mapping

Results 151 - 175 of 185Sort Results By: Published Date | Title | Company Name

Five reasons why mobilizing Windows applications is simpler than you think

Published By: Citrix     Published Date: Aug 15, 2012
Mobility and consumerization are little more than buzzwords without the applications that drive business activities. A successful enterprise mobility strategy places priority on applications first, mapping their mission to the variety of use cases out in the field. This paper describes how you can simplify application mobilization with Citrix.
Tags : 
citrix, xenapp, windows applications, microsoft applications, windows, microsoft, mobilizing applications, mobile devices
    
Citrix

Next Generation Firewall (NGFW) Security Value Map

Published By: Cisco     Published Date: Jan 15, 2015
Empirical data from our individual Product Analysis Reports (PARs) and Comparative Analysis Reports (CARs) is used to create the unique Security Value MapTM (SVM). The SVM provides a quick, clear overview of the relative value of security investment options by mapping security effectiveness and value (TCO per protected Mbps) of tested product configurations.
Tags : 
comparitive analysis, datacenter, social, analytics, security, data management
    
Cisco

Vodafone Ireland implements world-class service excellence with HP BSM

Published By: HP     Published Date: Apr 13, 2014
Learn how business service management helped Vodafone Ireland transform from a reactive to a proactive IT Operations function. Read how BSM solutions enabled the Vodafone IT Operations group to align priorities to match the business and drive business value, delivering 300% ROI in one year.
Tags : 
apm, application performance, arcsight, bsm, business service management, communication service provider, ddma, discovery and dependency mapping
    
HP

GE Capital: Winner 2014 Awards of Excellence for Business Service Management

Published By: HP     Published Date: May 05, 2014
Discover, map, and optimize assets to streamline global data centers, speed audits, slash costs: Using HP’s Business Services Management portfolio, GE Capital has realized an $8 million annual savings through data center consolidation. Find out how they addressed their key IT challenges of data center simplification, asset management and capacity management. GE Capital is the financial services unit of the American conglomerate General Electric. GE Capital provides commercial lending and leasing, as well as a range of financial services.
Tags : 
bsm, business service management, ddma, discovery and dependency mapping, it operations group, it performance suite, it case study, ge capital
    
HP

NSS Labs - Web Application Firewall (WAF) Analysis Security Value Map™ (SVM)

Published By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
The SVM illustrates the relative value of security investment options by mapping security effectiveness and value of tested product configurations. The SVM provides an aggregated view of the detailed findings from NSS Labs’ group tests.
Tags : 
citrix, firewall, security, svm, firewalls, intrusion prevention, web service security, data protection
    
Citrix Systems, Inc.

NSS Labs - Web Application Firewall (WAF) Security Value Map™

Published By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
The SVM provides a quick, clear overview of the relative value of security investment options by mapping security effectiveness and value of tested product configurations.
Tags : 
citrix, waf, firewall, tco, security, network security, application security, firewalls
    
Citrix Systems, Inc.

Lean Content Marketing

Published By: Marketo     Published Date: Jul 13, 2015
This ebook goes through tried and true strategies for lean content marketing—so you can extend the value of all your thought leadership.
Tags : 
content marketing, content strategy, collaboration, content creation, content contribution incentives, content planning, content mapping
    
Marketo

Top 8 Reasons SMBs Need to Monitor their Networks

Published By: InterMapper     Published Date: Apr 10, 2011
If you are responsible for administering the IT infrastructure at a small-to-medium size business (SMB), using network monitoring, mapping and alerting software can help you do your job better by maximizing network uptime and efficiency.Here are the top reasons to implement a network monitoring system.
Tags : 
smb networks, troubleshoot, intermapper, alert, alerting software, infrastructure, network management, monitoring
    
InterMapper

Flashmaps: The Premier Source For Flash Interactive Maps - AreaSelector Evaluation Pack

Published By: Flashmaps     Published Date: Aug 16, 2011
Convert your databases into useful geospatial information in a snap! Interactive area maps of the world, USA, Canada, states, counties and more!
Tags : 
flash maps, interactive maps, real-estate maps, world map, city map, street map, us map, state map
    
