dma

Results 226 - 250 of 360Sort Results By: Published Date | Title | Company Name

Build your WCM shortlist with Gartner’s Critical Capabilities report

Published By: Sitecore     Published Date: Feb 24, 2017
Gartner’s Critical Capabilities report helps you understand the evolving role of WCM, five use cases to consider, and how 19 WCM vendors score on each of the use case criteria.
Tags : 
gartner critical capabilities, wcm, web content management, digital business strategy, digital roadmap
    
Sitecore

Social Media Marketing Hits and Misses: How 2007 Hot Holiday Brands and Products Performed Online

Published By: Oneupweb     Published Date: Jun 24, 2008
Learn from the mistakes and successes of others in part 2 of Oneupweb's landmark social media marketing study, Social Media Marketing Hits and Misses: How 2007 Hot Holiday Brands and Products Performed Online.
Tags : 
oneupweb, social media marketing, social marketing, online advertising, online marketing, search engine optimization, seo, search engine marketing
    
Oneupweb

Competing on Customer Intelligence: Building Competitive Advantage Based on the 3 I's of Marketing

Published By: SAS     Published Date: Sep 25, 2008
This white paper provides a blueprint for action for senior marketers and decision makers across the enterprise. It provides straightforward advice on how to build a more durable and profitable customer base by building a more competitive business model, enabling customer-centric business strategies in a product-centric organization, turning expanding volumes of customer data into actionable insight for smarter decision making, and providing a roadmap for integrating technology to achieve competitive advantage.
Tags : 
competitive advantage, customer data, data collection, business intelligence, customer intelligence, sas
    
SAS

Performance Management Solutions for the Midmarket Organization: Why Bother?

Published By: Cornerstone OnDemand     Published Date: Feb 24, 2011
Why bother with performance management? This paper will explain why creating a performance-oriented culture that is supported by technology is crucial for business growth in midmarket companies today.
Tags : 
cornerstone, performance management, productivity, efficiency, risk
    
Cornerstone OnDemand

Dispelling the Hype Around Private Storage Cloud Environments

Published By: IBM     Published Date: Jan 10, 2012
You will learn how to build a practical roadmap toward private Storage Cloud by starting with a virtualized, efficient storage environment and build a more flexible and responsive business.
Tags : 
data protection, cloud computing, green computing
    
IBM

5 Step Roadmap for Evaluating Ad Hoc Reporting Tools

Published By: GrapeCity, Inc.     Published Date: Feb 25, 2013
Since business-wide deployment of ad hoc reporting tools can be a resource-intensive process, this white paper offers five-step roadmap of evaluation steps to help fully assess the quality of the products under consideration.
Tags : 
ad hoc reporting, ad hoc report designer, self-service bi, business intelligence, reporting, activereports, web-based reporting, mobile bi
    
GrapeCity, Inc.

How to Manage Regulatory Compliance & Data Privacy While Keeping Your Data Safe

Published By: Intralinks     Published Date: Mar 12, 2014
The implications of data loss are significant. Organizations that ignore the law affecting collaboration and information sharing are at serious risk of litigation, fines and brand damage. The paradigm shift from organizationally-defined to user-defined information governance is making it that much more difficult to maintain control of business activity and data. This informative white paper by legal firm Field Fisher Waterhouse evaluates the legal risks of uncontrolled collaboration and information sharing and what to do about them, while providing in-depth insights into: • Landmark incidents that have influenced data protection laws • How to navigate different jurisdictional privacy frameworks • Top 4 types of legal risk to protect against • Top 5 recommendations for implementing good governance
Tags : 
data security, compliance, technology, network security, regulatory compliance, security, knowledge management, enterprise applications
    
Intralinks

When Application Performance is Better, Business Works Better

Published By: Hewlett-Packard     Published Date: Jul 24, 2013
Isolating application problems can be challenging in highly virtualized or cloud environments. This paper offers a roadmap to optimize application performance management with a pragmatic, phased approach that goes beyond monitoring and focuses on support for composite applications, SOA, and ERP applications.
Tags : 
application performance, apps, soa, erp, applications, cloud, application integration, application performance management
    
