RecruitingBlogscom

Follow Us:

 

overview

Results 251 - 275 of 670Sort Results By: Published Date | Title | Company Name
Published By: Marketo     Published Date: Mar 23, 2015
In this on-demand demo, learn how leading enterprise marketing teams are leveraging Marketo’s customer engagement platform to increase lead conversion, improve marketing ROI and integrate social campaigns.
Tags : 
marketo, enterprise marketing, customer engagement, customer engagement platform, conversion rate, marketing roi, lead qualification, lead nurture, crm & customer care
    
Marketo
Published By: Marketo     Published Date: Mar 25, 2015
In a world where one-to-one personalization and individual relationships are a necessity to ensure marketing campaigns drive action, Consumer Engagement Marketing enables marketers to respond to a wide variety of individual behaviors in real-time with personalized content, dramatically increasing click-through rates, engagement, revenue, and ROI.
Tags : 
marketo enterprise, marketing campaigns, consumer engagement marketing, roi, click-through rates, personalized content, emerging marketing
    
Marketo
Published By: AWS     Published Date: Nov 15, 2018
Businesses are generating staggering amounts of data—and extracting the most value from this information is paramount. Amazon Redshift provides organizations what they’re looking for: Affordability and flexibility combined with a powerful feature set. Download our solution overview covering some of the best practices on loading data and making the most of Amazon Redshift, including: • Loading data for faster results • Querying data for gaining actionable insights • Creating a schema to forgo complicated queries, saving time
Tags : 
    
AWS
Published By: Adobe     Published Date: Jun 16, 2017
Watch this video to discover how creative cloud collaboration can drastically improve work flow.
Tags : 
cloud, adobe, creative cloud collaboration, work flow
    
Adobe
Published By: Epson     Published Date: Jul 27, 2017
From assembly and pick-and-place to material handling and packaging, the use of robots is on the rise in factory automation. Extremely customizable in even the most complex applications, automation systems are beneficial for a wide variety of reasons. Taking the plunge into automation, however, can be confusing and daunting. With so many factors to consider, you may be wondering, “Where do I start?” With over 35 years of experience in the automation industry, we have broken down the process, step-by-step, to guide you on your journey. Keep in mind that this guide is a broad overview, but can serve well as a starting point for those new to automation.
Tags : 
automation, robotics, tutorial, efficiency, assembly, packaging
    
Epson
Published By: Dassault Systèmes     Published Date: Aug 08, 2017
Intellectual Property (IP) is the life-blood of your Aerospace & Defense business. It’s the product designs that required thousands of man-hours and millions of dollars to create, or the 10-year strategy overviews that can give a competitor a huge advantage. The stakes for safeguarding IP within the Aerospace & Defense industry are at an all-time high, given the costs, complexity and potential military applications of their products. Read this White Paper to learn how you can secure and manage your IP by implementing the right strategy.
Tags : 
intellectual property, aerospace, defense business, product design, security
    
Dassault Systèmes
Published By: CA Technologies EMEA     Published Date: May 29, 2018
From startups to established companies, containers help meet the demands of a modern digital business –supporting massively scalable, portable and fast to deploy apps. Engineered for the Modern Applications, Built by Modern Teams. Yes, it’s complex. And yes, there is much to consider. Start here for a quick overview of the essentials of container monitoring.
Tags : 
    
CA Technologies EMEA
Published By: Tenable     Published Date: Feb 05, 2018
"This IDC Technology Spotlight examines the evolution of vulnerability management. By leveraging the cloud and new technologies that deliver greater visibility, organizations can gain an accurate picture of their assets and overall risk posture. This is a critical step toward addressing the current landscape where attackers are using a wide variety of vectors such as mobile, social, and cloud-based attacks to infiltrate organizations and steal data. By reading this report you will get an overview of: - Benefits of cloud-based security and vulnerability management - Challenges of adopting cloud-based vulnerability management - IDC assessment of Tenable.io cloud vulnerability management"
Tags : 
vulnerability management, analyst report, idc
    
Tenable
Published By: Sprinklr     Published Date: Mar 13, 2018
"“Analyze This” highlights key points from recent Forrester Wave Reports to help you work smarter. Read on for an overview of what Forrester – and Sprinklr – say about: - Social Advertising Technology - Content Marketing Platform - Social Media Management Solutions"
Tags : 
    
Sprinklr
Published By: Arbor Networks     Published Date: Jan 18, 2013
This Frost & Sullivan whitepaper provides an overview of the latest DDoS attack trends, and offers examples of how cloud service and hosting providers can use Arbor Networks solutions to protect their data centers from DDoS attacks and increase revenue by offering Arbor-based, managed DDoS protection services.
Tags : 
ddos, arbor networks, cloud services, protection, data center, ddosattack, hosting provider, business technology
    
Arbor Networks
Published By: Marketo     Published Date: Jun 26, 2015
In this on-demand demo, learn how leading enterprise marketing teams are leveraging Marketo’s customer engagement platform to increase lead conversion, improve marketing ROI and integrate social campaigns.
Tags : 
enterprise management, marketing roi, best practices, integration, lead generation, email marketing, enterprise applications
    
Marketo
Published By: ArcSight     Published Date: Mar 03, 2009
This document provides an overview of the drivers for Log Management scalability and outlines the key requirements to consider as part of the evaluation process.
Tags : 
log management, security, fraud, insider threat, suspicious network activity, pci dss, hipaa, sox, application security, arcsight, mission critical assets, networking
    
