dam

Results 876 - 900 of 902Sort Results By: Published Date | Title | Company Name
By: Melissa Data     Published Date: Nov 18, 2008
Tom Brennan and John Nydam explain the Melissa Data and Stalworth partnership, discuss the business problems caused by bad data, and describe how DQ*Plus provides a complete data quality solution for enterprise applications and commercial databases.
Tags : melissa data, data quality, contact data verification, address verification, validate address, address verification software, address verify, address validation software, data quality tools, data quality management, data quality objects, data quality api, address quality, data cleanse, data hygiene, data quality, data quality analysis, data quality api, data quality assurance, data quality control
     Melissa Data
By: Dell     Published Date: Oct 23, 2008
ITIL has proven to be a veritable blueprint for repeatable best practices in the data center. Windows Vista migration features provide support for ITIL fundamental operations, as you’ll hear about in this informative podcast with Dell ITIL expert Don Bui.
Tags : dell, itil fundamental operations, itil vista migration, windows vista migration, it management
     Dell
By: DataMotion     Published Date: Oct 20, 2008
Almost every task one performs at work includes the exchange of information in one form or another and much of that is exchanged via email and its attachments. Yet too many enterprises view e-mail as a mature technology that simply accomplishes a rather mundane but necessary task, taking e-mail for granted. They rarely seek to leverage it beyond its most fundamental function. However, the messaging services that form the basis of e-mail are far more valuable than the e-mail itself, and can be used innovative ways to save time and money in our every day tasks. Download to learn more.
Tags : certifiedmail, datamotion, microsoft exchange, security, e-mail security, maintenance
     DataMotion
By: Godfrey     Published Date: Oct 02, 2008
Branding has always been about much more than logos and graphics. It comprises the total experience customers and prospects have with your company. By adding newer, richer choices, today’s new communications technologies – everything from blogs and podcasts to wikis and mobile – are changing the fundamental basis of business-to-business marketing. Almost daily. While some are saying that branding is no longer relevant in that increasingly fragmented media world, we believe branding actually is more important than ever. In fact, it’s critical to your success.
Tags : godfrey, b-to-b branding, business-to-business branding, b-to-b branding in web 2.0, b-to-b interactive media, brand guardians, brand ambassadors, media proliferation, brand fragmentation, business-to-business marketing
     Godfrey
By: NeighborhoodAmerica     Published Date: Oct 01, 2008
Virtually all organizations are realizing the importance of customer engagement. But in order to benefit, we must subscribe to the idea that consumers really can add value to our organization. And sometimes, that means removing the notion that we are the experts in exchange for the belief that we can learn a thing or two from our customers. The collective intelligence of the communities we serve is largely an untapped asset - a stream of valuable input that can help improve the decisions we make and shape the products we sell. This book explores the value of many - and the role that customer engagement will play in shaping the future of our businesses, our government, and our economy.
Tags : neighborhood america, social network, web 2.0, data integration
     NeighborhoodAmerica
By: CA Mainframe     Published Date: Sep 12, 2008
Automated application quality assurance and testing are fundamental to the delivery of the service levels and managed risks that are essential to delivering business outcomes you can depend on. In this context, CA’s mainframe Application Quality Management and Testing Tools send very strong messages: the tools are being actively developed and, where appropriate, integrated with equivalent tools on the distributed platforms, to help companies deliver holistic, automated, business services.
Tags : ca mainframe, mainframe, application quality, application testing, testing
     CA Mainframe
By: KEMP Technologies     Published Date: Aug 04, 2008
Websites have become critical components of most businesses’ core operations. They support the brand and ordering process, serve as data information resources and assist in overall customer care. Having poor website performance or poor reliability can destroy or severely damage a business and its reputation. The increasing importance of these websites leads to critical requirements of security, reliability and scalability. Delivering these, however, can leave an SMB stretched beyond its resources.
Tags : load balancer, load balancing, application delivery, ssl acceleration, application optimization, windows terminal services, terminal services, content switching, server load balancing, application security, network security, kemp, kemp technologies
     KEMP Technologies
By: Intermec     Published Date: Aug 01, 2008
Find out how each aspect of perfect order performance (On-Time Delivery, Complete Orders, Damage-free Delivery, Accurate Invoicing and Documentation) can be improved through enhancements to data collection processes and technologies including RFID, speech, imaging technology, and GPS.
