op

Results 76 - 100 of 19586Sort Results By: Published Date | Title | Company Name

Five game-changing factors to consider before investing in the European power market.

Published By: ABB     Published Date: Mar 21, 2019
Many in the United States’ power generation industry no doubt long for the relative market tranquility of the late 20th century. The generation plants built and operated then were carbon-fueled or nuclear-powered, with a few hydro-electric plants sprinkled in. The economics were largely stable and predictable, often thanks to regulation that shielded utilities from market fluctuations. But even in those simpler times, when the market was far less volatile, there was still much due diligence required when investors and developers were considering multi-milliondollar commitments in new generation projects. Today’s market is more volatile, due in large part to the disruptive effect of low-cost natural gas and the subsequent, rapid growth of affordable renewable energy. As more uneconomical and inefficient generation plants go offline, there is, for the most part, sufficient carbon-free or carbon-reduced generation to meet the growing demand for electric energy. There are pockets of growth
Tags : 
    
ABB

The ABC's of Executive Analytics: A-List Performance Using BI in the C-Suite

Published By: Aberdeen     Published Date: Jun 17, 2011
Download this paper to learn the top strategies leading executives are using to take full advantage of the insight they receive from their business intelligence (BI) systems - and turn that insight into a competitive weapon.
Tags : 
aberdeen, michael lock, data-driven decisions, business intelligence, public sector, analytics, federal, state
    
Aberdeen

Embracing and Empowering the Consumerization of IT

Published By: Aberdeen - youSENDit     Published Date: Sep 14, 2011
Consumer-focused technologies that are deployed by employees can provide tremendous value to any business and can provide IT organizations with more functionality than they can afford or are willing to deploy. However, consumer technologies must be appropriately managed in order to satisfy corporate security, compliance and other requirements. This means integrating consumer technologies into the existing IT fabric in order to achieve the greatest possible synergies between consumer-focused and IT-deployed technologies.
Tags : 
yousendit, ftp replacement, secure file transfering, online fire sharing, uploading files, consumerization of it, ip storage, network attached storage
    
Aberdeen - youSENDit

Important Issues to Consider Before Migrating to a New Version of Exchange

Published By: Aberdeen - youSENDit     Published Date: Sep 14, 2011
This white paper discusses the drivers for migrating to Exchange 2010 and why decision makers should consider adopting cloud-based MST/AM during the planning phase of the overall migration.
Tags : 
yousendit, exchange, cloud-based, cloud computing, web services, sending files, clustering, web service security
    
Aberdeen - youSENDit

The ABC's of Executive Analytics: A-List Performance Using BI in the C-Suite

Published By: Aberdeen Group     Published Date: Jun 02, 2011
Download this paper to learn the top strategies leading executives are using to take full advantage of the insight they receive from their business intelligence (BI) systems - and turn that insight into a competitive weapon.
Tags : 
aberdeen, michael lock, data-driven decisions, business intelligence, public sector, analytics, federal, state
    
Aberdeen Group

Delivering Videoconferencing to the Enterprise

Published By: Aberdeen Group     Published Date: Jul 11, 2011
This document outlines key concerns that exist for both IT and line-of-business videoconferencing stakeholders and is intended to allow both of these constituencies to better understand the holistic challenges and value propositions of videoconferencing.
Tags : 
aberdeen group, business enterprise videoconferencing, compliance, virtualizing video application, unified communications, video solutions, roi, value proposition
    
Aberdeen Group

Secure / Managed File Transfer: Why You Should Be Looking More Closely Right Now

Published By: Aberdeen Group     Published Date: Sep 06, 2011
This Aberdeen Group research shows why you should be looking more closely right now at secure/managed file transfer solutions.
Tags : 
aberdeen, secure / managed file transfer, file transfer, collaboration, copy and carry, ftp, dropbox, sftp
    
Aberdeen Group

Defining a Framework for Cloud Adoption

Published By: Aberdeen Group     Published Date: Sep 11, 2012
The purpose of this paper is to introduce the cloud computing adoption framework from IBM and make it available for use by any organization looking for a standardized frame of reference for cloud computing discussions.
Tags : 
cloud, computing, aberdeen, technology, ibm, cloud, cloud adoption, application integration
    
Aberdeen Group

Delivering Videoconferencing to the Enterprise

Published By: Aberdeen Group     Published Date: Jul 11, 2011
This document outlines key concerns that exist for both IT and line-of-business videoconferencing stakeholders and is intended to allow both of these constituencies to better understand the holistic challenges and value propositions of videoconferencing.
Tags : 
aberdeen group, business enterprise videoconferencing, compliance, virtualizing video application, unified communications, video solutions, roi, value proposition
    
Aberdeen Group

How to Win the B2B Marketing Analytics Poker Game

Published By: Aberdeen Group     Published Date: Aug 04, 2015
The practice of using predictive analytics for marketing is becoming much more commonplace, but, in many ways, this field is still immature. Marketers are using analytics to identify new prospects, qualify leads, predict close rates, and optimize pricing, but there are still many ways to refine these methods -- along with many pitfalls to avoid. Download this white paper to learn how to win the B2B marketing analytics poker game.
Tags : 
predictive analytics, leads, pricing, close rates, public data, social media, data analysis
    
Aberdeen Group

Defining a Framework for Cloud Adoption

Published By: Aberdeen-IBM     Published Date: Sep 12, 2012
The purpose of this paper is to introduce the cloud computing adoption framework from IBM and make it available for use by any organization looking for a standardized frame of reference for cloud computing discussions.
Tags : 
cloud, computing, aberdeen, technology, ibm, cloud, cloud adoption, application integration
    
