usage

Results 251 - 275 of 306Sort Results By: Published Date | Title | Company Name
Published By: AdRoll     Published Date: Feb 21, 2018
This is Econsultancy’s second State of Marketing Attribution report, published in association with AdRoll and based on an online survey of 987 practitioners in Europe, North America and Asia-Pacific. We expanded on last year’s report, which focused solely on Europe, and made the report a global comparison. This report reviews the current adoption levels of marketing attribution, the confidence in its usage and the effectiveness of companies’ attribution methods.
Tags : 
marketing attribution, attribution modeling, roi, attribution
    
AdRoll
Published By: AirDefense     Published Date: Apr 24, 2007
This paper outlines the specific elements of wireless LAN security (perimeter control, access control, date protection, and monitoring) and WLAN management (configuration, fault diagnostics, network usage, and policy enforcement). Reader will gain a keen understanding of how to effectively lockdown a wireless LAN and manage it for peak performance.
Tags : 
wireless security, wlan, wlans, wlan security, wireless lan, access control, wireless access control, data protection, monitoring, wlan management, security policies, airdefense
    
AirDefense
Published By: Aladdin     Published Date: Aug 21, 2009
Identity theft is a major obstacle financial organizations must overcome to maximize the potential of online banking. USB strong authentication tokens with built-in smartcard technology combat identity theft and fraud, while helping banks meet regulatory compliance.
Tags : 
compliance, glba, identity theft, pci, authentication, tokens, smartcard, smartcards, smart card, smart cards, regulatory compliance, online banking, ssl, banking, database security, aladdin
    
Aladdin
Published By: Schneider Electric     Published Date: May 03, 2018
While many OEMs are aware of new technologies to make machines more energy-efficient, they are reluctant to make changes due to the perception that it will make their machines more expensive to sell. The constraints of cost reduction, usage of resources and energy reduction are becoming key drivers in the industry as consumers require manufacturers to be more “green”. This paper demonstrates how incorporating sustainable design can add value to their machines and differentiate OEMs from the competition.
Tags : 
    
Schneider Electric
Published By: IBM     Published Date: Apr 23, 2008
The IBM Active Energy Manager is a unique software tool that gives you the detailed information you need to closely and accurately monitor power consumption in your data center. Watch this IBM demo to see the extensive capabilities of Active Energy Manager, from setting automatic caps on energy usage to tracking trends over any time period you specify.
Tags : 
energy, energy efficient, power, data center, datacenter, ibm, ibm opt it, opt it
    
IBM
Published By: IBM     Published Date: Jun 11, 2008
According to Selfserviceworld.com, 50 percent of consumers prefer to use credit cards at self-checkout counters. As credit card usage continues to rise, it's beneficial for retailers to consider non-cash methods of payment. Download the white paper and see how self-checkout solutions from IBM can help increase sales and improve customer satisfaction.
Tags : 
checkout, retail, point of sale, pos, customer service, ibm, mmdg
    
IBM
Published By: IBM     Published Date: Jun 19, 2008
Discover the high performance, flexibility and extreme availability of IBM System x3550 Express rack-mount server. IBM PowerExecutive software manages energy usage to keep costs and heat output down. And advanced predictive failure analysis and Light Path Diagnostics keep you up and running, reduce down time and service costs. Watch this video demo of the IBM System x3550 Express to see how it compares to competitive products and how it can bring savings, power and reliability to your business.
Tags : 
ibm, express seller, system x, server
    
IBM
Published By: Meru Networks     Published Date: Aug 21, 2009
As wireless LAN deployments and usage has increased, coupled with the near ubiquity of embedded Wi-Fi in laptops and smart phones, many enterprises are experiencing complaints from their users of slow or even dropped connections.
Tags : 
wlan, wireless lan, wifi, wi-fi, wlan deployment, pervasive wlan, ubiquitous wlan, microcells, macrocell, macrocells, wlan reliability, virtual cell, meru, meru networks
    