ArcSight
Published By: F5 Networks Inc     Published Date: Jan 22, 2009
This white paper is focused on the design and architecture of an OCS 2007 environment in an HP BladeSystem infrastructure. The document outlines a building block approach to deploying OCS on the HP BladeSystem and focuses on how the design decisions around levels of availability, scalability, and the OCS 2007 feature set impact the hardware that is deployed and the version of OCS that is used. The white paper also covers a brief overview of the Microsoft Unified Communications framework including Microsoft Exchange Server 2007 and Office Communications Server 2007 and an overview of the HP BladeSystem architecture and how the HP BladeSystem can help lower the total cost of ownership (TCO).
Tags : 
hp bladesystem, ocs, voip, storage
    
F5 Networks Inc
Published By: VMware     Published Date: Feb 26, 2009
This flash provides an overview of how CA ARCserve® Backup r12 provides several new disaster recovery enhancements, including an easy-to-use Disaster Recovery wizard. Together with the replication and application failover functionality in CA XOsoft™ Replication and CA XOsoft™ High Availability, and the integrity testing features in CA XOsoft™ Assured Recovery, these tools enable you to recover servers, applications, and data swiftly and effectively.
Tags : 
ca arcserve, ca xosoft, vmware, restoring database application, bootable cd, bootable tape, cdp, database sessions, simple recovery procedures, iis vm, non-disruptive testing, recovery enhancements, security, storage, data management
    
VMware
Published By: BMC Control M     Published Date: Dec 07, 2009
Watch a 2-minute overview of BMC CONTROL-M and make the switch to enterprise workload automation.
Tags : 
bmc control-m, enterprise workload automation
    
BMC Control M
Published By: Zebra Technologies     Published Date: Mar 25, 2010
Mobile printing provides a series of quality improvements and timesaving benefits that are often overlooked in route automation, but can have a significant impact on the bottom line. This white paper will: • Describe uses for mobile printing in route accounting applications; •Provide return on investment calculation tools to measure the financial impact mobile printing can have; • Demonstrate how mobile printing processes can improve billing, distribution, and customer service operations; • Detail how on-demand thermal printing can reduce forms expenses; • Provide an overview of mobile printer and wireless communications options for route accounting systems. Read on to see how your route delivery and sales staff can make more stops and fewer errors each day by using mobile printing to support their work.
Tags : 
zebra technologies, dsd, manufacturing, mobile printing, wireless printing
    
Zebra Technologies
Published By: Cisco Systems, Inc.     Published Date: May 25, 2010
This document provides a technical overview of the Cisco Digital Media System for Cisco Desktop Video and its main components.
Tags : 
cisco digital media, desktop video, digital signage, multimedia, video management software
    
Cisco Systems, Inc.
Published By: VMware     Published Date: Apr 08, 2011
Watch this video for an educational overview that explains how virtualization can help your business.
Tags : 
vmware, vm ware, dell, layered tech, virtualization
    
VMware
Published By: Citrix Systems and Wyse     Published Date: Jun 07, 2011
In this whitepaper, IDC explores the challenges facing companies looking to implement the technology, discusses the market forecast and provides an overview of the benefits of Virtual Client Computing.
Tags : 
citrix, wyse, thin client, desktop virtualization, zero client, xendesktop, virtual client computing
    
Citrix Systems and Wyse
Published By: YouSendIt     Published Date: Apr 19, 2012
This white paper provides a brief overview of the trend toward consumerized IT and Osterman Research's recommendations for addressing it.
Tags : 
yousendit, manufacturing, email maketing, ecommerce, healthcare, business managers, email, marketing, collaboration, productivity, revenue, sharing, workforce, email marketing, emerging marketing, internet marketing, crm & customer care, marketing research, e-commerce
    
YouSendIt
Published By: Citrix Systems     Published Date: Feb 10, 2016
Empirical data from our individual Product Analysis Reports (PARs) and Comparative Analysis Reports (CARs) is used to create the unique Security Value MapTM (SVM). The SVM provides a quick, clear overview of the relative value of security investment options by mapping security effectiveness and value (TCO per protected-CPS) of tested product configurations.
Tags : 
    
Citrix Systems
Published By: IBM US Smarter Buildings     Published Date: Dec 20, 2011
Jack Porco from William Beaumont Hospital and Mike Stephens from Atkins give an overview of their use of IBM Maximo Asset Management for facilities management and how it helped them run their buildings... smarter.
Tags : 
ibm, smarter buildings, solutions, asset management, finance
    
IBM US Smarter Buildings
Published By: IBM US Smarter Buildings     Published Date: Dec 20, 2011
This high-level Flash video provides an overview of how the IBM Smarter Planet campaign can help improve facilities management. By using IBM Maximo Asset Management, facilities managers are enabled to create smart buildings that reduce overall energy use and are operationally efficient.
Tags : 
ibm, asset management, maximo, flash video, smarter planet, energy, efficiency, finance
    
IBM US Smarter Buildings
Published By: CDW     Published Date: Jun 10, 2013
Securing your network requires more than just new hardware and software. It’s abouta change in your organization’s culture to a more security-conscious environment. Your staff needs strong and diverse passwords.
Tags : 
cdw, external threats, malware, defense, internal threats, security
    
CDW
Published By: Nimble Storage     Published Date: Oct 28, 2013
Storage is a critical factor when virtualizing your business-critical applications like Exchange, SharePoint, SQL Server, and Oracle databases. What features should you look for when selecting a storage vendor? Download this tech overview to learn how flash-optimized Nimble Storage accelerates performance, maximizes utilization, and cost-effectively protects your mission-critical data.
Tags : 
nimble storage, data storage, backup, disaster recovery, flash memory, data protection, ssd, hybrid storage, high-performance storage, storage efficiency, storage management, storage for vdi, storage for virtualized servers, storage for private cloud, storage for vmware, storage for oracle, storage for microsoft, storage for exchange, storage for sharepoint, storage
    
Nimble Storage
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top