Hewlett-Packard

Taking care of your Company's future: 3 Best Practices for Succession Planning

Published By: Success Factors     Published Date: Aug 19, 2014
This eGuide provides a roadmap to make a succession planning strategy successful.
Tags : 
successfactors, succession planning, improved morale, higher performance, corporate culture
    
Success Factors

How to create a roadmap with your sales and product teams

Published By: Intercom     Published Date: Apr 05, 2018
There are two truths about sales and product. One, salespeople hate when deals stall because their product is missing a vital feature. Two, product people hate building features no one uses.
Tags : 
    
Intercom

The Forrester Wave™: Lead-To-Revenue Management Platform Vendors, Q4 2016

Published By: Marketo     Published Date: Mar 16, 2017
Read this complimentary report and find out why Marketo was named a leader based on the strength of its current offering, vision, roadmap, and marketplace impact.
Tags : 
marketo, revenue management, lead management, lead generation, sales pipeline, marketing strategy, best practices, marketing automation
    
Marketo

A Roadmap to Data Migration Success

Published By: SAP     Published Date: Feb 21, 2008
Many significant business initiatives and large IT projects depend upon a successful data migration. Your goal is to minimize as much risk as possible through effective planning and scoping. This paper will provide insight into what issues are unique to data migration projects and offer advice on how to best approach them.
Tags : 
sap, data architect, data migration, business objects, information management software, bloor, sap r/3, application
    
SAP

Uponor case study: On the road to marketing maturity with the Sitecore® Experience Platform™

Published By: Sitecore     Published Date: Nov 05, 2015
Register to learn how Uponor tackled these challenges by leveraging The Sitecore® Experience Platform™ and using the Sitecore’s Customer Experience Maturity Model to create a custom marketing roadmap plan that creates extraordinary customer experiences.
Tags : 
sitecore nfusion, uponor, marketing, experience platform, customer marketing, customer experience maturity, enterprise applications, platforms
    
Sitecore

Talent Acquisition Software Buy-In Guide

Published By: Yello     Published Date: Mar 14, 2016
You conducted hours of talent acquisition software research, sat through countless sales demos, made multiple vendor comparisons and you finally found the best recruitment software for your company. You’re ready to sign the dotted line so you can measure your recruitment marketing ROI, automate candidate communications, eliminate paper resumes and more. But first, the tough part: selling the C-Suite on the value. Use this guide as your roadmap to get your leadership team bought in and excited for the recruiting year ahead.
Tags : 
yello, talent acquisition, talent acquisition software, marketing roi, recruiting
    
Yello

Connecting the Data: Integration for Today's Healthcare Environment

Published By: IBM     Published Date: Nov 12, 2015
Hear from the University of Michigan Health System’s CMIO, Dr. Andrew Rosenberg, to learn how this institution is achieving their goal for internal/external operability in support of their enterprise analytics roadmap to support its clinical, research, education and administrative missions. Learn more about the specific challenge's that were solved, how they integrated systems of record with medical devices, and hear about their plans for future integration.
Tags : 
ibm, big data, enterprise analytics, emr, research interfaces, it management, knowledge management, data management
    
IBM

IT Consolidation with HP and VMware for the Midmarket

Published By: VMware     Published Date: Apr 11, 2011
Virtualize to reduce costs, simplify IT, and increase business agility. Realize the full benefits of virtualization HP and VMware.
Tags : 
vmware, it consolidation, vmware, midmarket, virtualization, remote office deployment, remote access, storage area networks
    
VMware

SANS Critical Security Controls: From Adoption to Implementation

Published By: Qualys     Published Date: Jan 08, 2015
The Critical Security Controls (CSCs), a well-known roadmap for enterprise information assurance published and maintained by the Council on CyberSecurity, is being widely adopted across financial and government sectors, according to the second SANS survey on CSC adoption. Download this report from SANS to find out why more and more organizations of various types consider the CSCs a reliable mechanism to reduce attack surfaces, increase visibility and improve protection and response.
Tags : 
critical security controls, csc adoption, enterprise information assurance, cybersecurity, security
    
