• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

pts

Results 201 - 225 of 344Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Nov 17, 2009
This report describes a study of attempts by organizations to improve decision-making through the use of information, among other interventions.
Tags : 
ibm, organizational performance, business information systems, decision making, automating process, process efficiency, leveraging info, best practices, business activity monitoring, business intelligence, business management, business process automation, contact management
    
IBM
By: IBM     Published Date: Aug 30, 2010
Vendors in this market have been challenged in their attempts to gain market visibility and awareness for their products and for the benefits they can provide compared with just throwing more hardware at the problem.
Tags : 
ibm, database application, vendor, data archiving, erp, crm application, customer relationship management, storage management, storage virtualization, database development, data integration, data mining, data protection, data quality, database security, email archiving
    
IBM
By: Landslide Technologies     Published Date: Apr 21, 2008
If you think you know sales, you likely are bringing to this topic a history and track record that has served you well.  This paper attempts to offer the cautionary warning that what has worked in your past may not serve your current  sales reps as well today, and could actually hurt their performance. Sales 1.0 was about lone wolves, product superiority,  proven skills and making the number.
Tags : 
landslide, customer relationship, customer loyalty, loyalty, crm, sales, sales, sales 2.0, sales 1.0, business metrics, customer relationship management, sales & marketing software, sales automation, collaboration
    
Landslide Technologies
By: ESET     Published Date: Jan 21, 2010
Bots and botnets suck, so what better teaching aid to help people understand them than a vacuum cleaner? It can be extremely challenging to attempt to explain technical concepts to non-technical people. There are two goals for this presentation. Click on this white paper to read about it.
Tags : 
eset, internet security, bots, botnets, national cybersecurity alliance, roomba, remote access tool, denial of service attack, safe computing, remote access, access control, network security appliance, security management
    
ESET
By: Lumension     Published Date: Jan 22, 2013
In this age of APTs you can’t leave a single PC unpatched and vulnerable. In this on-demand webcast, Randy Franklin Smith from Ultimate Windows Security will deal with this whole topic.
Tags : 
software updates, security, patch, network security, patch management, remediation solutions, access control, anti spam, anti spyware, anti virus, application security, business continuity, compliance, firewalls, hacker detection, identity management, internet security, intrusion detection, intrusion prevention, network security appliance
    
Lumension
By: NetIQ     Published Date: Jan 12, 2011
This report is a deep dive into a potential way in which you could use the concepts of the Zero Trust Model and conceivably implement them in a real-world environment.
Tags : 
netiq, security, network architecture, forrester, auditing, best practices, zero trust model, compliance, encryption
    
NetIQ
By: SugarCRM     Published Date: Apr 08, 2014
CRM wurde lange als unabdingbares Vertriebs-Tool angesehen. Von den Vorteilen traditioneller CRM-Systeme profitierte jedoch hauptsächlich das Management anstatt die CRM-Nutzer an vorderster Front. Ein CRM für das Individuum kommt der gesamten Vertriebsorganisation zugute – ohne steigende Kosten.
Tags : 
crm best practices, crm software, customer data management, customer experience & engagement, customer relationship management (crm), lead generation, lead management, lead nurturing, lead quality, lead scoring, sales automation, sales channels, sales force automation, sales management, customer relationship management
    
SugarCRM
By: SendGrid     Published Date: Jul 19, 2012
This guide takes a new and comprehensive approach to solving one of the most pressing needs that virtually every company must deal with. With best practices tips throughout, you will learn five important concepts that are key to email delivery.
Tags : 
    
SendGrid
By: CDW     Published Date: Apr 04, 2016
IT infrastructure is no longer just supporting the business; it is the business enabler. Infrastructure must support constant business demands for new applications and services with limited budgets and resources. Yet there is limited time to constantly evaluate and integrate hardware, software and networking solutions to meet continuously evolving requirements. Create an automated, dynamic infrastructure that adapts to your business demands with the VCE VxRail™ Appliance.
Tags : 
infrastructure management, business management, best practices, application performance, data management, business analytics, business integration
    
CDW
By: McAfee     Published Date: Apr 25, 2014
You spoke and we listened. Today’s advanced malware threats have you spending a lot of resources fighting an uphill battle. The answer is McAfee Advanced Threat Defense—so you can find, freeze, and fix threats.
Tags : 
advanced malware, maware threats, malware problems, malware attacks - rootkits, phishing, zero-access, trojans, apts, botnets, social engineering, sandboxing, layered defenses, block and contain malware, security, it management
    
