bre

Results 1 - 25 of 1976Sort Results By: Published Date | Title | Company Name

Microsoft Exchange Server 2007: Migration Made Easy

Published By: 123Together     Published Date: Dec 04, 2008
Microsoft Exchange Server has been a crucial technological breakthrough in advanced corporate communication systems. Companies who utilize an enterprise-class email server like Exchange believe that email is mission critical, and value the productivity it enables. But an in-house migration to Exchange 2007 from an earlier version of Exchange or another email program will not be an easy task. Complexity, time and cost issues loom large over the IT department and are causing IT directors to search for an alternative solution.
Tags : 
123together, it strategies, contact management, email, economy, stability, collaboration, green it, outsourcing, microsoft exchange, hosted exchange, migration, osterman, collaboration, mobile services, business management, collaborative commerce, messaging, colocation and web hosting
    
123Together

10 Unexpected Employee Performance Management Trends To Watch For In 2019

Published By: 15five     Published Date: Jul 17, 2019
The best practices for managing employees evolves at a break-neck pace. In 2019, the key distinction for performance management strategies is to focus on the whole employee. This ranges from physical, emotional, and mental well-being to facilitating their personal and professional development. To help you gain a deeper understanding of new trends, we assembled this list of top trends to help you create or refine your employee performance management strategy this year, including: • Developing trust with your employees • The value of people analytics • Individualized support • Learning & development • Diversity & inclusion
Tags : 
    
15five

eBook: Additive Fertigung von Kunststoffteilen für Ihre Produktionsumgebung

Published By: 3D Systems     Published Date: Feb 28, 2019
Der 3D-Druck begann als Prototyping-Technologie in den 1980er Jahren und hat sich seitdem rasant weiterentwickelt. Die stetigen Entwicklungen der letzten Jahrzehnte haben den 3D-Druck (auch als „Additive Fertigung“ bezeichnet) in der gesamten Produktionsumgebung zu einer praktikablen und kostengünstigen Technologie werden lassen: von der Prototypenentwicklung bis hin zur 3D-Direktherstellung. Unternehmen, die den 3D-Druck nutzen, können aufgrund der Fortschritte bei Dauer, Kosten und Fähigkeiten, die der 3D-Druck ermöglicht, eine Führungsposition in ihrer Branche erreichen und festigen. Dieses E-Book gibt einen Überblick über die Weiterentwicklungen bei den 3D-Drucktechnologien und Materialien von 3D Systems im Bereich der additiven Kunststofffertigung, die die Bandbreite der Einsatzmöglichkeiten in der Produktionsanwendung vergrößern.
Tags : 
    
3D Systems

Logiciel de fabrication additive en métal

Published By: 3D Systems     Published Date: Feb 28, 2019
L'impression 3D en métal est en train de révolutionner le processus de fabrication. Parmi les avantages uniques liés à la fabrication additive (AM) figurent entre autres la réalisation de formes complexes, des propriétés fonctionnelles améliorées et un poids réduit. Bien que de nombreuses informations soient disponibles sur les techniques, les matériaux et le matériel d’impression, un élément essentiel est rarement mentionné : la nécessité d’une solution logicielle intégrée pour la fabrication additive en métal. Il ne suffit pas de disposer d'un modèle CAO et d'une bonne imprimante pour réussir une impression. Le logiciel de fabrication additive en métal gère toutes les opérations de préparation et d'optimisation nécessaires pour qu'une pièce imprimée soit conforme aux spécifications du modèle CAO. Cet ebook offre un aperçu du processus de préparation et optimisation pour la fabrication additive, explique l’importance du logiciel pour la rentabilité d’une activité de fabrication additi
Tags : 
    
3D Systems

La fonderie passe au numérique

Published By: 3D Systems     Published Date: May 15, 2019
Le moulage à modèle perdu est une méthode de fabrication précise qui apporte de la valeur ajoutée dans tous les secteurs, des pièces mécaniques, automobiles et aérospatiales aux traitements dentaires, bijoux et sculptures complexes. Pendant des siècles, les pièces coulées lisses et précises ont été obtenues au prix de coûts élevés et de longs délais de modèles de moulage. À présent, l'évolution des pièces s'accélère de manière spectaculaire dans de nombreux secteurs, ce qui se traduit par des cycles de vie des produits plus courts et des volumes de pièces moulées plus faibles entre les cycles. L'attente de l'outillage pour les pièces obsolètes destinées aux avions vieillissants entraîne également des retards dans leur réparation, ce qui coûte du temps et de l'argent. La demande d'une production en fonderie plus rapide augmente dans tous les secteurs et les fonderies doivent être prêtes à réagir.
Tags : 
    
3D Systems

Empower Your Business with Continuous Communications

Published By: 8x8 Inc.     Published Date: Feb 13, 2017
Enterprise conferencing and collaboration technologies today stand at an exciting crossroads. Solutions that were once considered consumer technologies are moving into the enterprise. Never has this trend been more pronounced than now, as consumerization of IT and mobile device proliferation increasingly break down the walls between business and consumer use. As a result, enterprise solutions must become increasingly simpler to deploy and more intuitive to use. At the same time they must deliver a secure and seamless communications experience. As the worlds of consumer and business communications blend, walking the line between the two has become top of mind for users and IT decision makers alike. Businesses must capitalize on these tectonic shifts in user preferences by deploying agile communications that today’s mobile users need in order to collaborate effectively wherever they are.
Tags : 
continuous communication, consumer technologies, mobile device proliferation
    
8x8 Inc.

Winter is Not Coming: Eliminating Data Silos and Ending Information Hoarding

Published By: Aberdeen Group     Published Date: Nov 13, 2015
This report examines the pressing need to break down data silos due to the damage they cause to analytical initiatives and user engagement. Read this report to find out more.
Tags : 
customer acquisition, marketing leads, marketing challenges, marketing messages, contact management, data science, demand generation, email marketing, inbound marketing, lead generation, lead intelligence, market research, integrated marketing, lead nurturing, marketing analytics
    
Aberdeen Group

Winter is Not Coming: Eliminating Data Silos and Ending Information Hoarding

Published By: Aberdeen Group     Published Date: Nov 23, 2015
This report examines the pressing need to break down data silos due to the damage they cause to analytical initiatives and user engagement. Read this report to find out more.
Tags : 
customer acquisition, marketing leads, marketing challenges, marketing messages, contact management, data science, demand generation, email marketing, inbound marketing, lead generation, lead intelligence, market research, integrated marketing, lead nurturing, marketing analytics
    
Aberdeen Group

Intelligent Client-Side Defense for Stolen Laptops

Published By: Absolute Software     Published Date: May 08, 2009
Keeping data secure in a mobile environment is not just a daunting challenge, but a critical requirement. Loss and theft of computers leaves sensitive data vulnerable, creating serious financial and legal risks.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security, hacker detection, identity management
    
Absolute Software

The Human Factor in Laptop Encryption

Published By: Absolute Software     Published Date: May 08, 2009
In this whitepaper, the Ponemon Institute shares its findings on the use of encryption on laptops by corporate employees. It shows that many employees may not be taking the most basic precautions to secure their company laptop.
Tags : 
absolute, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, endpoint security, portable computer, end user, data regulation, encryption
    
Absolute Software

So, You're Responsible for Managing Laptops

Published By: Absolute Software     Published Date: Jan 29, 2008
Does your PC lifecycle management (PCLM) reflect the issues associated with mobile users? Many organizations face expensive inefficiencies by not managing mobile assets effectively. These inefficiencies include dispersed and manual data collection, and inventory tools that are dependent on a connection to the company network.
Tags : 
absolute, intel, laptop, saas, managing laptops, pclm, computrace, absolute software, it asset management, remote data delete, geolocation tracking, theft recovery, service guarantee, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm
    
Absolute Software

Proactive Patch Management

Published By: Absolute Software     Published Date: Jan 27, 2010
Deploying patches in a timely fashion soon after they become available helps secure the OS and prevent the majority of data breaches. However, many computer systems are often not patched for months or not at all.
Tags : 
computrace, absolute software, it asset management, remote data delete, geolocation tracking, theft recovery, service guarantee, application integration, application performance management, business activity monitoring, business integration, business management, business process automation, it spending, product lifecycle management
    
Absolute Software

Technology Brief: Absolute Software Expands Lifecycle Management

Published By: Absolute Software     Published Date: Feb 04, 2010
Absolute Software has announced it has completed its acquisition of the LANrev systems management platform. Absolute plans to integrate LANrev's popular Mac and PC lifecycle configuration management technology with its flagship security and asset management suite, Computrace.
Tags : 
absolute, laptop, saas, lifecycle management, enterprise management, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, endpoint security, portable computer, end user
    
Absolute Software

Demo: Absolute Manage

Published By: Absolute Software     Published Date: Sep 06, 2011
Let us walk you through Absolute Manage's capabilities in this 10-minute demo; see how Absolute Manage can help you centrally manage both Mac and PCs.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security, application security, disaster recovery
    
Absolute Software

Grappling Growth: How IT Can Thrive in a Fast-Growing Organization

Published By: Absolute Software     Published Date: Sep 06, 2011
Watch this webcast as Support Manager for La Jolla Institute for Allergy & Immunology relates how he successfully frees up 30 IT support hours a week.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security, access control, application security
    
