step by step

Results 101 - 125 of 173Sort Results By: Published Date | Title | Company Name

Reap the Benefits of Application and Server Load Balancing in Just 7 Easy Steps

Published By: Fortinet     Published Date: Nov 11, 2013
This whitepaper provides a step-by-step guide showing how easy it is to implement application and server load balancing using a Coyote Point Equalizer ADC.
Tags : 
load balancing, server load balancing, hardware load balancing, application delivery controller, adc, server optimization, coyote point, fortinet, kemp, a10, radware, enterprise applications
    
Fortinet

Seven steps to achieving better requirements engineering in your organization

Published By: IBM     Published Date: Jul 23, 2009
Companies that successfully introduce a new requirements-engineering process not only change their process and technology but also change their thinking. While improving your requirements management and analysis practices, this step-by-step guide can help you accelerate change and process acceptance across your organization. Learn more today!
Tags : 
ibm, telelogic, doors, enterprise applications, business management, business process management, customer relationship management
    
IBM

3 Things to do Before, During, and After a Webinar

Published By: GoToWebinar     Published Date: Oct 08, 2013
There are a few simple things you can do before, during and after a webinar that will leave your attendees talking for days. If you want to have a lively event, get the conversation started early. This brief provides an easy step-by-step guide that will make your online event more engaging, valuable and effective.
Tags : 
citirx, whitepaper, go to webinar, citrix, webinar preparation, productivity, elearning
    
GoToWebinar

6 Steps to Power Advocates to Create Authentic Brand Content

Published By: SocialChorus     Published Date: Oct 06, 2014
Download this step-by-step guide to filling your content gap.
Tags : 
socialchorus, advocate marketing, brand content creation, content creation, advocate content, brand ambassadors, roi, brand awareness, marketing campaigns
    
SocialChorus

How Mature is Your Cyber-Security Risk Management?

Published By: IBM     Published Date: Nov 05, 2014
A security framework is a step-by-step approach to helping an organization move from meeting its basic security requirements to providing a fully security-optimized environment. Five types of frameworks address progressive steps in security maturity as needs and capabilities change.
Tags : 
ibm, cyber security, risk management, business threats, security framework, business protection, cyber protection, security framework, protection, security, it management, business intelligence, business management
    
IBM

Managing the Social Media Mix

Published By: Oracle     Published Date: Jan 16, 2014
This white paper provides a step-by-step guide for determining your strategy—and the proper mix of marketing channels—in social media.
Tags : 
marketing mix, social media marketing, 4p’s, marketing channels, digital marketing, internet marketing, marketing strategy, brand strategy
    
Oracle

Building an Inbound Website: The Complete eBook

Published By: Ektron     Published Date: Jun 03, 2014
Learn the step-by-step process to create a strategic, inbound website
Tags : 
ektron, website, marketing strategies, seo rankings, roi, inbound website
    
Ektron

The Inbound Website: Getting Found with SEO & Social

Published By: Ektron     Published Date: Jun 03, 2014
Learn the step-by-step process of creating an inbound website with SEO & social strategies
Tags : 
ektron, seo, social media, roi, website, marketing strategy
    
Ektron

Your business is at risk from a spear-phishing attack. See how it will take place – step by step.

Published By: Mimecast     Published Date: Jun 25, 2015
In this whitepaper, Countdown to Compromise: The Timeline of a Spear-Phishing Attack on Your Organization, see exactly what happens before, during and after an attack, all the mistakes that made you vulnerable, and how you can get ready for it.
Tags : 
mimecast, social media, spear-phishing, data breach, personalized emails, network defenses, security, it management, knowledge management, data management
    
Mimecast

Your business is at risk from a spear-phishing attack. See how it will take place – step by step.

Published By: Mimecast     Published Date: Aug 19, 2015
A spear-phishing attack could bring your company to its knees – today. For all you know, you may already be under attack. That could result in a data breach that lands your company in the glare of the news cameras – and in hot water with your customers, partners and investors.
Tags : 
mimecast, social media, spear-phishing, data breach, personalized emails, network defenses, security, it management, knowledge management, data management
    
Mimecast

5 Steps To A Successful Data Center Consolidation

Published By: Schneider Electric     Published Date: Aug 15, 2017
The reference guide lays out for data center managers a step-by step approach to data center consolidation. By breaking down the process into clear and identifiable actions – all of which are covered in the sections below – a data center consolidation becomes much more manageable, and the odds of its success much higher.
Tags : 
assessment, strategical planning, design, commission, operation, additional resources, schneider electric
    
Schneider Electric

E-Book: The Step-by-Step Guide to Creating Your Employee Engagement Pulse Program

Published By: Glint     Published Date: Sep 20, 2017
The employee engagement survey can be a powerful force for consistent, positive change. This guide provides a more insightful and actionable approach to employee engagement, including a framework for designing and implementing pulse programs. The ideas inside come from decades of engagement survey and organizational development (OD) experience.
Tags : 
employee engagement software, team engagement software, employee engagement initiatives, impact of employee engagement, employee engagement software, drivers of employee engagement
    
Glint

Data Quality Strategy: A Step-by-Step Approach

Published By: SAP     Published Date: Mar 10, 2009
Learn about the importance of having a data quality strategy and setting the overall goals. The six factors of data are also explained in detail and how to tie it together for implementation.
Tags : 
sap, data quality, strategy, project management, erp, enterprise resource planning, enterprise software
    
SAP

Creating an Email Marketing Strategy

Published By: Benchmark Email     Published Date: Jul 12, 2012
How do you find your audience? How do you reach them? Who's after your business and what is your ultimate goal? When you've decided to commit to email marketing, Benchmark is ready with a step by step strategy guide.
Tags : 
benchmark, marketing, email, email marketing, bloggers, business, marketing strategy
    
