bing

Results 101 - 125 of 133Sort Results By: Published Date | Title | Company Name

Common Data Location Problems For Automotive Companies

Published By: Yext     Published Date: May 21, 2013
The paper will show every dealership the most common data location problems. It will explain why these problems need to be fixed and then show you the best strategies to fix them.
Tags : 
advertising, marketing, location, listings, maps, directories, yext, business, local, smb, seo, google, yahoo, mapquest, bing, yelp, facebook, foursquare
    
Yext

Common Data Location Problems For Lawyers

Published By: Yext     Published Date: May 21, 2013
The paper will show every law firm the most common data location problems. It will explain why these problems need to be fixed and then show you the best strategies to fix them.
Tags : 
advertising, marketing, location, listings, maps, directories, yext, business, local, smb, seo, google, yahoo, mapquest, bing, yelp, facebook, foursquare
    
Yext

Common Data Location Problems For Doctors

Published By: Yext     Published Date: May 21, 2013
The paper will show every doctors office the most common data location problems. It will explain why these problems need to be fixed and then show you the best strategies to fix them.
Tags : 
advertising, marketing, location, listings, maps, directories, yext, business, local, smb, seo, google, yahoo, mapquest, bing, yelp, facebook, foursquare
    
Yext

Cisco UCS Integrated Infrastructure for SAP HANA

Published By: Cisco     Published Date: Dec 21, 2016
Cisco UCS Integrated Infrastructure provides a pre-validated, ready-to-deploy infrastructure, which reduces the time and complexity involved in configuring and validating a traditional data center deployment. Cisco UCS Platforms is flexible, reliable and cost effective to facilitate various deployment options of the applications while being easily scalable and manageable. The reference architecture detailed in this document highlights the resiliency, cost benefit, and ease of deployment of a SAP HANA solution. This document describing the infrastructure installation and configuration to run SAP HANA on a dedicated or shared infrastructure.
Tags : 
    
Cisco

Campus LAN and Wireless LAN Design Summary

Published By: Cisco     Published Date: Dec 21, 2016
There is a tendency to discount the network as just simple plumbing, to think that all you have to consider is the size and the length of the pipes or the speeds and feeds of the links, and to dismiss the rest as unimportant. Just as the plumbing in a large stadium or high rise has to be designed for scale, purpose, redundancy, protection from tampering or denial of operation, and the capacity to handle peak loads, the network requires similar consideration. As users depend on the network to access the majority of the information they need to do their jobs and to transport their voice or video with reliability, the network must be able to provide resilient, intelligent transport.
Tags : 
    
Cisco

Outnetwork Your Peers And Learn How To Market Yourself And Strengthen Your Connections On LinkedIn.

Published By: Northeastern University     Published Date: Oct 01, 2015
Looking for a career change or considering the ways to maximize your career? Building your your LinkedIn profile to highlight your strengths, education and experience can help you establish your personal brand and market yourself to catch the attention of potential employers and recruiters. Browse this helpful guide, brought to you by Northeastern University, to learn about best practices for producing an attention-grabbing LinkedIn profile, while also exploring other LinkedIn tools and features to extend your network. Experience Northeastern.
Tags : 
grad school, northeastern university, graduate studies, masters, mba, career growth, career change
    
Northeastern University

Outnetwork Your Peers And Learn How To Market Yourself On LinkedIn To Stand Out From The Competition

Published By: Northeastern University     Published Date: Oct 01, 2015
Looking for a career change or considering the ways to maximize your career? Building your your LinkedIn profile to highlight your strengths, education and experience can help you establish your personal brand and market yourself to catch the attention of potential employers and recruiters. Browse this helpful guide, brought to you by Northeastern University, to learn about best practices for producing an attention-grabbing LinkedIn profile, while also exploring other LinkedIn tools and features to extend your network. Experience Northeastern.
Tags : 
grad school, northeastern university, graduate studies, masters, mba, career growth, career change
    
Northeastern University

Creating a Sustainable, Easy to Maintain BI Environment

Published By: IBM     Published Date: Oct 06, 2014
Business Intelligence (BI) has become a mandatory part of every enterprise’s decision-making fabric. Unfortunately in many cases, with this rise in popularity, came a significant and disturbing complexity. Many BI environments began to have a myriad of moving parts: data warehouses and data marts deployed on multiple platforms and technologies – each requiring significant effort to ensure performance and support for the various needs and skill sets of the business resources using the environment. These convoluted systems became hard to manage or enhance with new requirements. To remain viable and sustainable, they must be simplified. Fortunately today, we have the ability to build simpler BI technical environments that still support the necessary business requirements but without the ensuing management complexity. This paper covers what is needed to simplify BI environments and the technologies that support this simplification.
Tags : 
data warehouses, bi environments, bi technologies, faster deployments, knowledge management, business analytics, business management, business process management
    
IBM

Getting Started with DevOps Automation

Published By: Cisco     Published Date: Jan 05, 2016
In the time it took you to download and open this eBook, you could have spun up and configured hundreds of virtual machines in a public or private cloud, deployed your application, database, middleware, messaging, load balancers, storage, and other components to those configured servers, linked them all together, and had your app live in production - all with a single click. This isn’t the future we’re describing, it’s right now, and thousands of development teams around the world are doing it. At a high level, we’re describing automation that cloud and APIs enable, and at a low level, we’re describing the outcome of adopting a DevOps mentality and the associated tools. This eBook will look at the basics of DevOps automation, and configuration management to get you started down the right path.
Tags : 
    
Cisco

Getting Started w/DevOps Automation eBook

Published By: Cisco     Published Date: Apr 15, 2016
In the time it took to download and open this eBook, you could have spun up and configured hundreds of virtual machines in a public or private cloud, deployed your application, database, middleware, messaging, load balancers, storage, and other components to those configured servers, linked them all together, and had your app live in production - all with a single click. This isn't the future we're describing, it's right now, and thousands of development teams around the world are doing it. At a high level, we;re describing automation that cloud and API's enable, and at a low level, we're describing the outcome of adopting a DevOps mentality and the associated tooks. This eBook will look at the basics of DevOps, automation and configuration management to get you started down the right path.
Tags : 
cloud management, cloud services, cloud management, best practices, cloud computing, business optimization, business intelligence, business management, content integration, content management system
    
Cisco

How to Increase Email Campaign Performance and Improve Sender Reputation with Email Verification

Published By: StrikeIron     Published Date: Oct 03, 2013
Learn the best practices from StrikeIron's Email Verification Plus Hygiene technology and how this cloud-based & powerful technology goes through a four-step process to validate emails in real time.
Tags : 
email campaign performance, improve sender reputation, email verification, strikeiron, email verification plus hygiene, cloud, technology, emails, email verification, scrubbing, best practices, data mining, data quality, email archiving, business technology, cloud computing
    
StrikeIron

Going Beyond Email Compliance: 7 Surprising Use Cases for Email Suppression

Published By: UnsubCentral     Published Date: Oct 17, 2014
Email suppression lists are often created and maintained for one purpose: honoring the consumer’s opt out request and remaining CAN-SPAM compliant. While those are incredibly important, there are so many other ways that a suppression list can and should include. Take a look at our e-book to find out how you can use your suppression lists to increase your ROI.
Tags : 
mail marketing compliance, email list scrubbing, suppression list, email suppression list, suppression list management, suppression file management, email suppression file scrubbing, affiliate email marketing, email opt out management, email acquisition, affiliate email marketing, b2b scrubbing, can spam compliance
    
UnsubCentral

GPU-Powered Smarter, Faster Visual Search

Published By: NVIDIA     Published Date: Aug 22, 2018
Download the new white paper from Nvidia to explore how Bing deployed NVIDIA technology to speed up object detection and deliver pertinent results in real time.
Tags : 
nvidia, gpu, object detection, hpc, infrastructure, network performance, business activity monitoring, productivity, project management
    
NVIDIA

A Rational Approach to Integration Testing

Published By: IBM     Published Date: Jan 10, 2014
Applications are evolving at an ever-faster pace. These applications are not discrete islands; they build on a complex, interconnected set of components that includes disparate technologies, developers, deployment topologies and organizations. Developers must deliver high-quality applications while limiting their testing expenses. In this challenging environment, a combination of automated integration testing and test virtualization can enable test teams to improve software quality and keep up with the rate of change. This whitepaper helps address these needs by describing the benefits that can be gained through a proactive and continuous approach to integration testing with IBM® Rational® test automation solutions.
Tags : 
ibm, rational, integration, integration testing, incremental integration, testing, virtulization, data management, asset sharing, application performance, it management, test and measurement, application performance management, content integration, business technology
    
IBM

A Rational approach to integration testing

Published By: IBM     Published Date: Feb 18, 2015
In this challenging environment, a combination of automated integration testing and test virtualization can enable test teams to improve software quality and keep up with the rate of change. This white paper helps address these needs by describing the benefits that can be gained through a proactive and continuous approach to integration testing with IBM® Rational® test automation solutions.
Tags : 
integration testing, test virtualization, ibm, test automation solutions, it management, knowledge management, enterprise applications
    
IBM

The Seven Types of Power Problems

Published By: Schneider Electric     Published Date: Feb 12, 2018
Many of the mysteries of equipment failure, downtime, software and data corruption, are the result of a problematic supply of power. There is also a common problem with describing power problems in a standard way. This white paper will describe the most common types of power disturbances, what can cause them, what they can do to your critical equipment, and how to safeguard your equipment, using the IEEE standards for describing power quality problems.
Tags : 
    
