base

Results 4576 - 4600 of 4753Sort Results By: Published Date | Title | Company Name
Published By: Black Duck Software     Published Date: Dec 29, 2015
Security teams understand that developers turn to open source to save time, cut costs, and promote innovation. But getting a handle on the security implications of open source use can be difficult. Learn how to identify security vulnerabilities and monitor your codebase for future security.
Tags : 
black duck, open source, application security, security, compliance, appsec, software vulnerabilities, risk management
    
Black Duck Software
Published By: eDataSource     Published Date: Jun 15, 2015
eDataSource compares certain quarterly email activity and engagement metrics across four similar retailers, based on our visibility into the email activity of 53,000 brands, and how their customers are engaging with those emails.
Tags : 
    
eDataSource
Published By: Semcasting     Published Date: Feb 14, 2013
This White Paper illustrates three important lessons learned as a result of executing highly targeted campaigns for 36 elected offices in November of 2012.
Tags : 
hyperlocal targeting, hyper-local targeting, location-based targeting, hyperlocal advertising, hyper-local advertising, digital marketing, ip address targeting, ip geo targeting
    
Semcasting
Published By: Webroot UK     Published Date: Mar 22, 2010
The components required of an effective web security solution are many and varied, including a range of tools that guard against specific types of threats
Tags : 
webroot, web security service, cloud computing, web threats, business process automation
    
Webroot UK
Published By: XO Communications     Published Date: Jul 17, 2014
The cloud has gone mainstream, 75% of businesses are using or plan to use cloud based services. More Enterprises are adopting multi-cloud environments, 50% of IT leaders plan on using four or more cloud-based services.
Tags : 
cloud, network, software, backup, disaster recovery, security
    
XO Communications
Published By: Carbonite     Published Date: Jan 04, 2018
These days, a lot of organizations are looking to the cloud to help them protect their data. They wish to take advantage of the appealing economics and operational agility that are two of the biggest attributes of a cloud-based IT infrastructure. Leveraging the cloud can be a smart choice for any organization interested in gaining more control over costs (i.e., almost all organizations). According to ESG research, reducing costs was the second most commonly reported business driver affecting IT spending in 2016.
Tags : 
    
Carbonite
Published By: SilverSky     Published Date: Mar 20, 2013
In this whitepaper, we highlight the important issues surrounding cloud email, such as cost, security, monitoring, uptime, and compliance.
Tags : 
email, cloud, uptime, compliance, data protection, security, email security, business continuity
    
SilverSky
Published By: SilverSky     Published Date: Mar 26, 2014
This white paper includes a comprehensive list of things to consider in evaluating cloud-based email solutions, from the hidden costs of hosting your own, to additional services you might need, as well as what questions to ask your provider.
Tags : 
silversky, cloud based email, cloud, email solutions, security, archiving, data protection, collaboration
    
SilverSky
Published By: SilverSky     Published Date: May 22, 2014
Companies today are able to focus more time on their core competencies by trusting email and other resource-intensive activities to experts in the cloud. Thinking of moving services to the cloud? Read SilverSky’s comprehensive list of things to consider when evaluating cloud-based email solutions.
Tags : 
silversky, ibm, cloud, cloud-based email, cloud business email, email service, email solutions, cloud based email solutions
    
SilverSky
Published By: HP     Published Date: Feb 02, 2015
Everyone agrees that data is the lifeblood of any business. Just think how tense you get when your laptop crashes and you realize you have not saved that critical document. Or put yourself in the shoes of your company’s sales teams when they suddenly find themselves unable to access information related to a deal in the pipeline at the end of the quarter because it is corrupted or went missing because of a database or server issue. Data protection is—and always will be—a constant concern.
Tags : 
    
HP
Published By: HP     Published Date: Feb 11, 2015
Everyone agrees that data is the lifeblood of any business. Just think how tense you get when your laptop crashes and you realize you have not saved that critical document. Or put yourself in the shoes of your company’s sales teams when they suddenly find themselves unable to access information related to a deal in the pipeline at the end of the quarter because it is corrupted or went missing because of a database or server issue. Data protection is—and always will be—a constant concern.
Tags : 
    
HP
Published By: Sybase     Published Date: Oct 18, 2011
Watch this webinar for an overview of some of the benefits customers can expect from moving to ASE 15.7.
Tags : 
enterprise mobility, enterprise mobility software, enterprise mobility solutions, enterprise mobility systems, capital markets, capital markets solutions, capital markets analytics, business intelligence
    
Sybase
Published By: Indigo Rose Corporation     Published Date: Feb 14, 2007
This document outlines the new features in AutoPlay Media Studio 6.0 over previous versions of the product. Built on a solid base of proven predecessors, AutoPlay Media Studio 6.0 is more powerful and flexible than ever!
Tags : 
enterprise applications, sales & marketing software, cd maker, multimedia studio, multimedia software, indigo rose
    
Indigo Rose Corporation
Published By: Sybase     Published Date: Oct 18, 2011
Download this document for an overview of some of these capabilities and the benefits customers can expect from moving to ASE 15.7.
Tags : 
enterprise mobility, enterprise mobility software, enterprise mobility solutions, enterprise mobility systems, capital markets, capital markets solutions, capital markets analytics, business intelligence
    
