ngo

Results 276 - 300 of 352Sort Results By: Published Date | Title | Company Name
Published By: StrikeIron     Published Date: Aug 01, 2013
For internal and external applications, Web API’s provide flexibility and unlock the value of your data and software. However, ongoing API development, deployment and delivery require extensive domain knowledge in operating an enterprise-class infrastructure. Without this expertise, scalability, reliability, and security are compromised.
Tags : 
cloud computing, colocation and web hosting, web service security, soap web development, web services, web service security, xml, mobile computing, mobile data system, wireless application software, content integration, application integration, content delivery, edi
    
StrikeIron
Published By: CSB by Cornerstone on Demand     Published Date: Jun 26, 2013
Need to fix your company's performance management? Want to make woeful performance reviews a thing of the past? Collect actually useful data and actually use it? Build a robust people strategy? Ensure your company's ongoing success? Take over the world (of successful performance management)? Download this paper to learn more.
Tags : 
performance management, human resources
    
CSB by Cornerstone on Demand
Published By: Jive Software     Published Date: Jun 26, 2013
Balancing customer service quality and costs is an ongoing battle for most organizations. Superior service means higher labor spend, but shunting customers into long support queues and confusing self-help areas costs companies loyalty and retention. Conventional technologies don’t help much: They’re fragmented, with no unified view of customer interactions; they don’t provide effective peer-based support, leaving customers frustrated and dissatisfied; and they do nothing to improve retention, knowledge-sharing and overall enablement of service rep teams. Learn how social business tools eliminate the conventional cost/quality trade-offs.
Tags : 
customer service, customer service quality, customer experience, customer experience/engagement
    
Jive Software
Published By: Teradata     Published Date: Jun 12, 2013
In March of 2011, CFO Research Services conducted a survey among more than 200 senior finance executives primarily in the United States to explore how well companies' information systems are supporting finance executives' ongoing efforts to transform the finance function into a value-added partner to the business. Especially in the aftermath of a worldwide recession, do CFOs and their staffs have the information they need to deliver real business value throughout the organization? How well equipped are they to provide the kinds of critical and useful business analytics that can drive the company forward? Download this paper to learn the findings of our research.
Tags : 
financial analytics, teradata, it complexity
    
Teradata
Published By: Percussion     Published Date: Jun 11, 2013
This paper will explore how WCMS buyers can assess the costs associated to buy, customize and maintain prospective solutions. We will examine the five key areas of cost: User Adoption, Initial Implementation, Upgrades and Ongoing Re-implementation, Maintenance and Support Cost and Application Integration
Tags : 
cms, cms best practices, cms software, content marketing, content marketing platform, digital content management, content marketing platform, wcms, wcms software, web based cms, website cms, content management systems
    
Percussion
Published By: HireRight     Published Date: May 01, 2013
Employee screening is a critical capability for organizations today. No longer just a part of the hiring process, employee background checks, eligibility verification and even tax credit screening are increasingly part of the ongoing talent life cycle. Aberdeen Group’s latest survey on talent acquisition strategies looked at the practices of over 480 organizations for best practices used and results delivered through the use of employee screening tools and solutions.
Tags : 
employee screening strategies, human resources, hireright
    
HireRight
Published By: IBM     Published Date: Apr 04, 2013
What is a workload-optimized system? Simply put, it is one that matches architecture to the needs it is purchased for. Systems performance is no longer defined only by the fastest processor or other leading benchmarks, but rather by the ability to deploy new services faster, with higher quality, and within financial objectives. Commoditization has led some to think that financial objectives will lead to Intel-based systems for all uses. In this Advisory, we show that this is not the case, and by way of example, we demonstrate how Power Systems can be less expensive for ongoing operational costs and initial outlay.
Tags : 
business value, processor, new services faster, higher quality, financial objectives, intel-based, commoditization
    
IBM
Published By: Adobe     Published Date: Mar 07, 2013
This paper discusses the different attribution models available to marketers, the channels that should be included when conducting multichannel attribution modelling and recommendations for making attribution a part of your ongoing strategy.
Tags : 
budget allocation, marketing, multichannel marketing, digital marketing, adobe, attribution modelling, emerging marketing
    
Adobe
Published By: Tripwire     Published Date: Feb 08, 2013
John Gilligan, former CIO of the U.S. Air Force and the U.S. Department of Energy, led the development of this document; it represents a consensus of government and nongovernment experts.
Tags : 
cyberdefender, security, federal, government, sans 20 sc, dhs, defense
    
Tripwire
Published By: McAfee     Published Date: Feb 06, 2013
This paper explores the subject of continuous compliance versus audit-driven compliance, as well as how an ongoing approach to compliance makes compliance a positive force for securing data and systems.
Tags : 
continuous compliance, siem, continuous pci dss 2.0, fisma, security monitoring, pci compliance
    
McAfee
Published By: Sangoma     Published Date: Jan 30, 2013
The most cost-effective, easiest to provision, and easiest to manage line of SBCs on the market. Sangoma’s Vega Enterprise SBC VM/Software provides full-featured protection and easy interconnection at the edge of enterprise networks.
Tags : 
sbc, vega sbc enterprise, vm/software, sangoma, session boarder control, ip communication
    
Sangoma
Published By: Sangoma     Published Date: Jan 30, 2013
The most cost effective, easiest to provision, and easiest to manage line of Session Border Controllers on the market. Sangoma’s Vega Enterprise SBC VM/Hybrid provides full-featured protection and easy interconnection.
Tags : 
vega sbc, enterprise, vm hybrid, data sheet, easy to use, cost effective, sbc solution
    
