custom applications

Results 401 - 425 of 425Sort Results By: Published Date | Title | Company Name
Published By: HP     Published Date: Jul 08, 2009
Read this white paper to learn how scalable and efficient blade server enclosures can meet your business needs. Learn more today!
Tags : 
it outsourcing, hp bladesystem, sllas, uptime, itoncommand, customer applications, data center, space, power, hp virtual connect, rack, c3000, scalable, compact, green, space management, it services, budget, rack, six hot-plug small form factor
    
HP
Published By: SPSS     Published Date: Jun 30, 2009
This White Paper provides strategies and tactics for enabling a more innovative, predictive enterprise that maximizes the value of every customer interaction to "get, keep and grow" customers.
Tags : 
spss, predictive enterprise, retail management, customer interactions, crm, customer relationship management, customer innovation, business analytics, data management, enterprise applications, roi, return on investment, predictive analytics, decision-making, data resources, enterprise feedback management, efm, customer experience, customer-facing personnel
    
SPSS
Published By: Stratus Technologies     Published Date: Jun 16, 2009
"Time is money. You can't do business if you can't access your applications. I won't settle for anything less than 99.99% application availability." Steven Sommer, veteran CIO/CTO There is no aspect more critical to a business than the ability of its end users, customers, business partners and suppliers to have high availability access the corporate applications. If applications are unavailable, business ceases. And corporations know it.
Tags : 
c-level, stratus, itic, end users, customers, partners, high availability, corporate applications, service oriented architecture, soa, web based applications, afcom, uptime, continuous availability, servers, downtime, big iron, return on investment, roi, slas
    
Stratus Technologies
Published By: Genesys     Published Date: May 14, 2009
Customer loyalty is a two-way street. Businesses around the world are finding greater success at winning, serving and retaining customers when they are able to respond quickly and effectively whenever they call. Intelligent Customer Front Door (iCFD) is a metaphor that describes a set of applications and technological resources that enable businesses to identify callers and quickly aggregate information about them to assist in successfully resolving their needs. Learn more today!
Tags : 
genesys, opus, customer loyalty, customer, crm, customer relationship management, retention, intelligent customer front door, icfd, interactive voice response, ivr, metadata, information, lead, mobile, establishment, consolidation, performing, optimizing, computer telephone integration
    
Genesys
Published By: SAGE     Published Date: May 11, 2009
It's a scary climate for small and mid-size businesses. Besides economic, many growing businesses also experience problems and frustrations when it comes to data management and business software integration. Sage has introduced an eBook, On the Hotseat: How Your Peers Are Tackling the Questions That Matter Now, that provides insight on how other businesses are handling these problems.
Tags : 
sage, smb, small medium size business, software solutions, fortune magazine, roi, crm, customer relationship management, data management, erp software, enterprise applications, competitive advantage, unified solutions, software integration, dedicated it staff
    
SAGE
Published By: SPSS, Inc.     Published Date: Mar 31, 2009
This White Paper provides strategies and tactics for enabling a more innovative, predictive enterprise that maximizes the value of every customer interaction to "get, keep and grow" customers.
Tags : 
spss, predictive enterprise, retail management, customer interactions, crm, customer relationship management, customer innovation, business analytics, data management, enterprise applications, roi, return on investment, predictive analytics, decision-making, data resources, enterprise feedback management, efm, customer experience, customer-facing personnel, web analytics
    
SPSS, Inc.
Published By: Ecessa Corporation     Published Date: Mar 11, 2009
To achieve greater productivity, employees at headquarters, telecommuters, business partners and customers must all have unhindered access to critical applications. Any delay in delivering these applications can cause user productivity to suffer and adversely affect business profitability. WAN link controllers are an affordable solution for ensuring the optimum performance, reliable delivery and protection of applications. They optimize network bandwidth and ensure the delivery of critical applications. Download this white paper to learn how to achieve efficiencies and competitive advantages through the adoption of affordable, yet feature-rich WAN link controllers.
Tags : 
adsl load balancing, vpn load balancing and redundancy, bandwidth aggregation, qos, bandwidth control, bandwidth management, multi-homing, bgp multihoming, broadband bonding, broadband failover, disaster recovery, business continuity, wan load balancing, wan failover, dsl failover, dsl load balancing, disaster recovery solutions, dual wan router, wan failover, isp failover
    
Ecessa Corporation
Published By: Microsoft Visual Studio Team System     Published Date: Feb 25, 2009
Is building custom software a necessary evil, a process that’s divorced from the really important parts of a business? Or is the ability to do this well the underpinning of every successful organization? The truth is probably somewhere in between these two extremes. One thing is clear, however: In many organizations, how well a firm executes its business strategies is inextricably tied to how good it is at creating and running new applications.
Tags : 
vsts, alm, application lifecycle management, business strategy, it alignment
    