Meru Networks
Published By: PKWARE     Published Date: Oct 22, 2007
Text-messaging, or SMS, usage is on the rise while email usage is falling. Meanwhile many more mobile phones than personal computers are sold around the world. Long story short: Marketers who want to reach consumers with targeted campaigns had better put an SMS strategy in place. mobileStorm's new white paper, "SMS Or Die," explains why mobile marketing, particularly SMS marketing, is the ideal platform to reach consumers.
Tags : 
sms marketing, mobile marketing, email marketing, text messaging, text marketing, sms, sms, mobile, email, text, sms messaging, mobile messaging, mobilestorm, mobilestorm
    
PKWARE
Published By: Secure Computing     Published Date: Aug 21, 2009
This white paper discusses how HTTPS filtering (SSL scanning) from Secure Computing provides companies with the means to counter these threats by fully extending their Internet usage policies to HTTPS traffic, and thereby proactively closing that last known major network security hole.
Tags : 
ssl, vpn, secure socket layer, virtual private network, traffic management, security management, https, internet security, secure computing, securecomputing
    
Secure Computing
Published By: Quocirca     Published Date: Jul 11, 2007
Wide areas networks (WANs) are essential to the majority of businesses, connecting remote locations and individuals back to centralized IT resources. But as the network is expected to handle more bandwidth intensive applications such as voice and video it is essential to ensure the WAN usage is well managed – eliminating unwanted traffic and accelerating business content.
Tags : 
wan, wans, wide area network, wan acceleration, remote workers, bandwidth management, traffic management, quocirca
    
Quocirca
Published By: Quocirca     Published Date: Sep 13, 2007
The general public is becoming increasingly cynical about the environment claims of businesses and with much bad press around data centers, information technology (IT) is in the front line. But data centers are actually the easiest bit of IT to control and consolidating infrastructure into them can help reduce the overall energy usage of IT and, if used well, IT itself can help businesses reduce their overall carbon footprint.
Tags : 
environment, environmental, green, green business, efficient, efficiency, energy, energy efficient, energy saving, power, infrastructure, symantec, quocirca, data center, datacenter, data centers, datacenters, data centre, data centres
    
Quocirca
Published By: Ingate Systems     Published Date: May 31, 2007
Session Initiation Protocol (SIP) represents the third wave of Internet usage after SMTP (email) and HTTP (Web). Download this free guide now and learn why all firewalls will need to be SIP capable in order to support the wide-scale deployment of enterprise person-to-person communications.
Tags : 
communication, communications, voip, voice over ip, lan, local area network, ip networks, ip telephony, internet security, firewall, firewalls, ingate, ingate systems
    
Ingate Systems
Published By: GFI     Published Date: Jun 14, 2007
This technical white paper gives an introduction to fax over Internet Protocol (FoIP) and explains the various usages and advantages of FoIP including Least Cost Routing (LCR).
Tags : 
ip fax, faxing, ip faxing, foip, fax server, gfi, real time, real-time faxing, lcr, sip, session initiation protocol, ip networks
    
GFI
Published By: Knoa     Published Date: Jul 17, 2007
What is often overlooked is that application performance is just one of three key drivers of return on investment (ROI) from your Siebel application. An efficient infrastructure is critical. It's important to optimize the Siebel application for your own unique business environment, user needs and usage patterns. But, it's all for naught if you do not build and sustain adoption and efficient and effective use of the Siebel application by your end users.
Tags : 
epm, performance management, experience management, knoa, siebel, crm, customer relationship, end user, enterprise software, software training, application performance, monitoring
    
Knoa
Published By: Nevis Networks     Published Date: Sep 04, 2007
The ability to monitor, track and report usage based on actual user identity and applications provides for quicker reaction time, easier reporting for compliance, as well as more visibility into the network. Learn about a complete line of solutions for effective identity-based policy enforcement.
Tags : 
lan, lan security, network security, security policies, security policy, policy management, best practices, nevis, nevis networks, dos, infrastructure, dmz, access control, precision prospects
    