Tags : rfid, on-time delivery, complete orders, perfect order, bar code, manufacturing, metrics, speech, werc, eps, roa, intermec
     Intermec
By: Javelin Strategy & Research     Published Date: Jul 02, 2008
Javelin Strategy & Research has released a study covering data breach victims, which highlights the acute awareness among consumers about data security and the significant implications security breaches represent to businesses once consumer trust is compromised. Read this report, which also reveals Javelin's recommendations to institutions to address consumer security concerns and expectations in the event of a data breach.
Tags : javelin, debix, customer service, customer experience, damage control, data breach, security breach
     Javelin Strategy & Research
By: Clearswift     Published Date: Jun 09, 2008
Every enterprise has to find a balance between security and the ability to carry on conducting business freely. This short guide is about finding that balance. By following some basic principles, there's no reason you can't let legitimate business email move into, out of and within your enterprise while stopping the things that cause damage: viruses, spam, spyware, trojans, phishing, Denial of Service attacks, the loss of sensitive data and the collection of illegal, immoral and just plain offensive material.
Tags : e-mail security, guide, clearswift, clearswift
     Clearswift
By: Catalyst SF     Published Date: May 05, 2008
This white paper is designed to provide the marketing generalist with the basics of the gaming industry and how to leverage game marketing tools to improve marketing effectiveness. It is not designed for a gaming expert but rather for the person who is curious about the space, believes that game marketing may have value for their brand, but is not well versed in the opportunities available or the dynamics of the industry.
Tags : game, gaming, video game, video gamings, catalyst, catalyst sf, game marketing
     Catalyst SF
By: Extensis     Published Date: May 04, 2008
With a library of thousands of on- and off-line slides growing by 1,200 new images monthly, chaos was spreading like a disease in The Pathology Department at Oregon Health & Science University. Until they found the perfect solution to help them organize, track and access their image library - Portfolio Server.
Tags : extensis, ohsu, library, dam, solutions, digital asset management'
     Extensis
By: Catalyst SF     Published Date: Apr 30, 2008
This white paper is intended to provide an overview of the mobile marketing options available to marketers today. It is designed for the person who wants an entry level perspective on the platform. Ultimately, this document is meant as a starting point in your pursuit for greater understanding of emerging media options, in this case mobile. After reading, you should have some idea of how to proceed to explore digital marketing for your brand.
Tags : catalyst, mobile marketing, mobile, cell, cell phone, smart phone
     Catalyst SF
By: BlueArc Corporation     Published Date: Apr 24, 2008
When people think of global warming and environmental damage caused by inefficient power consumption, computing may not instantly spring to mind as a culprit, but the computing industry takes a toll on the environment. Learn more about how your company can address both environmental and business initiatives in this white paper.
Tags : bluearc, green, energy efficient, energy, environmental, data center, business initiatives
     BlueArc Corporation
By: Extensis     Published Date: Apr 18, 2008
In 2006, Direct Wines Ltd identified a need for a solution that would manage the thousands of wine related images they had collected. The main use of the images, which range from images of wineries and wine makers to those of grapes, is inclusion in the company's direct mail campaigns and on the Direct Wines website.
Tags : extensis, direct wine, portfolio server, images, dam, solutions
     Extensis
By: AcquireWeb     Published Date: Apr 07, 2008
This article, published by Target Marketing in April 2008, examines principles and practices associated with acquisition e-mail, which also apply to CRM programs, that are often overlooked by marketers when building their e-mail strategies. These fundamentals serve as strategies to consider and employ to yield higher response rates and a more effective e-mail marketing effort.
Tags : acquireweb, acquisition email, email marketing, integrated marketing, e-mail, acquisition e-mail, lead generation, e-mail marketing, e-mail appending, acquirelocal, local marketing, local store marketing, restaurant marketing, franchise marketing, acquisition marketing
     AcquireWeb
By: Extensis     Published Date: Mar 07, 2008
The Photography Department at The National Gallery of London wanted to give other Gallery departments better visibility into its archived library of images and reduce the administrative workload for its photographers. Read how Portfolio Server and Portfolio SQL-Connect painted the perfect solution to this challenge.
