source

Results 51 - 75 of 3677Sort Results By: Published Date | Title | Company Name
Published By: Ounce Labs, an IBM Company     Published Date: Jul 08, 2009
The Business Case for Data Protection, conducted by Ponemon Institute and sponsored by Ounce Labs, is the first study to determine what senior executives think about the value proposition of corporate data protection efforts within their organizations. In times of shrinking budgets, it is important for those individuals charged with managing a data protection program to understand how key decision makers in organizations perceive the importance of safeguarding sensitive and confidential information.
Tags : 
ounce labs, it securitym it risk, software applications, ciso, pci dss, hipaa, glba, data security
    
Ounce Labs, an IBM Company
Published By: ASG Software Solutions     Published Date: Mar 05, 2008
Because business success is tightly fused with technology, IT costs are rising, and this trend is expected to continue. As a result, businesses are demanding that IT be more than a static resource. IT is expected to deliver business results with a measurable contribution to the organization's bottom line.
Tags : 
asg, cmdb, bsm, itil, paradigm, btsm, sla, configuration management
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Sep 28, 2009
Virtualization is now mainstream. Enterprises continue to heavily invest in virtualization projects and while short term hardware and cost saving benefits are being achieved, few enterprises achieve anywhere close to the full potential of virtualization as they struggle with new problems like assuring performance and availability, preventing VM sprawl, and maximizing resource utilization
Tags : 
asg, cmdb, bsm, itil, bsm, bsp, metacmdb, virtualization
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Nov 05, 2009
Effective workload automation that provides complete management level visibility into real-time events impacting the delivery of IT services is needed by the data center more than ever before. The traditional job scheduling approach, with an uncoordinated set of tools that often requires reactive manual intervention to minimize service disruptions, is failing more than ever due to todays complex world of IT with its multiple platforms, applications and virtualized resources.
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, workload automation, wla
    
ASG Software Solutions
Published By: InsideUpbg     Published Date: May 21, 2015
I. What is Payroll Accounting? II. Does Your Business Need to Outsource Payroll? III. What About Payroll Accounting Software? IV. In-House vs. Outsourced Payroll V. Consideration VI. Glossary
Tags : 
    
InsideUpbg
Published By: OneSource     Published Date: Dec 08, 2010
Have you received your quota for 2011 yet? Wondering how you are going to hit it?as
Tags : 
webinar, onesource, business intelligence, prospects, lead generation
    
OneSource
Published By: StrongMail     Published Date: Jun 08, 2008
The growing trend towards insourcing marketing and transactional email is being driven by businesses that are looking for ways to improve their email programs, increase data security and lower costs. When evaluating whether it makes more sense to leverage an on-premise or outsourced solution, it's important to understand how the traditional arguments have changed.
Tags : 
strongmail, social media, email marketing, on-premise advantage, transactional email, insourcing, bounce management, spam trappers
    
StrongMail
Published By: AppAssure Software     Published Date: Jul 14, 2010
All those employees who access email, financial systems, human resources, and other core corporate applications; Replay for Exchange continuously protects and monitors the health of your Exchange data stores and allows administrators to quickly search, recover, and analyze mailbox content. With Replay for Exchange you can restore individual email messages, folders, or mailboxes to a live Exchange server or directly to a PST, thereby solving some of your most costly and time consuming challenges. Take advantage of these Free Trial Offer!!
Tags : 
appassure, sql, hyper-v, windows, vmware, replay, windows server, application server
    
AppAssure Software
Published By: ZoomInfo     Published Date: Sep 07, 2010
Find and connect quickly with the right people, prospects, and opportunities to grow your sales pipeline and boost conversion rates. The ZoomInfo™ Database is the only source of business information combining the business web, community contributors, and professionals who post their own profiles-updated 24 hours a day, 7 days a week. Unlock the power of this data with our next-generation prospecting tool, ZoomInfo™ Pro, featuring rich segmentation, export capabilities, and list building. Add custom appends and lists to streamline revenue generation and maximize ROI. Start your free trial today.
Tags : 
zoominfo, sales, marketing, pipeline, conversion rates
    
ZoomInfo
Published By: PCRecruiter     Published Date: Oct 28, 2010
Only a decade or so ago, those human resources professionals who hadn't yet found their way onto the Internet were finding themselves increasingly left out in the cold.As we slip swiftly into the second decade of the 21st century, it's those who haven't yet begun to participate in 'social media and networking' that are starting to feel the chill.
Tags : 
pcrecruiter, recruiting, social networking, network, facebook, twitter, email program, networking
    