Microsoft Visual Studio Team System
Published By: F5 Networks Inc     Published Date: Jan 22, 2009
F5 is a worldwide Oracle Certified Partner, a proud member of Oracle Partner Network (OPN), and works closely with Oracle on the development and refinement of their Maximum Availability Architecture (MAA). Oracle E-Business Suite is a fully integrated, comprehensive suite of business applications for the enterprise. In fact, Oracle is one of F5’s largest customers, providing application delivery networking to Oracle.com, and all of their internal and external enterprise applications for Oracle employees worldwide.
Tags : 
oracle, internet-enabled enterprise, application ready network guide, oracle e-business suite, business applications, external enterprise applications, internal enterprise applications
    
F5 Networks Inc
Published By: Neolane, Inc.     Published Date: Dec 30, 2008
EMI Music is one of the top global recorded music companies and represents artists spanning all musical tastes and genres including Lily Allen, Coldplay, and Pink Floyd. No longer able to rely on mass marketing to drive in-store sales, EMI Music had to figure out who, exactly, was downloading its artists' music, and how to maximize communications with those consumers to strengthen relationships and drive more revenue.  EMI Music opted for enterprise marketing software from Neolane that would help the company better capture consumer information from multiple sources and integrate its disparate CRM and customer analytics applications.
Tags : 
neolane, emi music, enterprise marketing software, customer analytics applications, crm, customer relationship management, cross-channel customer relationships, enterprise marketing platform, crm software, custom content, deliverability, e-commerce, email marketing, emerging marketing, international marketing, lead generation, rich media, lead generation & automation
    
Neolane, Inc.
Published By: Aprimo, Inc.     Published Date: Dec 19, 2008
While marketers usually look first to customer facing applications when making technology acquisitions, taking into account the entire marketing value chain--from strategic brief to a personalized communication--is the best way to look at achieving marketing ROI. Too often, investments in customer facing technology fail to account for operational burdens created upstream in the marketing process.
Tags : 
aprimo, marketing productivity, marketing value chain, marketing execution, marketing efficiency
    
Aprimo, Inc.
Published By: Network Automation     Published Date: Dec 08, 2008
In order to deliver quality patient care, Health First must exchange information with a large number of partners, customers, and vendors on a timely basis. Complicating this enormous task is the fact that Health First has over 15 business units using a variety of mission-critical applications.
Tags : 
network automation, mission critical applications, process automation, automate
    
Network Automation
Published By: Network Automation     Published Date: Oct 23, 2008
In good economic times, success simply means keeping pace. After all, the market is demanding your company’s products and services, and your responsibility is simple: keep up with the demand no matter what it takes. Most managers, whether they are business managers or technology managers respond to this situation the same way. They hire more people to shoulder the increased load. Sales managers seek out more sales reps. Foremen bring more assembly workers online. Customer service beefs up the call center. And IT managers hire more administrators to maintain the constant flux of demands from users, applications, systems, and networks.
Tags : 
network automation, business, process, automation, processes, tough economy, bad economy, workflow, process improvement, streamline it, strategies
    
Network Automation
Published By: HP - Enterprise     Published Date: Oct 16, 2008
As the military and US government rely more heavily on custom-built applications for communications and management, they also become more vulnerable to cyber attacks. Worse, according to the Dept. of Homeland Security, the number of attacks on custom-built applications is doubling every year. Learn about critical threats, methods that military and civilian agencies can use to deal with cyber attacks and technologies that improve security for custom-built applications.
Tags : 
security, application security, audit, risk, vulnerabilities, fortify, fortify software, hackers, cyber threats, application security standards, threats, assessment, remediation, department of homeland security, us government, military agency, civilian agency, military
    
HP - Enterprise
Published By: Tail-f Systems     Published Date: Oct 01, 2008
Network management systems must adapt to meet the requirements of next generation networks.  For example, a user interfaces may need to be refreshed with a state-of-the-art Web interface or support for the NETCONF protocol may be required to help customers deploy scalable networks. Adding functionality and integrating with existing applications and data stores has multiple trade-offs in terms of development time and system efficacy.
Tags : 
network management, next-generation networks, netconf, legacy networks, network management systems, tail f, tail-f, tailf
    
