purpose

Results 376 - 396 of 396Sort Results By: Published Date | Title | Company Name

How to Select Partners to Communicate Your News

Published By: Godfrey     Published Date: Oct 24, 2008
With the constantly-changing media landscape and the growing demand for media communication via 2.0 channels, you need to reconsider both your news and the vendor partners on whom you rely to distribute it. It could mean the difference between a purposeful, engaging and long interactive life for even the "smallest" news item, and a costly yet low-impact news distribution program that saps valuable resources. This white paper tells you some key considerations to help guide your selection process.
Tags : 
godfrey, white paper, b to b, business to business, 2.0, vendor, analytics, brand management, integrated marketing, wire distribution
    
Godfrey

What to Look for in Mission-Critical Managed IT Services

Published By: Stratus Technologies     Published Date: Sep 30, 2008
The Choices from many reputable suppliers of IT managed services can appear very much alike. Yet when you have a mission-critical business process whose function must not be interrupted, you know your requirements call for something above and beyond. This paper serves as a field guide to help you identify key characteristics that set a critical managed IT service apart from even highly capable general-purpose offerings.
Tags : 
stratus technologies, it services, business impact analysis (bia), recovery point (rpo), recovery time objectives (rto), business continuity (bc), disaster recovery (dr) protection, service level agreement (sla), software development, it management, itil
    
Stratus Technologies

Federation Products 2008

Published By: Burton Group     Published Date: Jul 07, 2008
The identity federation market enjoys an exceptional supply of products. With well over a dozen products available to enterprise customers, most architects have more choices than time will allow for evaluation. This abundance of products is partly the result of the inherent difficulty of developing a truly multipurpose federation server. Although federation products are similar in name, each has its own personality and idiosyncrasies that make it suitable for certain environments but insufficient in others.
Tags : 
fim, federated identity management, identity federation, access control, identity management, passport, burton group, networking, password management
    
Burton Group

Sustainable High Performance And Profitability - The Journey That Never Ends

Published By: Oliver Wight     Published Date: Jun 23, 2008
The purpose of this white paper is to introduce and describe the steps necessary to start on the journey to Sustainable High Performance and Profitability and how to do it in a holistic manner.
Tags : 
erp, business management, profitability, oliver wight
    
Oliver Wight

Guidelines for the Evaluation of Enterprise De-Duplication Solutions

Published By: Diligent Technologies     Published Date: Apr 11, 2008
This document is intended for the use of Enterprise1 Storage Professionals, focused on Data Protection — Backup, Restore,DR and Archive operations — who are interested in evaluating the potential impact of de-duplication technologies to their business. There is much hyperbole associated with de-duplication. The purpose of this document is to help readers distill the essence from the hype, as the basis for sound decision-making.
Tags : 
diligent, diligent technologies, deduplication, de-duplication, data center, datacenter, data protection, storage, data management, data deduplication
    
Diligent Technologies

Best Practices Using WS Business Modeler and Monitor

Published By: IBM     Published Date: Mar 28, 2008
The purpose of this Redbook is to provide guidance for the preparation of business process models, developed with the WebSphere® Business Modeler, which will ultimately be monitored by the WebSphere Business Monitor.
Tags : 
business analytics, business management, business metrics, business process management, web sphere, analytical applications
    
IBM

10 Reasons your RADIUS Server Needs a Refresh

Published By: Identity Engines     Published Date: Mar 24, 2008
For over a decade now, RADIUS servers have been a mainstay of dial-up and VPN access control. The rather inconspicuous RADIUS server, perhaps better known as that beige, general-purpose PC collecting dust in the corner of your data center, has proved sufficient for performing basic duties like validating passwords and granting network access.
Tags : 
radius, servers, idengines, id engines, identity engines, vpn, access control, auditing, authentication
    
Identity Engines

What Would Bond Do? A Spyware Survival Guide

Published By: CopiaTECH     Published Date: Mar 18, 2008
With the advancement of IT, technology has brought great improvements and new challenges. One such challenge is spyware: software designed to either capture your data or use your system for its own purposes. This paper discusses in detail various kinds of spyware and measures of protection against it.
Tags : 
copiatech, anti spam, anti spyware
    
CopiaTECH

The IT Service Catalog: Common Pitfalls and How to Avoid Them

Published By: newScale     Published Date: Jan 30, 2008
This white paper is intended to share some of those lessons learned and suggesting ways you can achieve success by avoiding the most common pitfalls. But before we talk about the typical mistakes in creating a Service Catalog, let’s briefly review its purpose.
Tags : 
service catalog, service management, newscale, customer service, itil, v.3, itil v3, itil v.3, itil, service catalog, service catalogue, itil service catalogue, it service catalogue, it management, best practices, sla
    
newScale

WebEx Support Center: Remote Support Security Overview

Published By: WebEx Communications     Published Date: Dec 14, 2007
The purpose of this document is to provide information on the data security features and functions available with WebEx Support Center Remote Support and inherent to the underlying WebEx communication infrastructure known as the WebEx MediaTone™ Network.
Tags : 
online meetings, web conference, online collaboration, elearning, online classroom, web training, webinar, online demos, online presentations, interactive selling, desktop support, remote support, helpdesk, webex, knowledge management, remote access, best practices, customer service, hipaa compliance, video conferencing
    
