users

Results 1626 - 1650 of 1775Sort Results By: Published Date | Title | Company Name
Published By: Flimp Media     Published Date: Jan 26, 2010
This report, discusses the uses, applications and benefits of video landing pages for email marketing, communications and sales; and explores how new technologies are enabling users to create, distribute and measure effective online video email marketing campaigns using video landing pages without programming or advanced technical skills.
Tags : 
flimp, b2b, idc, intelligent digital collateral, landing pages, email marketing, emarketing, measurability
    
Flimp Media
Published By: McAfee     Published Date: Dec 28, 2009
McAfee Labs foresees an increase in threats related to social networking sites, banking security, and botnets, as well as attacks targeting users, businesses, and applications. However, in 2010 McAfee also expects to see an increase in the effectiveness of law enforcement to fight back against cybercrime is also anticipated. Read this report to learn more about what to expect in 2010.
Tags : 
mcafee, cybersecurity, hackers, malware, security threats, trojan horses, virus protection, vulnerability assessments
    
McAfee
Published By: Net Atlantic     Published Date: Dec 08, 2009
How to Keep Compliant, Avoid Mistakes, and Manage a Healthy Member List. Net Atlantic's whitepaper, "Email Compliance & Best Practices for Healthcare" helps healthcare providers and healthcare product and service vendors understand email communications compliance issues. It illustrates how CAN-SPAM forms the foundation of compliance, and also explains why healthcare organizations have to go beyond CAN-SPAM to sustain a truly effective email communications strategy. Healthcare users of email for communications should know how to use these best practices before building their email campaigns.
Tags : 
net atlantic, email compliance, spam, can-spam, healthcare, members, hmtl messages, email marketing
    
Net Atlantic
Published By: Vision Solutions     Published Date: Dec 04, 2009
The newest edition of this unique report is filled with survey findings from over 4,000 individuals responsible for the resilience and protection of AIX and IBM i (i5/OS) environments. Discover if and how your peers are meeting recovery-time and recovery-point objectives, disaster recovery plans and more.
Tags : 
vision solutions, ibm power systems, aix users, data protection, recovery and optimization, it availability
    
Vision Solutions
Published By: IBM ILOG.     Published Date: Oct 26, 2009
IBM WebSphere ILOG Rule Solutions for Office meets the demands of business users by integrating Microsoft Office Word and Excel with the market-leading WebSphere ILOG BRMS. See Rules for Office in action during this one-hour webinar, including a live demonstration.
Tags : 
ibm, ilog, business rule management systems, brms, websphere, application integration
    
IBM ILOG.
Published By: IBM     Published Date: Oct 09, 2009
"Recently, Open Source Software has been gaining in popularity due to the ability it provides users to view and modify source code. Another attraction is the perceived cost savings. Read the white paper that takes a look at the truth about those savings. Initially, deployment environments like JBoss have an advantage-zero initial software acquisition costs. However, the white paper will show how, over time, IBM WebSphere Application Server (WAS) and IBM WebSphere Application Server Network Deployment (WAS ND) win the TCO battle. Learn more."
Tags : 
open source, ibm, tco, total cost ownership, roi, return on investment, application development, jboss
    
IBM
Published By: Direct Message Lab     Published Date: Oct 02, 2009
Participation in social media has become a necessity. Done properly, social media can deliver new users, drive revenue and increase engagement. DML has asked its partners to share their approach to social media from a strategic standpoint and the day-to-day mechanics of managing their social presence.
Tags : 
social media, social networks, social media management, social media agency, dml, direct message lab, facebook, twitter
    
Direct Message Lab
Published By: IBM     Published Date: Sep 11, 2009
Discover the hidden dangers posed by privileged users and the damages they have caused. This webcast features two senior analysts from Burton Group Identity and Privacy Strategies, as well as IBM identity and access management solutions address this security and compliance challenge.
Tags : 
ibm, access management solutions, christopher bauseman, ibm tivoli software, lori rowland, senior analyst, mark diodati
    
IBM
Published By: Ektron     Published Date: Aug 26, 2009
Social media allows people to be more connected than ever before and the mediums available for marketing are changing rapidly as new technologies come available. Online users are communicating in real time and every brand in the world is being caught up in the conversation whether they are participating or not.
Tags : 
social media, ektron, intranets, powerpoint, word of mouth, marketing, .net, cms
    
Ektron
Published By: Alacritech     Published Date: Aug 21, 2009
Growth challenges in Microsoft Exchange environments can be solved with the deployment of iSCSI storage. Microsoft favors block storage such as iSCSI for Exchange deployments. Attaching iSCSI storage to a network provides the server with headroom for adding Exchange users, since the storage can grow without being restrained by the server's ability to add storage.
Tags : 
microsoft exchange, iscsi, iscsi storage, storage, windows server, windows exchange server, alacritech
    
Alacritech
Published By: Aventail     Published Date: Aug 21, 2009
This white paper summarizes the capabilities of Aventail End Point Control and explains the range of features that increase IT control and data protection by giving users access that's finely tuned to the risks of their environment.
Tags : 
vpn, access control, ssl, network security, data protection, wireless security, aventail
    
Aventail
Published By: Aventail     Published Date: Aug 21, 2009
Today's office is now anywhere that a user can get an Internet connection, a PC on a business partner's network, a handheld at a WiFi hotspot, an airport kiosk, or a computer on a home WiFi network. But secure access is not the only driving business factor remote access must be easy to use and administer as well.
Tags : 
secure remote access, remote access, wireless security, secure wifi, wifi security, wi-fi security, wifi, wi-fi
    
