practical

Results 1 - 25 of 498Sort Results By: Published Date | Title | Company Name
Published By: 123Together     Published Date: Sep 10, 2008
You understand the value Microsoft Exchange Server can bring to your company but the internal deployment delays, administrative complexity and cost of Exchange just isn't practical. Business and technical executives strive to find time to focus on running their business and avoid the distractions of managing a 24X7 application such as Exchange. The time and expense of running a Microsoft Exchange Server in-house may simply be too much for a company your size.
Tags : 
123together, it strategies, contact management, email, economy, stability, collaboration, green it, outsourcing, outsource, outsourcing, microsoft exchange, hosted exchange, mobile services
    
123Together
Published By: A10 Networks     Published Date: Apr 14, 2006
Download this white paper to learn how IAM projects can be practical, affordable and provide quick ROI for companies of all sizes.
Tags : 
access control, identity management, access management, authentication, roi, return on investment, a10, a10 networks, security
    
A10 Networks
Published By: Adaptive Growth     Published Date: Feb 25, 2008
In what practical ways – if any – is ERP implementation project success different from the absence of failure? Both casual and thorough analysis of ERP failure agree on several interesting points.
Tags : 
erp, adaptive growth, project management, enterprise applications, enterprise resource planning, adaptivegrowth
    
Adaptive Growth
Published By: Adaptive Planning     Published Date: Apr 25, 2012
Activity-based budgeting has been discussed for some time, but becomes far more practical with a Time Driven Activity-Based-Budgeting (TDABC) model. Using this approach, a company can now link its strategic plan and sales and production forecast to the specific demands for capacity required for implementation. This chapter introduces the powerful new extension of the TDABC model to perform what-if analysis and activity-based budgeting.
Tags : 
adaptive, business, finance, forecasting, business planning, budget
    
Adaptive Planning
Published By: Adobe     Published Date: Apr 03, 2015
Download our new white paper, Top Analysis Tips & Tricks for 2015, to discover best practices for marketing analytics success. Packed with practical advice from digital marketing experts and industry insight from Web Analytics Demystified, this hands-on guide will help you unleash the power of your Adobe Analytics solution so you can: • Implement advanced segmentation strategies • Make the most of marketing attribution • Build models for predictive analysis
Tags : 
analytics, marketing analysis, adobe, segmentation strategy, marketing attribution, predictive analysis
    
Adobe
Published By: Adobe     Published Date: Apr 20, 2016
To improve your customer engagement, you need to test and learn from every possible interaction. Forrester provides helpful steps and insights in their report, Optimize Customer Experiences with Online Testing and Continuous Optimization. Read the report to learn: • How to establish an online testing strategy based on continuous optimization • How to elevate your testing by achieving four crucial optimization objectives • Recommendations from Forrester on practical next steps in your optimization journey
Tags : 
adobe, marketing, data driven marketing, continuous optimization, customer experience, customer engagement
    
Adobe
Published By: Adobe_Edelman     Published Date: Jun 07, 2017
With the explosion of touch points and ways to communicate, the public today is more connected than ever before with the government. The transformation for your own agency can begin right now. We’ve created this roadmap for understanding what best practices exist and how we can surprise and delight your users with new digital services. You’ll also learn new strategies to help put your agency on the path to digital transformation, as well as practical tips for getting the job done.
Tags : 
adobe, customer experience, mobile-friendly service, digital growth, public sector
    
Adobe_Edelman
Published By: AdRoll     Published Date: Jul 14, 2015
If you’re searching for information about attribution, you’ve come to the right place. Solving the attribution problem will be one of the most important things you do to boost ROI for your organization. In fact, 58% of marketers depend on attribution to allocate their marketing budget to the most effective channels. In a few short pages, this guide will deliver all the practical advice you need to run with the pros.
Tags : 
adroll, custom attribution model, roi, best practices, marketing solutions
    
AdRoll
Published By: AdRoll     Published Date: Aug 22, 2017
Account-based marketing (ABM) is a combination of people, processes, and technology that, if deployed intelligently, will complement existing marketing programs to close bigger deals more efficiently. Account-Based Marketing: A Practical Guide is your manual to achieving that alignment and running efficient ABM. We’ll provide practical, actionable advice and tips on all aspects of ABM, with a bottom-up approach that asks and answers the question: “How?” How to set goals and objectives? How to select target accounts and specific roles? How to create a compelling buyer journey and, in turn, align content around it? We’ll then show you, step by step, how to roll out ABM campaigns and, critically, how to structure your CRM and marketing platforms around them. As a performance marketing platform that allows you to collect, analyze, and act on your data at scale, AdRoll is uniquely positioned to demonstrate how you can achieve this. So, if your company depends on closing long-cycle, mu
Tags : 
account based marketing, marketing programs, adroll. crm
    
