des

Results 8326 - 8350 of 8451Sort Results By: Published Date | Title | Company Name

QoS, QoE and Total Customer Experience

Published By: MASERGY     Published Date: Jul 20, 2007
Organizations of all sizes are evolving to an enlightened, business-focused method of choosing network services and service providers called Total Customer Experience (TCE). This white paper describes the evolution toward a TCE approach and the benefits and clarity that TCE brings to the marketplace.
Tags : 
mice, multimedia, internet, communications, entertainment, service level, service level agreement, ip networks
    
MASERGY

Service-Embedded Network Management

Published By: MASERGY     Published Date: Jul 20, 2007
This paper will explore the problems inherent in an overlay management approach and describe a new approach that allows for the management of the wide-area network to be not only offered as a service, but actually embedded in the network itself, resulting in several incremental benefits to the enterprise.
Tags : 
ip services, ip networks, network management, voip, it management, system management software, smb network, smb networks
    
MASERGY

Intrusion Defense: Is Your Castle Protected?

Published By: Perimeter     Published Date: Jul 17, 2007
Read this interesting comparison about designing an intrusion defense strategy that identifies the value of business processes, and implements appropriate strategies to protect these systems using a layered defense approach is not only a good security practice, but also a regulation in many cases.
Tags : 
ids, intrusion defense, intrusion prevention, firewall, security, compliance, layered security, ips
    
Perimeter

Vulnerability Management 101: What’s a Risk and How Can I Mitigate as Many as Possible?

Published By: Perimeter     Published Date: Jul 17, 2007
What is the difference between a risk, a threat, a vulnerability and an exploit? Which product or solution can be employed to address my institution’s information security and compliance needs? This paper provides some clarity on the first question, and in the process, it should help to offer an answer to the second question, one of aligning concerns with solutions with vulnerability management.
Tags : 
risk management, vulnerability assessment, ips, intrusion prevention, ids, intrusion detection, firewall, exploit
    
Perimeter

The Importance of Personalization

Published By: Gold Lasso     Published Date: Jul 13, 2007
Since the introduction of e-mail as a viable marketing and communications vehicle, the focus has shifted from a "one size fits all" model to content that is relevant and specific to the intended recipient. This paper reviews general concepts behind personalization, further investigates its advantages, discusses the challenges to personalizing campaigns and provides solutions to overcome the challenges.
Tags : 
personalization, newsletter design, content personalization, return on investment, email marketing, ebusiness, ecommerce, e-commerce
    
Gold Lasso

Industrial Equipment Manufacturing: Innovation and the Competitive Edge

Published By: Microsoft Dynamics     Published Date: Jul 11, 2007
In this white paper we do not make specific recommendations for manufacturers to follow; rather, we present suggestions for competing effectively in a fast-paced industry. From adopting lean manufacturing practices to strengthening bidding and quoting processes, opportunities exist for companies to grow and thrive despite relentless cost pressures.
Tags : 
manufacturing, manufacturer, scm, supply chain, supply chain management, lean methods, lean manufacturing, lean
    
Microsoft Dynamics

Synchronizing Real-Time Product Movement to Improve Distribution Operation Productivity

Published By: Microsoft Dynamics     Published Date: Jul 11, 2007
This white paper addresses business and technical decision-makers for ambitious companies in which product distribution and transportation play key roles in daily operations and profitability. It describes how the comprehensive, integrated management solution represented by Supply Chain Execution for Microsoft Dynamics AX can help build an integrated logistics solution.
Tags : 
scm, supply chain, radio frequency, rfid, inventory, transportation management, asset management, warehouse
    
Microsoft Dynamics

Manage Your Operations for Greater Profitability with Retail Chain Manager for Microsoft Dynamics AX

Published By: Microsoft Dynamics     Published Date: Jul 11, 2007
By providing integrated, adaptable functionality within one scalable platform, Microsoft Dynamics AX helps midsize retailers improve their agility with an all-in-one solution based on an open technology platform. And it provides the ability for retailers to connect and interact with customers, partners, and employees around the world.
Tags : 
retailer, enterprise resource, erm, erp, financial, enterprise software, merchandising, accounting
    
