document

Results 701 - 725 of 993Sort Results By: Published Date | Title | Company Name

Online Marketing is Content Marketing: Part 2: Technology - The Web Content Marketing Suite

Published By: CrownPeak     Published Date: Jun 30, 2009
This is the second of a three part CrownPeak White Paper exploring Why Content Marketing Is Online Marketing. In this series we present the new idea that Web content marketing is the central and most important tenet of online marketing. Today, the function of online marketing revolves around the Web which, itself, revolves around content. So as we talk about online marketing/marketers and content marketing/marketers consider them and yourself one and the same. Learn more today!
Tags : 
crownpeak, roi, web content marketing, cms, content management system, web site development, infocenter, hosted services, open source software, project definition, rfp, request for proposal, vendor strengths, os/ databases, hardware, infrastructure, document management, portal, licensing, workflow management
    
CrownPeak

Guide to IT Search: Managing the Modern Data Center

Published By: Splunk Inc.     Published Date: Jun 02, 2009
This document explains IT Search's ability to instantly search all the data generated by applications, servers and network devices in your IT infrastructure. Download to learn more today!
Tags : 
operations, it search, data center, splunk, business intelligence, compliance, security, it infrastructure, data generation, data management, application management, snmp, opsec, wmi, ajax, single sign on, sso, knowledge management, enterprise applications, information management
    
Splunk Inc.

Six Things You MUST Know About Choosing The Best SEO Firm

Published By: WebiMax     Published Date: Jan 04, 2012
This document provides six important components that the best SEO Company should contain. The secondary goal of this document is to provide an expert source for all things related to SEO.
Tags : 
webimax, marketing, seo, search engine optimization, internet marketing
    
WebiMax

How to Sell Backup to Your CFO

Published By: Unitrends     Published Date: Jun 15, 2010
In this document we're first going to explore the use of the insurance metaphor in terms of its most fundamental element: the broad consequences of data loss. We'll also discuss industry and regulatory consequences of data loss.
Tags : 
unitrends, backup, data protection, data quality, server, replication, data loss, sox, backup and recovery, storage management, it spending, return on investment, database development
    
Unitrends

The 5 Essential Components of a Data Strategy

Published By: SAS     Published Date: Aug 28, 2018
Despite heavy, long-term investments in data management, data problems at many organizations continue to grow. One reason is that data has traditionally been perceived as just one aspect of a technology project; it has not been treated as a corporate asset. Consequently, the belief was that traditional application and database planning efforts were sufficient to address ongoing data issues. As our corporate data stores have grown in both size and subject area diversity, it has become clear that a strategy to address data is necessary. Yet some still struggle with the idea that corporate data needs a comprehensive strategy. There’s no shortage of blue-sky thinking when it comes to organizations’ strategic plans and road maps. To many, such efforts are just a novelty. Indeed, organizations’ strategic plans often generate very few tangible results for organizations – only lots of meetings and documentation. A successful plan, on the other hand, will identify realistic goals along with a r
Tags : 
    
SAS

Text Analytics for Executives: What Can Text Analytics Do for Your Organization

Published By: SAS     Published Date: Jul 22, 2019
Text is the largest human-generated data source. It grows every day as we post on social media, interact with chatbots and digital assistants, send emails, conduct business online, generate reports and essentially document our daily thoughts and activities using computers and mobile devices. Increasingly, organizations want to know how all of that data can be used to drive improvements. For many, unstructured text represents a massive untapped data source with great potential for producing valuable insights that could result in significant business transformations or spur incredible social innovation. This paper looks at how organizations in banking, health care and life sciences, manufacturing and government are using SAS text analytics to drive better customer experiences, reduce fraud and improve society.
Tags : 
    
SAS

Buyer’s Criteria for Advanced Malware Protection

Published By: Cisco     Published Date: Nov 17, 2014
This document will identify the key questions you should ask your advanced malware protection vendor, and show you how Cisco combats today’s advanced malware attacks using a combination of four techniques.
Tags : 
sourcefire, antimalware protection, network protection, evolving threats, antimalware vendors, malware, cisco, collective intelligence, big data, traditional defenses, security, business intelligence
    
Cisco

Closing the Order-to-Cash Performance Gap Between Document Processes & ERP Solutions

Published By: Esker     Published Date: Jun 23, 2015
Companies running ERPs/business systems already have an edge — yet critical gaps still exist. Learn how end-to-end automation of the order-to-cash (O2C) cycle can drive success.
Tags : 
    
Esker

Manual Process Makeover: Inbound Document Automation Edition

Published By: Esker     Published Date: Dec 18, 2015
Those with document process automation solutions in place know the answer. Now, through this how-to guide, you can too.
Tags : 
esker, manual process, document automation, it management, collaboration, collaborative commerce
    