Absolute Software

Webcast: iPads and iPhones Go to Work: The Essential Guide for IT Support

Published By: Absolute Software     Published Date: Sep 06, 2011
Vice President and Research Fellow for Aberdeen Group, shares trends, best practices and actionable insight on management of iOS mobile devices.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security, access control, application security
    
Absolute Software

Webcast: The Growing Threat Landscape: Why your IT Security Strategy Needs to Evolve

Published By: Absolute Software     Published Date: Sep 06, 2011
Forrester Research and Absolute Software discuss the importance for IT to create a "layered approach" for endpoint security and management
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security, access control, application security
    
Absolute Software

Demo: Absolute Manage Mobile Device Management

Published By: Absolute Software     Published Date: Sep 06, 2011
See how Absolute Manage Mobile Device Management allows organizations to remotely manage their Apple® iOS devices (iPhone®, iPod® Touch, iPadT).
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security, access control, application security
    
Absolute Software

Endpoint Security - Data Protection for IT, Freedom for Laptop Users

Published By: Absolute Software     Published Date: Sep 09, 2011
Only the introduction of end-point security - the ability to force mobile computers to secure themselves - offers end-users the freedom to embrace mobility and IT departments robust protection for sensitive information.
Tags : 
absolute, end-point security, data breach protection, authentication, organizational policy, encryption, asset management, computrace, laptop, security management, security policies, data protection, database security, vulnerability management
    
Absolute Software

Insiders are Still the Weakest Link in your Data Security Chain

Published By: Absolute Software     Published Date: May 31, 2016
With companies embracing mobility to maintain competitive advantage in the digital era, information security threats have increased exponentially. Userfriendly technologies such as mobile devices, mobile apps, and cloud storage are often hacker-friendly too, creating opportunities for cybercriminals to covertly infiltrate company data. This opens the door to data loss, reputational damage, loss of proprietary information – not to mention the associated regulatory penalties and potential legal fees. IT bears the brunt of responsibility for information security, yet according to Forrester, internal incidents top the list of security breach causes in 2014.
Tags : 
mobility, competitive advantage, best practices, mobile devices, mobile applications, mobile computing, mobile data systems, wireless application software, content management system
    
Absolute Software

Achieving HIPAA Compliance

Published By: Absolute Software     Published Date: May 31, 2016
The OCR conducts HIPAA audits of covered entities and their business associates and subcontractors. If HIPAA violations are discovered during these audits, the OCR will implement significant penalties. Additionally, since OCR is posting the details of every breach affecting 500 or more individuals on a public website1 , the organizations involved have become susceptible to class-action lawsuits.
Tags : 
best practices, business analytics, productivity, business intelligence, business management
    
Absolute Software

The Cost of a Data Breach: Healthcare Settlements Involving Lost or Stolen Devices

Published By: Absolute Software     Published Date: May 31, 2016
IT leaders today are reinventing their infrastructure to support a mobile workforce and a complex array of connected devices. Against this backdrop of mobility and connectivity, Healthcare IT is tasked with meeting compliance challenges in an intricate and transformational regulatory environment. With a host of new data protection regulations and increasingly high settlement fees for data breaches, data security has never been more important to Healthcare organizations
Tags : 
mobility, mobile computing, best practices, data security, security management, business analytics, business integration, business intelligence
    
Absolute Software

Unleash Employee Success

Published By: Achievers     Published Date: Jan 17, 2014
Download Achievers white paper, Unleash Employee Success to stay abreast of changes in the kinds of recognition that employees expect and that motivate them. Based on real-world experience, this paper will explain how you can use recognition to engage and motivate these generations in your workforce.
Tags : 
employee success, employee recognition, employee engagement, human resources
    
Achievers

Email Raises Awareness for Susan G. Komen Breast Cancer Fundraiser

Published By: AcquireWeb     Published Date: Apr 07, 2008
This case study, published by DM News in July 2007, explores how email helped top-ranked ad agency Radarworks succeed in a changing market in developing a marketing campaign using a mixture of media channels with a set budget to maximize brand and event awareness and drive participation, and be able to measure the ROI from each marketing channel.
Tags : 
acquireweb, complete campaign, complete, multi-faceted, multichannel, multi-channel, integrated marketing, e-mail, acquisition e-mail, lead generation, e-mail marketing, e-mail appending, acquirelocal, local marketing, local store marketing, restaurant marketing, franchise marketing, acquisition marketing
    
AcquireWeb

A 5 Step Breakdown: Embedding Reports, Dashboards and Analytics

Published By: Actuate     Published Date: May 19, 2014
A white paper providing a breakdown in five steps of embedding reports, dashboards and analytics.
Tags : 
embedding reports, dashboards, analytics, saas, actuate, software application providers, software development, application integration, application performance management, best practices, enterprise software
    
Actuate
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.