Microsoft Dynamics

Smarter Supply Chain Utilization for the Retailer

Published By: Microsoft Dynamics     Published Date: Jul 11, 2007
This paper introduces various supply chain concepts and explains their importance. It describes initiatives being undertaken by the largest retailers and reviews what small and mid-size firms need to do to compete.
Tags : 
retailer, enterprise resource, erm, erp, sales software, sales management, scm, supply chain
    
Microsoft Dynamics

Microsoft Dynamics Case Study: Best Buy for Business

Published By: Microsoft Dynamics     Published Date: Jul 09, 2007
Saddled with a home-grown business-management tool originally designed for its retail business, the Best Buy for Business sought a solution that would support its extensive outside sales force and would provide a commercial CRM solution it could sell to business customers. Best Buy for Business found both in Microsoft Dynamics CRM.
Tags : 
microsoft, microsoft dynamics, sales automation, salesforce automation, scm, supply chain management, crm, customer relationship management
    
Microsoft Dynamics

Automating Vulnerability Management for PCI DSS Compliance

Published By: GFI     Published Date: Jul 09, 2007
This white paper identifies the problems encountered in addressing network security risks through vulnerability management. It describes how automated vulnerability management contributes to compliance with industry standards such as the Payment Card Industry Data Security Standard (PCI DSS) and assists you in proactively identifying security weaknesses before these are exploited.
Tags : 
security software, pci, payment card, credit card, compliance, pci compliance, pci data security, vulnerability
    
GFI

A Guide to SOA Implementation

Published By: Torry Harris Business Solutions     Published Date: Jul 05, 2007
The information overload on SOA is largely on describing its merits, its principles and the vast variety of products intended to address its needs. This document is written to identify the factors to be considered, and articulate the principles and questions to be asked that will drive the decisions within each enterprise towards creating a road map for implementation.
Tags : 
service oriented, service-oriented, soa, network architecture, soa roi, change management, it spending, governance
    
Torry Harris Business Solutions

Can Speaking Avatars Help Your Website?

Published By: SitePal     Published Date: Jul 02, 2007
Discover the benefits and potential pitfalls of using speaking avatars (virtual animated characters) for your small business websites. Learn the best practices to use to increase conversions with a talking character!
Tags : 
conversion analysis, landing page, landing pages, content personalization, ecommerce, e-commerce, e-business, live support
    
SitePal

SIP Trunking Benefits and Best Practices

Published By: Ingate Systems     Published Date: Jun 21, 2007
A complete guide to SIP trunks, this whitepaper provides a comprehensive overview on the basics of SIP trunking, including a discussion of infrastructure needs and deployment issues and solutions. In-depth sections dedicated to interoperability, security as well as quality and reliability issues are also included.
Tags : 
pbx, phone, phone system, phone systems, best practices, sip, ip telephony, voip
    
Ingate Systems

Visual Communication: Core Design Principles for Displaying Quantitative Information

Published By: Cognos     Published Date: Jun 19, 2007
This paper looks at research into the link between visual perception and understanding, and translates the findings into practical techniques that you can use to communicate more clearly with your data.
Tags : 
visual communication, visual perception, graph, graphical representation, graphs, presentations, evaluation, presentation
    
Cognos

Network Fax Technology: A Primer

Published By: GFI     Published Date: Jun 14, 2007
A fax server buyers' guide, this paper describes the features you need to look for in fax server software and why. It also discusses the type of fax server devices (fax cards) available and which to choose.
Tags : 
fax server, buyers guide, buyer's guide, buying guide, ip fax, ip faxing, ip network, network fax
    