Esker

Identifying and Resolving Internal Compensation Inequities within a Position

Published By: Payscale, Inc     Published Date: Jan 16, 2014
Make sure your internal pay practices are fair, well-documented and can be easily explained to employees or in court. Learn how to uncover and deal with internal pay inequities.
Tags : 
pay inequities, discrimination, pay equity, pay practices, compensation, salary rates, pay for performance
    
Payscale, Inc

Moving Beyond TCO: Demonstrating Cost and Value on the Managed Cloud

Published By: Rackspace     Published Date: Jan 16, 2015
This white paper aims to help businesses understand the total value of ownership (TVO) delivered by the managed cloud by documenting and evaluating the potential impact of several key qualitative factors.
Tags : 
rackspace, tco, managed cloud, cloud spend, roi, infrastructure, network architecture, it spending, return on investment, total cost of ownership, cloud computing, colocation and web hosting
    
Rackspace

Why IBM Flex System is the Best Blade Solution on the Market

Published By: IBM     Published Date: Sep 27, 2013
This document explains briefly how and why IBM Flex System surpasses mere blade systems.
Tags : 
ibm, ibm flex system, best blade solution, storage, ibm pureflex system, networking, platform systems, integrated systems, compute nodes, blade systems, chassis, storage, data management, storage management, storage virtualization, business technology
    
IBM

Securing end-user mobile devices in the enterprise

Published By: IBM     Published Date: Oct 10, 2013
Mobile devices, including smartphones and tablets, enable increasing numbers of employees to work "anywhere, anytime."The security of enterprise data is a key concern, particularly on mobile devices that are easily lost or stolen. The security risk is further heightened by the proliferation of employee-owned mobile devices in many enterprises. Employees will almost always take the path of least resistance in leveraging mobile devices for business purposes, which may lead to unsafe computing practices. A clearly documented and enforceable mobile security policy is critical to reducing the risk of data loss.
Tags : 
mobile, mobile enterprise, mobile environment, security, mobile security, mobile device, wireless, mobile strategy, byod, mobile infastructure, application management, data, security, safeguarding, telecommunications, enterprise applications, business technology, telecom
    
IBM

ROI: The Value of Deployment Automation

Published By: IBM     Published Date: Oct 17, 2013
ROI: The Value of Deployment Automation explains how a deployment automation framework can streamline release operations and increase business agility. The document describes the benefits of Deployment Automation. In addition, the whitepaper contains a formula for calculating the ROI of a Deployment Automation solution.
Tags : 
ibm, roi, deployment automation, deployment, automation, roi, automation framework, visibility, deployment frequency, application configuration, application release, application integration, application performance management, productivity, business technology
    
IBM

10 Steps to Optimize SharePoint Performance

Published By: Metalogix     Published Date: Jan 10, 2014
Microsoft SharePoint is the fastest growing product in Microsoft history. Its adoption rate has been exponential with millions of documents being stored daily. With its growth, critical documents and procedures are now being stored in SharePoint. It is fundamental that SharePoint maintains its healthy status, and application performance is a key component for a successful deployment, adoption and monitoring of SharePoint.
Tags : 
sharepoint, sharepoint performance, sharepoint adoption, optimize sharepoint, sharepoint diagnostics, sharepoint tuning, sharepoint performancetuning, sharepoint performance monitoring, sharepoint monitoring, monitor sharepoint, sharepoint health
    
Metalogix

IBM WP: Why Flex System is Best Blade Solution on Market

Published By: IBM     Published Date: Jan 09, 2014
IBM Flex System is quite simply the best blade offering on the market. The rest of this document explains briefly how and why IBM Flex System outperforms mere blade systems IBM Flex. It illustrates the combination of capabilities that Flex System solutions offer and blade systems from HP, Dell, Cisco and, yes, even IBM BladeCenter®, can’t.
Tags : 
ibm, flex system, architecture, blade architecture, puresystems, pureflex, virtualization, storage, business technology, cloud computing, infrastructure, infrastructure management
    
IBM

Content Marketing Software: An Introduction

Published By: Kapost     Published Date: Feb 20, 2014
Just about everyone claims to be doing content marketing, but far fewer organizations have a thought-out plan. According to Content Marketing Institute, only 44% of B2B marketers and 39% of B2C marketers have a documented content strategy. But as organizations scale content operations, workflows, distribution, and promotion, many are seeking tools to centralize, manage, and improve the process. That’s where content marketing software comes in. This software can help organize, automate, and visualize your efforts to create original content, as well as curate the content of others.
Tags : 
    
Kapost

Requirements When Considering a Next-Generation Firewall (WP)

