line data

Results 501 - 525 of 782Sort Results By: Published Date | Title | Company Name
By: GoToMeeting     Published Date: Aug 02, 2011
This new SandHill Group white paper explores recent study findings to better understand the powerful advantages of SaaS technologies in addressing the training challenges of a global market, virtual teams and an ever-changing business climate.
Tags : gotomeeting, citrix, meetings, online meetings, collaboration, gotomeeting, go to meeting, sharing resources, meeting, desktop, sharing, resources, virtualization, cloud, green it, desktop management, access control, desktop security, remote, data recovery
     GoToMeeting
By: SAS     Published Date: Jun 05, 2017
"The Industrial Internet of Things (IIoT) is flooding today’s industrial sector with data. Information is streaming in from many sources — equipment on production lines, sensors at customer facilities, sales data, and much more. Harvesting insights means filtering out the noise to arrive at actionable intelligence. This report shows how to craft a strategy to gain a competitive edge. It explains how to evaluate IIoT solutions, including what to look for in end-to-end analytics solutions. Finally, it shows how SAS has combined its analytics expertise with Intel’s leadership in IIoT information architecture to create solutions that turn raw data into valuable insights. "
Tags : 
     SAS
By: IBM Unica     Published Date: Sep 08, 2011
This SiriusDecisions vendor profile features Unica, which offers a marketing automation platform that includes online and offline campaign management, Website and content personalization, activity-based campaign triggers, lead management, and customer data and Web analytics.
Tags : ibm, unica, siriusdecisions, vendor profile, field marketing, automation platforms, integrated enterprise, demand creation provider grid
     IBM Unica
By: Janrain, Inc.     Published Date: Oct 29, 2012
Never before have digital marketers been blessed with such immense quantities of online customer data at our disposal, yet been so incapacitated by how to use it. This paper explores ways to collect value from customer related information.
Tags : janrain, user management, vibrant audience, online users, user engagement, big data, customer related information, collect value
     Janrain, Inc.
By: Janrain, Inc.     Published Date: Mar 22, 2013
A common objective for a website is to convert an anonymous visitor to an engaged and active registered user. Download this paper for best practices in implementing online user registration and collecting data without sacrificing conversion rates.
Tags : user registrations, user management platform, registration system, registration optimization, registration infrastructure
     Janrain, Inc.
By: Mirror Image Internet     Published Date: Jun 07, 2012
This white paper discusses 5 sure-fire ways you can make your advertising technologies perform better to deliver significant business value.
Tags : advertising, ad ops, ad tech, display advertising, online advertising, targeting, data, mobile advertising, dsp, rtb, ad networks, ad exchanges, iab, banner ads, clickthrough, pixel, pixel tracking, mobile device detection, video advertising, interactive advertising
     Mirror Image Internet
By: SunGard     Published Date: Aug 13, 2012
A leader in performance management, marketing, and training, Frontline Focus required a new data solution to keep information flowing and secure. Any solution had to be resilient, highly available,completely scalable, and cost-effective.
Tags : cloud, scalable, cost-effective, sunguard, virtual, cloud, iaas, capital, expenditures, security, recoverability, storage, data management, data center
     SunGard
By: CDW     Published Date: Mar 31, 2015
Organizations face a challenging deadline as the end of support for Windows Server 2003 nears, but they also have an opportunity for data center transformation. Download this infographic to learn more.
Tags : windows server 2003, microsoft, server migration, workloads, applications, security, it management, data management
     CDW
By: CDW     Published Date: Apr 04, 2016
Open Compute has had a significant impact on the thinking about data center design. Until now, the focus has been on systems at the rack level, leaving unanswered questions about the power infrastructure upstream of the rack. In this paper, we address critical questions about the implications of Open Compute on the upstream power infrastructure, including redundancy, availability, and flexibility. We introduce simplified reference designs that support OCP and provide a capital cost analysis to compare traditional and OCP-based designs. We also present an online TradeOff Tool that allows data center decision makers to better understand the cost differences and cost drivers to various architectures.
Tags : data, application performance, data protection, performance optimization, data center, infrastructure management, data management
     CDW
By: SafeNet     Published Date: Jan 14, 2014
SafeNet CN high speed network data encryption devices are purpose built hardware appliances that secure data transmitted across Layer 2 networks. The CN series platforms provide highly secure, full line rate transparent encryption for data moving across both dark Fibre and metro, or wide area Ethernet networks in point-point, hub & spoke, or any meshed environment.
Tags : wan optimization, wan, encryption, network data security, wan acceleration, safenet
     SafeNet
By: VMTurbo     Published Date: Mar 25, 2015
In this paper, we outline the need for “Software-Driven Control” – the intelligence or “control plane” that can take advantage of these new software-defined capabilities, enabling enterprises and service providers to bridge the gap between software-defined flexibility and the true business potential of the Software-Defined Datacenter.
Tags : vmturbo, cloud control plane, software-driven control, software-defined capabilities, software-defined datacenter, it management, enterprise applications
     VMTurbo
By: NAVEX Global     Published Date: Nov 18, 2013
Download this report for a comprehensive review of cross-industry benchmarks and gain an excellent resource for companies wishing to assess their organization's reporting data.
Tags : compliance, benchmark, compliance programs, case management, hotline data benchmarking, ethics and compliance
     NAVEX Global
By: NAVEX Global     Published Date: Nov 18, 2013
In this paper, you'll learn more about each of the four Board responsibilities outlined in the U.S. Sentencing Guidelines with respect to ethics and compliance programs.
Tags : compliance, benchmark, compliance programs, case management, hotline data benchmarking, ethics and compliance
     NAVEX Global
By: NAVEX Global     Published Date: Nov 18, 2013
Download this whitepaper to learn the 4 fundamental steps to creating an effective third party compliance program like the elaborate, richly funded programs that are so prominent in the news.
Tags : compliance, benchmark, compliance programs, case management, hotline data benchmarking, ethics and compliance, third party compliance, risk assessment
     NAVEX Global
By: NAVEX Global     Published Date: Nov 18, 2013
This checklist will enable you to target the features and functionality you really need before embarking on the path to securing your third party relationships.
Tags : compliance, benchmark, compliance programs, case management, hotline data benchmarking, ethics and compliance
     NAVEX Global
By: NAVEX Global     Published Date: Nov 19, 2013
Is your organization benefiting from the full ROI of automated policy and procedure management? Policies and procedures are the building blocks of every organization. This eBook offers articles geared toward managing the policy lifecycle from drafting and validating to approving and implementing, as well as increasing security and important steps toward protecting against data breaches.
Tags : compliance, benchmark, compliance programs, case management, hotline data benchmarking, ethics and compliance
     NAVEX Global
By: CDW-Trend Micro     Published Date: Mar 26, 2015
Merchants and service providers that process credit card payments must comply with the Payment Card Industry Data Security Standard (PCI DSS), now at Version 3.0. Whether the transaction occurs in a store or online, and regardless of the environment, from physical Point of Sale devices, to virtualized servers, or web servers in a public cloud, PCI DSS 3.0 mandates that these organizations are responsible for the security of their customers’ cardholder data. Read this white paper to learn more about the Payment Card Industry Data Security Standard 3.0.
Tags : security, software development, it management
     CDW-Trend Micro
By: Avi Networks     Published Date: Mar 24, 2016
This buyer’s guide for load balancers is based on research, best practices, and conversations with network administrators and IT operations teams at over 110 Global 2000 enterprises. It presents guidelines for choosing application services that mirror the needs of modern data centers and public cloud initiatives. The guide is organized in sections, starting with a pre-assessment of your current application delivery capabilities. With data gathered from your pre-assessment, you can review the considerations involved in creating a software-defined application services strategy; identify opportunities to improve automation of application services and operations. Finally, use the software-defined application services checklist at the end of the guide to identify key priorities in your choice of application service solutions for your enterprise.
Tags : avi networks, best practices, application services, modern data centers, public cloud initiatives, load balancer, load balancing, application delivery, application delivery controller, adc, software-defined networks, sdn, networking, it management
     Avi Networks
By: CDW - APC     Published Date: Apr 07, 2016
Open Compute has had a significant impact on the thinking about data center design. Until now, the focus has been on systems at the rack level, leaving unanswered questions about the power infrastructure upstream of the rack. In this paper, we address critical questions about the implications of Open Compute on the upstream power infrastructure, including redundancy, availability, and flexibility. We introduce simplified reference designs that support OCP and provide a capital cost analysis to compare traditional and OCP-based designs. We also present an online TradeOff Tool that allows data center decision makers to better understand the cost differences and cost drivers to various architectures.
Tags : data, application performance, data protection, performance optimization, data center, infrastructure management, data management
     CDW - APC
By: Qlik     Published Date: Jun 24, 2016
This paper outlines the benefits of a distributed model, and includes insights and case studies from leading executives.
Tags : qlik, data, business data, business intelligence, distributed model
     Qlik
By: Cambium Networks     Published Date: Oct 03, 2016
Cambium Networks’ fixed wireless broadband solutions provide an attractive ROI for electric utilities when replacing leased-lines for: Redundant backbone IP network rings Smart meter and distribution automation aggregation transport Transport for substation and distribution SCADA data Remote office connectivity Mobile WiFi connectivity in substations and operation centers Download this white paper to learn more.
Tags : wireless broadband, roi, mobile wi-fi connectivity, smart meter
     Cambium Networks
By: CrowdStrike     Published Date: May 10, 2018
Finding out your organization has been breached can be devastating news — knowing how to deal with an intruder that’s broken through your cyber defenses can be even more challenging. This white paper, “You’ve Been Breached — Now What? How to Respond to a Worst-Case Scenario,” offers practical steps IT and security professionals should take after a cyberattack occurs. You’ll receive guidance for both short-term and long-term strategies to help minimize damage, protect sensitive assets and preserve forensic evidence that can help during the investigation and remediation process. This paper also includes recommendations for strengthening your organization’s defenses against a future breach. They are based on decades of experience from CrowdStrike® incident responders who work on the front lines fighting cyberthreat actors every day. Download this White Paper to learn: • How to collect and preserve data after a breach so that critical forensic information can be retrieved • What sort of in
Tags : 
     CrowdStrike
By: CrowdStrike     Published Date: Nov 28, 2018
Finding out your organization has been breached can be devastating news — knowing how to deal with an intruder that’s broken through your cyber defenses can be even more challenging. This white paper, “You’ve Been Breached — Now What? How to Respond to a Worst-Case Scenario,” offers practical steps IT and security professionals should take after a cyberattack occurs. You’ll receive guidance for both short-term and long-term strategies to help minimize damage, protect sensitive assets and preserve forensic evidence that can help during the investigation and remediation process. This paper also includes recommendations for strengthening your organization’s defenses against a future breach. They are based on decades of experience from CrowdStrike® incident responders who work on the front lines fighting cyberthreat actors every day. Download this White Paper to learn: How to collect and preserve data after a breach so that critical forensic information can be retrieved What sort of int
Tags : 
     CrowdStrike
By: PwC     Published Date: Aug 27, 2019
Six hours a day. According to research, that’s how much of a lawyer’s time, on average, is spent on administrative tasks or new client development (sound familiar?). Fortunately, technology and the data it generates can help you streamline systems and processes — and reveal important insights about your firm. But what tools should you use? How should you implement them? We’ve got the answers. Our guide outlines what you need to know when leveraging technology to reduce admin inefficiencies and, better yet, increase cash flow. You’ll learn how to identify what metrics matter most to your practice: like billable hours, profitability by client and hiring decisions. It also spotlights helpful tools, like PwC’s InsightsOfficer, that turn data into insights, impacting your firm’s performance.
Tags : 
     PwC
By: Adverity     Published Date: Jun 15, 2018
A Beginner's Guide to Marketing Data Analytics Marketing Data is big & highly fragmented Big data is messy. It’s scattered across platforms, it’s diverse, and in its raw form, it’s practically unusable. We know, it’s a painful truth. The fact of the matter is that having a lot of data doesn’t necessarily mean that you have the answers to your most pressing questions. Looking for the most relevant bits in your pile of big data is like looking for a needle in a haystack. But don't you worry - we are here to help. This handy e-book will give you a short overview what quality matters, why data is so important and what you need to pay attention to. Best thing is: getting this ebook is super easy. Just fill out the form to the right and voilá - your download is ready. Enjoy this read!
Tags : marketing business intelligence, saas marketing optimization, measuring marketing performance, roi analytics, automated report generator, performance based marketing, online marketing data, roi metrics, marketing reports, roi reporting, reporting generator, automated reporting tool, marketing dashboard, marketing data, marketing intelligence, report software, marketing reporting, marketing metrics, performance marketing, marketing performance
     Adverity
Start   Previous    14 15 16 17 18 19 20 21 22 23 24 25 26 27 28    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com