McAfee
By: ThreatTrack Security     Published Date: May 21, 2015
Watch this webinar for a discussion on: • Advanced threats and their potential points of entry • Why Advanced Targeted Attacks will continue to confound organizations with even the best defenses • Methods, practices, and technologies to help quickly detect and respond to these advanced attacks
Tags : 
advanced threats, advanced targeted attacks, security, cybersecurity, it management, knowledge management, data management
    
ThreatTrack Security
By: Microsoft Azure     Published Date: Apr 11, 2018
Distributed systems enable different areas of a business to build specific applications to support their needs and drive insight and innovation. While great for the business, this new normal can result in development inefficiencies when the same systems are reimplemented multiple times. This free e-book provides repeatable, generic patterns, and reusable components to make developing reliable systems easier and more efficient—so you can free your time to focus on core development of your app. In this 160–page e-book, you’ll find: An introduction to distributed system concepts. Reusable patterns and practices for building distributed systems. Exploration of a platform for integrating applications, data sources, business partners, clients, mobile apps, social networks, and Internet of Things devices. Event-driven architectures for processing and reacting to events in real time. Additional resources for learning more about containers and container orchestration systems. “There are more
Tags : 
    
Microsoft Azure
By: Microsoft Azure     Published Date: Apr 11, 2018
While it’s clear what the potentials of cloud computing are for your organization, it may be unclear the adjustments your IT organization will need to make in transitioning to the cloud. This guide is designed to help your IT team more effectively implement and integrate cloud technologies. You’ll explore key cloud concepts as well as Azure-specific tips and tactics around: General architectures that incorporate security, identity, and cloud design principles. DevOps and how it fits with cloud technologies. Integrating, planning, and managing cloud resources. Microsoft Azure governance.
Tags : 
    
Microsoft Azure
By: Dell EMC     Published Date: Nov 03, 2015
This white paper outlines the principles and concepts involved in implementing an enterprise-class archive repository using EMC Isilon scale-out storage.
Tags : 
emc, nas, isilon, enterprise, data storage, data protection, data warehousing
    
Dell EMC
By: CDW - EMC     Published Date: Apr 07, 2016
IT infrastructure is no longer just supporting the business; it is the business enabler. Infrastructure must support constant business demands for new applications and services with limited budgets and resources. Yet there is limited time to constantly evaluate and integrate hardware, software and networking solutions to meet continuously evolving requirements. Create an automated, dynamic infrastructure that adapts to your business demands with the VCE VxRail™ Appliance.
Tags : 
infrastructure management, business management, best practices, application performance, data management, business analytics, business integration
    
CDW - EMC
By: Whil Concepts, Inc.     Published Date: Jan 30, 2017
This eBook provides an overview of the science behind mindfulness meditation and highlights why it’s captured the attention of top executives across the globe. It’s intended for people who are not only interested in the health and performance benefits of mindfulness, but also want the proof points... just like us.
Tags : 
mindfulness, wellbeing, wellness, mental wellbeing, emotional wellbeing, stress, resilience, sleep, training, benefits, virgin pulse, jiff, health, fitness, performance, health, sleep, brain training, performance, perks
    
Whil Concepts, Inc.
By: Whil Concepts, Inc.     Published Date: Jan 30, 2017
This Best Practices Guide shares how to successfully add mindfulness training to your current wellness program to make employees happier, more focused and more productive. It also provides insights from survey results compiled over 6 months in conversations with 56 companies, including 30 Fortune 500 brands.
Tags : 
mindfulness, wellbeing, wellness, mental wellbeing, emotional wellbeing, stress, resilience, sleep, training, benefits, virgin pulse, jiff, health, fitness, performance, health, sleep, brain training, performance, perks
    
Whil Concepts, Inc.
By: Whil Concepts, Inc.     Published Date: Jan 30, 2017
Download these case studies to learn how Whil was able to increase employee satisfaction and decrease employee turnover by introducing mindfulness in the below organizations: Global fashion retailer City government Technology University Leading non-profit Production company Global advertising agency
Tags : 
mindfulness, wellbeing, wellness, mental wellbeing, emotional wellbeing, stress, resilience, sleep, training, benefits, virgin pulse, jiff, health, fitness, performance, health, sleep, brain training, performance, perks
    
