scribe

Results 276 - 300 of 862Sort Results By: Published Date | Title | Company Name

5 Ways for Humanizing Content

Published By: Silverpop     Published Date: Sep 19, 2011
The most successful marketers will be those who stand out by infusing their content with a more human feel. Here are five tips and tactics guaranteed to strengthen your messages and delight your subscribers.
Tags : 
silverpop, humanizing content, personal attention, social media
    
Silverpop

Building the Next-Generation Data Center - A Detailed Guide

Published By: CA Virtualization/Automation     Published Date: Dec 22, 2010
This whitepaper: Describes a 4-stage virtualization maturity lifecycle experienced by many organizations and discusses in detail (using sample project plans) the tasks and capabilities required to succeed at each stage of the maturity lifecycle.
Tags : 
virtualization, virtual, virtualisation, agility, capex, opex, vmware, hypervisor, gartner, forrester, idc, analyst, server consolidation, private, hybrid, cloud, clouds, datacenter, datacenters, ca technologies
    
CA Virtualization/Automation

Managing the Virtualization Maturity Life

Published By: CA Virtualization/Automation     Published Date: May 25, 2011
This video describes that maturity lifecycle and the key management activities you will need to get past these tipping points, drive virtualization maturity and deliver virtualization success, at every stage of your virtualization lifecycle.
Tags : 
virtualization project, private cloud, virtualization video, virtualization lifecycle, lifecycle management, data center design, it spending, project management, cloud computing, data center design and management, virtualization, infrastructure, design and facilities
    
CA Virtualization/Automation

Virtualized iSCSI SANS: Flexible, Scalable Enterprise Storage for Virtual Infrastructures

Published By: Dell EqualLogic     Published Date: Sep 15, 2008
This white paper describes a virtualized infrastructure that applies storage and server virtualization technologies to cost-effectively achieve a flexible, high-performance, dynamic IT infrastructure that is simple to manage and scale.
Tags : 
dell equallogic, dell, equallogic, infrastructure, virtual, virtualization, virtual infrastructure, server virtualization
    
Dell EqualLogic

Master Data Management: Extracting Value from Your Most Important Intangible Asset.

Published By: SAP Inc.     Published Date: Jun 16, 2009
This SAP Insight explores the importance of master data and the barriers to achieving sound master data, describes the ideal master data management solution, and explains the value and benefits of effective management of master data.
Tags : 
sap, mdm, master data management, master data consolidation, master data harmonization, data management, service oriented architecture, international computing
    
SAP Inc.

The Centrify Suite enables you to extend Active Directory to your non-Microsoft platforms

Published By: Centrify Corporation     Published Date: Apr 05, 2010
This white paper examines the compelling business and technical case for centralizing administration in Microsoft's Active Directory, describes how Centrify's integrated architecture enables you to extend Active Directory to your non-Microsoft platforms, and describes the Centrify Suite's unique benefits.
Tags : 
heterogeneous systems, active directory, iam, identity and access management, audit, access control, authentication, compliance, sox, sarbanes-oxley, hipaa, glba, pci, cross-platform, auditing, logging, security, rbac, entitlements, privilege management
    
Centrify Corporation

How to Protect Your Business from the Coming Malware Storm

Published By: Webroot     Published Date: Jul 08, 2011
This paper describes the evolution and future of the online threat environment, and outlines the security, economy, performance, and control available to smaller businesses who act now to adopt Security as a Service.
Tags : 
webroot, saas, security as a service, computer security software, antispyware software, home internet security, enterprise internet security, solution center, information security, anti spyware, anti virus, application security, internet security, network security appliance
    
Webroot

Database Consolidation into Private Clouds

Published By: Oracle     Published Date: Apr 03, 2012
This white paper describes how to successfully consolidate your database onto a private cloud through several deployment models.
Tags : 
orace, service models, cloud management, 11g, database services, database consolidation, database development, data integration, data protection, data quality, data replication, database security, cloud computing, infrastructure
    
Oracle

7 Best Practices for Medical Accounts Receivable Management

Published By: CareCloud     Published Date: Aug 13, 2013
Installing your first practice management system or upgrading to a different system with the features described above is one major step toward improving your practice’s accounts receivable operations.
Tags : 
accounts receivable management, medical accounts, practice management systems, operations, billing
    
CareCloud

5 Recurring Revenue Growth Secrets

Published By: ServiceSource     Published Date: Nov 01, 2013
In this book we describe best practices honed through 13 years of experience and partnership with some of the leading technology companies in the world. These best practices will give you insight into three key areas: • Data management & renewal opportunity generation • Sales strategy & execution • Continuing the renewal cycle We hope you enjoy this book!
Tags : 
reducing customer churn, servicesource, recurring revenue, higher profit margins, drive innovation, drive performance, saas companies, competitive markets, less loyal customers, the cloud, profitable revenue stream, unique business process, technology platform, deliver real-time, fact-based plan, renewal ready data, accelerate analytics, channel partners, science of renewals, application performance management
    