Tail-f Systems
Published By: Tidal Software     Published Date: Sep 03, 2008
With 50+ percent of all business processes leveraging batch operations, it is essential to keep your batch production running smoothly in order to keep your business running smoothly. Whether you are consolidating datacenter operations, moving apps to more cost-effective platforms, or transitioning from customized to packaged applications, learn how you can simplify and lower the cost of batch management with a single interface to all batch processes across platforms and applications and more.
Tags : 
datacenter consolidation, application consolidation, application standardization, tidal, tidal software
    
Tidal Software
Published By: KEMP Technologies     Published Date: Aug 04, 2008
Today’s web and application infrastructure continues to expand applications for e-commerce, and communications with customers, partners and internal employees. For those responsible for deploying, maintaining and supporting these networked applications, there is an increasing need to get the highest performance out of datacenter equipment, while simplifying the complexity that causes excess overhead and unnecessary costs.
Tags : 
load balancer, load balancing, application delivery, ssl acceleration, application optimization, windows terminal services, terminal services, content switching, server load balancing, application security, network security, kemp, kemp technologies, infrastructure
    
KEMP Technologies
Published By: Entrust Datacard     Published Date: Jul 30, 2008
This white paper outlines issues with managing online identities across a diverse customer base when faced with increasing threats. It proposes a common sense approach that matches security to the assessed risk for users, actions and applications.
Tags : 
entrust identityguard, versatile authentication platform, entrust, authentication, password management, identity management, iam, internet security, online security
    
Entrust Datacard
Published By: Quocirca     Published Date: Apr 09, 2008
Today, many organizations are increasingly reliant on software application development to deliver them competitive edge. Simultaneously, they are progressively opening up their computer networks to business partners, customers and suppliers and making use of next-generation programming languages and computing techniques to provide a richer experience for these users. However, hackers are refocusing their attention on the vulnerabilities and flaws contained in those applications.
Tags : 
quocirca, application security
    
Quocirca
Published By: Cast Iron Systems     Published Date: Feb 14, 2008
Discover why traditional software and custom coding solutions are obsolete when solving integration problems in a SaaS environment and how they’re rapidly being replaced by Integration Appliances that use “configuration, not coding” to quickly integrate your SaaS applications with your business-critical data.
Tags : 
saas, software as a service, erp, scm, crm, data integration, application integration, marketing automation, sales automation, castiron, cast iron
    
Cast Iron Systems
Published By: Cast Iron Systems     Published Date: Feb 14, 2008
Traditionally companies had only two choices for integrating SAP solutions, complex and expensive platforms like EAI or write custom code. Integration Appliances offer companies a third option, one that dramatically simplifies and accelerates SAP integration by using a “configuration, not coding” approach to rapidly connect SAP applications with a wide variety of applications, without burdening specialist resources.
Tags : 
eai, sap, castiron, cast iron, enterprise resource planning, erp, crm systems
    
Cast Iron Systems
Published By: GlobalSCAPE     Published Date: Jan 08, 2008
AON’s Human Capital division needed a better way to automate their data transfer processes. They wanted a simple yet flexible system that didn’t require customization to adapt to growing needs.  They wanted to consolidate their sensitive data transfers and ensure the security of this data and to provide integration with current workflow and key legacy applications. AON deployed the GlobalSCAPE EFT (Enhanced File Transfer) server.
Tags : 
file transfer, file transmission, eft, mft, secure file transfer, data transfer, data transmission, globalscape
    
GlobalSCAPE
Published By: Network Engines     Published Date: Sep 21, 2007
Enterprise customers want software applications delivered as server appliances because they help to reduce IT costs and complexity. Appliances provide better performance, security and manageability. Learn from experts, about factors to consider and things to avoid with the appliance delivery model.
Tags : 
software as an appliance, hardware, server hardware, software appliance, software delivery, software management, enterprise software, software installation, network performance, network engine, network engines
    
Network Engines
Published By: Ultimus     Published Date: Aug 16, 2007
With the largest global installed base of pure-play BPM solutions, the Ultimus BPM Suite exemplifies the role of managing OSAP processes in the business process ecosystem. Customers worldwide use it to extend, maximize and complement their investments in SAP or other enterprise applications.
Tags : 
ultimus, bpm, business process management, automation, bpa, productivity, bpm basics, profitability, business process modeling, modeling, workflow, enterprise, enterprise applications, outside sap
    
Ultimus
Published By: Tripp Lite     Published Date: Jan 24, 2007
Voice over IP (VoIP) is exploding in popularity as an application for business data networks. As a result, a company can lower its hardware and service costs while raising productivity through the use of more customizable telephony applications.
Tags : 
voice over ip, voip, ip telephony, call center management, quality of service, network infrastructure, infrastructure, power, voip deployment, voip implementation, power supply, tripplite, tripp lite
    
Tripp Lite
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.