bea

Results 251 - 262 of 262Sort Results By: Published Date | Title | Company Name
Published By: SyberWorks     Published Date: Oct 21, 2008
Jean Ann Larson, Chief Learning Officer (CLO), and Tawanna Foggs, Educational Systems Coordinator, of William Beaumont Hospitals, talk about their use of the SyberWorks Learning Management System to train and certify hospital employees.
Tags : 
syberworks, learning management system, learning management systems, learning management system, e-learning, elearning, web based training, training management systems, training management system, online training software, web based training software, e-learning, sop automation, seminar logistics, classroom management, online survey tool, competency management, schedule simulation, fda 21 cfr part 11, compliance management
    
SyberWorks
Published By: LeadLife Solutions     Published Date: Oct 20, 2008
Learn how BearingPoint successfully implemented a lead scoring and nurturing system within their organization that increased their qualified leads by 78% and decreased their buy cycle time from months to weeks.
Tags : 
leadlife solutions, bearingpoint, demandgen, lead scoring, lead generation, crm, roi, lead nurturing, lead generation & automation
    
LeadLife Solutions
Published By: Dell     Published Date: Oct 20, 2008
This paper offers IDC's quantitative and qualitative research and perspective for examining the challenges and costs of PC deployment, as well as the benefits of automating deployment processes. The paper also looks at the Dell Deployment Optimization model and the role of the DAD solution in this important market.
Tags : 
dell, automate deployment process, challenges of pc deployment, costs of pc deployment, dell optimization model
    
Dell
Published By: Godfrey     Published Date: Oct 02, 2008
One of the most important questions a company can ask itself is “what is our differentiation?” The reason is simple: it’s how you define yourself in the minds of your customers and beat the competition. Beyond that, it’s what guides business strategy as you face decisions and choices on a daily basis. A company that knows who it is and how it adds value for customers and prospects has a solid foundation for making those decisions. One that has an unclear position or, worse yet, constantly shifts position, has a difficult path in a challenging market. That’s why branding discussions need to go well beyond graphics and touch on the values and identity that are at the core of any successful company.
Tags : 
godfrey, b-to-b, business-to-business, web 2.0, branding, b-to-b branding, b-to-b differentiation, brand differentiation, branding differentiation, b-to-b brand, b-to-b brand positioning, brand positioning, brand affinity, brand advertising, brand communications, branding research, b-to-b marketer, b-to-b buying process, b-to-b branding program, integration
    
Godfrey
Published By: JBoss     Published Date: Sep 23, 2008
This document is intended to provide insight into the considerations and processes required to move an enterprise application from a JavaEE-based application server, such as BEA WebLogic, Oracle Application Server, or IBM WebSphere, to the JBoss Enterprise Application Platform.
Tags : 
jboss, middleware, redhat, linux, red hat, server, server migration
    
JBoss
Published By: IBM     Published Date: Sep 18, 2008
When bound to regulation and compliance, process manufacturers find opportunities to grow through enterprise resource planning (ERP). However, 50% of process manufacturers execute non-integrated ERP strategies. This Aberdeen Group research study reveals best practices to help you adapt or select an ERP vendor that improves your business performance.
Tags : 
erp, enterprise resource planning, cindy jutras, process, process industry, chemical, food and beverage, food, beverage, pharmaceutical, pharma, best-in-class, material requirements planning, mrp, global competition, manufacturing process, microsoft dynamics, acsis, fullscope, traceability
    
IBM
Published By: Oracle Corp.     Published Date: May 30, 2008
Current trends show that the vast majority of companies are moving to services-oriented architectures (SOAs) and deploying Web services within and across their IT infrastructure.However, the success of those deployments is determined by the integrations and innovations that Web services make possible and how Web services affect the quality and performance of the mission-critical applications with which they interface.
Tags : 
soa, soas, oracle, application testing suite, web services, mission-critical, enterprise java beans-based, quality assurance, ejb, user interface
    
Oracle Corp.
Published By: GFI     Published Date: Mar 25, 2008
This white paper explains what makes spam such an unbearable problem and how spamming tactics are evolving daily to beat anti-spam software. In the space of two months, spammers have switched from image spam to using PDF, Excel and ZIP file attachments. By using these attachments to send images instead of embedding them in the body of the email message, spammers have taken the cat-and-mouse game with anti-spam software developers to a new level.
Tags : 
attachment spam, filter attachment spam, image spam, pdf spam, excel spam, xls spam, stock spam, gfi
    
GFI
Published By: Solidcore     Published Date: Jan 15, 2008
New report issued by Fortrex, Emagined Security and Solidcore reveals the cost of PCI compliance is justified. These PCI requirements exist to protect sensitive data - yet, research indicates that these are among the least satisfied requirements across Level 1 merchants, with almost 40% non-compliance. 
Tags : 
    
Solidcore
Published By: GFI     Published Date: Jul 24, 2007
This white paper explains what makes spam such an unbearable problem and how spamming tactics are evolving daily to beat anti-spam software. The latest tactic is to use the common PDF file format to send image spam. By using PDF attachments to send images instead of embedding them in the body of the email message, spammers have taken the cat-and-mouse game with anti-spam software developers to a new level.
Tags : 
adobe, adobe acrobat, acrobat, gfi, spam, image spam, pdf spam, anti-spam, anti spam, email security, zombie, zombies, botnet, botnets, hacker, vulnerability, filtering, blocking, mailessentials, mail essentials
    
GFI
Published By: Omniture     Published Date: Jun 27, 2007
The beauty of Web analytics - and the promise of the Internet - is the ability to capture nearly unlimited amounts of data about your Web site. So how can you turn these incredible data resources into clear and actionable insights? A good place to start is by defining key performance indicators or KPIs.
Tags : 
key performance indicator, kpi, omniture, web analytics, website analytics, user data, data collection, web measurement, dashboard, dashboards, lead generation, site catalyst, sitecatalyst
    
Omniture
Published By: GFI     Published Date: Jun 12, 2007
Virus-writers are using increasingly complex and sophisticated techniques in their bid to circumvent anti-virus software and disseminate their viruses. Anti-virus software, though essential, cannot combat such threats alone; an email exploit detection tool is also necessary.
Tags : 
email security, trojan, trojans, anti-virus, anti virus, virus, network security, gfi, email exploit, nimda, yaha, bugbear, exploit software, exploit engine, mailsecurity
    
GFI
Start   Previous    1 2 3 4 5 6 7 8 9 10 11     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.