Tags : extensis, portfolio server, sql, asa, dam, digital asset management
     Extensis
By: IBM     Published Date: Feb 08, 2008
Throughout the industrialized world, healthcare systems are in crisis. Aging populations and skyrocketing costs are putting unprecedented financial and organizational pressure on healthcare providers and payers. The result is often a decreasing level of care. In response, fundamental changes are taking place. Patient-centric systems are evolving in which the patient's well-being and the responsibility for good health are defining treatment and operational policies.
Tags : health, healthcare, medical, medical records, patient, patient records, hipaa, customer-centric, medicine, hospital, hospitals, ibm
     IBM
By: Aveksa     Published Date: Feb 04, 2008
User access-related business risk comprises a broad array of potentially damaging events that may be caused or made possible by inadequate governance of access to an enterprise’s information assets. Such events range from relatively minor policy and compliance violations to disastrous business losses.  The stakes involved in access-related risk have risen dramatically in recent years as organizations have become thoroughly operationalized by technology.
Tags : access control, user access, access, permissions, risk, risk management, compliance, governance, aveksa
     Aveksa
By: Tideway Systems     Published Date: Dec 11, 2007
Many firms are embarking on ambitious data center optimization projects to significantly reduce cost in hardware, maintenance, licensing, rack space, cooling and power – only to realize they are lacking fundamental data about their environment. Learn how you can accelerate and de-risk your data center optimization initiatives.
Tags : infrastructure, network management, configuration management, cms, cmml, cmdb, datacenter, data center, datacenters, tideway, tideway systems
     Tideway Systems
By: Trend Micro SaaS     Published Date: Dec 05, 2007
eSecurityToGo hat sich auf Sicherheitslösungen für kleine und mittlere Unternehmen (SMB) von heute spezialisiert. Einen großen Teil des Kundenstamms bilden andere IT-Berater, die das umfassende Fachwissen und die besonderen Schwerpunkte von eSecurityToGo zu schätzen wissen. Das Unternehmen ist Reseller der kompletten Produktpalette von Trend Micro Lösungen. Es sichert sich damit zufriedene Kunden, die sich auch in Zukunft für Trend Micro entscheiden.
Tags : gegensatz, unternehmen, esecuritytogo, interscan messaging, trend micro, smb
     Trend Micro SaaS
By: Quocirca     Published Date: Nov 13, 2007
Businesses across Europe are becoming increasingly reliant on web-enabled applications that are accessed over the public internet. One of the key drivers for this is to open up communications with external organizations that are fundamental to core business processes.
Tags : bpm, business process, web application, customer service, customer satisfaction, business management, order, order management, quocirca, it management, enterprise applications
     Quocirca
By: Quocirca     Published Date: Sep 13, 2007
A sound IT infrastructure is fundamental to today’s businesses and when that infrastructure fails the consequences can be far reaching. Whether it is business-to-business, business-to-consumer or public sector organizations serving citizens, applications and the services they drive increasingly need to be available all day, every day. Many organizations find it hard to achieve such service levels. This briefing looks at some possible solutions.
Tags : data center, datacenter, data centers, datacenters, data centre, data centres, infrastructure, mission critical, high availability, small business, smb, smbs, outsourcing networking, network management, symantec, quocirca
     Quocirca
By: Asentria Corporation     Published Date: Sep 04, 2007
More than ever before, IT managers need to secure equipment and facilities against a variety of intrusive conditions that could cripple critical operations, resulting in system malfunctions, loss of data or intellectual property, damage to mission critical hardware or even theft of valuable physical assets. Such conditions often include environmental events, failure of air conditioning systems, power outages, and untoward human actions.
Tags : telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures, fault management, network management, remote site monitoring, remote site alarms, environmental monitoring, network alarm monitoring, network alarm management, remote telemetry units, alarm management system, network management systems, network monitoring, protocol mediation
     Asentria Corporation
By: Secure Computing     Published Date: Feb 27, 2007
This industry white paper takes the mystery out of the key differences in the main classes of firewall architectures. It was independently written by Marcus J. Ranum, a world-renowned expert on security system design and implementation. It includes fundamental lessons about building application layer firewalls, technical examples, and concludes with predictions about the future of firewall technology.
Tags : security, firewalls, firewall, internet security, intrusion detection, intrusion prevention, application security, email security, network security, secure computing, securecomputing
     Secure Computing
Start   Previous    23 24 25 26 27 28 29 30 31 32 33 34 35 36 37    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com