PCRecruiter
Published By: PCRecruiter     Published Date: Oct 28, 2010
Only a decade or so ago, those human resources professionals who hadn't yet found their way onto the Internet were finding themselves increasingly left out in the cold. As we slip swiftly into the second decade of the 21st century, it's those whohaven't yet begun to participate in 'social media and networking' that are starting to feel the chill.
Tags : 
pcrecruiter, recruiting, social networking, network, facebook, twitter, email program, networking
    
PCRecruiter
Published By: SuccessFactors     Published Date: Jun 21, 2012
Discover how you can leverage talent management processes to drive business execution.
Tags : 
human resources, talent management, business execution
    
SuccessFactors
Published By: SAP     Published Date: Feb 03, 2017
In the digital economy, data is becoming more interconnected every day. The volume of highly-connected data is growing rapidly, while also becoming a highly-valued corporate asset. By exploring relationships among people, processes and things, new business opportunities emerge, helping grow your business's competitive advantage.
Tags : 
    
SAP
Published By: SAP     Published Date: Mar 09, 2017
There’s strong evidence organizations are challenged by the opportunities presented by external information sources such as social media, government trend data, and sensor data from the Internet of Things (IoT). No longer content to use internal databases alone, they see big data resources augmented with external information resources as what they need in order to bring about meaningful change. According to a September 2015 global survey of 251 respondents conducted by Harvard Business Review Analytic Services, 78 percent of organizations agree or strongly agree that within two years the use of externally generated big data will be “transformational.” But there’s work to be done, since only 21 percent of respondents strongly agree that external data has already had a transformational effect on their firms.
Tags : 
    
SAP
Published By: Entrust Datacard     Published Date: Aug 10, 2016
Entrust’s SSL/TLS Best Practices Guide is a key resource for those charged with SSL (Secure Sockets Layer) and TLS (Transport Layer Security) deployment. In our guide, you’ll find expert advice from the thought leaders at Entrust on SSL/TLS certificate installation, and tips for managing security for optimal performance. Included in the SSL/TLS Best Practices Guide: Certificates and Private Keys Server Configuration Application Protection Enhanced Server Security Domain Protection Advanced Certificates Always-On SSL Our guide is designed to help make SSL/TLS certificate installation easier, so you can use SSL expertly and with confidence.
Tags : 
    
Entrust Datacard
Published By: Cisco EMEA     Published Date: Oct 01, 2019
Een robuust netwerk opent de deur naar succes en Cisco is wereldwijd marktleider op het gebied van netwerktechnologie. Onze portfolio voor kleine bedrijven levert de betrouwbare, schaalbare en sterk beveiligde IT-infrastructuur die uw bedrijf nodig heeft. Uw IT-teams moeten uw infrastructuur operationeel houden, op urgente verzoeken reageren en nieuwe technologieën implementeren – zelfs als er sprake is van een beperkt aantal IT-medewerkers. Cisco Small Business-oplossingen zorgen ervoor dat u deze uitdagingen een stap voor kunt blijven. Het resultaat: IT-resources komen vrij, zodat u zich kunt richten op projecten met meerwaarde.
Tags : 
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Oct 01, 2019
Small businesses are the backbone of every country’s workforce and arguably the hardest working. They create the most jobs and deliver growth – usually without the tools, resources, and support that larger enterprises take for granted – particularly in their use of technology
Tags : 
    
Cisco EMEA
Published By: SAP Hybris     Published Date: Oct 26, 2017
For companies and buyers alike, customer service has traditionally been used as a troubleshooting tool. Forrester found that companies believe that nearly 50% of all buyers still view customer service as a post-purchase resource, rather than a purchasing aid, and in response, companies have positioned their customer service capabilities to match that expectation. However, Forrester conducted a custom survey of 247 companies and found that this reactive, postpurchase-only customer service mindset can result in missed sales opportunities and contributes to greater purchase dissatisfaction.
Tags : 
    