Published By: Cisco     Published Date: Apr 08, 2015
The checklist provided in this document details six must-have capabilities to look for when evaluating a nextgeneration firewall (NGFW) to determine whether the solution can provide comprehensive protection for your entire enterprise. An NGFW must be able to: • Integrate security functions tightly to provide highly effective threat and advanced malware protection • Provide actionable indications of compromise to identify malware activity • Offer comprehensive network visibility • Help reduce complexity and costs • Integrate and interface smoothly and transparently with third-party security solutions • Provide investment protection
Tags : 
next generation, firewall, malware, threat, complexity, costs, visibility, protection, network, enterprise, solution, security, data management
    
Cisco

Validated Design Guide (US Pilot Only)

Published By: Cisco     Published Date: Apr 10, 2015
This document is a Cisco Validated Design (CVD) for Cisco Connected Mobile Experience (CMX) Solutions. It presents system-level requirements, recommendations, guidelines, and best practices for detecting, connecting, and engaging mobile users within your venue and leveraging your Wi-Fi network to fit your business needs. As Cisco continues to develop and enhance the technologies required to implement a CMX solution, this CVD will evolve and be updated to provide the latest guidelines, recommendations, and best practices for designing and deploying a CMX solution.
Tags : 
cisco, design, network architecture, mobile devices, best practices, wifi, wlan, wan, cmx, network management, network performance, network performance management, network security, quality of service, small business networks, wireless application software, wireless hardware, wireless infrastructure, wireless security, productivity
    
Cisco

Cisco Validated Design Guide for Campus Wireless

Published By: Cisco     Published Date: Apr 10, 2015
Cisco Validated Designs (CVDs) provide the foundation for systems design based on common use cases or current engineering system priorities. They incorporate a broad set of technologies, features, and applications to address customer needs. Cisco engineers have comprehensively tested and documented each CVD in order to ensure faster, more reliable, and fully predictable deployment.
Tags : 
cisco, byod, wifi, wireless, wlan, productivity, design guide, system design, network architecture, network management, network performance, mobile computing, mobile data systems, mobile workers, wireless application software, wireless communications, wireless hardware, wireless infrastructure, wireless phones, wireless service providers
    
Cisco

WP: Migrate to a 40-Gbps Data Center with Cisco QSFP BiDi Technology

Published By: Cisco     Published Date: Apr 10, 2015
This document describes how the Cisco® 40-Gbps QSFP BiDi transceiver reduces overall costs and installation time for customers migrating data center aggregation links to 40-Gbps connections.
Tags : 
cisco. transceiver, cost reduction, data center aggregation, migration, switches, infrastructure, network architecture, network management, network performance, network performance management, wireless hardware, wireless infrastructure
    
Cisco

Cisco Validated Design Guide for Campus Wireless

Published By: Cisco     Published Date: Jun 02, 2015
Cisco engineers have comprehensively tested and documented each design in order to ensure faster, more reliable, and fully predictable deployment. See how in this whitepaper.
Tags : 
use cases, design guide, campus wireless, deployment, multicast support, channel planning, bandwidth performance, wireless, network performance management, design and facilities
    
Cisco

FlexPod Data Center with Microsoft Fast Track Private Cloud 3.0 Design Guide

Published By: Cisco     Published Date: Jun 02, 2015
The purpose of this document is to describe the Cisco and NetApp® FlexPod® solution, which is a validated approach for deploying Cisco and NetApp technologies as a shared cloud infrastructure.
Tags : 
infrastructure, data, cloud, sharing, software, network, storage, database development, quality assurance, productivity, cloud computing
    
Cisco

Buyer's Criteria for Advanced Malware Protection

Published By: Cisco     Published Date: Jun 10, 2015
This document will identify the essential capabilities you should seek in an advanced malware protection solution, the key questions you should ask your advanced malware protection vendor, and shows you how Cisco combats today’s advanced malware attacks using a combination of techniques.
Tags : 
security, vulnerability management, analytics, threat prevention, cyber attacks, access control, anti spam, anti spyware, anti virus, mobile device management, data loss prevention
    
Cisco

WP: Migrate to a 40-Gbps Data Center with Cisco QSFP BiDi Technology

Published By: Cisco     Published Date: Sep 16, 2015
This document describes how the Cisco® 40-Gbps QSFP BiDi transceiver reduces overall costs and installation time for customers migrating data center aggregation links to 40-Gbps connections.
Tags : 
applications, systems integration, cloud, development, network architecture, network management, network performance, cloud computing, data center design and management, virtualization, infrastructure, design and facilities, power and cooling
    
Cisco
Start   Previous    22 23 24 25 26 27 28 29 30 31 32 33 34 35 36    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.