design

Results 1876 - 1900 of 1992Sort Results By: Published Date | Title | Company Name

Wedding site "The Pros" Increases Sales by 80%+ and Revenue per Visit by 70%+

Published By: TRUSTe     Published Date: Jun 02, 2010
For Ecommerce and Direct Marketing professionals: As a result of displaying the TRUSTe seal, The Pros saw an enormous 84% lift in Purchases by those landing on the page with the TRUSTe seal, and a 72% increase in Revenue per Visitor lift. See how you can mirror these results today.
Tags : 
truste, suresource, ecommerce, the pros, landing pages, website development, design, a/b, optimization, user experience
    
TRUSTe

Privacy Assessment Overview

Published By: TRUSTe     Published Date: Jun 02, 2010
Ecommerce, Web Development and Design, and Direct Marketing professionals can take advantage of a new program designed to gauge your organization's privacy level. Thousands of companies leave the intricacies of privacy management to TRUSTe, 13 year old leader in online privacy. Gain an overview of the program today.
Tags : 
truste, ecommerce, privacy, security, coppa, transactions, a/b, optimization, user experience
    
TRUSTe

Building a Trusted Mobile Strategy: Increase User Trust to Further your Mobile Platform Strategy

Published By: TRUSTe     Published Date: Dec 08, 2010
This paper outlines for businesses the mobile landscape and introduces best design and privacy practices for mobile websites and apps, location-aware technologies, and mobile advertising.
Tags : 
truste, mobile platform strategy, design, privacy and security, mobile advertising, website, apps
    
TRUSTe

Ecommerce Professionals: Reduce Purchase Delay and Decrease Cart Abandonment

Published By: TRUSTe     Published Date: Dec 08, 2010
Shirley Tan, Founder of AmericanBridal.com - subsidiary of TheKnot.com, details her success building the highly-successful AmericanBridal.com Ecommerce business including causes and remedies for purchase delay, tips about website design and purchase flow to engender trust in your web visitors, how to increase cart conversion.
Tags : 
truste, ecommerce, purchase delay, cart abandonment, americanbridal, website design, purchase flow, trust and security, cart conversion
    
TRUSTe

Top 4 Secrets to Building Instant Trust Online

Published By: TRUSTe     Published Date: Dec 08, 2010
In this webinar, nationally-recognized landing page optimization expert Tim Ash and Andreas Ryuta Stenzel, Senior Manager of Online Marketing at TRUSTe, lay out the top 4 secrets to building instant trust online.
Tags : 
truste, trust and security, landing page optimization, online marketing, website design, conversion rates
    
TRUSTe

Introduction to AWS IaaS Solutions: Deploying and Managing Amazon Web Services

Published By: Turbonomic     Published Date: Nov 27, 2018
Want to learn how to design and deploy infrastructure-as-a-service (IaaS) solutions in the cloud using Amazon Web Services? This ebook will take you through practical examples, design patterns, and tips to help you confidently build a working IaaS solution. Download to find out: The key components of the AWS public cloud platform How to launch your compute and storage resources on the AWS Virtual Private Cloud (VPC) platform How to add compute resources to your VPC with AWS Elastic Compute Cloud (EC2) The types of storage in AWS Elastic Block Storage (EBS) with cost, performance impact, and examples of operational tasks By the end of this ebook, you’ll master AWS core components and how to design for resiliency. You’ll even be able to launch and manage your cloud solution using either the AWS command-line interface or the AWS web console.
Tags : 
    
Turbonomic

Introducing the Two Sigma Factor Lens

Published By: Two Sigma     Published Date: Sep 19, 2019
In this paper, we provide an overview of the Two Sigma Factor Lens, designed for analyzing multi-asset portfolios and derived from returns of broad, liquid asset class proxy indexes. This lens is intended to be: • Holistic, by capturing the large majority of cross-sectional and time-series risk for typical institutional portfolios; • Parsimonious, by using as few factors as possible; • Orthogonal, with each risk factor capturing a statistically uncorrelated risk across assets; • Actionable, such that desired changes to factor exposure can be readily translated into asset allocation changes. Finally, we discuss methods for constructing and assessing the Two Sigma Factor Lens that can be extended to produce additional risk factors for new sub-assetclasses or cross-sectional risks that may not currently be captured by the lens.1 This factor lens, and our ongoing work to expand it, form the foundations of the VennTM platform.
Tags : 
    
Two Sigma

HDMI ESD Protection Without Sacrificing Performance

Published By: Tyco Electronics     Published Date: Jun 23, 2008
Adding ESD protection to your HDMI system design can be simplified by choosing the proper solution. Tyco Electronics' ESD and overcurrent protection reference layout complies with the HDMI 1.3 specification at 3.4GHz, helps meet the requirements of the IEC 61000-4-2 ESD protection specification, and optimizes board space, all of which helps minimize risk for designers.
Tags : 
esd, scm, plm, supply chain, product lifecycle, tyco, circuit protection
    