AdRoll
Published By: AdRoll     Published Date: Jan 04, 2019
With over 1 billion active users and counting, it’s no secret that Instagram has rapidly become a major tool for businesses looking to drive tangible sales. From simple advertising options to shoppable post features, it’s now a platform that can help you find and meet your customers—right at their fingertips. But how can you start reaping the benefits for your business? In our new guide The E-commerce Guide to Marketing on Instagram, you’ll find the latest tactics around building awareness, growing your community, and reaching users at every stage of the buyer journey. Designed with marketers in mind, this practical guide also covers: Working with AdRoll to get the most out of the platform The Dos and Don’ts of advertising on Instagram Insightful case studies Actionable tips on everything from branding your profile to creating Instagram ads So, if you’re ready to harness the power of Instagram to take your business to new heights, download our handy guide today.
Tags : 
    
AdRoll
Published By: Adverity     Published Date: Jun 15, 2018
A Beginner's Guide to Marketing Data Analytics Marketing Data is big & highly fragmented Big data is messy. It’s scattered across platforms, it’s diverse, and in its raw form, it’s practically unusable. We know, it’s a painful truth. The fact of the matter is that having a lot of data doesn’t necessarily mean that you have the answers to your most pressing questions. Looking for the most relevant bits in your pile of big data is like looking for a needle in a haystack. But don't you worry - we are here to help. This handy e-book will give you a short overview what quality matters, why data is so important and what you need to pay attention to. Best thing is: getting this ebook is super easy. Just fill out the form to the right and voilá - your download is ready. Enjoy this read!
Tags : 
marketing business intelligence, saas marketing optimization, measuring marketing performance, roi analytics, automated report generator, performance based marketing, online marketing data, roi metrics, marketing reports, roi reporting, reporting generator, automated reporting tool, marketing dashboard, marketing data, marketing intelligence, report software, marketing reporting, marketing metrics, performance marketing, marketing performance
    
Adverity
Published By: Aerohive     Published Date: Oct 23, 2014
Unifying cloud and distributed network intelligence creates a completely practical, cost-effective approach to mobility. At Aerohive®, we’ve always done it this way.
Tags : 
wireless networks, controller-less networks, the new mobility, network infrastructures
    
Aerohive
Published By: ALE     Published Date: Dec 05, 2018
A hospital’s network is the foundation for the critical applications that run on it, where most of those applications are related to the hospitals core businesses. The return on the investments made in EMR (electronic medical records), PACS (picture archiving and communication system), clinical imaging systems and workstations on wheels, can only be truly realized if those assets are always available to the people in need in a reliable, secure and highly optimized way, at a fixed location, or while mobile. Find out how to simplify network management and enhance application and service visibility with Smart Analytics and PALM by downloading this whitepaper today.
Tags : 
    
ALE
Published By: Alere Wellbeing     Published Date: Nov 09, 2011
Today, many employers have considered offering a reward or penalty to encourage employees to reduce their BMI. Yet weight bias is prevalent in the workplace even before incentives for BMI reduction are introduced. This white paper, derived from a presentation given by Dr. Rebecca Puhl and Dr. Jennifer Lovejoy, discusses weight bias, reviews well-known examples of employers who offer incentives tied to BMI, and offers practical strategies to promote a supportive worksite environment.
Tags : 
alere, human resources, employee bmi, employee incentive, reward program, whitepaper
    
Alere Wellbeing
Published By: Alert Logic     Published Date: May 23, 2019
This security overview provides best practices to help organizations looking to harden their environment. Designed to help small- to mid-sized organizations stop an attack before one starts, this basic guidance will help reduce your attack surface and outlines practical steps to securing your enterprise. With this checklist, you will have a guide to help prevent initial compromise and stop attacks before they start. This checklist helps to explain how to: • Address software vulnerabilities and misconfigurations • Eliminate exposed ports & services • Reduce the chance of attacks delivered via email • Limit browser-based attacks • Reduce the attack surface across Microsoft Office applications Lastly, we will share details on how Alert Logic helps organizations of all sizes get a comprehensive view of their enterprise assets, find misconfigurations and vulnerabilities, and delivers endpoint coverage with an automated quarantine response to stop malware in its tracks.
Tags : 
    
Alert Logic
Published By: Alert Logic     Published Date: May 23, 2019
In our first cyber security checklist, we provided a security overview and best practices to help organizations prevent an initial compromise from occurring. In this guide, we will help you understand practical steps you can take to mitigate techniques attackers use once they have penetrated your defenses. Once attackers have access to a machine, they can evade detection by using fileless techniques and legitimate system administration tools to do their dirty work. With this checklist, you will have a guide to help mitigate the impact of an attacker. Lastly, we will hep you understand how partnering with a company like Alert Logic can provide better defenses to stop attackers in their tracks. This checklist helps to explain how to: • How to manage and limit PowerShell access • Securing and utilizing Windows Management Instrumentation (WMI) • Ways to apply application controls • Following the principle of least privilege and applying access controls • What to monitor for to help uncover
Tags : 
    