Nevis Networks
Published By: TamoSoft     Published Date: Sep 28, 2007
This white paper examines the problems related to the deployment and usage of software-based network monitoring solutions, methods of achieving network traffic visibility in various network configurations that include hubs, switches, routers, etc.
Tags : 
monitoring, lan, wan, best practices, networking, wlan, wireless security, tamosoft
    
TamoSoft
Published By: TamoSoft     Published Date: Feb 14, 2008
This white paper covers the VoIP basics, deployment and usage of a VoIP solution over both wireless (Wi-Fi) and wired (Ethernet) network infrastructures, guidelines on efficient monitoring and analyzing VoIP network traffic, troubleshooting various VoIP problems, etc.
Tags : 
voip, wifi, voip deployment, voip monitoring, voip network, ip network, ip telephony, voice over ip, tamosoft
    
TamoSoft
Published By: WiChorus     Published Date: Nov 05, 2007
Rising demand for multimedia applications and mobile usage requires new paradigm to shift voice-oriented cellular architecture into data-oriented networks in order to serve bandwidth hungry packet based applications which include but not limited to multimedia gaming, mobiTV, streaming media, P2P, etc. Data oriented network requires 20-fold fatter air link and backhaul as compared to typical voice communication.
Tags : 
wimax, access controller, asn-gw, gateway, base station, ofdma, edge router, farpoint group, controller, wichorus
    
WiChorus
Published By: NetSupport     Published Date: Nov 14, 2007
A majority of organizations do not have efficient ways of keeping track of their IT assets. That opens them up to dangers like system downtime from improperly implemented upgrades, potential licensing violations, poor customer service, overpaying on license fees and improper usage of software and the Internet by employees.
Tags : 
itam, asset management, spend management, cost savings, cost control, risk management, it management, software compliance, net support, netsupport
    
NetSupport
Published By: MessageLabs     Published Date: Jan 13, 2009
Drawing the line between employee web usage and company policy is challenging for IT Managers. Download this whitepaper to help make informed decisions about your own web monitoring requirements FREE Whitepaper (PDF/40KB)
Tags : 
messagelabs, employee web use, employee web misuse, employee web surfing, employee internet usage, web use monitoring, web use blocking
    
MessageLabs
Published By: Project Success, Inc.     Published Date: Jun 23, 2008
For some projects, tracking actuals is unnecessary or is not worth the effort required. In other cases, however, tracking actual costs and resource usage is an essential aspect of the project control function. Why then is tracking actual costs and resource usage on a project ever worth the effort required to accomplish it?
Tags : 
project management, project success, psi
    
Project Success, Inc.
Published By: MessageLabs     Published Date: Jun 03, 2009
Does your email and web Acceptable Usage Policy (AUP) need a refresh? Shoosmiths Solicitors and MessageLabs combine to provide you with some top tips to ensuring your policy is fit for purpose. Click here.
Tags : 
aup, acceptable usage policy, message labs, shoosmiths solicitors, copyright, security provisions, guidance, email usage, etiquette, personal use, blogging
    
MessageLabs
Published By: Subrago     Published Date: Apr 30, 2009
The key objective of this white paper is to highlight the key issues and discuss processes and controls required to build a high performing IT support organization.
Tags : 
it support, subrago, it costs, customer transaction, high performing it support, it dependency, tolerance level, production services, change management, itil, itil v3, efficiency, it infrastructure, cab, change advisory board, segregation of duties, zero down, metrics, hardware performance, database performance
    
Subrago
Published By: Symantec.cloud     Published Date: Feb 03, 2010
Best-Practices Guidelines for Managing Workplace Email and Web Use to Minimize Risks and Maximize Compliance.
Tags : 
messagelabs, symantec hosted services, workplace email, web acceptable usage policy, compliance, security, productivity
    
Symantec.cloud
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.