Benchmark Email

Developing a Business Case for Data Center Transformation Through ITIL Best Practices & Automation

Published By: Evergreen Systems, Inc.     Published Date: Dec 16, 2008
This comprehensive white paper applies automation and ITIL best practices to the data center and reviews current industry trends, server automation energy usage issues and a variety of optimization strategies for data center improvement.  The effects of virtualization are explored in-depth.  Includes detailed sections on increasing operational efficiency using workflow analysis, automating and optimizing server change management, reducing infrastructure complexity and developing security, disaster recovery and business continuity procedures.  Step by step instructions for developing metrics and a business case to justify data center and server automation are included.
Tags : 
evergreen system, data center automation, data center automation manager, network automation, server automation, server virtualization, itil, data center optimization, roi, server management, data storage, server storage, it management, enterprise applications, storage, data management, storage management, return on investment, service management, data center design and management
    
Evergreen Systems, Inc.

The Definitive Guide to Employee Advocate Marketing: A Seven Step Guide to Ensure Success

Published By: SocialChorus     Published Date: Jun 06, 2014
Employee-shared content increases reach 10x and engagement 8x. That’s why leading brands are launching Employee Advocate Marketing programs to drive the marketing metrics they care about most, including increased awareness, social engagement and new customers. But what are the steps they took to launch and maintain a successful program? Download this guide and step-by-step checklist for everything you need to know to launch an employee Advocate Marketing program. Download the guide and checklist to learn: • The steps to launch an employee Advocate Marketing program • Proven best practices to grow your program • The recommended timeline and steps to ensure the program drives your goals
Tags : 
employee advocacy, employee advocates, employee advocate marketing, advocate marketing
    
SocialChorus

Cisco UCS Integrated Infrastructure for SAP HANA Design Guide

Published By: Cisco     Published Date: Sep 08, 2016
This white paper provides a step by step guide on making better business decisions.
Tags : 
    
Cisco

Setting Up Google Analytics Enhanced Ecommerce Using Google Tag Manager: A Step by Step Guide

Published By: MoreVisibility     Published Date: Dec 10, 2015
This guide covers a step-by-step outline to help you deploy Google Analytics Enhanced Ecommerce via Google Tag Manager.
Tags : 
morevisibility, google, google tag manager, clicks, promotions, sales automation, collaborative commerce, customer experience management, messaging
    
MoreVisibility

PCI DSS Compliance with Tripwire

Published By: Tripwire     Published Date: Jul 05, 2007
Find out step-by-step what it takes to become compliant with the Payment Card Industry (PCI) Data Security Standard (DSS), and how Tripwire can help your company achieve and maintain PCI compliance.
Tags : 
pci, pci compliance, payment card, credit card, credit cards, payment card industry, cisp, privacy, customer privacy, consumer privacy, vulnerability, consumer data, data protection, customer data, tripwire, compliance, pci, pci dss, database security, authentication
    
Tripwire

Answering The Call: 5 Best Practice Steps for B2B and B2C Convergence

Published By: IBM     Published Date: Mar 03, 2016
A step-by-step approach to streamline and reengineer your B2B and B2C fulfillment processes.
Tags : 
ibm, b2b, b2c, aberdeen group, convergence
    
IBM

Defining Your Audience: A Step-by-Step Guide to Creating Buyer Personas

Published By: Bulldog Solutions     Published Date: Jul 20, 2009
If you’re under increasing pressure to be as efficient as possible with your marketing spend, you need to avoid wasting resources on strategies and messages targeted at the wrong audience. This white paper is a step-by-step guide on creating buyer personas to help focus your marketing efforts.
Tags : 
audience, bds, bulldog solutions, client list, pain points, motivators, validation, map, mapping, audience development, resources, buyer personas, sales development, sales leads, in-person environment, audience segmentation, promotion planning, audience, b2b, btob
    
Bulldog Solutions

How to Perform Compensation Benchmarking and Set Salary Ranges

Published By: Payscale, Inc     Published Date: Jan 16, 2014
Step-by-step guide to salary benchmarking and setting salary ranges. Learn how to select your data sources, determine pay grades, handle range-busters, and more.
Tags : 
salary benchmarking, salary range, pay grades, compensation philosophy, compensation strategy
    
Payscale, Inc

Architecting a High Performance Storage System

Published By: Intel     Published Date: Jan 06, 2014
This paper describes a step-by-step approach to designing such a system and presents an iterative methodology that applies at both the component level and the system level.
Tags : 
intel, hpc, high performance computing, storage, high performance storage, storage management, architecture, infrastructure, network architecture, servers, backup and recovery, ip storage, storage virtualization, server virtualization, data center design and management
    
Intel

UCS Design Guide

Published By: Cisco     Published Date: Jun 02, 2015
Start planning your deployment of the Cisco Unified Computing System (Cisco UCS), powered by the Intel® Xeon® processor, with this useful, step-by-step design guide.
Tags : 
cisco, ucs, design, guide, data center, server, virtualization, cloud computing, infrastructure, design and facilities
    
Cisco

7 Best Practices for Buying Colocation: Choosing the Best Provider for YOUR Business Needs

Published By: Cobalt Networks     Published Date: Jan 23, 2015
7 Best Practices for Buying Colocation is a step-by-step handbook for organizations actively selecting a colocation provider. It offers tips and tricks from experienced colocation buyers to help you narrow down your choices, see through the sales pitches, and select the colocation vendor who will best suit your needs.
Tags : 
buying colocation, business needs, experience buyers, sales pitches, enterprise applications
    
Cobalt Networks
Start   Previous    1 2 3 4 5 6 7    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.