Whil Concepts, Inc.
By: Optimizely     Published Date: Jun 05, 2017
Learn about statistical significance, statistical error, and the concepts behind Optimizely’s Stats Engine: - Best practices for running your experiments to statistical significance - Tips for communicating results, optimizing low-traffic pages, using confidence intervals, and more - How Optimizely is creating an always-valid view of statistical significance
Tags : 
optimizely, online experiments, statistics, statistical significance, optimizely stats engine
    
Optimizely
By: Epson     Published Date: Dec 18, 2017
When it comes to display technology today, businesses tend to invest in flat panel TVs without much thought. But visual communication is an important element essential for success. When a new product is unveiled to a room of editors, when engineers analyze a circuit board, or when a teacher attempts to bring a classroom subject to life, visuals are as powerful as the spoken word, if not more. This paper offers insight on the state of visual display to ensure you make the right decision on your next investment, whether it’s a replacement, revamp, or remodel. Learn how to use and maintain visual display technology to make the greatest positive impact on your organization with the highest return of investment.
Tags : 
display technology, visual communication, virtual display, projectors
    
Epson
By: Stratavia     Published Date: Oct 03, 2007
IT organizations are looking to leverage automation to improve the delivery of business services across the enterprise, while reducing costs. Automation can be implemented in many ways; however, today’s enterprise demands a higher level of sophistication than simple scripts. This whitepaper from Stratavia discusses the key aspects of automated server provisioning that every CIO should know.
Tags : 
server provisioning, automation, itil, workflow, data center automation, run book automation, configuration management, configuration, data center, vmware, virtualization, stratavia, infrastructure, network management, servers, server virtualization
    
Stratavia
By: Trend Micro SaaS     Published Date: Feb 09, 2009
Today's confidentiality and privacy requirements drive organizations of all sizes and industries to secure sensitive data in email. Often particular types of data need to be encrypted, such as credit card numbers, intellectual property, or client information. Organizations also need to protect confidential emails for particular groups, such as executive management, human resources or legal departments. Many organizations are turning to policy-based encryption to meet their encryption needs because it automatically encrypts data using content filtering rules that identify types of content or email for particular groups. Encryption is applied when the rules are triggered. With policy-based encryption, organizations avoid relying on individual users to secure important content.
Tags : 
saas, trend, trend micro, software as a service, trendlabs, email security, security, interscan messaging, service level agreement, sla, virus, spam, phishing, distributed denial of service, ddos, encryption, policy based, filtering, anti spam, anti spyware
    
Trend Micro SaaS
By: CradlePoint     Published Date: May 17, 2016
This global corporation of quick service restaurants has about 17,500 locations serving millions of customers each day with concepts including popular pizza, chicken, and Tex-Mex chains. Most of the restaurants are on a wired network with Cisco routers, the main function of which is to process credit card purchases. With so many transactions taking place every day, the corporation decided to invest in a wireless failover system to guarantee uninterrupted connection. After careful consideration, the corporation chose Cradlepoint to provide “four-nines” (99.99% or better) connectivity via 3G/4G/LTE or wireless backup. - See more at: https://cradlepoint.com/success_stories/quick-service-restaurant-chain#sthash.ODr3J5uT.dpuf
Tags : 
    
CradlePoint
By: G/O Digital     Published Date: Nov 13, 2014
As an HVAC company, you have to understand how to connect your services to your targeted audience’s typical purchase cycle. You have to think about how your clients find you, where they are researching your specific services, and what prompts them to call your business versus your competitor. Download this guide for quick and easy steps to improve digital advertising for your local business.
Tags : 
digital marketing, online marketing, internet marketing, search marketing, seo, ppc, search engine optimization, social media, email marketing, web development, web design, enterprise applications
    
G/O Digital
By: Centrify Corporation     Published Date: May 03, 2018
"Watch the On-Demand webinar to hear Centrify's Chief Product Officer, Bill Mann and Forrester Principal Analyst, Chase Cunningham in a lively discussion how Zero Trust concepts can be applied to Identity and Access Management. "
Tags : 
    
Centrify Corporation
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter