bsp

Results 301 - 325 of 411Sort Results By: Published Date | Title | Company Name

Turbulent times call for an agile application foundation.

Published By: IBM     Published Date: Oct 09, 2009
Does your IT change as fast as the market? A service-oriented architecture (SOA) provides a foundation that enables agility and aligns IT to business goals. This interactive presentation from IBM will show you how to provide fast, flexible, reliable access to information, business-wide. It also covers methods to ensure trust, management and security across business applications.
Tags : 
application foundation, ibm, service-oriented architecture, soa, websphere, point-to-point connectivity, esb messaging, esb enrichment
    
IBM

Increase Reliability with IBM WebSphere File Transfer Edition (FTE)

Published By: IBM     Published Date: Nov 16, 2009
Is your information at risk? Read this whitepaper to find out how the IBM WebSphere MQ FTE solution, built on WebSphere MQ, offers reliable, secure and auditable file transfers.
Tags : 
ibm, ebf, websphere mq, file transfer edition, fte, ftp, application security, business continuity
    
IBM

Business to Business Marketing on Search Engines - A Largely Untapped Marketing Tool

Published By: iDirect     Published Date: Jan 29, 2007
Many people may not be aware of SEO’s usefulness is in business to business marketing or what a valuable marketing tool SEO can be in general.  Learn more about why B2B companies can benefit from using SEO as a key marketing tool.
Tags : 
search marketing, search engine marketing, search engine optimization, seo firms, seo firm, seo, outsource, outsourcing
    
iDirect

Professional SEO in Your Marketing Mix - Convincing Your Company

Published By: iDirect     Published Date: Jan 29, 2007
Very often, the people who first recognize the potential benefits of professional SEO are not the key decision makers when it comes to a company’s marketing mix.  They are the people on the front lines of the organization - the ones who deal with prospects and customers every day.
Tags : 
seo, search marketing, search engine optimization, seo firm, seo firms
    
iDirect

Leprechaun Repellent and Guaranteed SEO Companies - The Disturbing Link

Published By: iDirect     Published Date: Jan 29, 2007
There are a number of guaranteed SEO companies, but many of these guarantees are meaningless and about as useful as leprechaun repellent.  Learn what to look for to avoid being taken advantage of by unscrupulous SEO companies.
Tags : 
medium blue, seo firms, seo companies, seo company, seo firm, seo, search marketing, search engine optimization
    
iDirect

Making the Most of On-Demand Software

Published By: NetSuite     Published Date: Nov 27, 2007
Where should mid-market companies invest valuable resource? Two out of three businesses are either buying or considering buying software via the subscription model.  This white paper will explain how Software-as-a-Service is revolutionizing the economics of growing businesses.
Tags : 
saas, software as a service, on demand, on-demand, software development, development, programming, web services
    
NetSuite

Acquiring Business Intelligence is Crucial

Published By: NetSuite     Published Date: Nov 27, 2007
But what is "BI" and how do small/mid size business owners acquire it without too much cost?  This Executive White Paper will outline the issues and solutions for the "BI" requirements of growing companies.
Tags : 
analytics, business analytics, business intelligence, bi tools, business planning, erp data, netsuite, business metrics
    
NetSuite

Protecting the Inside Edge of the Network: NitroSecurity's Active Network Response

Published By: NitroSecurity     Published Date: Aug 21, 2009
NitroSecurity's Active Network Response is a new security model that delivers network protection closer to the users at the network edge - stopping attacks before they can propagate throughout the network. 
Tags : 
network security, intrusion prevention, hackers, hacker detection, ips, anr, nitro security, nitrosecurity
    
NitroSecurity

White Paper: 5 Tips to Turn Your Website into a Marketing Machine

Published By: ProjectLocker     Published Date: Nov 19, 2007
Learn how you can transform your website into a marketing machine that attracts qualified prospects and converts a higher percentage of them into paying customers.  This Internet marketing whitepaper discusses 5 tips you can implement today to leverage the Internet and reach your customers more effectively.
Tags : 
website marketing, search engine, sem, seo, online marketing, blogging, adwords, google adwords
    
ProjectLocker

DITA: Four Letters You Need to Know

Published By: PTC     Published Date: Aug 21, 2009
DITA is one of the most important innovations in XML publishing in recent memory.  Though DITA is an IBM invention and plenty of material has been written about it already, this paper must be read as well to clear the air about any errors, omissions, or misinterpretations, from previous publications on this topic.
Tags : 
xml, dita, darwin, ibm, ptc, content delivery, information management
    
PTC

Fresh Approaches to Solving the Malware Problem

Published By: Secure Computing     Published Date: Nov 20, 2006
Organizations need to be protected from both known and unknown threats, and all the varieties and forms that sophisticated malware can take.  Learn about the changing nature of malware attacks and how the Webwasher Anti-Malware from Secure Computing can provide a highly effective defense against malicious content.
Tags : 
anti spam, anti spyware, anti virus, application security, security, network security, data protection, malware
    
Secure Computing

Image Spam: The Latest Attack on the Enterprise Inbox

Published By: Secure Computing     Published Date: Nov 20, 2006
Spammers have now fired a new barrage of image spam using randomized images that appear identical to the human eye, yet appear to be entirely unique to most anti-spam software. Many of the changes to the images contained within spam messages are so subtle that they require a pixel-by-pixel examination of the image in order to detect the differences.  Read how Secure Computing effectively addresses this problem.
Tags : 
security, anti spam, email security, image spam, malware, spyware, crimeware, intrusion prevention
    
Secure Computing

Web 2.0 Security Risks. Are you protected?

Published By: Secure Computing     Published Date: Feb 22, 2007
This paper outlines these new threats and discusses the limited effectiveness of reactive legacy Web security solutions against those threats.  The paper then outlines the new reputation based, proactive security paradigm that is necessary for securing Web 2.0 applications.
Tags : 
web 2.0, web 20, web security, application security, web app security, internet security, network security, hacker detection
    
Secure Computing

Think. Think Different. Think Again. Sales 2.0 Whitepaper Part 2

Published By: SilverStorm Technologies     Published Date: Apr 21, 2008
If you think you know sales, you likely are bringing to this topic a history and track record that has served you well.  This paper attempts to offer the cautionary warning that what has worked in your past may not serve your current  sales reps as well today, and could actually hurt their performance. Sales 1.0 was about lone wolves, product superiority,  proven skills and making the number.
Tags : 
landslide, customer relationship, customer loyalty, loyalty, crm, sales, sales, sales 2.0
    
SilverStorm Technologies

Intelligent Defense for Enterprise Assets: The Need for Host Intrusion Prevention

Published By: Third Brigade     Published Date: Aug 21, 2009
Businesses today are under intense pressure to open up their networks, comply with increasingly rigorous regulatory requirements, AND ensure their IT assets are protected from attacks. This white paper explores these security challenges and explains how host-based Intrusion Prevention Systems  play a critical role in an organization's overall security strategy.
Tags : 
intrusion prevention, security, network security, compliance, security compliance, attacks, hacker detection, ips
    
Third Brigade

Web Application Security: The Overlooked Vulnerabilities

Published By: Third Brigade     Published Date: Nov 27, 2006
This white paper identifies critical vulnerabilities that most organizations overlook when they secure their web applications. It also introduces host intrusion defense with deep packet inspection as a new, effective  approach for shielding these vulnerabilities.
Tags : 
web application security, application security, web security, web service security, security management, internet security, ips, intrusion prevention
    
Third Brigade

Understand Earned Value in Under an Hour

Published By: Villanova     Published Date: Aug 21, 2009
Earned value (EV) has grown in popularity over the last several years. With 76% of IT projects failing (Crawford, 2002), project management and control systems must be implemented to ensure IT project success.  Learn how EV links to the work breakdown structure (WBS) the schedule and the budget.
Tags : 
project management, employee performance, budget, project success, villanova, it management, business management
    
Villanova

How Project Managers Benefit from Lean and Six Sigma

Published By: Villanova     Published Date: Aug 21, 2009
Professionals who master Six Sigma disciplines can become recognized leaders, guiding key projects that result in breakthrough improvements, improving bottom-line results.  This white paper discusses how Project Managers can deliver projects as much as 90% faster, and reduce costs by 25%.
Tags : 
project management, project management tips, 6 sigma, lean methods, lean, pmp, cost control, productivity
    
Villanova

Cost of Losing Information

Published By: XOsoft     Published Date: Aug 21, 2009
The primary information management concern in the enterprise today is to ensure that the knowledge necessary to drive critical business processes is available where it needs to be, when it needs to be. The costs of failure to do this are high. 
Tags : 
cost control, data loss, data protection, information management, data management, business process management, xosoft, knowledge management
    
XOsoft

Top 10 Data Protection Tips for SMBs

Published By: EMC     Published Date: Nov 06, 2006
The amount of data on business computers has grown astronomically over the past few decades.  If a company loses this data, business grinds to a halt. The following tips can help you select the hardware and software you need to safeguard the integrity of your data, guarantee accurate restores, and manage backups without placing an undue burden on IT personnel.
Tags : 
data protection, raid, disaster plan, smb, smbs, small business, top 10, backup and recovery
    
EMC

Helping Find the Way to Better Public Sector IT

Published By: Quocirca     Published Date: Nov 13, 2006
IT in the UK public sector is under intense scrutiny and needs to deliver better results:  much investment has been made which has too often failed to deliver. Projects have a history of being protracted and complex, offering significant challenges to all involved.
Tags : 
public sector, it management, government, project management, efficiency, productivity, quocirca
    
Quocirca

Connectivity and SOA: Embracing Old Assets, Furthering the New

Published By: Quocirca     Published Date: Dec 04, 2006
Service Oriented Architectures (SOAs) will provide greater flexibility for those utilizing them, but will also bring greater issues for data and functional connectivity.  This paper contrasts and compares the capabilities of a point-to-point and an enterprise service bus approach.
Tags : 
soa, connectivity, service-oriented architecture, service oriented architecture, data management, enterprise, quocirca, it management
    
Quocirca

Business Impact Management: Measuring the Financial and Business Impact from Process to Packet

Published By: Quocirca     Published Date: Apr 23, 2007
The need to understand how the performance and problems within the technical infrastructure impacts the capabilities of the business is massive.  However, the majority of companies can only measure application and specific asset performance, whereas many issues within the infrastructure lie at the transport level, where packet switching presents both great opportunities and major issues.
Tags : 
networking, infrastructure, network management, tcp/ip protocol, wide area networks, wan, wans, packet switching
    
Quocirca

Information and SOA: Gaining Greater Insights Through MDM

Published By: Quocirca     Published Date: Apr 23, 2007
Information management, which includes both data and content management, is an essential building block for Service-Oriented Architecture (SOA).  By taking a service oriented approach to information, you can achieve much greater value from your information assets.
Tags : 
information management, service oriented architecture, service-oriented architecture, soa, data management, mdm, master data management, content management
    
Quocirca

People and SOA: Improving Productivity through People Collaboration

Published By: Quocirca     Published Date: Jul 11, 2007
SOA enables composite applications or collections of services that have been assembled to support a company’s business processes.  Portal and collaboration software delivers the essential people-focused capabilities of the SOA strategy to provide significant value to the organisation.
Tags : 
productivity, soa, service oriented, service-oriented, collaboration, bpm, business process management, portals
    
Quocirca
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.