Sybase
Published By: IBM     Published Date: Mar 05, 2014
If you specialize in relational database management technology, you’ve probably heard a lot about “big data” and the open source Apache Hadoop project. Perhaps you’ve also heard about IBM’s new Big SQL technology, which enables IBM® InfoSphere® BigInsights™ users to query Hadoop data using industry-standard SQL. Curious? This paper introduces you to Big SQL, answering many of the common questions that relational database management system (DBMS) users have about this IBM technology.
Tags : 
ibm, big data, ibm big sql, sql, database management, database management technology, software, tables
    
IBM
Published By: Atlantic Broadband Business     Published Date: Jul 30, 2018
From professional services and hospitality to healthcare and retail, businesses thrive when they have fast, reliable Internet connections. You need reliable connections to send sales transactions, upload files, transmit payroll data, and take advantage of cloud-based applications for sales, finance, and shipping. Then remember all of the different devices in your office – like mobile phones, wearables, tablets, and even desktop phones – and the need becomes even greater.
Tags : 
atlantic broadband, transmit, data, payroll, cloud, data
    
Atlantic Broadband Business
Published By: Adaptive Planning     Published Date: Apr 25, 2012
Activity-based budgeting has been discussed for some time, but becomes far more practical with a Time Driven Activity-Based-Budgeting (TDABC) model. Using this approach, a company can now link its strategic plan and sales and production forecast to the specific demands for capacity required for implementation. This chapter introduces the powerful new extension of the TDABC model to perform what-if analysis and activity-based budgeting.
Tags : 
adaptive, business, finance, forecasting, business planning, budget
    
Adaptive Planning
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Encryption will help to protect data against unauthorized access by outsiders from lost or stolen devices such as laptops, thumb drives, and other removable media. But it does not protect against the insider threat-employees and contractors with authorized access to data who mistakenly or maliciously leak your most valuable assets.
Tags : 
trend micro, encryption, laptop, ediscovery, e-discovery, data protection, threats, leaks
    
Trend Micro, Inc.
Published By: IBM MaaS360     Published Date: Jul 09, 2015
Volume III: Now that you know the app management basics, it’s time to learn not all apps are developed equally. Nor should they be; learn the layered security options for apps based on the privacy of data passing.
Tags : 
app management, app security, privacy, data passing, mobile app, networking, security, software development
    
IBM MaaS360
Published By: IBM     Published Date: Jun 13, 2018
In the digital era, businesses in every industry are becoming technology companies. New business models such as “product as a service” (in which traditional manufacturers and distributors are driving new revenue streams by integrating software-based services into their offerings) and new operational models, such as collaboration, social business, and mobile platforms, mean that nearly every company is deriving at least part of its revenue from cloudbased solutions. So, why are so many of these new cloud solution providers building their businesses on shaky foundations? The truth is, when your business is based in the cloud, you need more than on-demand leased compute and storage capacity. You need a cloud that is enterprise-grade, secure, and resilient. Equally important—and overlooked by too many cloud solution providers—you need a cloud platform that is able to grow your business into the future, supporting next-generation functionality like Artificial Intelligence (AI). No matter wh
Tags : 
    
IBM
Published By: Riversand     Published Date: Oct 30, 2017
MDM can add value to the business in many different ways. It most often does so indirectly, as an enabler for other business and IT initiatives. Some of these areas of potential benefit support shorter-term or tactical efforts at helping the business operate more efficiently — that is, they help to reduce the cost bases to "run the business." Some benefit areas of MDM are related more to helping users "grow the business." That is, they help to increase the revenue and market share within a given business model or framework. Yet other areas of opportunity fall into the "transform the business" arena — for example, allowing customer support representatives to perform inside sales activities enabled by trusted customer and product master data.
Tags : 
    
Riversand
Published By: IBM     Published Date: Jun 20, 2017
Watch this on-demand webinar for a look at in-memory databases and better understand the advantages of in-memory vs. disk-based technology.
Tags : 
data integration, data security, data optimization, data virtualization, in-memory, disk-based, technology
    
IBM
Published By: Tridion     Published Date: Aug 21, 2009
Organizations have been implementing intranets for a number of years, expecting to gain efficiencies and improve information exchange among their employees. Based on an organization's objectives, an intranet can take many different forms, ranging from a corporate information and communication platform to a pragmatic approach to Knowledge Management. This White Paper specifically focuses on the lifeblood of intranets: content.
Tags : 
collaboration, content, intranet, corporate communication, workforce management, internal communication, team management, web site management
    
Tridion
Published By: IBM     Published Date: Oct 31, 2013
Turn marketing challenges into opportunities with marketing performance analytics
Tags : 
financial accountability, roi, return on investment, accountability, marketing analytics, performance analytics, business analytics, metrics
    
IBM
Published By: NetProspex     Published Date: May 12, 2014
NetProspex analyzed the success rate of hundreds of email open rates and thousands of phone calls. The statistics proved that trigger-based emails had significantly higher conversion rates, but email sent on optimized days also did well. Download this guide on the best days to send emails.
Tags : 
marketing data services, marketing data management, marketing data quality, installed technology list, international contact data, business contact list, marketing database cleansing, marketing database services
    
NetProspex
Start   Previous    177 178 179 180 181 182 183 184 185 186 187 188 189 190 191    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee