dam

Results 876 - 900 of 916Sort Results By: Published Date | Title | Company Name
By: Quocirca     Published Date: Jul 27, 2009
With data breaches widespread, no organisation can afford to be complacent, but most data losses are avoidable. Many of the breaches making headline news are caused by the loss or theft of laptops and other portable devices. To protect themselves from financial and reputational damage, encryption technologies can reduce risks by ensuring the information on such devices is secure when users are on the move. They can also add value by allowing the secure sharing of information among authorised users and by enabling more secure remote working.
Tags : quocirca, encryption, security, information protection, compliance, data management
     Quocirca
By: SDL Web Content Management Solutions     Published Date: Jun 01, 2009
Forrester Research, Inc. has named SDL a Leader in "The Forrester WaveT: Web Content Management for Online Customer Experience, Q3 2011" independent report (July 2011). According to the report, "SDL's globalization and localization functionality remains a differentiator."
Tags : sdl tridion, a/b, crm, ecm, dam, wcm, web content management, online customer experience
     SDL Web Content Management Solutions
By: SDL Web Content Management Solutions     Published Date: Jun 01, 2009
Forrester evaluated 11 leading Web content management (WCM) vendors across 190 external site content management and delivery criteria and found that European vendor SDL Tridion has established clear leadership in enabling organizations to manage and deliver persuasive content customer experiences.
Tags : sdl tridion, a/b, crm, ecm, dam, wcm, web content management, multisite functionality
     SDL Web Content Management Solutions
By: WebEx.     Published Date: Apr 03, 2009
In today's business environment, equipping information workers with the right tools to do their jobs is a fundamental element for maintaining competitive advantage. Organizations are striving to achieve global connectivity in a dynamic environment where travel is becoming more difficult and expensive, employees are more dispersed, and business boundaries are constantly being extended.  Web collaboration is becoming imperative in reaching this fundamental goal by offering "anytime anywhere" communications that impacts the bottom line and improves profitability.
Tags : webex, web collaboration, information workers, competitive advantage, on-demand web collaboration, roi, global connectivity, decision cycles
     WebEx.
By: WebEx     Published Date: Apr 02, 2009
In today's business environment, equipping information workers with the right tools to do their jobs is a fundamental element for maintaining competitive advantage. Organizations are striving to achieve global connectivity in a dynamic environment where travel is becoming more difficult and expensive, employees are more dispersed, and business boundaries are constantly being extended. To harness the benefits of the new work order, organizations are looking to achieve true collaboration with customers, partners, suppliers and employees. Simply put, the mantra is to "improve productivity while lowering costs." Web collaboration is becoming imperative in reaching this fundamental goal by offering "anytime anywhere" communications that impacts the bottom line and improves profitability.
Tags : webex, web collaboration, information workers, competitive advantage, on-demand web collaboration, roi, global connectivity, decision cycles
     WebEx
By: IBM     Published Date: Mar 17, 2009
With A&D products containing tens of thousands of parts, and potentially millions of lines of software code–produced by hundreds of companies dispersed across the globe, Aerospace & Defense organizations understand the fundamental value and dire need for robust Change & Configuration Management (CM) processes. But it’s not just the number of parts, lines of code, or partners driving the need for better processes. The complexity of products and development processes, as well as the globalization of product development, are all contributing to an environment that is becoming more difficult to manage with each new program or project.
Tags : change and configuration management, ibm, telelogic, a&d, software coding, aerospace and defense, global supply chain, product data management
     IBM
By: Point It     Published Date: Mar 02, 2009
Whether you’re an experienced marketing manager, or just starting your career, it’s imperative that you know the fundamentals of search engine marketing and optimization. If for no other reason, you certainly don’t want to let your boss know you’re a marketing dinosaur. This whitepaper details the top 10 myths and errors behind SEO.
Tags : point it, b2b search mistakes, seo, meta tags, meta keywords, crawl rate, pay per click, ppc
     Point It
By: Quocirca     Published Date: Feb 23, 2009
Network Centric Operations (NCO) recognises the demand for pervasive decision-making in the modern battlespace. NCO provides the ability to leverage information networks to generate a more dynamic and agile decision-making space. An important dimension of this approach is the technological flexibility to quickly move the decision-making authority hierarchically or geographically as the situation demands. A fundamental enabler to this approach is the concept of a services orientated architecture (SOA). The use of industry-standard IT architectures provides the means of ensuring that systems can be provisioned rapidly, can be shared as appropriate, and can give the flexibility and response times required within such challenging environments.
Tags : quocirca, network centric operations, agile decision-making, services orientated architecture, soa, enterprise service bus, esb, non-governmental organizations
     Quocirca
By: ThreatMetrix.     Published Date: Jan 30, 2009
In this new white paper, learn how it’s possible to block fraud without damaging the customer experience and causing dropoff.
Tags : threatmetrix, device identification, dropoff, security token, fraud prevention solutions, security
     ThreatMetrix.
By: F5 Networks Inc     Published Date: Jan 22, 2009
Understanding HTTP and how these headers control behavior of web-based applications can lead to better end-user performance, as well as making it easier to choose an application acceleration solution that addresses the shortcomings of HTTP and browser-based solutions.
Tags : fundamentals of http, web-based applications, http, application acceleration solution, browser-based solutions, enterprise applications
     F5 Networks Inc
By: ThreatMetrix     Published Date: Jan 21, 2009
In this new white paper, learn how it’s possible to block fraud without damaging the customer experience and causing dropoff.
Tags : threatmetrix, device identification, dropoff, security token, fraud prevention solutions
     ThreatMetrix
By: Dell Windows Server     Published Date: Jan 16, 2009
The Dell EqualLogic™ PS Series is fundamentally changing the way enterprises think about purchasing and managing storage. Built on breakthrough virtualized peer storage architecture, the EqualLogic PS Series simplifies the deployment and administration of consolidated storage environments.
Tags : dell, dell equallogic, virtual storage, storage management, storage purchase, peer storage architecture, consolidated storage environments, storage
     Dell Windows Server
By: LeftHand Networks, Inc.     Published Date: Jan 15, 2009
Carefully protecting and managing the storage that holds a company’s data has become one of the most important missions of today’s Information Technology (IT) organizations. With data being a company’s most valuable asset, many are turning to Storage Area Networks (SANs) as a way to meet a number of challenges.  This White Paper looks at how a well built SAN can provide real benefits to your organization and improve overall efficiency within you network.
Tags : lefthand networks, san, storage area networks, simplification of storage, central data storage
     LeftHand Networks, Inc.
By: Network Automation     Published Date: Dec 02, 2008
The Vanderburgh County Highway Department encompasses the Highway, Local Roads, and Street and Cumulative Bridge departments within the Vanderburgh County Government. About 55 employees within these departments handle public works and general maintenance for 560 lane miles of Vanderburgh County roads, including general road repairs and resurfacing, right-of-way mowing, roadway ditch maintenance, tree maintenance and emergency response to weather conditions such as storm damage and snow removal.
Tags : network automation, business process automation, automatic vehicle location, it management
     Network Automation
By: Melissa Data     Published Date: Nov 18, 2008
Tom Brennan and John Nydam explain the Melissa Data and Stalworth partnership, discuss the business problems caused by bad data, and describe how DQ*Plus provides a complete data quality solution for enterprise applications and commercial databases.
Tags : melissa data, data quality, contact data verification, address verification, validate address, address verification software, address verify, address validation software
     Melissa Data
By: Dell     Published Date: Oct 23, 2008
ITIL has proven to be a veritable blueprint for repeatable best practices in the data center. Windows Vista migration features provide support for ITIL fundamental operations, as you’ll hear about in this informative podcast with Dell ITIL expert Don Bui.
Tags : dell, itil fundamental operations, itil vista migration, windows vista migration, it management
     Dell
By: DataMotion     Published Date: Oct 20, 2008
Almost every task one performs at work includes the exchange of information in one form or another and much of that is exchanged via email and its attachments. Yet too many enterprises view e-mail as a mature technology that simply accomplishes a rather mundane but necessary task, taking e-mail for granted. They rarely seek to leverage it beyond its most fundamental function. However, the messaging services that form the basis of e-mail are far more valuable than the e-mail itself, and can be used innovative ways to save time and money in our every day tasks. Download to learn more.
Tags : certifiedmail, datamotion, microsoft exchange, security, e-mail security, maintenance
     DataMotion
By: Godfrey     Published Date: Oct 02, 2008
Branding has always been about much more than logos and graphics. It comprises the total experience customers and prospects have with your company. By adding newer, richer choices, today’s new communications technologies – everything from blogs and podcasts to wikis and mobile – are changing the fundamental basis of business-to-business marketing. Almost daily. While some are saying that branding is no longer relevant in that increasingly fragmented media world, we believe branding actually is more important than ever. In fact, it’s critical to your success.
Tags : godfrey, b-to-b branding, business-to-business branding, b-to-b branding in web 2.0, b-to-b interactive media, brand guardians, brand ambassadors, media proliferation
     Godfrey
By: NeighborhoodAmerica     Published Date: Oct 01, 2008
Virtually all organizations are realizing the importance of customer engagement. But in order to benefit, we must subscribe to the idea that consumers really can add value to our organization. And sometimes, that means removing the notion that we are the experts in exchange for the belief that we can learn a thing or two from our customers. The collective intelligence of the communities we serve is largely an untapped asset - a stream of valuable input that can help improve the decisions we make and shape the products we sell. This book explores the value of many - and the role that customer engagement will play in shaping the future of our businesses, our government, and our economy.
Tags : neighborhood america, social network, web 2.0, data integration
     NeighborhoodAmerica
By: CA Mainframe     Published Date: Sep 12, 2008
Automated application quality assurance and testing are fundamental to the delivery of the service levels and managed risks that are essential to delivering business outcomes you can depend on. In this context, CA’s mainframe Application Quality Management and Testing Tools send very strong messages: the tools are being actively developed and, where appropriate, integrated with equivalent tools on the distributed platforms, to help companies deliver holistic, automated, business services.
Tags : ca mainframe, mainframe, application quality, application testing, testing
     CA Mainframe
By: KEMP Technologies     Published Date: Aug 04, 2008
Websites have become critical components of most businesses’ core operations. They support the brand and ordering process, serve as data information resources and assist in overall customer care. Having poor website performance or poor reliability can destroy or severely damage a business and its reputation. The increasing importance of these websites leads to critical requirements of security, reliability and scalability. Delivering these, however, can leave an SMB stretched beyond its resources.
Tags : load balancer, load balancing, application delivery, ssl acceleration, application optimization, windows terminal services, terminal services, content switching
     KEMP Technologies
By: Intermec     Published Date: Aug 01, 2008
Find out how each aspect of perfect order performance (On-Time Delivery, Complete Orders, Damage-free Delivery, Accurate Invoicing and Documentation) can be improved through enhancements to data collection processes and technologies including RFID, speech, imaging technology, and GPS.
Tags : rfid, on-time delivery, complete orders, perfect order, bar code, manufacturing, metrics, speech
     Intermec
By: Javelin Strategy & Research     Published Date: Jul 02, 2008
Javelin Strategy & Research has released a study covering data breach victims, which highlights the acute awareness among consumers about data security and the significant implications security breaches represent to businesses once consumer trust is compromised. Read this report, which also reveals Javelin's recommendations to institutions to address consumer security concerns and expectations in the event of a data breach.
Tags : javelin, debix, customer service, customer experience, damage control, data breach, security breach
     Javelin Strategy & Research
By: Clearswift     Published Date: Jun 09, 2008
Every enterprise has to find a balance between security and the ability to carry on conducting business freely. This short guide is about finding that balance. By following some basic principles, there's no reason you can't let legitimate business email move into, out of and within your enterprise while stopping the things that cause damage: viruses, spam, spyware, trojans, phishing, Denial of Service attacks, the loss of sensitive data and the collection of illegal, immoral and just plain offensive material.
Tags : e-mail security, guide, clearswift, clearswift
     Clearswift
By: Catalyst SF     Published Date: May 05, 2008
This white paper is designed to provide the marketing generalist with the basics of the gaming industry and how to leverage game marketing tools to improve marketing effectiveness. It is not designed for a gaming expert but rather for the person who is curious about the space, believes that game marketing may have value for their brand, but is not well versed in the opportunities available or the dynamics of the industry.
Tags : game, gaming, video game, video gamings, catalyst, catalyst sf, game marketing
     Catalyst SF
Start   Previous    23 24 25 26 27 28 29 30 31 32 33 34 35 36 37    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com