GFI

GFI FAXmaker for Exchange/SMTP 12: Architecture and Deployment Options

Published By: GFI     Published Date: Jun 14, 2007
This technical white paper describes the different ways in which GFI FAXmaker for Exchange/SMTP 12 can be deployed, depending on your mail server type/version and network infrastructure.
Tags : 
ip fax, ip faxing, infrastructure, network infrastructure, faxmaker, gfi, microsoft exchange, exchange server
    
GFI

Patch Management with GFI LANguard N.S.S. & Microsoft WSUS

Published By: GFI     Published Date: Jun 14, 2007
This white paper provides an overview of how to use GFI LANguard Network Security Scanner (N.S.S.) and Microsoft Windows Software Update Services (WSUS) to keep your network automatically updated with the latest security patches.
Tags : 
patch, patches, patch management, windows, windows patch, windows update, windows updates, network security
    
GFI

Why Bayesian Filtering is the Most Effective Anti-Spam Technology

Published By: GFI     Published Date: Jun 12, 2007
This white paper describes how Bayesian mathematics can be applied to the spam problem, resulting in an adaptive, 'statistical intelligence' technique that achieves very high spam detection rates.
Tags : 
anti spam, anti-spam, filter, block, blocking, email security, phishing, baysian
    
GFI

The Corporate Threat Posed by Email Trojans

Published By: GFI     Published Date: Jun 12, 2007
Describing what trojans are and why they pose a danger to corporate networks, this paper discusses the need and method to protect your network from the threat of trojans.
Tags : 
network security, trojan, trojans, anti virus, anti-virus, virus, email security, internet security
    
GFI

Protecting Your Network Against Email Threats

Published By: GFI     Published Date: Jun 12, 2007
Examining the different kinds of email threats and email attack methods, this paper describes the need for a solid server-based content-checking gateway to safeguard your business against email viruses and attacks as well as information leaks.
Tags : 
network security, virus, anti virus, anti-virus, content checking, mailsecurity, gfi, anti trojan
    
GFI

GFI MailSecurity Deployment Strategies

Published By: GFI     Published Date: Jun 12, 2007
GFI MailSecurity can be deployed as an SMTP gateway or as a VS API version for Exchange 2000/2003. This technical white paper describes each operating mode and helps you decide which to deploy and whether you should deploy both.
Tags : 
gfi, mailsecurity, email security, anti virus, virus, network security, deployment, implementation
    
GFI

Analytics Tips: Wrong Keywords May Be Hazardous To Your Health

Published By: Engine Ready     Published Date: Jun 08, 2007
Besides being a terrible drain on your online budget, using the wrong keywords in your PPC accounts can probably make you feel ill as you wonder how your competitors can afford to keep their listings ahead of yours. Discover how your analytics can easily cure those ills and get you on track for higher returns on your PPC investment.
Tags : 
pay per click, search engine marketing, web analytics, online marketing, web marketing, internet marketing, ppc, sem
    
Engine Ready

Extending System Longevity with Diskeeper

Published By: Diskeeper Corporation     Published Date: Jun 08, 2007
Tight IT budgets demand that desktop and laptop PCs remain in service well beyond their prime. But as these systems age, performance degrades. The culprit most often is file fragmentation. Download this paper to find out how Diskeeper can help your systems perform longer.
Tags : 
pc performance, system performance, defrag, defragment, defragmentation, old pc, old pcs, old desktop
    
Diskeeper Corporation

File Fragmentation, SANs, NAS and RAID

Published By: Diskeeper Corporation     Published Date: Jun 08, 2007
This document will explain the behavior and benefit of implementing Diskeeper defragmentation software with intricate modern hardware technologies such as RAID, NAS and SANs. SANs, NAS devices, corporate servers, and even high end workstations and multimedia-centric desktops characteristically implement multiple physical disk drives in some form of fault tolerant disk striping (RAID).
Tags : 
san, sans, storage, raid, network attached storage, nas, storage management, defrag
    
Diskeeper Corporation
Start   Previous    325 326 327 328 329 330 331 332 333 334 335 336 337 338 339    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.