profile

Results 276 - 300 of 301Sort Results By: Published Date | Title | Company Name
Published By: Business-Software     Published Date: Jul 14, 2010
Profiles of the Leading Retail Management Software Vendors.
Tags : 
business software, business intelligence, business management, enterprise resource planning, enterprise software
    
Business-Software
Published By: Business-Software     Published Date: Jul 14, 2010
Profiles of the Leading Supply Chain Management Software Vendors.
Tags : 
business software, enterprise resource planning, enterprise software, supply chain management
    
Business-Software
Published By: Savvis     Published Date: Jul 07, 2010
Savvis Symphony VPDC introduces one of the industry's first enterprise-grade Virtual Private Data Center (VPDC) solutions with multi-tiered security and service profiles.
Tags : 
savvis symphony, virtual private data center, vpdc, security, it infrastructure, outsourcing, cloud computing, infrastructure
    
Savvis
Published By: Bell Micro     Published Date: Jun 14, 2010
In this Customer Solution Profile a Fortune five organization put the IBM XIV storage system through its paces in their Microsoft Exchange 2003 environment.
Tags : 
bell micro, microsoft exchange, ibm xiv storage system, resilience, performance, email system, network performance management, storage management
    
Bell Micro
Published By: Net Atlantic     Published Date: Jun 04, 2010
Register for this live event: Date: Thursday, September 2, 2010 Time: 2:00pm EDT / 11:00am PDT Length: 1 Hour During this one hour session, we'll discuss 5 components of a successful email marketing strategy and how to increase relevance through segmentation and targeting, including: .creating and delivering relevant content; .applying profile and behavior-based targeting; .automating email campaigns to match the customer purchase lifecycle; .achieving the right contact frequency for your audience; and .testing your strategy for effectiveness.
Tags : 
email marketing, webinar
    
Net Atlantic
Published By: EMC Backup & Recovery Solutions     Published Date: Mar 29, 2010
VMware sites create more storage to manage and protect than their physical counterparts. This report showcases how EMC Backup and Recovery Solutions for VMware have helped customers redesign their backup operations.
Tags : 
emc, data domain, efficiency, vmware, server consolidation, servers, data integrity, backup
    
EMC Backup & Recovery Solutions
Published By: EMC Backup & Recovery Solutions     Published Date: Mar 22, 2010
In this Solution Profile, we will concentrate on the importance of optimizing data protection for evolving virtual networks, and on working with a trusted partner. Virtualization technology works across all sizes of business to reduce costs, control management overhead, and increase flexibility. However, virtualization also requires that companies adapt their traditional backup and data protection practices to suit the rapidly changing virtualization infrastructure.
Tags : 
emc, vmware, taneja, virtual environments, virtualization, backup, data protection, infrastructure
    
EMC Backup & Recovery Solutions
Published By: Absolute Software     Published Date: Jan 27, 2010
This whitepaper explains how organizations can reduce their energy bills by remotely regulating computers. Topics include typical workplace computer usage, how to calculate your potential energy savings, debunking power management myths, and how you can assign multiple power saving profiles to clients.
Tags : 
computrace, absolute software, it asset management, remote data delete, geolocation tracking, theft recovery, service guarantee, application integration
    
Absolute Software
Published By: McAfee Inc     Published Date: Nov 16, 2009
With all the benefits and opportunities the Internet provides, it can also be a very inhospitable place, requiring organizations' constant vigilance to protect themselves from attack. To better understand important security issues affecting organizations today, IDC recently completed a survey of more than 260 IT and Firewall managers and executives in the US and Europe that aimed to profile their organization's firewall deployments.
Tags : 
mcafee, email protection, firewall, it security, midsize, global threat intelligence, security, data protection
    
McAfee Inc
Published By: VM Ware     Published Date: Nov 04, 2009
This Taneja Group Solution Profile identifies the data protection optimizations available in the VMware vSphere environment.
Tags : 
vmware, data protection, vsphere, server virtualization, smb, disaster recovery
    
VM Ware
Published By: Progress Software Corporation CEP     Published Date: Oct 23, 2009
IDC Report: Complex Event Processing Opportunity Analysis and Assessment of Key Products Read this excerpt of the 2009 IDC study by Maureen Fleming and Jeff Silverstein looking at complex event processing. The excerpt includes IDC opinion on the market for CEP, what defines CEP and independently profiles Progress Apama, which was ranked "Top CEP Innovator" in the report.
Tags : 
progress software, idc, complex event processing, business intelligence, cep, mom, application performance management, business activity monitoring
    
Progress Software Corporation CEP
Published By: Iovation     Published Date: Sep 25, 2009
After $20,000 in direct losses and who knows how many lost opportunities, we just couldn't stay in reaction mode. We went looking for a proactive solution and found iovation. We were drawn to the idea of sharing fraud profiles with other subscribers. Plus, the fraud checking is done in real time and it scales to volume which eased my concerns about customer impact. Implementation was straightforward. Preventing half the fraud attempts each month pays for the system; we've seen a 95% reduction in our chargeback rate in 8 months.
Tags : 
iovation, sharing fraud profiles, fraud protection service, on-line mmo gaming, rmt, real money trading, application security, auditing
    