Aventail
Published By: Aventail     Published Date: Aug 21, 2009
Network Access Control (NAC) solutions has arrived, with the support of some of the largest vendors in the IT/networking world, its own consortium, the excitement of users at organizations of all types and sizes, real available solutions, and significant revenue generated. Learn more in this white paper.
Tags : 
vpn, ssl, nac, network access control, access control, remote access, remote access security, aventail
    
Aventail
Published By: Aventail     Published Date: Aug 21, 2009
In this white paper mobility expert Peter Rysavy discusses how Aventail SSL VPNs provide one secure gateway for access from any device, ensuring only authorized users get access to resources. And, with access that's optimized for specific device types, users only see information that's relevant to them at the time of access.
Tags : 
ssl, vpn, encryption, secure remote access, ssl vpn, secure mobile, mobile workers, secure mobile device
    
Aventail
Published By: Clearvale by BroadVision     Published Date: Aug 21, 2009
The move towards self-service is clearly about mitigating costs. But self-service models can also deliver significant benefits to users when they combine the best of online convenience with the insight and personal touch of an experienced sales or service rep.
Tags : 
self service, customer service, customer relationship management, crm, live support, online help, online support, cost control
    
Clearvale by BroadVision
Published By: ClearNova     Published Date: Aug 21, 2009
In the 1990s, client/server was the predominant architecture used to build business applications. The applications had rich functionality, were responsive, and satisfied users' needs. Client/server worked in a time where the only networks were the ones owned and controlled by the enterprise and the only user base was internal.
Tags : 
internet apps, web applications, web application, web application development, j2ee, open source, ajax, web architecture
    
ClearNova
Published By: HP     Published Date: Aug 21, 2009
Read this guide to learn how HP works closely with organizations throughout the entire consolidation process which results in reduced costs, improved database administration, enhanced service levels to end users, and improved communication/collaboration.
Tags : 
data management, database development, dba, database administration, collaboration, service levels, database consolidation
    
HP
Published By: iDirect     Published Date: Aug 21, 2009
With developments in IP networking in general and the Internet in particular, the ability to transmit voice calls which have been traditionally handled by the public switched telephone network (PSTN) over a lower cost IP infrastructure has become a reality. More and more users are researching VoIP capability when purchasing a connection to the Internet or simply expanding their private intranet.
Tags : 
voice over ip, ip telephony, voip, ip networking, ip networks, pstn, telephone, phone
    
iDirect
Published By: Internet Security Systems     Published Date: Aug 21, 2009
Voice over Internet Protocol (Voice over IP or VoIP) allows users to make phone calls over the Internet, or any other IP network, using the packet switched network as a transmission medium rather than the traditional circuit transmissions of the PSTN. As the technology has become more reliable in recent years, companies have been moving to VoIP for a number of reasons.
Tags : 
voip, voice over ip, ip telephony, voip security, secure voip, pstn, network security, internet security
    
Internet Security Systems
Published By: Meru Networks     Published Date: Aug 21, 2009
As wireless LAN deployments and usage has increased, coupled with the near ubiquity of embedded Wi-Fi in laptops and smart phones, many enterprises are experiencing complaints from their users of slow or even dropped connections.
Tags : 
wlan, wireless lan, wifi, wi-fi, wlan deployment, pervasive wlan, ubiquitous wlan, microcells
    
Meru Networks
Published By: NitroSecurity     Published Date: Aug 21, 2009
NitroSecurity's Active Network Response is a new security model that delivers network protection closer to the users at the network edge - stopping attacks before they can propagate throughout the network. 
Tags : 
network security, intrusion prevention, hackers, hacker detection, ips, anr, nitro security, nitrosecurity
    
NitroSecurity
Published By: Objectivity     Published Date: Aug 21, 2009
As business users expand to newer types of applications, and grow older ones, their attempts to use RDBMS encounter the "Relational Wall," where RDBMS technology no longer provides the performance and functionality needed. This paper measures the wall, explains what model and architectural differences cause it, how to foresee it, and how to avoid it.
Tags : 
database, rdbmss, object, object-oriented, object oriented, database performance, database development, database architecture
    
Objectivity
Published By: OpSource     Published Date: Aug 21, 2009
End users are demanding it and competitors are already providing it, but how do software companies overcome the model, code, and operational issues preventing them from bringing SaaS to market? Read this paper to learn more about the hows and whys of SaaS.
Tags : 
saas, software as a service, service management, opsource
    
OpSource
Published By: PassGo     Published Date: Aug 21, 2009
Management of user ID accounts is expensive for business, frustrating for users, and open to abuse. A user account Helpdesk in a large organization typically deals with many thousands of Helpdesk calls each year, and the costs surrounding this are significant. Any operation that requires human intervention can become a bottleneck during especially busy periods.
Tags : 
crm, customer relationship management, customer service, helpdesk, help desk, support, cost control, productivity
    
PassGo
Published By: RuleStream     Published Date: Aug 21, 2009
Capturing product knowledge has proven to be very difficult and early attempts at building systems to capture and reuse knowledge have failed because they were too limited technically, required users to be able to develop computer codes (or programs) to embody knowledge rules and actions, and they did not work with common product design tools such as CAD and PDM systems.
Tags : 
product design, product development, product information, pim, product information management, product lifecycle management, computer aided design, computer-aided design
    
RuleStream
Start   Previous    57 58 59 60 61 62 63 64 65 66 67 68 69 70 71    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.