Sangoma
Published By: Sangoma     Published Date: Jan 30, 2013
The most cost effective, easiest to provision, and easiest to manage line of SBCs on the market. Sangoma's Vega Enterprise SBC provides full-featured protection and easy interconnection at the edge of enterprise networks.
Tags : 
sbc, enterprise appliance, vega sbc, sangoma, datasheet, cost effective solution
    
Sangoma
Published By: Sangoma     Published Date: Jan 30, 2013
Sangoma has introduced the most cost-effective, easiest to provision and easiest to manage line of enterprise SBCs on the market. The four available options deliver maximum flexibility when selecting a solution -- Learn how they can help you.
Tags : 
sangoma session border controllers, sbc series, carriers, enterprise, cost effective, easy to manage, sbc
    
Sangoma
Published By: Sangoma     Published Date: Jan 30, 2013
IP communications across multiple, sometimes untrusted, networks needs to be normalized, managed and secured. As part of the most cost-effective, easiest to manage line of Session Border Controllers on the market. Read to learn how they can help you.
Tags : 
ip communications, sangoma, ip firewall, datasheet, sangoma, session border control, carrier appliance
    
Sangoma
Published By: Websense     Published Date: Jan 25, 2013
Websense Security Labs discovers and investigates today’s advanced security threats and publishes its findings. This information is used not only to inform the public, but also to inform the ongoing development by Websense of sophisticated security.
Tags : 
websense threat report, security, websense, sophisticated security, web security, phishing
    
Websense
Published By: Lumension     Published Date: Jan 22, 2013
With ongoing compliance and evolving attacks against vulnerable endpoint devices, getting a handle on managing endpoints becomes more important.
Tags : 
endpoint management, security, compliance, patch management, file integrity monitoring, device control
    
Lumension
Published By: Lumension     Published Date: Jan 22, 2013
Keeping track of 10,000+ of anything is a management nightmare. With ongoing compliance and evolving attacks against vulnerable endpoint devices, getting a handle on managing endpoints becomes more important.
Tags : 
endpoint management, security, compliance, patch management, file integrity monitoring, device control
    
Lumension
Published By: IBM     Published Date: Nov 14, 2012
No matter what your business sells, where it operates or who its customers are, its ongoing success might ultimately depend on the answers to three simple questions. Read on to learn how these questions may help business success.
Tags : 
transaction integrity, integral business success, ibm, it systems
    
IBM
Published By: CDW     Published Date: Nov 12, 2012
In organizations of every size, data center optimization has become an ongoing focus of attention.
Tags : 
data center optimizations, data centers, converged infrastructure, reference architecture
    
CDW
Published By: IBM     Published Date: Oct 24, 2012
If you met a valued customer face to face, you'd probably greet the person with a smile and a "hello." You'd want the communication and ongoing discussion to be personal and specific to the individual. Deliver -- Learn to connect with your users.
Tags : 
ibm, analytics, consumer behavior, consumer interaction, communication, email marketing, internet marketing
    
IBM
Published By: Dell Storage     Published Date: Aug 14, 2012
Engagement with customers online has evolved from novelty to necessity, with an estimated $202 billion spent in 2011 and projected 10% growth to $327 billion in 2016, according to Forrester Research. Businesses are maneuvering to connect with the growing pool of online customers, but the move to eCommerce brings new security risks with the exchange of sensitive consumer information, including cardholder data and personally identifiable information that can enable identity theft. At stake is reputation of brand, ongoing access to merchant credit lines, and substantial penalties and remediation in the event of a breach. This white paper elucidates the aspects of PCI DSS (Payment Card Industry Data Security Standards) compliance that must be considered when choosing a secure environment for servers involved in eCommerce. Whether deciding to outsource or keep data hosting in-house, any company collecting, storing or transmitting customer cardholder data needs to be compliant, and this document helps pinpoint the specific concerns and standards a company should be aware of when choosing how to keep their data secure. Understanding requirements and best practices for security policies and procedures, physical safeguards, and security technologies is essential to establishing cardholder data security and meeting QSA and SAQ audit requirements.
Tags : 
pci, compliant, data, centers, engagement, connect, ecommerce, compliance, complaint, data, breach, remediation, dss, payment, card, industry, data, security, standards, qsa
    
Dell Storage
Published By: SAP     Published Date: Jul 17, 2012
Relational database management systems (RDBMSs) are systems of software that manage databases as structured sets of tables containing rows and columns with references to one another through key values. They include the ability to optimize storage, process transactions, perform queries, and preserve the integrity of data structures. When used with applications, they provide the beating heart of the collection of business functions supported by those applications. They vary considerably in terms of the factors that impact the total cost of running a database application, yet users seldom perform a disciplined procedure to calculate such costs. Most users choose instead to remain with a single vendor's RDBMS and never visit the question of ongoing hardware, software, and staffing fees.
Tags : 
sap, infrastructure, database, data management, white paper, management, storage, business functions
    
SAP
Published By: Box.net     Published Date: Jun 27, 2012
Cloud apps continue to gain momentum in the enterprise as buyers are attracted to fast deployment speeds, low upfront costs, and ongoing flexibility to scale up or down as needs change.
Tags : 
cloud apps, deployment speeds
    
Box.net
Published By: Rapid7     Published Date: May 22, 2012
The ongoing struggle to prevent hackers from breaching assets and malware from gaining a foothold requires a vulnerability management strategy that begins with a comprehensive measurement of security risk. Organizations must examine the entire IT stack, including the operating system, network, applications, and databases. These new technologies include dynamic, virtualized environments and services outside traditional physical IT infrastructures, such as virtualized, cloud-based services and social networking.
Tags : 
security, risk management, security intelligence, security assessment, prevent data breach, cyber security, vulnerability management, penetration testing, data breach, breach
    
Rapid7
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.