dom

Results 401 - 425 of 711Sort Results By: Published Date | Title | Company Name

IDC Whitepaper: Lotus Blooms in 2009

Published By: IBM     Published Date: Aug 10, 2009
The growing adoption of collaborative and social networking applications such as Lotus productivity software is reflected in IDC's Canadian forecast, detailed in this white paper.
Tags : 
lotus, idc, efficiency, collaborative solutions, revenue growth, customer satisfaction, social networking, twitter, facebook, myspace, unified communications, domino, quickr, symphony, sametime, erp, saas, inotes, enterprise applications, customer relationship management
    
IBM

Take a holistic approach to business-driven security

Published By: IBM     Published Date: Sep 10, 2009
Take a business-level view of security and risk management, so you can prioritize security activities and focus on those that make the most strategic sense. With this white paper, learn to direct resources to mitigate risk and costs.
Tags : 
ibm, security, risk domains, cyber security industry alliance, network, server and end point, it security, application security, business continuity, firewalls, hacker detection, internet security, network security appliance, security management
    
IBM

IBM ISS X-Force Threat and Risk Report

Published By: IBM     Published Date: Sep 10, 2009
Read this Trend and Risk report from IBM® ISS X-Force® to learn statistical information about all aspects of threats that affect Internet security, including software vulnerabilities and public exploitation, malware, spam, phishing, web-based threats, and more!
Tags : 
ibm iss x-force threat and risk report, ibm, web-related security threats, spam and phishing, malware, cvss, top vendor list, web application vulnerabilities, sql injection attacks, web browser exploitation, browser and plug-in vulnerabilities, activex, url spam, domains, international distribution of spam, anti spam, anti spyware, application security, firewalls, hacker detection
    
IBM

ESET Monthly Threat Report for the United Kingdom: December 2009

Published By: ESET     Published Date: Jan 08, 2010
This report provides a report of the Top Computer Threats in the United Kingdom.
Tags : 
eset, monthly threat report, top computer threat, security, anti spam, anti spyware, anti virus, internet security, security management
    
ESET

Top Computer Threats in the United Kingdom - January 2010

Published By: ESET     Published Date: Feb 17, 2010
View this ESET Monthly UK threat report to find out the top computer threats in the UK.
Tags : 
eset, computer threats, threatsense.net, virus lab, malware, antivirus, trojan, security protection, anti spam, anti spyware, anti virus, internet security, security management, data protection
    
ESET

A CFOs Guide to Why Standalone AV is No Longer Enough

Published By: Lumension     Published Date: Jan 22, 2013
Find out from Derek Brink at Aberdeen Group how their latest research confirms – and quantifies – the prevailing wisdom that enterprise security based on anti-virus software alone is not enough.
Tags : 
endpoint management, security, compliance, patch management, file integrity monitoring, device control, access control, anti spam, anti spyware, anti virus, application security, auditing, business continuity, hacker detection, identity management, internet security, intrusion detection, intrusion prevention, security management, security policies
    
Lumension

50,000-Seat VMware View Deployment

Published By: VMware     Published Date: Sep 12, 2011
This white paper highlights an architectural design for a 50,000-seat VMware View architecture created by NetApp, VMware, Cisco, Fujitsu, and Wyse. Explore how the project demonstrates the most reliable methods for deploying a scalable and easily expandable environment, anywhere from 5,000 to 50,000 seats.
Tags : 
vmware, desktop virutalization, shared storage, connection servers, netapp, vsphere, end-user, desktop management, infrastructure, domain structure, network attached storage, storage area networks, storage management, storage virtualization, system management software, windows
    
VMware

Developing, Deploying, and Delivering Web API's

Published By: StrikeIron     Published Date: Aug 01, 2013
For internal and external applications, Web API’s provide flexibility and unlock the value of your data and software. However, ongoing API development, deployment and delivery require extensive domain knowledge in operating an enterprise-class infrastructure. Without this expertise, scalability, reliability, and security are compromised.
Tags : 
cloud computing, colocation and web hosting, web service security, soap web development, web services, web service security, xml, mobile computing, mobile data system, wireless application software, content integration, application integration, content delivery, edi, networking
    
StrikeIron

IBM SmartCloud for Social Business Mobility

Published By: IBM     Published Date: Jan 09, 2013
Combining the power of cloud computing with the freedom and functionality of mobile devices can give enterprises access to a wide range of key benefits. Read on this white paper to learn more about SmartCloud for Business Mobility.
Tags : 
mobility, smart cloud, ibm, cloud strategy, cloud benefits, data management, business technology, data center
    
IBM

New IT Change Management Cloud Service a "Game Changer" Says EMA Analyst

Published By: ITinvolve     Published Date: Jun 06, 2012
Learn why Enterprise Management Associates analyst Dennis Drogseth calls ITinvolve for Change Management "a breath of fresh air in humanizing change management and streamlining collaboration across a wide range of relevant stakeholders.
Tags : 
change management, cloud computing, cross-domain change management, cmdb, cms, itinvolve, enterprise applications, business technology
    
ITinvolve

2017 Digital Trends In Retail

Published By: Adobe     Published Date: Aug 02, 2017
Customer experience (CX) continues to dominate the agenda, and it is clear from the research that retailers collectively grasp the importance of a personalised and mobilefriendly experience which is relevant at every stage of the customer journey. It makes absolute sense for retailers to focus on optimising the mobile experience as part of their CX initiatives. CX is a differentiator for retail brands and, as part of this trend, the mobile experience in particular will increasingly define your brand.
Tags : 
digital skills, culture, strategy, data management, processing, technology, ux design
    
Adobe

Calculating the True Cost of RDBMS Ownership and How Sybase ASE Stack Up

Published By: SAP     Published Date: Jul 17, 2012
Relational database management systems (RDBMSs) are systems of software that manage databases as structured sets of tables containing rows and columns with references to one another through key values. They include the ability to optimize storage, process transactions, perform queries, and preserve the integrity of data structures. When used with applications, they provide the beating heart of the collection of business functions supported by those applications. They vary considerably in terms of the factors that impact the total cost of running a database application, yet users seldom perform a disciplined procedure to calculate such costs. Most users choose instead to remain with a single vendor's RDBMS and never visit the question of ongoing hardware, software, and staffing fees.
Tags : 
sap, infrastructure, database, data management, white paper, management, storage, business functions, backup and recovery, storage management, data integration, data protection, business technology
    
SAP

Mobile Security for Networks without Borders

Published By: CDW     Published Date: Jul 08, 2015
It’s official — BYOD is here, and there’s no turning back. Mobile Device Management (MDM) gives employees the freedom to connect whenever, wherever for increased productivity and a better work-life balance. But every smartphone, tablet and notebook is a potential gateway for unauthorized applications, malware and other security threats.
Tags : 
security, vulnerability management, analytics, mobile security, byod, mdm, application security, policy based management, mobile device management, data loss prevention
    
CDW

How to Slay the Dragon of Enterprise Work eBook

Published By: Workfront     Published Date: Jun 25, 2014
Work chaos comes in many forms: random input processes, disconnected activities, poor visibility into work and more. Read this eBook: "How to Slay the Dragon of Enterprise Work" and learn how slaying the work chaos dragon will help you simplify your processes, connect team members, save time and money, and more. Get the eBook today.
Tags : 
at task, work chaos, solutions, input processes, poor visibility, resources, knowledge management, enterprise applications
    
Workfront

Do You Know The Eight Must Have Tools for Ensuring the Survival of Your Network?

Published By: McAfee     Published Date: Aug 14, 2014
Network availability and survivability in the face of an attack requires specific tools and processes. Are you using RBAC, hierarchical policy management and individual domain control? Find out which eight features you must deploy now.
Tags : 
network security, network management, firewall management, enterprise firewall, ngfw, next generation firewall, firewall automation, security
    
McAfee

Cloud Computing Through Integration: Realizing the Value Proposition

Published By: IBM     Published Date: May 22, 2013
Cloud computing continues to dominate conversations in the banking industry worldwide, and the cloud concept is gaining increased visibility among banking IT executives.
Tags : 
ibm, ibm cloud, cloud computing, integration, business software, bank software, ibm bank, business continuity, application integration, infrastructure management
    
IBM

Intelligence-Led Security: Develop a Concrete Plan

Published By: Cyveillance     Published Date: Apr 03, 2015
Protecting a business – including its information and intellectual property, physical infrastructure, employees, and reputation – has become increasingly difficult. Online threats come from all sides: internal leaks and external adversaries; domestic hacktivists and overseas cybercrime syndicates; targeted threats and mass attacks. And these threats run the gamut from targeted to indiscriminate to entirely accidental. Like many security trends and frameworks, the early stages of adoption often involve inconsistent definitions, challenges with justification and management communication and an unknown path to implementation. In this white paper, we: • Review the current threatscape and why it requires this new approach • Offer a clarifying definition of what cyber threat Intelligence is • Describe how to communicate its value to the business and • Lay out some concrete initial steps toward implementing Intelligence-Led Security
Tags : 
intellectual property, hackers, protection, leaks, security, threatscape, networking
    
Cyveillance

Mobile Content Revolution in B-to-B Organizations

Published By: bigtincan     Published Date: Oct 10, 2014
Understanding content value and unlocking the tribal knowledge that exists among mobile workforces is one of the key drivers that can improve how an organization operates in the age of mobile computing. By implementing Content Intelligence, mobile users can easily learn from their colleagues and leverage the domain expertise and the content that works best. It’s the ultimate way to get people working together to improve the productivity of every user within the organization.
Tags : 
mobile content, b2b, content intelligence, content value
    
bigtincan

Control and Freedom at the Same Time

Published By: Tyco Integrated Security     Published Date: Mar 09, 2016
Crime alone costs businesses dearly – as much as 5 percent of gross revenue each year.
Tags : 
tyco, security, control, freedom, crime, revenue
    
Tyco Integrated Security

Whistle While You Perk: How increasing perks creates a more engaged workforce

Published By: Cornerstone OnDemand     Published Date: Jul 16, 2015
Forget the conventional wisdom – increasing employee engagement does not mean increasing salaries. So how exactly, then, can executives achieve a happy, motivated team? By offering simple free or low-cost perks! In the new infographic, Whistle While You Perk, you’ll uncover the hidden truth about engagement – that employees don’t want more money. They’d rather have a flexible lifestyle and not be married to their desk. You’ll also learn that employees really want: • a fluid work environment that promotes friendships • to put their personal stamp on the workplace • a professional experience that makes them say no to external job offers Want to discover additional easy ways to increase engagement? Download Whistle While You Perk today!
Tags : 
perks, productivity, engagement, performance, development
    
Cornerstone OnDemand

7 strategies for being a BETTER MANAGER

Published By: Cornerstone OnDemand     Published Date: Aug 27, 2015
We believe that to be the best leader you can be, you need to be a fearless, bold, effective coach on a daily basis. Aspirational, right? The path to greatness seldom runs smoothly though, so here are a few strategies to get you started.
Tags : 
management, applications, software, productivity, workflow, application integration, analytical applications, human resources services, workforce management software, recruiting software/services, business technology
    
Cornerstone OnDemand

Whistle While You Perk: How increasing perks creates a more engaged workforce

Published By: Cornerstone OnDemand     Published Date: Oct 21, 2015
Forget the conventional wisdom – increasing employee engagement does not mean increasing salaries. So how exactly, then, can executives achieve a happy, motivated team? By offering simple free or low-cost perks! In the new infographic, Whistle While You Perk, you’ll uncover the hidden truth about engagement – that employees don’t want more money. They’d rather have a flexible lifestyle and not be married to their desk. You’ll also learn that employees really want: • a fluid work environment that promotes friendships • to put their personal stamp on the workplace • a professional experience that makes them say no to external job offers Want to discover additional easy ways to increase engagement? Download Whistle While You Perk today!
Tags : 
reachmail, employee engagement, increasing employee engagement, perks, fluid work environment, engaged workforce, increase perks
    
Cornerstone OnDemand

Are You Living in a Digital Fairy Tale? Make Digital Real

Published By: Mindtree     Published Date: Feb 06, 2015
Web, social and mobile experiences that delight customers are real—they just take real work. Learn how deep domain expertise, nimble processes and the right partnerships will help you slay complexity and conquer tight deadlines. Download the e-book to help you: • Identify and navigate digital complexity • Explore your development options to get to market faster • Learn how to choose and work with the right digital partners
Tags : 
digital transformation, digital marketing platform, digital ecommerce solutions, customer engagement solutions, enterprise portal solutions, mobile technology, digital enterprise, improve customer experience, customer engagement, enterprise mobility
    
Mindtree

New InfoTrends Report – 2015 Digital Publication Platform Market Overview

Published By: Quark Software     Published Date: Mar 19, 2015
With the proliferation of customer experience initiatives, content marketing and an increasing need to fulfill content delivery on mobile devices, digital publishing has now become an important component of the digital toolbox for every organization. Research firm InfoTrends recently released the 2015 Digital Publication Platform Market Overview, which finds that: • Over 90% of enterprises are moving towards electronic documentation. • The digital publishing platform landscape is made up of approximately 60 to 80 main companies, but is dominated by a few vendors that can be considered influencers. • The digital publishing platform market will grow by a 25% CAGR (compound annual growth rate) over the next five years. Learn more about the market, solution providers and take a look at the future of digital publishing in the InfoTrends Digital Publication Platform Market Report.
Tags : 
digital publishing, sales enablement, digital sales enablement, mobile sales enablement, enterprise mobility, corporate app, automated publishing, automated digital publishing, publishing automation, automated authoring, enterprise publishing, digital publishing software, digital publishing solutions, tablet publishing, mobile publishing digital, publishing report digital, publishing analyst report, xml publishing to apps, ipad publishing, digital publishing platform
    
Quark Software

The New Industrial Innovation: Emotion

Published By: gyro     Published Date: Sep 10, 2015
Showing a softer side of manufacturing is winning over executives, according to a new study conducted by the FORTUNE Knowledge Group and gyro. While conventional wisdom and the standard manufacturing marketing approach would indicate that hard elements are more compelling, this new research suggests that the opposite is true: A significant majority of business leaders are moving to a more innate approach to decision-making, trusting their gut and relying on “soft” factors, such as company culture, reputation and level of trust, to help them make decisions.
Tags : 
decision-making, company culture, reputation, emotion, strategy, buyers
    
gyro
Start   Previous    10 11 12 13 14 15 16 17 18 19 20 21 22 23 24    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.