Alert Logic
Published By: AlienVault     Published Date: Oct 21, 2014
Event logs provide valuable information to troubleshoot operational errors, and investigate potential security exposures. They are literally the bread crumbs of the IT world. As a result, a commonly-used approach is to collect logs from everything connected to the network "just in case" without thinking about what data is actually useful. But, as you're likely aware, the "collect everything" approach can actually make threat detection and incident response more difficult as you wade through massive amounts of irrelevant data. Join us for this session to learn practical strategies for defining what you actually need to collect (and why) to help you improve threat detection and incident response, and satisfy compliance requirements.
Tags : 
alienvault, troubleshooting operational errors, potential security exposures, satisfy compliance requirements, security, it management, knowledge management
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
Do you feel alone? No resources? No help? If you are like many security practitioners faced with a mountain of tasks each day and a small (or non-existent) team to help, prioritization and efficiency are key. Join Joe Schreiber, Solutions Architect for AlienVault for this practical session outlining habits to get the most out of your limited resources. In this session, you'll learn how to develop routines to efficiently manage your environment, avoid time-sucks, and determine what you can do by yourself and where you need help.
Tags : 
alienvault, limited resources, it time management, it prioritization, it management, security
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
If you're like most IT practitioners, you are busy. You have a million things to do and preparing the reports needed to prove PCI DSS compliance requires time you just don't have. It doesn't have to be so hard. In this practical webinar, PCI DSS compliance experts walk through strategies for taking the pain out of PCI DSS reporting.
Tags : 
alienvault, pci dss reporting, pci dss compliance, it management, knowledge management
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
If you're like most IT practitioners, you are busy. You have a million things to do and preparing the reports needed to prove PCI DSS compliance requires time you just don't have. It doesn't have to be so hard. Join compliance experts from Terra Verde Services and AlienVault for this practical session on how to take the pain out of PCI DSS reporting. You'll learn: • The key reporting requirements of the PCI DSS standard • The security technologies you need to collect the required data • How AlienVault USM can generate these reports in minutes, not days • How to use your audit reports to improve security on an on-going basis
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault
Published By: AlienVault     Published Date: Jun 05, 2015
A checklist summarizing steps you should take now to improve security
Tags : 
security, web application, software, network
    
AlienVault
Published By: AlienVault     Published Date: Jun 05, 2015
Practical security controls that won't break the bank
Tags : 
threat management, security, network, web application, network
    
AlienVault
Published By: AlienVault     Published Date: Mar 30, 2016
The public demands accountability for data breaches involving systems that include personally identifiable information (PII) and expects that all educational institutions will have the same levels of security that Fortune 500 companies do. However, most educational institutions have fewer IT security resources than their larger enterprise counterparts, yet they face the same threats from attackers. Fortunately, there are solutions. This whitepaper by SANS instructor Jake Williams walks through an example of a typical breach in an education organization, highlighting common ways attackers gain access to a network and practical steps to reduce risk. Download this whitepaper to learn: • Common security gaps that make educational institutions vulnerable to attack • Practical security controls that won't break the bank • Key questions to evaluate security vendors • A checklist summarizing steps you should take now to improve security
Tags : 
    
AlienVault
Published By: Alt-N Technologies     Published Date: Sep 26, 2008
Selecting an email system to fulfill the needs of a small-to-medium business (SMB) with 5-500 employees can be easy to do by following some practical and straightforward guidelines. Choosing a productive system involves finding the best combination of security, mobility, collaboration and ease-of-use, in addition to the basic functions of sending and receiving electronic messages.
Tags : 
alt-n technologies, email server, email, security, mobility, collaboration, administration
    
Alt-N Technologies
Published By: Anaplan     Published Date: Sep 07, 2018
Innovate the supply chain, improve the business For many companies, supply chain performance affects 100 percent of company revenue but only part of the income statement. Supply chain problems have significant impact across the rest of the business, as do supply chain successes. If you could improve the health and visibility of your supply chain and your business, wouldn’t you? Together with Supply Chain Management Review (SCMR), Anaplan surveyed dozens of supply chain leaders about the effectiveness of their supply chain management strategies. Survey data capturing trends in supply chain challenges and opportunities Practical tips on improving supply chain performance Insight on the important connection between supply chain and business performance
Tags : 
    
Anaplan
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee