RecruitingBlogscom

Follow Us:

 

overview

Results 326 - 350 of 660Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Dec 09, 2008
Watch an overview of IBM Information Server FastTrack, a revolutionary new module of the IBM Information Server. IBM Information Server FastTrack was designed to help enterprises of all sizes maximize team collaboration, facilitate automation and help ensure projects are completed successfully and on time. By creating an integrated environment that includes business analysts, developers and data modelers, Information Server FastTrack accelerates collaborative development across user roles, products and geographies.
Tags : 
ibm, fasttrack, ibm information server, server fasttrack, data integration projects, project completion, ibm information server fasttrack, process automation, storage
    
IBM
Published By: IBM     Published Date: Dec 30, 2008
Don’t just dump your data - get the most value from it, and see how IBM is redefining what a warehouse can deliver.  IBM DB2 Warehouse is a dynamic, integrated data warehousing solution that delivers all the functions required to deploy, maintain, and evolve an intelligent data warehouse. It makes your data active and available to all the users you need to reach. Watch this video to hear more.
Tags : 
ibm, integrated data warehousing, intelligent data warehouse, dwe, data management
    
IBM
Published By: IBM     Published Date: Sep 10, 2009
You feel the same pressures to secure your data as a massive corporation does, but without the massive budget. This white paper gives an overview of next-generation data protection and recovery options designed and priced for small and mid-sized business.
Tags : 
ibm, data protection and recovery options, disaster recovery, application protection and recovery, e-mail object recovery, business continuity and resiliency
    
IBM
Published By: IBM     Published Date: Oct 13, 2009
Explore a topic often overlooked during discussions about data security: the risk of insider threats. This report, "Stopping insider attacks: how organizations can protect their sensitive information," provides an overview of the issue of insider attacks and offers suggestions that may help organizations mitigate their risk. Plus, listen to a podcast about stopping insider threats.
Tags : 
sensitive information, ibm, personal data privacy, global business security, threats, malware, insider attacks
    
IBM
Published By: IBM     Published Date: Oct 21, 2009
The purpose of this white paper is to provide an overview of next-generation data protection and recovery options that are designed and priced specifically for small and midsized businesses (SMBs).
Tags : 
data protection, ibm, recovery point objective, rpo, backup, ngdp, disk-based backup, disaster recovery, business continuity, tivoli
    
IBM
Published By: IBM     Published Date: Nov 17, 2009
This paper provides an overview of what is required to create an environment to leverage information dynamically for innovation and competitive advantage.
Tags : 
content management, information management, data integration, ibm, li campaign, ibm li, leveraging information, data management
    
IBM
Published By: Inovis     Published Date: Aug 06, 2007
This white paper provides an overview of the growing opportunities for EDI managers and coordinators. It highlights how their role can change from being responsible for implementation of technologies for operational activities to being infrastructure leaders. It shows how they can deliver increased efficiencies and velocity for value chain automation, which increases visibility, control and agility for a business.
Tags : 
edi, electronic data interchange, electronic data, inovis, supply chain, manufacturing, productivity, infrastructure, bpm, bpa, business process, roi, spend management, cost control, xml, data management
    
Inovis
Published By: ESET     Published Date: Feb 01, 2008
With the ever evolving threat landscape, what will 2008 hold for IT Managers?  This podcast provides a high level overview of a few trends to watch for this year.
Tags : 
2008 predications, it security predictions, it security, mobile devices, laptops, endpoint, operating systems, antivirus, spam, viruses, trojans, rootkits, malware, threats, eset, nod32, trends, security, networks, spyware
    
ESET
Published By: Landslide Technologies     Published Date: Apr 21, 2008
What sales is has not changed. How sales are accomplished is changing radically. In this first of a two-part whitepaper,  we present an overview of the state of sales today, supported by metrics from our 2007 Sales Performance Optimization survey.  The differences between S1.0 and S2.0 are represented in the comparison between old-style circus companies and  the modern circus (think Ringling Bros. vs. Cirque du Soleil).
Tags : 
sales, sales 2.0, landslide, crm, metrics
    
Landslide Technologies
Published By: LandslideCRM     Published Date: May 17, 2012
What sales is has not changed. How sales are accomplished is changing radically. In this first of a two-part white paper,  we present an overview of the state of sales today, supported by metrics from our 2007 Sales Performance Optimization survey.  The differences between S1.0 and S2.0 are represented in the comparison between old-style circus companies and  the modern circus (think Ringling Bros. vs. Cirque du Soleil).
Tags : 
sales, sales 2.0, landslide, crm, metrics
    
LandslideCRM
Published By: Microsoft Exchange     Published Date: Oct 02, 2008
Today’s business requirements—such as security, disaster recovery, and mobility—are more extensive than ever before. To meet these requirements, Microsoft® Exchange has extended its reach beyond simple e-mail to increase user productivity and keep information close at hand, while being flexible enough to meet your organization’s administrative model.
Tags : 
microsoft exchange, exchange, productivity, microsoft, exchange server, it management
    
Microsoft Exchange
Published By: Progress Software BTA Financial     Published Date: Oct 15, 2008
This Assessment Guide helps you to create a high-level overview for each business-critical application, detailing the context of the application, highlighting risk factors and overall effectiveness of each application. This assessment, in turn, will provide a foundation for further investigation and actions to optimize the outcomes of your business-critical transactions and mitigate risk.
Tags : 
soa risks, application risks, integration risks, actional, application assessment, progress software, soa infrastructure, soa security, it governance, soa, soa governance
    
Progress Software BTA Financial
Published By: Progress Software BTA Telecommunications     Published Date: Oct 15, 2008
This Assessment Guide helps you to create a high-level overview for each business-critical application, detailing the context of the application, highlighting risk factors and overall effectiveness of each application. This assessment, in turn, will provide a foundation for further investigation and actions to optimize the outcomes of your business-critical transactions and mitigate risk.
Tags : 
soa risks, application risks, integration risks, actional, application assessment, progress software, soa infrastructure, soa security, it governance, soa, soa governance
    
Progress Software BTA Telecommunications
Published By: Citrix Online     Published Date: Jun 09, 2010
This new TSIA white paper provides an overview of Web collaboration, explores how companies are utilizing its capabilities within technical support and details its business value.
Tags : 
citrix gotoassist, remote support platform, web collaboration
    
Citrix Online
Published By: NetIQ     Published Date: Jul 07, 2011
Controlling distribution of passwords to highly sensitive environments in no longer enough; learn more about Privileged identity management (PIM) and what you can do to monitor and control your business to finest level of detail possible.
Tags : 
netiq, pci compliance, file integrity monitoring, fim, report on compliance, roc, audit, forrester, fraud management, pattern recognition
    
NetIQ
Published By: Digital Realty     Published Date: Apr 13, 2011
Digital Realty Trust conducts an annual survey of senior executives from enterprise sized companies to capture their perspectives on the industry. This paper provides an overview of the study's major findings.
Tags : 
digital realty trust, enterprise data center, pue, capacity expansion, diy, data center market
    
Digital Realty
Published By: IBM Corporation     Published Date: Jun 28, 2011
IBM CloudBurst is a family of built-for-purpose, workload-specific cloud computing packages that provide IT executives with the capabilities required for a Dynamic Infrastructure. View this complimentary demonstration video to learn more.
Tags : 
ibm, enterprise asset management, cloud computing, ibm cloudburst, dynamic infrastructure
    
IBM Corporation
Published By: IBM Corporation     Published Date: Jun 30, 2011
This menu interface provides a high-level overview, product demonstrations, expert interviews, and resource links for the IBM Data Center Automation solution.
Tags : 
automation, launchpad, ibm, isms, ibm data center, data recovery, wireless internet, business intelligence, 802.11, wi-fi, authentication, vulnerability, san, nas, crm, erp, wireless security, wireless lan, communications software, converged networks
    
IBM Corporation
Published By: IBM Corporation     Published Date: Jun 30, 2011
This menu interface provides a high-level overview, product demonstrations, expert interviews, and resource links for the IBM Energy Management solution.
Tags : 
energy management, tivoli, disaster prevention, infrastructure, bms, building management system, ecosystem, opc, power and cost savings, energy optimization
    
IBM Corporation
Published By: IBM     Published Date: Jul 24, 2012
Join fundraising consultant and author Joshua Birkholz and IBM for an overview of the impact predictive analytics can have on your fundraising programs. We'll explore how this data-based approach can help you
Tags : 
ibm, technology, business, fundraising, analytics, donor, finance
    
IBM
Published By: SAP     Published Date: May 11, 2012
The objective of this paper is to provide an introduction to "location-based intelligence" as it relates to the common view of an "address," as well as provide an overview of geocoding and geographic data services.
Tags : 
location-based intelligence, geocode, geographic data services, reverse geocoding, address cleansing, enterprise applications, business technology
    
SAP
Published By: Intel     Published Date: Aug 10, 2012
3rd generation Intel® CoreT vProT overview covering threat management, identity and access, data protection, and monitoring and remediation.
Tags : 
security, it management, it security, total cost of ownership, tco, intel, solutions, speed, manageability, return on investment, roi, threat management, hardware-based, identity, monitoring, remdiation, reporting, data management, business technology
    
Intel
Published By: Intel     Published Date: Aug 10, 2012
3rd generation Intel® CoreT vProT overview animation covering threat management, identity and access, data protection, monitoring and remediation.
Tags : 
security, it management, it security, total cost of ownership, tco, intel, solutions, speed, manageability, return on investment, roi, threat management, hardware-based, identity, monitoring, remdiation, reporting, animation, business technology, data center
    
Intel
Published By: CDW     Published Date: Mar 31, 2015
Why should you consider Microsoft Azure? Benefits include improved efficiency and agility, scalability, lower IT costs and a consistent user experience between Microsoft's Cloud and your cloud. CDW Principal Consulting Engineer Matt Riley also says Microsoft Azure offers multi-factor authentication, giving users a more robust identity management structure, allowing them to automatically provision users. Watch this webinar to learn more about Microsoft Azure.
Tags : 
microsoft azure, scalability, user experience, authentication, security, it management, knowledge management, data management
    
CDW
Published By: CDW     Published Date: Jun 25, 2015
Receive additional savings of up to 17% on top of your current discount level, and get a trusted, hassle-free PDF solution for your organization. Overview of Adobe Acrobat CLP Program.
Tags : 
adobe, cdw, clp pack, content management
    
CDW
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top