Schneider Electric

Leprechaun Repellent and Guaranteed SEO Companies - The Disturbing Link

Published By: iDirect     Published Date: Jan 29, 2007
There are a number of guaranteed SEO companies, but many of these guarantees are meaningless and about as useful as leprechaun repellent.  Learn what to look for to avoid being taken advantage of by unscrupulous SEO companies.
Tags : 
medium blue, seo firms, seo companies, seo company, seo firm, seo, search marketing, search engine optimization, false promises
    
iDirect

RFID Solutions for Fleet Maintenance

Published By: GAO RFID Inc.     Published Date: Feb 28, 2007
Efficient fleet maintenance is absolutely necessary given today's high equipment costs and climbing operating expenses. Whether you are involved in LTL, cartage, courier, direct store delivery (DSD) or field service operations, an integrated and cost effective fleet maintenance program is a prerequisite to increased profitability.
Tags : 
rfid, rfid tags, automotive, trucking, fleet management, fleet maintenance, wireless data systems, wireless hardware, gao, gao group, gao rfid, mobile data systems
    
GAO RFID Inc.

The Corporate Threat Posed by Email Trojans

Published By: GFI     Published Date: Jun 12, 2007
Describing what trojans are and why they pose a danger to corporate networks, this paper discusses the need and method to protect your network from the threat of trojans.
Tags : 
network security, trojan, trojans, anti virus, anti-virus, virus, email security, internet security, intrusion prevention, ips, security management, corporate network, email archiving
    
GFI

Introduction to email archiving

Published By: GFI     Published Date: Jan 07, 2009
This white paper shall cover the following topics: What archiving is and how it integrates with Microsoft Exchange or a messaging solution, What stubbing is and why Microsoft does not recommend the use of stubbing, How Journaling in Exchange can allow efficient email archiving.
Tags : 
gfi, email archiving, email management, compliance, stubbing, journaling, exchange server, networking, it management, email security
    
GFI

A Guide to SOA Implementation

Published By: Torry Harris Business Solutions     Published Date: Jul 05, 2007
The information overload on SOA is largely on describing its merits, its principles and the vast variety of products intended to address its needs. This document is written to identify the factors to be considered, and articulate the principles and questions to be asked that will drive the decisions within each enterprise towards creating a road map for implementation.
Tags : 
service oriented, service-oriented, soa, network architecture, soa roi, change management, it spending, governance, bpm, eda, bam, infrastructure, service management, thbs, torry harris, network management, business process management, corporate governance, return on investment, service oriented architecture
    
Torry Harris Business Solutions

Securing Cardholder Data So You Don't Make Headlines

Published By: Ecora Software     Published Date: Aug 15, 2007
High-profile data losses are grabbing more and more headlines every week, threatening the reputation, customer base, and overall bottom line of organization whose systems have been exploited. In addition to this lurking threat, now organizations face potential fines for PCI non-compliance from VISA, beginning in September 2007. Ecora Software will provide you with the information you need to proactively address PCI compliance and, of equal importance, minimize your risk of a costly data breach.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial, privacy, consumer data, data privacy, information management, customer data, consumer privacy, database security, ecora, pci compliance
    
Ecora Software

The Business Case for Account Lockout Management

Published By: Netwrix     Published Date: Oct 10, 2007
This white paper covers account lockout management process and introduces new cost-effective workflows of account lockout resolution, describing significant ROI enterprises can achieve through the use of automated management solutions.
Tags : 
authentication, account lockout, access control, network security, lockout, user lockout, user authentication, user validation, intrusion prevention, netwrix, password management
    
Netwrix

Achieving Business Performance Goals through Virtualization Management Best Practices

Published By: eG Innovations     Published Date: Jun 13, 2008
This EMA white paper investigates virtualization management issues in detail, outlining the key drivers and outcomes of virtualization, explaining critical inhibitors to virtualization success (and how to overcome them), and describing core virtualization performance management solution requirements. It also briefly describes one such solution, the eG Enterprise Suite, and includes a short case study highlighting this solution in action.
Tags : 
virtualization management, application performance management, it infrastructure management, root cause diagnostics, eg innovations, virtualization, it management, network performance management, best practices
    
eG Innovations

Corporate Finance: Financial Planning Steps For High Growth Companies

Published By: Lantern Capital Advisors - Corporate Finance Consulting     Published Date: Feb 07, 2011
White Paper describing the financial planning steps required for growing companies to unlock growth and manage growth.
Tags : 
corporate finance, corporate financial planning steps, corporate financial planning
    
Lantern Capital Advisors - Corporate Finance Consulting
Start   Previous    1 2 3 4 5 6    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.