SAP Hybris
Published By: Red Hat     Published Date: Sep 09, 2018
This assessment shows that enterprises adopt Red Hat Fuse because they believe in a community-based open source approach to integration for modernizing their integration infrastructure that delivers strong ROI. For these organizations, Fuse was part of a larger digital transformation initiative and was also used to modernize integration. IDC interviewed organizations using Fuse to integrate important business applications across their heterogeneous IT environments. These Red Hat customers reported that Fuse has enabled them to complete substantially more integrations at a higher quality level, thereby supporting their efforts to deliver timely and functional applications and digital services. Efficiencies in application integration with Fuse have generated significant value for study participants, which IDC quantifies at an average value of $75,453 per application integrated per year ($985,600 per organization). They have attained this value by: » Enabling more efficient and effectiv
Tags : 
    
Red Hat
Published By: Cisco     Published Date: Dec 23, 2015
So what lessons can operators learn from the past experience with server virtualization? Beware of merely shifting costs from capital to operating expenditures. Be selective in virtualizing the right resources and functions driven by the business need, and not the technology lure.
Tags : 
cisco, virtualization, sdn, wan, cloud, networking, wireless, enterprise applications
    
Cisco
Published By: Dell SB     Published Date: Aug 27, 2019
Bon nombre de propriétaires de PME pensent que cela n’arrive qu’aux autres et que leur entreprise est trop petite pour être la cible de piratages, d’attaques par rançongiciel et d’autres types de cybercriminalité. D’autres sont conscients de l’importance de la cybersécurité, mais estiment qu’ils n’ont pas les ressources nécessaires pour en faire une priorité. Ce sont là quelques-unes des raisons pour lesquelles pas moins de 90 % des PME n’ont pas établi de système de protection pour leurs données ou celles de leurs clients.
Tags : 
    
Dell SB
Published By: Dell SB     Published Date: Aug 27, 2019
Viele Kleinunternehmer glauben, dass ihre Unternehmen aufgrund der Größe kein Ziel von Hacks, Ransomware und anderen Arten von Cyberangriffen werden. Andere sind sich der Notwendigkeit von Cybersicherheit bewusst, sind aber der Meinung, nicht über genügend Ressourcen zu verfügen, um Cybersicherheit zur Priorität zu machen. Dies sind nur einige der Gründe, weshalb ganze 90 % aller Kleinunternehmen keine Sicherheitsvorkehrungen treffen, die die Daten des Unternehmens und der Kunden schützen könnten.
Tags : 
    
Dell SB
Published By: Akamai Technologies     Published Date: May 24, 2017
Webanwendungs- und DDoS-Angriffe lassen sich nicht vorhersehen und treffen Unternehmen ohne Vorwarnung. Für die meisten DDoS-Angriffe (Distributed Denial of Service) ist nicht viel Know-how erforderlich. Angreifer können günstig Ressourcen mieten, die auf entsprechenden Seiten leicht zu finden sind. Trotz des geringen Preises führen DDoS-Angriffe zu vielen Problemen: • Betriebsunterbrechung • Verlust vertraulicher Daten • Niedrigere Nutzerproduktivität • Rufschädigung • Beeinträchtigung von Partnerschaften und Kundenbeziehungen • Umsatzverlust Je nach Branche können sich so schnell Schäden von Zehntausenden US-Dollar ergeben – in einigen Fällen geht der Schaden sogar in die Millionen. Nur 2 % der Unternehmen gaben an, ihre Webanwendungen seien in den vergangenen 12 Monaten nicht Opfer eines Angriffs geworden. Bei 98 % war das Gegenteil der Fall.
Tags : 
    
Akamai Technologies
Published By: Hewlett Packard Enterprise     Published Date: Jun 17, 2019
"Cloud-based predictive analytics platforms are a relatively new phenomenon, and they go far beyond the remote monitoring systems of a prior generation. Three key features differentiate cloud-based predictive analytics — data sharing, scope of monitoring, and use of artificial intelligence/machine learning (AI/ML) to drive autonomous operations. To help familiarize the uninitiated with specifically what types of value these systems can drive, IDC discusses them at some length in this white paper."
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Jul 29, 2019
Businesses of all sizes and industries have struggled to implement a hybrid IT environment that can meet their most critical needs, without disrupting business. The challenge is especially acute for midsized firms whose limited IT resources are facing pressure to adopt a never-ending torrent of technology innovations. In an effort to create a hybrid IT environment, many businesses end up with a multiple siloed infrastructure deployment options that consume increasing amounts of management time, effort and budget, while never quite meeting business needs.
Tags : 
    
Hewlett Packard Enterprise
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

Free Magazines

Hundreds of free magazines!