Tyco Electronics

Tyco Integrated Security Education Solutions

Published By: Tyco Integrated Security     Published Date: Mar 09, 2016
Building on the experience we’ve gained as the leading name in the security field since 1874, Tyco Integrated Security currently helps protect thousands of schools around the country. And because of our comprehensive offerings, we’ve been able to do so with security solutions specifically designed for each unique situation.
Tags : 
tyco, security, security education, school
    
Tyco Integrated Security

How to Design Compelling Content Experiences

Published By: Uberflip     Published Date: Jan 20, 2016
In this presentation, SnapApp’s Vanessa Porter joins us for a discussion on how to leverage new interactive content formats in tandem with a content experience that’s optimized to make it all work.
Tags : 
uberflip, content, engagement, snapapp, content, opt-in
    
Uberflip

Microsoft Workflow Foundation, SharePoint Workflow Designer and the Ultimus BPM Suite

Published By: Ultimus     Published Date: Aug 16, 2007
Windows Workflow Foundation (WF) and the Ultimus BPM Suite compliment each other. WF can be used to extend the capabilities of Ultimus by performing specialized services. The Ultimus BPM Suite can be invoked by WF activities to perform workflows that are not simple and require extensive and robust human-centric capabilities.
Tags : 
ultimus, bpm, business process management, automation, bpa, productivity, bpm basics, profitability, business process modeling, modeling, workflow, enterprise, enterprise applications, microsoft, sharepoint, business process automation, groupware workflow, .net, windows
    
Ultimus

Beauty & The Backup: Are You Spending Too Much Time on Backup and Recovery?

Published By: Unitrends     Published Date: Oct 30, 2015
Usability—much less beauty—was never a priority for backup and recovery software. All that mattered was that large and complex applications, usually diverse independent applications from multiple vendors, worked. As a result, IT staff spent countless hours slogging through poorly designed systems. But it doesn't have to be like this.
Tags : 
unitrends, backup software, recovery software, it staff solutions, it solutions, usability, it management, knowledge management, enterprise applications
    
Unitrends

Smarter Operations: The Value Chain’s Vital Role in Digital Evolution

Published By: UPS     Published Date: Sep 28, 2017
This series explores the role of modern digital technology in the evolution of manufacturing production, defined here as the value chain of internal and external contributors to the manufacture and delivery of products. Each chapter is designed to help operators visualize how they can build-out production of the future, and how to leverage help from the value chain to make faster progress.
Tags : 
manufacturing production, digital supply chain, smart operations, digital transformation, industrial internet of things
    
UPS

Top 12 Best Practices for Virtualizing Active Directory Domain Controllers

Published By: Veeam     Published Date: Oct 03, 2011
Virtualizing Active Director DCs can make your life easier in the long run, download this white paper to start moving toward right configuration!
Tags : 
veeam software, veeam, virtualization, best practices, configure, configuration, design, greg shields, vmware, vexpert, virtualizing, active directory, infrastructure, storage virtualization, application integration, application performance management, business integration, business management, productivity, data center design and management
    
Veeam

Real-world Attack Case Study: Misuse of Keys and Certificates Bypass Critical Security Controls

Published By: Venafi     Published Date: Mar 04, 2015
This technical case study addressing key and certificate security issues is designed for security conscious enterprises to understand real-life attack scenarios that threaten their businesses in today’s world. This white paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches. This paper should be read by more technical IT security staff who are interested in detailed attack methods and remediation tactics. The executive summary is intented for IT Security leaders (CISOs and their direct reports) and addresses the proof-of-concept attack impacts on the business. The attack scenario described in this technical white paper is based on a reproduction of a real-world attack in a Raxis test environment that simulated an enterprise security infrastructure.
Tags : 
venafi, ssh keys, vpn credentials, digital certificates
    
Venafi

Real-world Attack Case Study: Misuse of Keys and Certificates Bypass Critical Security Controls

Published By: Venafi     Published Date: Mar 26, 2015
This technical case study addressing key and certificate security issues is designed for security conscious enterprises to understand real-life attack scenarios that threaten their businesses in today’s world. This white paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches. This paper should be read by more technical IT security sta? who are interested in detailed attack methods and remediation tactics. The executive summary is intended for IT Security leaders (CISOs and their direct reports) and addresses the proof-of-concept attack impacts on the business.
Tags : 
secutiry, certificates, keys, security attacks, business
    
Venafi

Tips on Finding a Website Design Service

Published By: VendorSeek     Published Date: Feb 22, 2010
Save Time and Money on Web/E-Commerce Design. Fill out the form to request Web/E-Commerce Design price quotes
Tags : 
vendorseek, web e-commerce design, layout, vendor quotes, website graphics
    
VendorSeek

IDC Technology Spotlight: Primary Flash Market Evolving to Next-Generation Architectures

Published By: Veritas & PureStorage     Published Date: Jun 23, 2017
As flash costs continue to drop and new, flash-driven designs help to magnify the compelling economic advantages AFAs offer relative to HDD-based designs, mainstream adoption of AFAs —first for primary storage workloads and then ultimately for secondary storage workloads — will accelerate. Well-designed AFAs that still leverage legacy interfaces like SAS will be able to meet many performance requirements over the next year or two. Those IT organisations that aim to best position themselves to handle future growth will want to look at next-generation AFA offerings, as the future is no longer flash-optimised architectures (implying that HDD design tenets had to be optimised around) — it is flash-driven architectures.
Tags : 
cloud data, online marketing, customer acquisition, mobile marketing, social marketing, data warehouse, data storage, data collection
    
Veritas & PureStorage

High-Performance Embedded Applications: The SUMIT Standard

Published By: VersaLogic Corp.     Published Date: Nov 03, 2010
How the SUMIT interconnect standard is designed to meet the evolving needs of embedded systems.
Tags : 
embedded, single board computer, sumit, pci express, pcie, form factor, embedded design, boards & modules, embedded systems and networking
    
VersaLogic Corp.

The Vertica Analytic Database Technical Overview White Paper

Published By: Vertica     Published Date: Aug 16, 2010
The Vertica Analytic Database is the only database built from scratch to handle today's heavy business intelligence workloads. In customer benchmarks, Vertica has been shown to manage terabytes of data running on extraordinarily low-cost hardware and answers queries 50 to 200 times faster than competing row-oriented databases and specialized analytic hardware. This document summarizes the key aspects of Vertica's technology that enable such dramatic performance benefits, and compares the design of Vertica to other popular relational systems.
Tags : 
vertica, ec2, elastic, cloud computing, workflow, benchmark, projections, ad-hoc, business intelligence, cloud, cloudbased applications, analytic, saas, dbms, mpp, business analytics, business metrics, marketing automation, linux, application integration
    
Vertica

Slashing Data Warehouse Costs with the Vertica Analytic Database

Published By: Vertica     Published Date: Feb 20, 2010
For over a decade, IT organizations have been plagued by high data warehousing costs, with millions of dollars spent annually on specialized, high-end hardware and DBA personnel overhead for performance tuning. The root cause: using data warehouse database management (DBMS) software, like Oracle and SQLServer that were designed 20-30 years ago to handle write-intensive OLTP workloads, not query-intensive analytic workloads.
Tags : 
vertica, ec2, cdr, elastic, saas, cloud computing, data management, ad-hoc, business intelligence, cloud, cloudbased applications, analytic, saas, dbms, mpp, application integration, best practices, business activity monitoring, business analytics, business integration
    
Vertica

Vertica Analytic DBMS - OvumButler Technology Audit

Published By: Vertica     Published Date: Feb 23, 2010
Ovum takes a deep-dive technology audit of Vertica's Analytic Database that is designed specifically for storing and querying large datasets.
Tags : 
ovum, vertica, analytical databases, dbms, technology audit, mpp, rdbms, grid computing, business analytics, business metrics, linux, analytical applications, business intelligence, data mining, information management, data warehousing
    
Vertica

NPMD Solutions Support PCI DSS Compliance

Published By: Viavi Solutions     Published Date: Jan 04, 2017
Network performance Monitoring and diagnostics (NPMD) solutions are designed to capture and in many cases store network conversations in order to manage and troubleshoot IT service issues. Therefore, your NPMD solution must be viewed as an integral part of PCI DSS compliance efforts and never compromise these initiatives. This white paper goes through the best offerings that can strengthen these efforts.
Tags : 
    
Viavi Solutions

The Tenth Annual State of the Network Study

Published By: Viavi Solutions     Published Date: Jul 21, 2017
The Tenth Annual State of the Network Global Study focuses on a lens on the network team's role in security investigations. When it comes to technology adoption, both cloud and 100 GbE deployment continue to grow aggressively. VoIP adoption is closing in on 60% and software-defined networking is projected to cross the halfway mark, indicating compounding network complexity amidst the ongoing struggle to ID security threats. Study questions were designed based on interviews with network professionals and IT analysts. Results were compiled from the insights of 1,035 respondents, including network engineers, IT directors and CIOs around the world.
Tags : 
security investigation, security, sdn, cloud, data initiative, technology adoption, security trends, network performance monitoring, security threats
    
Viavi Solutions

Let the Games Begin: The Role of Game Mechanics in Employee Health Programs

Published By: Virgin Pulse     Published Date: Mar 01, 2012
Game techniques - like challenges, rewards, competition and leadership - appeal to the players' emotions and provide a sense of achievement and pride. If designed properly, game mechanics can be successfully added into workplace wellness programs to amplify results and build engagement and excitement. Discover more about the role of game techniques in corporate health programs in the new research paper, Let the Games Begin!
Tags : 
human resources, employee health program, employees, hr management, corporate health programs, employee development
    
Virgin Pulse
Start   Previous    66 67 68 69 70 71 72 73 74 75 76 77 78 79 80    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.