Flashmaps

Unlock the Secrets of Content ROI

Published By: Meltwater     Published Date: Oct 14, 2015
What can you do to make sure your content gets noticed? While many companies are spending an inordinate amount of time and money crafting and promoting content for prospects and customers, 60% to 70% of this B2B content goes unused. It’s time to explore the nuances of customer motivation and decision-making and find those moments when we can inspire and engage our customers. Download our e-book on mapping content to complex and unpredictable customer journeys, by Douglas Karr, founder of the Marketing Technology Blog.
Tags : 
meltware, content roi, b2b, customer motivation, knowledge management, data management
    
Meltwater

The Ultimate Marketer's Guide to Mapping Your Buyer's Journey

Published By: Crownpeak     Published Date: Jul 21, 2016
This Ultimate Guide to Mapping the Buyer's Journey will show you how to: - Identify and develop customer personas specific to your business - Map your buyer's journey from consideration to purchase based on persona - Create content based on every stage of the buyer's journey - Effectively reach customers by aligning your content with their needs
Tags : 
crownpeak, marketer, buyer's journey, customer reach, marketing, consumer behavior, customer reach, content marketing
    
Crownpeak

5 Secrets to Increase Website Traffic

Published By: VisiStat     Published Date: Mar 22, 2007
This report outlines five important "insider" secrets for measuring the effectiveness of your Website, along with tips on how to turn it into a lead generation machine.
Tags : 
website traffic, visitor tracking, web analytics, web metrics, site analysis, online marketing, site management, increase sales
    
VisiStat

Get More from Your Oracle Database: Best Practice Performance Management for Real Results

Published By: Confio     Published Date: Aug 21, 2009
DBAs are constantly challenged to increase database performance while keeping costs down. This short paper discusses Resource Mapping Methodology (RMM) which defines a systematic process for performing Wait-Event analysis to optimize database performance.
Tags : 
database, oracle, oracle database, database administrator, resource mapping, resource management, rmm, database performance
    
Confio

Class of Service: Myths and Misconceptions

Published By: AT&T     Published Date: Jun 25, 2008
Class of Service (CoS) functionality can help optimize network performance. For a successful deployment, network designers should identify all applications, understand requirements associated with each application, designate appropriate mapping for groups of applications and provide mechanisms in the underlying network to deliver CoS. CoS mapping and deployment are important; adhering to tested strategies and avoiding common misconceptions helps IT managers advance optimization across the wide area network.
Tags : 
class of service, service management, traffic management, bandwidth, at&t, att, network performance management, network management
    
AT&T

The Brand Lift of Search

Published By: Mediative     Published Date: Jan 14, 2008
More and more, companies are realizing the importance of creating a strong online presence both in the free organic search results and the paid advertisements that appear alongside those results. The tracking features of website logs and the measurability of pay-per-click ads enable marketers to monitor the traffic of their organic listings and the performance of their online advertising campaigns. However, it's comparatively more difficult to determine how the placement of those search listings and online ads affect consumer brand perceptions.
Tags : 
search marketing, organic search, buying behavior, buying behaviors, ctr, search, branding, google
    
Mediative

Integrating RenderX XSL FO Technology with iText for High Performance Dynamic Forms Generation

Published By: RenderX     Published Date: May 27, 2008
This paper presents a complete, generic framework for creating modifiable, flowing PDF forms, based on XML content and standard XSL templates. It requires no programming to generate dynamic, fillable, custom PDF forms by mapping some RenderX XSL FO extensions to form elements.
Tags : 
itext, xsl fo, pdf, pdf forms, dynamic forms, xep, xepwin, fill-able forms
    
RenderX

The Marketing Imperative for 2009: Build a killer lead nurturing program

Published By: TailoredMail     Published Date: Feb 27, 2009
In these trying times, no greater low-hanging-fruit opportunity exists than implementing a successful lead-nurturing program. But, creating one requires careful thought and planning – which this paper outlines. What are some key steps your organization should take to building a successful program? What marketing-platform capabilities should you consider to help you get the results you want? Get the answers today!
Tags : 
tailoredmail, lead nurturing, marketing imperative, lead generation, lead qualification, qualified leads, lead-lifecycle automation, content-mapping
    
TailoredMail

Identity Enabled Web Services: Standards-based identity for Web 2.0

Published By: Ping Identity     Published Date: May 05, 2009
Web Services are emerging as the preeminent method for program-to-program communication across corporate networks as well as the Internet. Securing web Services has been a challenge until recently, as typical Web authentication and authorization techniques employed browser-to-server architectures (not program-to-program). This resulted in user identity ending at the Web Application Server, forcing the Web Services Provider to trust blindly that the Web Services Requester had established identity and trust with the end user.
Tags : 
pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml
    
Ping Identity

Implementing HIPAA with Active Administrator

Published By: ScriptLogic     Published Date: Jan 11, 2012
Discover how the software helps achieve compliance with HIPAA standards, by giving IT administrators the power and control they need.
Tags : 
network administration, network management, desktop management, desktop administration, active directory management, patch management, desktop authority, active administrator
    
ScriptLogic

Nightmare on Delegation Street with Native Active Directory Tools

Published By: ScriptLogic     Published Date: Jan 11, 2012
In this whitepaper, we will discuss the challenges of managing delegation with native tools and how you can end the delegation nightmare with Active Administrator from ScriptLogic.
Tags : 
network administration, network management, desktop management, desktop administration, active directory management, patch management, desktop authority, active administrator
    
ScriptLogic

Integrating Network Monitoring and the Help Desk for Expedited Problem Resolution

Published By: ScriptLogic     Published Date: Jan 11, 2012
In this white paper learn how to have a fluid help desk to work flow and how to resolve quickly and correctly, users IT issues. Read on.
Tags : 
network administration, network management, desktop management, desktop administration, active directory management, patch management, desktop authority, active administrator
    
ScriptLogic

Stop Spending Money on Software Licenses You Already Own

Published By: ScriptLogic     Published Date: Jan 11, 2012
This white paper looks at what really needs to be done and how to enable your organization to be license efficient.
Tags : 
network administration, network management, desktop management, desktop administration, active directory management, patch management, desktop authority, active administrator
    
ScriptLogic

Automating IT Data Collection and Compliance for GRCM Controls

Published By: Qualys     Published Date: Apr 05, 2011
This guide explains how QualysGuard PC automates the "C" in GRCM by automatically scanning all assets, collecting operating system configuration and application access controls, mapping these to IT policy, and documenting compliance.
Tags : 
it data collection, it compliance, grcm controls, qualys, qualysguard pc, gcc, automated general computer control, legacy
    
Qualys

Mapping Security for Your Virtual Environment

Published By: HP and Intel ®     Published Date: May 06, 2013
With the gaining popularity of virtualization in today’s enterprise data centers, you need a virtual security solution that allows you to confidently adopt virtualization throughout your data center without compromising on your existing security postures.
Tags : 
virtualization, security, enterprise, data center, virtual security, access control, anti spam, anti spyware
    
HP and Intel ®

Dissatisfied with cost and time you're spending on IT discovery?

Published By: IBM     Published Date: Feb 05, 2014
Companies increasingly rely on IT discovery to provide a complete picture of the infrastructure for IT optimization and migration initiatives. But current methods are costly, and they can take too long to deliver results. ALDM (analytics for logical dependency mapping), a new service from IBM Research, is changing all of that. In this interview, Larry Thompson, IBM offering development executive, explains how ALDM reengineers IT discovery with analytics, automation and cloud computing technologies and delivers a more complete and accurate view of your IT environment. Listen to the full 8-minute podcast interview or read the two-page encapsulated version to learn how ALDM is lowering the cost of IT discovery while speeding results.
Tags : 
    
IBM
Start   Previous    1 2 3 4 5 6 7 8    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.