ServiceSource

ICD-10: A Dose of Reality, a Plan for Success

Published By: GE Healthcare     Published Date: Mar 04, 2014
Why prepare now for ICD-10? While the October 1, 2014 deadline for compliance may seem to be in the distant future, an informative whitepaper by GE Healthcare describes the importance of advance planning and outlines a plan for success.
Tags : 
ge healthcare, icd-10, service delivery, billing, claims processing, reimbursement, project management, emr, patient management, healthcare it
    
GE Healthcare

Brilliant Advertising

Published By: Adobe     Published Date: Mar 03, 2017
Programmatic advertising is full of complex patterns. Very similar to patterns in nature. Our guide, Brilliant Advertising, shows how fractals in nature perfectly describe the complexity of programmatic ads and pave the way for how you should approach creative assets. Read the guide to learn five ways to overcome challenges to programmatic ads, including how to: • Bring marketers, creatives, IT, and data analysts together to ensure success • Save money and time while improving engagement and conversion • Customize multiple versions of one campaign and serve ads with strong creative in real time
Tags : 
adobe media optimizer, programmatic advertising, engagement and conversion, application integration
    
Adobe

Five Ways Box Makes SharePoint Better

Published By: Box     Published Date: Jun 11, 2014
Box, the leader in Enterprise Content Collaboration, helps customers extend their SharePoint environments, quickly and easily meeting employees' needs for mobile productivity and secure external sharing with customers and partners. This whitepaper describes the top five ways that businesses are adding mobility and collaboration to SharePoint with Box.
Tags : 
box, sharepoint, mobility, collaboration, enterprise content, mobile productivity, mobile support, content management, networking, it management
    
Box

EMV Could Increase Your E-Commerce Fraud Risk

Published By: Affirm     Published Date: Jan 22, 2016
You thought EMV was supposed to help eliminate fraud, right? While it will reduce card-present fraud, there is a high likelihood that card-not-present (i.e. e-commerce) fraud will increase now that EMV has been implemented in the U.S.. In fact, experts have predicted an increase in online fraud similar to what was seen after the European rollout of EMV. As a merchant, are you prepared for such an increase? This article describes the EMV implementation and gives actionable tips for how online retailers should prepare in order to avoid a potential onslaught of fraud.
Tags : 
affirm, ecommerce, fraud, risk, emv, online retail, enterprise applications, business technology
    
Affirm

Cure Your 20th Century Data Hangover

Published By: GrowthIntel     Published Date: Feb 16, 2016
Business development and marketing programs have a tendency to underwhelm when it comes to actual results. As a result, we’re bombarded with SalesTech and MarTech apps endeavouring to plug the leaks. But these tools rarely tackle the core issues behind your lacklustre results. What’s needed is a fundamental change to your go-to-market approach. This ebook shows you what that change could look like, and describes how to make it happen.
Tags : 
marketing, business development, b2b, sales, business practices, business intelligence, project management, service management, data center design and management
    
GrowthIntel

Considerations for Building a Healthcare Sector Private Optical Network.

Published By: Ciena     Published Date: Nov 15, 2016
"In healthcare, as the trends supporting eHealth accelerate, the need for scalable, reliable, and secure network infrastructures will only grow. This white paper describes the key factors and technologies to consider when building a private network for healthcare sector enterprises, including: Transport Network Equipment Outside Fiber Plant Converged Platforms Reliability, Redundancy, and Protection Reconfigurable Networks Management Software Security Services, Operation, Program Management, and Maintenance Download our white paper to learn more."
Tags : 
packet networking, packet networking portfolio, packet optical hie network, packet-optical transport, patient data security, private and hybrid cloud, private optical network for healthcare, private optical network for hospitals, rapidly growing bandwidth, real-time telesurgery video and data, remote imaging and diagnosis, simplify healthcare network operations, telehealth and telemedicine, telesurgery and video diagnosis, transfer massive imaging files, transmitting full-body mri images, transmitting genome data, transport network equipment, value-based care models, wan and lan convergence reduces
    
Ciena

Managing Access to Legacy Web Applications with Okta

Published By: OKTA     Published Date: Sep 26, 2017
Traditional web applications pre-date modern standards like SAML and OpenIDConnect, so they often use legacy authentication methods to grant end users access. Historically, providing Single Sign-On and centralized access management for end users across these legacy applications required a Web Access Management, or WAM, product. These on-premises software tools could be expensive to maintain and complex to deploy. Now, modern identity providers like Okta in conjunction with best-of-breed network management technologies offer a better way. This white paper describes how web applications that lack modern standard support can be integrated into a cloud-based Identity-as-a-service architecture.
Tags : 
    
OKTA

Breakthrough Security and Compliance Practices for the Digital Enterprise

Published By: BMC ASEAN     Published Date: Dec 18, 2018
Today’s IT environments are so dynamic and complex that traditional manual administration makes it virtually impossible to keep pace with changing business opportunities and challenges, such as scaling to support new applications and users. Manual administration is not just unsustainable—it’s dangerous. Delays in responding to security threats and compliance issues can have devastating effects: • Security breaches • Failed audits • Financial losses • Loss of customers and reputation • Other serious business consequences To sustain a high level of security and compliance, IT teams must implement a comprehensive, aggressive automation strategy that establishes and tracks key performance indicators. Automation helps to optimize resources, increase efficiencies, lower costs and improve quality of service. This white paper describes principles and best practices for implementing automation as a strategic asset in the ongoing effort to achieve security and compliance excellence in a dynamic
Tags : 
    
BMC ASEAN

Robotic Process Automation: Adding to the Process Transformation Toolkit

Published By: Blue Prism     Published Date: Mar 28, 2019
Robotic process automation describes the use of technology to automate tasks that are traditionally done by a human being. The technology itself mimics an end user by simulating user actions such as navigating within an application or entering data into forms according to a set of rules. RPA is often used to automate routine administrative tasks that typically require a human being to interact with multiple systems, but RPA technology is evolving to support the automation of increasingly sophisticated processes at scale within enterprise architectures rather than on the desktop. Over the past two years, RPA has been adopted by a number of business process outsourcing (BPO) providers and a growing number of end-user organizations are now deploying the technology themselves to create “virtual workforces” of robotic workers.
Tags : 
    
Blue Prism

Supporting the Navy & USMC with Next-Gen Mobile Devices

Published By: Panasonic     Published Date: Apr 23, 2019
Technology is critical to mission success. However, hostile physical environments and specialized use cases put more stringent demands on mobile devices being used by the U.S. Navy and U.S. Marine Corp (USMC). Robert Murphy describes the unique requirements for these programs.
Tags : 
    
Panasonic

Authentication at the Network’s Edge: The Federal Government’s Journey to Secure Mobile Devices

Published By: Panasonic     Published Date: Apr 23, 2019
Mobility is critical to government productivity, but mobile data and devices present attractive targets to cybercriminals seeking to exploit vulnerabilities across the spectrum. Federal agencies are no strangers to cybersecurity attacks, and several recent high-profile breaches involving mobile devices demonstrate ongoing vulnerabilities in government’s expanding network of endpoints. This issue brief describes what can be done to protect devices, data and networks, including multi-factor authentication to authorization controls and user education.
Tags : 
    
Panasonic

Power and Cooling for VoIP and IP Telephony Applications

Published By: Schneider Electric     Published Date: Mar 03, 2015
This paper explains how to plan for VoIP power and cooling needs, and describes simple, fast, reliable, and cost effective strategies for upgrading old facilities and building new facilities.
Tags : 
voip power and cooling needs, building new facilities, upgrading old facilities, ip telephony applications, business technology, telecom, design and facilities, power and cooling, infrastructure management
    
Schneider Electric

Cooling Strategies for IT Wiring Closets and Small Rooms

Published By: Schneider Electric     Published Date: Jun 04, 2015
This paper describes the science and practical application of an improved method for the specification of cooling for wiring closets.
Tags : 
cooling, cooling strategies, cooling for wiring closets, wiring closets. cooling solution
    
Schneider Electric

Demystifying Real-Time Intelligence

Published By: Aprimo     Published Date: May 01, 2012
The real-time buzzword is back. Marketers, vendors, and service providers use this term in a variety of scenarios to describe technologies, analytics, customer service, and processes. In this report, Forrester outlines how firms should evaluate the need to build an agile and real-time environment using a combination of analytics, technology, and business processes.
Tags : 
aprimo, marketing, customer relations, crm, customer satisfaction, customer data, marketing strategy
    
Aprimo

The value of performance metrics in managing IT service

Published By: Arcserve     Published Date: Jul 23, 2010
This white paper describes an approach that provides these performance metrics for specific IT stakeholders, all drawn from data collection and analytics that support a holistic, integrated approach to optimizing IT service delivery.
Tags : 
ca technologies, performance metric, it service, monitoring, productivity, customer retention, service assurance, network performance, application performance management, business activity monitoring, business metrics, customer satisfaction, quality assurance
    
Arcserve
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.