purpose

Results 301 - 325 of 390Sort Results By: Published Date | Title | Company Name

OutSystems Platform and Force.com: Different PaaS for Different Players

Published By: OutSystems     Published Date: Jan 29, 2014
The paper, authored by Bloor Research, includes a comprehensive analysis of the two PaaS solutions with a focus on providing an objective look at two products that are both ‘fit for a purpose.’ The paper provides enough information to help IT professionals determine which product matches their needs and requirements.
Tags : 
outsystems, outsystems platform, force.com, paas, it management
    
OutSystems

Website Security in Corporate USA

Published By: Symantec     Published Date: Jan 11, 2013
We often think of malware as being designed to sit beneath the radar, collecting data in stealth mode, for the purposes of fraud or corporate espionage. Read on to learn more findings by this survey, with stats on security, confidence and more.
Tags : 
survey, usa, corporate america, security in corporations, symantec, security, it management, data management, data security, business technology, data center
    
Symantec

TEI of Cisco TrustSEC

Published By: Cisco     Published Date: Nov 18, 2015
In January 2015, Cisco commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment enterprises may realize by deploying Cisco TrustSec. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Cisco TrustSec on their organizations. The Cisco TrustSec solution simplifies the provisioning and management of highly secure access to network services and applications. Unlike access control mechanisms that work on network topology, Cisco TrustSec policies use logical grouping. Highly secure access is consistently maintained even as resources are moved in mobile and virtualized networks.
Tags : 
cisco, trustsec, tei, total economic impact, network, networking, wireless
    
Cisco

How to Handle Spam Complaints

Published By: Gold Lasso     Published Date: Jan 20, 2007
Organizations using e-mail marketing as a part of their overall communications plan can utilize a variety of tactics to effectively manage and reduce spam complaints. The purpose of this white paper is to educate organizations and marketers on the basics of the CAN-SPAM act by weeding through the jargon.
Tags : 
spam, spam complaints, email communication, black list, white list, deliverability, email marketing, inbox, gold lasso
    
Gold Lasso

State of the Art Practice with Visual Analytics

Published By: SAS     Published Date: Sep 30, 2014
As analytics and Big Data have been embraced, analysts are working to become better at communicating the insights from complex analysis. This makes the use of visual analytics increasingly important as a tool to tell compelling stories and to engage decision makers in dialogue. Importantly, the best visual analytics are not necessarily the coolest, most sophisticated, or most complex. Visual analytics are most effective when there is a clear purpose and when data can be visualized and communicated in a way that is easily understandable.
Tags : 
sas, big data, visual analytics
    
SAS

TDWI Best Practices: Data Lakes, Purposes, Practices, Patterns and Platforms (customized reports)

Published By: SAS     Published Date: Oct 18, 2017
When designed well, a data lake is an effective data-driven design pattern for capturing a wide range of data types, both old and new, at large scale. By definition, a data lake is optimized for the quick ingestion of raw, detailed source data plus on-the-fly processing of such data for exploration, analytics and operations. Even so, traditional, latent data practices are possible, too. Organizations are adopting the data lake design pattern (whether on Hadoop or a relational database) because lakes provision the kind of raw data that users need for data exploration and discovery-oriented forms of advanced analytics. A data lake can also be a consolidation point for both new and traditional data, thereby enabling analytics correlations across all data. To help users prepare, this TDWI Best Practices Report defines data lake types, then discusses their emerging best practices, enabling technologies and real-world applications. The report’s survey quantifies user trends and readiness f
Tags : 
    
SAS

Network Monitoring and Troubleshooting for Dummies

Published By: Riverbed     Published Date: Jan 28, 2014
The purpose of this book is to introduce you to common network performance management (NPM) issues and give you a new way of looking at solving them. This perspective allows you to see your network from your users’ point of view, namely, the services and applications they use and their experience with them. Of course, you can still get down to the other flow and packet levels, but macro-level visibility is a key differentiator in your ability to monitor and troubleshoot network performance efficiently.
Tags : 
application performance management, application performance monitoring, big data apm, network performance management, network performance monitoring, network performance troubleshooting, networking, it management, knowledge management, enterprise applications, mobile workers, application integration, analytical applications, business intelligence, data integration, business technology, virtualization, cloud computing, infrastructure, infrastructure management
    
Riverbed

The Evolution and Value of Purpose-Built Backup Appliances

Published By: Symantec     Published Date: May 02, 2014
This IDC White Paper explores the increased use and adoption patterns of PBBAs, both integrated and targeted, and the utility these appliances provide to customers in their data protection processes.
Tags : 
symantec, virtual machine backup, backup safety, backup and recovery, server management, power and cooling, data protection, loss data, virtual environment, data protection, enterprise data, security, best practices, business intelligence
    
Symantec

10 Reasons iAPPS Content Manager Should Be On Your CMS Shortlist

Published By: Bridgeline Digital     Published Date: Sep 26, 2013
iAPPS Content Manager is the premier business marketing solution to drive Digital Engagement in the CMS marketplace. iAPPS Content Manager allows businesses to personalize their online interactions with customers in an increasingly digital world. The solution combines business purpose and end-user context to attract customers, deliver compelling content, and optimize conversion rates.
Tags : 
cms, content manager, content management system, digital engagement
    
Bridgeline Digital

Video Marketing Domination

Published By: Audio Animators     Published Date: Oct 03, 2013
Video marketing typically means you want to generate leads, sales, or buzz. Most marketers jump right into video with little thought to their options. But, they exist and by making the right decision can have a big impact. This paper clarifies options and provides a path to optimal conversion by ensuring you select the right video medium for your purposes.
Tags : 
    
Audio Animators

FlexPod Data Center with Microsoft Fast Track Private Cloud 3.0 Design Guide

Published By: Cisco     Published Date: Jan 05, 2015
Cisco® Validated Designs consist of systems and solutions that are designed, tested, and documented to facilitate and improve customer deployments. These designs incorporate a wide range of technologies and products into a portfolio of solutions that have been developed to address the business needs of our customers. The purpose of this document is to describe the Cisco and NetApp® FlexPod® solution, which is a validated approach for deploying Cisco and NetApp technologies as a shared cloud infrastructure.
Tags : 
solution guide, integrate, infrastructure, solutions, applications, it management, data management
    
Cisco

Network Performance Management for Dummies

Published By: Riverbed     Published Date: Apr 03, 2014
The purpose of this book is to introduce you to common network performance management (NPM) issues and give you a new way of looking at solving them.
Tags : 
riverbed, npm, network performance management, performance management, network management, networking, performance tools, security, compliance, service management, network performance, network security appliance, best practices, infrastructure
    
Riverbed

Why Storage Convergence? Why Now?

Published By: HP     Published Date: May 14, 2014
As business purposes have changed over the years, IT approaches and infrastructures have had to change in lock-step to serve them optimally. IT professionals are now combining the best of the centralized approach – via virtualization, federation, and clouds of all sorts – with the best of the decentralized model – via mobile and localized consumption and production. In this paper, Enterprise Strategy Group examines approaches to IT operational challenges and business requirements. Learn how HP Converged Storage’s comprehensive approach represents a logical evolution development in storage, delivering ease, flexibility and cost-efficiency all in one.
Tags : 
3par storeserv, converged storate, new style of it, storage architecture, itaas, cloud, hybrid cloud, private cloud, it management, enterprise applications
    
HP

IDC: Driving Business Optimization with End-to-End Performance Testing Paper

Published By: HP     Published Date: Jul 28, 2014
The purpose of this IDC White Paper is to lay out the role that performance testing can play in the context of overall application lifecycle management (ALM), security, resource, and demand management. As part of that objective, the document defines an application performance testing framework and discusses a performance test evolution path and the relationship between a successful approach to performance testing and related IT elements such as monitoring, security, ALM, and project and portfolio management (PPM).
Tags : 
agile performance testing, continuous performance test, load testing, loadrunner, mobile performance testing, mobile testing, performance center, performance testing, idc, security
    
HP

Security in Fax: Minimizing Breaches and Compliance Risks

Published By: OpenText     Published Date: Aug 19, 2014
Maintaining regulatory compliance is a major business issue facing organizations around the world. The need to secure, track and store information for compliance purposes is critical. For years businesses have relied on fax communications in day-to-day operations. More pressure is now placed on the need to closely manage fax communications and document processes. It’s not surprising that organizations are turning to enterprise fax technology to meet compliance requirements. This white paper addresses the area of fax communications and the steps you can take to help keep your organization compliant.
Tags : 
opentext, security, fax, document delivery, workflow improvements, automation systems, transactional paper documents, knowledge management, enterprise applications
    
OpenText

Grow your business with a scalable network

Published By: HP     Published Date: Aug 26, 2014
SMBs need a robust, scalable network capable of handling any workload securely and reliably. It's critical to select network switches, routers, and wireless access points with the capabilities needed for today's traffic and tomorrow's growth, including mobile and BYOD computing. As part of HP’s Just Right IT program for SMBs, HP Networking solutions are purpose-built for growing businesses. Learn what to look for in networking technology, and how HP can help you create a network that will keep pace with your business growth.
Tags : 
data, business, technology, portfolio, cloud-based, support, portal, solution, consolidate, islands, access, reliable, retention, protection, robust, scalable, byod, networking, knowledge management
    
HP

Going Beyond Email Compliance: 7 Surprising Use Cases for Email Suppression

Published By: UnsubCentral     Published Date: Oct 17, 2014
Email suppression lists are often created and maintained for one purpose: honoring the consumer’s opt out request and remaining CAN-SPAM compliant. While those are incredibly important, there are so many other ways that a suppression list can and should include. Take a look at our e-book to find out how you can use your suppression lists to increase your ROI.
Tags : 
mail marketing compliance, email list scrubbing, suppression list, email suppression list, suppression list management, suppression file management, email suppression file scrubbing, affiliate email marketing, email opt out management, email acquisition, affiliate email marketing, b2b scrubbing, can spam compliance
    
UnsubCentral

Risk Mitigation for IT Asset Disposal

Published By: DMD Systems Recovery     Published Date: Dec 02, 2016
The purpose of ITAD is to ensure that every possible step is taken to protect the reputation of your brand while also maximizing your return on investment.
Tags : 
dmd systems, it asset disposal, itad, electronic waste, migration, server virtualization, productivity, power and cooling, data center design and management
    
DMD Systems Recovery

DCIG 2016-17 Hybrid Cloud Backup Appliance Buyer’s Guide

Published By: Unitrends     Published Date: Jan 05, 2017
Compliments of Unitrends. DCIG's analysts have done the heavy lifting for you. This Buyer's Guide evaluates the full range purpose-built backup appliance product capabilities, including features that enable the long-term retention of backups in the cloud and even application recovery in the cloud.
Tags : 
unitrends, hybrid cloud backup appliance, cloud, recovery, backup, it management, enterprise applications, business technology
    
Unitrends

Oracle BPM Suite 11g: BPM without Barriers

Published By: Oracle Corp.     Published Date: Jan 16, 2013
As the BPM market has matured, it’s time to declare the era of specialized “fit-for-purpose” BPM Suites officially over.
Tags : 
oracle, bpm, business technology
    
Oracle Corp.

Outsource lead generation for your small business

Published By: Rex Direct Net Inc.     Published Date: Apr 14, 2010
Online lead generation is a burgeoning industry and a crucial part of marketing a business on the Internet. However, because this is a relatively new industry, it can be challenging to get started and best practices are not well established. The purpose of this article is to explain what lead generation is and to educate businesses about best way to go about this process.
Tags : 
rex direct, lead gen, demand gen, co registration, direct email, lead generation, opt in, opt out, real time reporting
    
Rex Direct Net Inc.

Website Security in Corporate America

Published By: Symantec Corporation     Published Date: Oct 03, 2013
We often think of malware as being designed to sit beneath the radar, collecting data in stealth mode, for the purposes of fraud or corporate espionage. Increasingly however, we’re witnessing attacks on corporations designed to cause substantial economic losses via wholesale destruction. For example, the Shamoon malware that recently hit Saudi Arabia-based Aramco (the world’s largest oil company) and RasGas (a Qatar-based gas company) corrupted files on tens of thousands of workstations, overwriting the Master Boot Records. These malware attacks, which may well have targeted website vulnerabilities, resulted in destruction on an industrial scale. At Aramco, IT professionals were forced to replace 30,000 PCs and laptops. RasGas meanwhile, had to shut down all email communications, and the company’s website was forced offline.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation

Driving Product Quality With Continuous Verification and Validation

Published By: IBM     Published Date: Mar 10, 2015
This paper explains the methods and approaches that can enable continuous verification and validation and introduces a solution from IBM and National Instruments that designed for that purpose.
Tags : 
ibm, product quality, continuous engineering, continuous verification, embedded software, it management, knowledge management, enterprise applications
    
IBM

Driving A Single View of The Customer

Published By: Informatica     Published Date: Jan 16, 2007
The purpose of this white paper is to outline the importance of data quality with reference to single view of customer. In any organization SVC is the foundation of successful customer relationship management (CRM).
Tags : 
crm, data quality, data integrity, customer relationship
    
Informatica
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.