Iovation
Published By: EMC Backup & Recovery Solutions     Published Date: Aug 27, 2009
Data profile assessments will let us help you determine the best match for your situation, the data you are looking to protect, your service level agreements, and the specifics of your current challenges and environment.
Tags : 
emc, data domain, efficiency, api, disk backup, recovery, vmware, server consolidation
    
EMC Backup & Recovery Solutions
Published By: IBM     Published Date: Aug 10, 2009
Digital Media convergence, Web 2.0 and social networking's growing influence are forcing Telecommunications companies to transform their service offerings. Watch this webcast to learn about IBM's asset-based telecommunications solutions that solve our clients most important challenges.
Tags : 
web 2.0, social networking, telecommunications, digital media, collaboration, ibm, empowering people, spde
    
IBM
Published By: Pardot     Published Date: Apr 29, 2009
How much time is your sales team wasting on unqualified leads? With automated scoring and grading your best prospects rise to the top, making it easy for sales representatives to prioritize prospects and take action with targeted follow-up.   
Tags : 
pardot, b2b lead generation, roi, lead gen, leads, unqualified leads, sales, sales team
    
Pardot
Published By: Neolane, Inc.     Published Date: Dec 30, 2008
The Hager Group is a $1.5-billion electronics manufacturer. With a distributed global workforce of more than 10,000 employees, Hager has 40 sales subsidiaries and 25 industrial sites worldwide.  Today, with a centralized marketing database and software, Hager can ensure data quality and deliver personalized, targeted communications according to customer and prospect profiles and behavior.  This program allows Hager to capture 1,000 new prospects each month, and achieve a 10 percent conversion rate - resulting in an incremental revenue increase of $42 million per year.
Tags : 
neolane, the hager group, e-marketing program, centralized marketing database, central repository customer data, crm software, custom content, deliverability
    
Neolane, Inc.
Published By: TriTuns Innovation     Published Date: Nov 21, 2008
Discover the tangible benefit of creating and delivering Customer Engagement Campaign emails that integrate corporate marketing with their sales team profiles (From address, their picture, a message from them - along with all the relevant corporate content), for a true 'connected' solution.
Tags : 
tailored mail, email marketing program, customer engagement campaign, email service provider, email campaigns
    
TriTuns Innovation
Published By: HP - Enterprise     Published Date: Nov 19, 2008
With an extensive background in police, military, government, and industry security, Howard Schmidt explains how to respond to the changing landscape of cyber threats and how business leaders are helping set the standards for application security. He then profiles industry role models who are setting the standard for application security.
Tags : 
howard schmidt, security, application security, audit, risk, vulnerabilities, fortify, fortify software
    
HP - Enterprise
Published By: DataMotion     Published Date: Oct 01, 2008
After years of transferring many business activities online to take advantage of the benefits of the Internet, companies have now spent billions of dollars on antivirus software and other security measures. High-profile outbreaks and breaches reported in the international media have helped drive them to implement security measures that protect their customers and their brands while still growing their businesses...Download this paper to read more.
Tags : 
certifiedmail technology, email security, message security, encryption, security
    
DataMotion
Published By: mindSHIFT     Published Date: Nov 29, 2007
mindSHIFT has extended its service capabilities to include software-as-a-service as well as managed IT services, and is a "compelling solution" for small and medium-sized organizations seeking a strategic source to meet their IT and business needs.
Tags : 
saas, managed it, outsourcing, vendor selection, tco, voip, ip telephony, managed services
    
mindSHIFT
Published By: Red Gate Software     Published Date: Oct 19, 2007
This short white paper discusses the common pitfalls and performance problems .NET developers come across when creating applications. The paper also presents several ways of getting around these issues, so that developers can make their .NET applications perform the way they should.
Tags : 
scalability, performance, performance problem, performance problems, .net, .net application, optimize code, .net profiling
    
Red Gate Software
Published By: Appistry     Published Date: Oct 11, 2007
Organizations serving the intelligence & defense community rely on the performance of their applications for more than revenue - national security depends upon those applications for mission-critical operations. This industry profile details how Appistry provides the reliability and performance demanded by intelligence & defense organizations.
Tags : 
application fabric, performance computing, application performance, grid computing, infrastructure, appistry, enterprise applications, application performance management
    
Appistry
Published By: Ecora Software     Published Date: Aug 15, 2007
High-profile data losses are grabbing more and more headlines every week, threatening the reputation, customer base, and overall bottom line of organization whose systems have been exploited. In addition to this lurking threat, now organizations face potential fines for PCI non-compliance from VISA, beginning in September 2007. Ecora Software will provide you with the information you need to proactively address PCI compliance and, of equal importance, minimize your risk of a costly data breach.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial
    
Ecora Software
Published By: Cymfony     Published Date: Jul 11, 2007
This new study by Harvard's Berkman Center for Internet & Society analyzed corporate attacks against leading companies like Wal-Mart, McDonald’s, AOL, Genzyme and Lufthansa. This study establishes three profiles of corporate attacks and examines the unique behavior patterns and personal motivations behind each.
Tags : 
collaboration, customer behavior, customer service, online behavior, criticism, crm, customer relationship, customer satisfaction
    
Cymfony
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.