Qualys

The Security Paradox

Published By: McAfee Inc     Published Date: Oct 26, 2009
Medium organizations around the globe are increasingly concerned about cyberthreats, and the rising number of incidents shared publicly certainly justifies their worries. In the first half of 2009, for example, McAfee Labs saw almost as much new malware as it did in all of 2008. At the same time, most organizations have frozen or cut their IT security budgets. Threats up, budgets down. This is what we call the "security paradox."
Tags : 
mcafee, security, cyberattacks, midsize, cyberthreats, compliance, security tools, sans
    
McAfee Inc

Threat Vector Series - Data Protection for Midsize Companies

Published By: McAfee Inc     Published Date: Aug 19, 2009
If you're in IT, you understand all too well the challenge of competing priorities. Security is important-but so are all of your other jobs. That's why McAfee offers a practical approach to managing security and lays out an approach for managing security in just 15 minutes a day. Read more.
Tags : 
mcafee, security, pci, hipaa, epolicy orchestrator, the eu directive, compliance, security tools
    
McAfee Inc

Threat Vector Series - Data Protection for Midsize Companies

Published By: McAfee Inc     Published Date: Aug 19, 2009
Data is a company's most precious asset-and maintaining secure access for a mobile workforce is vital for midsize organizations. This brief explains the key benefits of implementing a data security solution with McAfee. Read more.
Tags : 
mcafee, security, data protection, compliance, cyber criminals, midmarket, encryption, security tools
    
McAfee Inc

Which McAfee Encrypted USB Device Best Fits My Needs?

Published By: McAfee Inc     Published Date: Mar 23, 2009
Today's workforce relies on USB drives all the more to share information - roadmap presentations, contracts, and sensitive or large files that can't be mailed. Find out which McAfee Encrypted USB Drives meet your needs.
Tags : 
mcafee, usb, encryption, drives, usb drives, data protection, data management, internet security
    
McAfee Inc

Threat Vector Series - Endpoint Protection for Midsize Companies

Published By: McAfee Inc     Published Date: Aug 19, 2009
Anti-virus by itself is no longer enough to protect endpoints, especially in this age of mobile devices and business users on the go. This brief explains the key benefits of implementing an endpoint security solution with McAfee. Read more.
Tags : 
mcafee, security, malware, compliance, cyber criminals, midmarket, encryption, security tools
    
McAfee Inc

CXO's Guide To IT Governance: A Roadmap To Driving Top-Down Alignment Between Business & IT Strategy

Published By: Innotas     Published Date: Apr 04, 2010
Find out why top down alignment between IT and the Business is now a mandate and read about how Business can participate when IT prioritizes both sustaining and strategic work.
Tags : 
innotas, it governance, enterprise services, it management, strategy, accountability, cost saving, business intelligence
    
Innotas

Where Finance Belongs on the IT Agenda

Published By: IBM     Published Date: Apr 23, 2013
When an unpredictable economy brings sudden shifts in revenues, costs, and profits, Software solutions can give Finance the ability to anticipate and adapt. But Finance needs the help of IT. Specifically, Finance needs the help of inspiring IT Managers who can lay out the roadmap that will take Finance from the automation of discrete processes to the broader task of transforming the business to compete successfully in a challenging global economy.
Tags : 
finance, operations, change management, enterprise, application integration, application performance management, best practices, business activity monitoring
    
IBM

An Enterprise Private Cloud Architecture and Implementation Roadmap

Published By: Intel Corp.     Published Date: Apr 26, 2012
Intel IT has defined an architecture and implementation roadmap for a private enterprise cloud designed. This white paper discusses best practices to follow to ensure your private cloud improves agility and IT efficiency throughout your organization.
Tags : 
cloud, storage, metrics, cloud storage, intel, value, enterprise, private cloud
    
Intel Corp.
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.