Aberdeen-IBM

eCommerce Email Acquisition: How to Leverage Your Site to Grow Your List Description

Published By: Ability Commerce     Published Date: May 18, 2009
eCommerce Marketers who want to exploit the full potential of e-mail should develop plans to consistently grow their permission-based e-mail lists of customers and prospects. This allows them to build loyalty and promote cross-sell and up-sell opportunities.
Tags : 
ability commerce, seo, roi, pci, emarketing, email marketing, email acquisition, ecommerce
    
Ability Commerce

eCommerce Email: What Great Emails Do So Well...and Why

Published By: Ability Commerce     Published Date: May 18, 2009
Reggie Brady shares some of her favorite e-mails and explain why they're tops in her book. As you read them, think about how you might incorporate these tactics in your own e-mail programs.
Tags : 
ability commerce, seo, email frequency, roi, pci, ecommerce, e-commerce, order management
    
Ability Commerce

Intelligent Client-Side Defense for Stolen Laptops

Published By: Absolute Software     Published Date: May 08, 2009
Keeping data secure in a mobile environment is not just a daunting challenge, but a critical requirement. Loss and theft of computers leaves sensitive data vulnerable, creating serious financial and legal risks.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense
    
Absolute Software

The Human Factor in Laptop Encryption

Published By: Absolute Software     Published Date: May 08, 2009
In this whitepaper, the Ponemon Institute shares its findings on the use of encryption on laptops by corporate employees. It shows that many employees may not be taking the most basic precautions to secure their company laptop.
Tags : 
absolute, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence
    
Absolute Software

So, You're Responsible for Managing Laptops

Published By: Absolute Software     Published Date: Jan 29, 2008
Does your PC lifecycle management (PCLM) reflect the issues associated with mobile users? Many organizations face expensive inefficiencies by not managing mobile assets effectively. These inefficiencies include dispersed and manual data collection, and inventory tools that are dependent on a connection to the company network.
Tags : 
absolute, intel, laptop, saas, managing laptops, pclm, computrace, absolute software
    
Absolute Software

So, You're Responsible for Managing Laptops. Now What

Published By: Absolute Software     Published Date: Jan 27, 2010
This whitepaper explains how organizations can reduce their energy bills by remotely regulating computers. Topics include typical workplace computer usage, how to calculate your potential energy savings, debunking power management myths, and how you can assign multiple power saving profiles to clients.
Tags : 
computrace, absolute software, it asset management, remote data delete, geolocation tracking, theft recovery, service guarantee, application integration
    
Absolute Software

Migrate Smoothly to Snow Leopard in 3 Easy Steps

Published By: Absolute Software     Published Date: Jan 19, 2010
This whitepaper explains step-by-step how you can deploy a complete Snow Leopard disk image to a Mac OS X computer, even while it is being used. No immediate boot from a server, FireWire drive, or boot DVD is necessary, and no pre-configuration of the target computer is required.
Tags : 
computrace, absolute software, it asset management, remote data delete, geolocation tracking, theft recovery, service guarantee, application integration
    
Absolute Software

Technology Brief: Absolute Software Expands Lifecycle Management

Published By: Absolute Software     Published Date: Feb 04, 2010
Absolute Software has announced it has completed its acquisition of the LANrev systems management platform. Absolute plans to integrate LANrev's popular Mac and PC lifecycle configuration management technology with its flagship security and asset management suite, Computrace.
Tags : 
absolute, laptop, saas, lifecycle management, enterprise management, lock down, rapid recovery, stolen
    
Absolute Software

Demo: How Computrace Tracks and Secures Laptops

Published By: Absolute Software     Published Date: Sep 06, 2011
View this flash demo to see Absolute in action and how you can monitor installed software/hardware and track location and take action if device is lost or stolen.
Tags : 
absolute, computrace, secure, tracking, security, manage, protect, application security
    
Absolute Software

Demo: Absolute Manage

Published By: Absolute Software     Published Date: Sep 06, 2011
Let us walk you through Absolute Manage's capabilities in this 10-minute demo; see how Absolute Manage can help you centrally manage both Mac and PCs.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense
    
Absolute Software

Grappling Growth: How IT Can Thrive in a Fast-Growing Organization

Published By: Absolute Software     Published Date: Sep 06, 2011
Watch this webcast as Support Manager for La Jolla Institute for Allergy & Immunology relates how he successfully frees up 30 IT support hours a week.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense
    
Absolute Software

Webcast: iPads and iPhones Go to Work: The Essential Guide for IT Support

Published By: Absolute Software     Published Date: Sep 06, 2011
Vice President and Research Fellow for Aberdeen Group, shares trends, best practices and actionable insight on management of iOS mobile devices.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense
    
Absolute Software

Webcast: The Growing Threat Landscape: Why your IT Security Strategy Needs to Evolve

Published By: Absolute Software     Published Date: Sep 06, 2011
Forrester Research and Absolute Software discuss the importance for IT to create a "layered approach" for endpoint security and management
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense
    
Absolute Software

Demo: Absolute Manage Mobile Device Management

Published By: Absolute Software     Published Date: Sep 06, 2011
See how Absolute Manage Mobile Device Management allows organizations to remotely manage their Apple® iOS devices (iPhone®, iPod® Touch, iPadT).
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense
    
Absolute Software
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.