WebEx Communications

Driving A Single View of The Customer

Published By: Informatica     Published Date: Sep 28, 2007
The purpose of this white paper is to outline the importance of data quality with reference to single view of customer. In any organization SVC is the foundation of successful customer relationship management (CRM).
Tags : 
crm, data quality, data integrity, customer relationship, informatica, svc, data management, customer relationship management, data integration
    
Informatica

Microsoft Dynamics: Enabling Real-World SOA to Connect Your Business Vision with Software

Published By: Microsoft Dynamics     Published Date: Jul 23, 2007
This paper walks you through the tools and technologies that enable service orientation. The purpose of this paper is to share with you the value of Real-World SOA and a few success stories from our customers who have taken on Real-World SOA projects to support their business vision.
Tags : 
microsoft, microsoft dynamics, soa, service-oriented, service oriented architecture, web services, soap, simple object access protocol, dynamics ax, dynamics crm, aif, application integration framework, biztalk, sharepoint, business integration, business management, business process management, enterprise resource planning, enterprise software, collaboration
    
Microsoft Dynamics

Malicious Software Defense: Have We Moved Beyond Anti-Virus and Spyware Protection Software?

Published By: Perimeter     Published Date: Jul 17, 2007
With the decrease in the total number of viruses, some have theorized that the need for virus protection is becoming less and less necessary. The purpose of this paper is to help individuals understand the scope of the problem, and specific strategies available to combat this continually changing threat.
Tags : 
patch, ips, intrusion prevention, ids, intrusion defense, security policies, spam, spyware, malware, firewall, firewalls, virus, anti-virus, anti virus, perimeter, security software, perimeter esecurity, anti spam, anti spyware, internet security
    
Perimeter

What You Should Know About Email Marketing Deliverability

Published By: Gold Lasso     Published Date: Jul 13, 2007
Successful delivery is the driving force behind an effective email marketing campaign. The purpose of this paper is to provide a summary of terms (or jargon) related to e-mail deliverability, increase general knowledge of the concept, discuss delivery barriers and provide tactics to overcome these issues.
Tags : 
email delivery, deliverability, inbox, email marketing, enewsletter, email newsletter, e-newsletter, newsletter, blocking, filtering, gold lasso, marketing automation, sales & marketing software, sales automation
    
Gold Lasso

Stand Guard Against Accidental File Erasure

Published By: Diskeeper Corporation     Published Date: Jun 08, 2007
Sooner or later, disasters happen to every computer user. They delete important files, on purpose or accidentally. Or they update a document and save it, overwriting the original version. Download this paper to learn how to protect against accidental file erasure.
Tags : 
user error, file erased, erase file, erased file, recover file, file recovery, delete file, file deleted, restore file, productivity, pibcac, restore document, diskeeper, disk keeper, diskkeeper, backup and recovery, best practices, windows, document management, desktop management
    
Diskeeper Corporation

How to Create HTML for Modern Email Clients: a Guide for Designers and Marketers

Published By: ISYS     Published Date: Mar 26, 2007
Outlook, Hotmail, Yahoo!, AOL and more recently Gmail- the number of different email systems people use to read email in the UK market is seemingly endless. The purpose of this document is to help designers and marketers alike understand email HTML to help maximize your readability, deliverability and campaign effectiveness.
Tags : 
email marketing, newsletter design, deliverability, readability, enewsletter, e-newsletter design, adestra
    
ISYS

Got CRM? Small Business CRM Software Guide

Published By: Surado Solutions, Inc.     Published Date: Jan 29, 2007
The purpose of this whitepaper is to educate small business owners on what, why and how CRM can retain existing customers and help their business grow.
Tags : 
enterprise applications, customer relationship management, customer service, crm, crm software, surado
    
Surado Solutions, Inc.

How to Handle Spam Complaints

Published By: Gold Lasso     Published Date: Jan 20, 2007
Organizations using e-mail marketing as a part of their overall communications plan can utilize a variety of tactics to effectively manage and reduce spam complaints. The purpose of this white paper is to educate organizations and marketers on the basics of the CAN-SPAM act by weeding through the jargon.
Tags : 
spam, spam complaints, email communication, black list, white list, deliverability, email marketing, inbox, gold lasso
    
Gold Lasso

Driving A Single View of The Customer

Published By: Informatica     Published Date: Jan 16, 2007
The purpose of this white paper is to outline the importance of data quality with reference to single view of customer. In any organization SVC is the foundation of successful customer relationship management (CRM).
Tags : 
crm, data quality, data integrity, customer relationship
    
Informatica

Advanced Global Name Recognition Technology

Published By: IBM     Published Date: Dec 12, 2006
The purpose of this paper is to highlight the issues, requirements, and technologies available for automated advanced name recognition.
Tags : 
business process automation, data integration, data quality, information management, customer service, data management, enterprise software, contact management, marketing automation, crm, customer relationship management, ibm, identity management
    
IBM

Email as Intellectual Property: The Need for Suitable Management

Published By: Quocirca     Published Date: Nov 09, 2006
Growth in overall email volume (driven by more sophisticated spamming attacks), the need to filter out malware, and ensuring suitable content for purpose means that we now must re-address how we view email within the organization.
Tags : 
email security, it management, malware, email communications, internet security, anti spam, anti-spam, spam, antispam, quocirca, content delivery, information management
    
Quocirca
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.