, voi
    
BMC ESM
Published By: HiDef Corporate     Published Date: Dec 22, 2009
Download the IDC Analyst Connection to learn how the cost of audio conferencing affects a company's bottom line.
Tags : 
citrix, audio conferencing, wainhouse, hidef, sme, pstn, time management, conference calls, remote access, resource management
    
HiDef Corporate
Published By: NeoSpire Managed Hosting     Published Date: Sep 01, 2009
When a company creates a custom web application, it also creates a custom challenge. Traditional monitoring does not cover everything, but alerts if something goes wrong with the application are more important than ever. Learn the benefits of custom application monitoring and how NeoSpire can help. . Dramatically reduces the time to troubleshoot a failed web application . Provides complete overview of web transaction and web application performance, to proactively locate and fix bottlenecks in your web system . Improves customer experience and increase customer satisfaction with excellent performance of your web applications and e-business transactions . Eliminates the risk of loss of revenue and credibility . Increases the efficiency of mission-critical e-business operations and web applications
Tags : 
application monitoring, load balancing system, neospire, benefits of testing, hardware monitoring, disk utilization, memory utilization, cpu load, service monitoring, port check (standard and custom ports), number of processes running, specific process monitoring, database monitoring, mysql replication monitoring, oracle rman backup monitoring, vpn monitoring: farend ping test, load-balanced ip monitoring, external url monitoring, centralized ids, logging monitoring
    
NeoSpire Managed Hosting
Published By: Lionbridge     Published Date: Nov 18, 2009
The IEEE is trying to cope by introducing the 802.11n standard-but it's still in draft form. Meanwhile, how can manufacturers cope with the confusion and promise surrounding 802.11's future? The situation is outlined, and a forward path, based on strategic testing, is proposed.
Tags : 
802.11 standard, 802.11n challenges, wireless networking, draft-n standard, ieee, 802.11 specification, veritest, ixchariot software, veritest's methodology, lionbridge
    
Lionbridge
Published By: Lionbridge     Published Date: Nov 18, 2009
APM is one of the best tools for evaluating, balancing, and enhancing the value of application portfolios and supporting fact-based decision making.
Tags : 
implementing apm, lifecycle approach to apm, efficiency with apm, value of apm
    
Lionbridge
Published By: Lionbridge     Published Date: Nov 19, 2009
This paper will interest ISV product managers and engineers of educational software products, chief learning officers and chief technology officers of corporate universities, along with information technology personnel at the community and state college level, including developers of custom applications & application services.
Tags : 
learning management systems, srcom 2004, saas, cms, ldap-based sso, isv product managers, educational software products, custom applications, student information systems, section 508, ims qti, lionbridge lms solution
    
Lionbridge
Published By: OneSource     Published Date: Jun 25, 2010
How to Find and Sell to Prospects 8x More Likely to Buy Research shows that prospects with associated sales triggers--such as executive changes, new funding, M&A, product launches--are 8x likelier to buy than the average prospect. This PDF outlines how you can leverage triggers to identify, pitch and win business using these key sales indicators.
Tags : 
sales leads, sales prospecting, b2b sales, sales triggers, onesource
    
OneSource
Published By: Athena Security     Published Date: Nov 20, 2009
This paper presents some techniques to cleaning up the rule base along with an effective solution that addresses these automatically for you using Athena FirePAC for Firewall Rule Cleanup.
Tags : 
firewall rules, cisco firewall, netscreen firewall, check point firewall, firewall pci, firewall audit, firewall analysis, firewall rule cleanup, firewall unused rules, cisco pix, juniper netscreen, cisco asa, cisco fwsm.
    
Athena Security
Start   Previous    166 167 168 169 170 171 172 173 174 175 176 177 178 179 180    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee