RecruitingBlogscom

Follow Us:

 

overview

Results 476 - 500 of 664Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jul 31, 2015
This guide provides a quick overview of the solutions IBM offers aligned to the three ‘imperatives’ facing the retail industry - to deliver a Smarter Shopping Experience, to build Smarter Merchandising and Supply Networks and to drive Smarter Operations.
Tags : 
ibm, retail solutions, retail industry, supply networks, omni-channel commerce, retail security, performance insights
    
IBM
Published By: Cornerstone OnDemand     Published Date: Jan 31, 2018
Over the past decade, talent management initiatives have become a critical priority for organizations. While CEOs see the business value of talent management— typically talent acquisition, learning, performance, talent mobility, compensation, and analytics—some organizations have found it challenging to quantify the business impact or return on such investments. If you are looking for help in building a talent management business case, this overview was created for you.
Tags : 
    
Cornerstone OnDemand
Published By: Net Atlantic     Published Date: May 28, 2010
During our live demo, you'll get an overview of Net Atlantic's Email Marketing Suite, tips to help make your email marketing campaigns more successful, mistakes to avoid, and a review of tools for effective email marketing. This one-hour session is perfect if you are new to Net Atlantic or interested in learning about our advanced capabilities, including segmentation, triggered and sequential mailings, and much more. Marketers focus on four basic elements in their campaigns; the list, the message, delivery, and measurement. We'll discuss the important factors of each. Our overview covers: •Logging into your list •Managing your members •Creating content •Sending mailings •Checking the results of your campaigns •And much more. This webinar will take around 30-45 minutes with time left over for Q&A. Register now using the form to the right. Webinar Details: "Email Marketing with Net Atlantic" presented by Gregg Hanson Date: Every Wednesday Time: 1:00PM EDT; 10:00AM PDT (1 Hour)
Tags : 
net atlantic, webinar, live event, email marketing
    
Net Atlantic
Published By: Cisco     Published Date: Nov 18, 2015
Cisco® Validated Designs provide the foundation for systems design based on common use cases or current engineering system priorities. They incorporate a broad set of technologies, features, and applications to address customer needs. Cisco engineers have comprehensively tested and documented each Cisco Validated Design in order to ensure faster, more reliable, and fully predictable deployment. This design guide summary provides you with an overview of the Cisco Intelligent WAN Design Guide, the key technology, the use cases it provides, and additional and related resources.
Tags : 
cisco, intelligent wan, validated designs, systems design, networking, wireless
    
Cisco
Published By: Cisco     Published Date: Jan 05, 2016
Beginning with a brief overview of private cloud computing and the evolution of on-premises private clouds, we will compare Cisco Metapod to options from VMware and the OpenStack community. We’ll also describe Cisco’s unique OpenStack as a Service (OaaS) operating model, and present Total Cost of Ownership (TCO) analyses that compare Cisco Metapod to VMware vCloud Director and an OpenStack Do-It-Yourself (DIY) strategy.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Apr 15, 2016
Beginning with a brief overview of private cloud computing and the evolution of on-premises private clouds, we will compare Cisco Metapod to options from VMware and the OpenStack community. We’ll also describe Cisco’s unique OpenStack as a Service (OaaS) operating model, and present Total Cost of Ownership (TCO) analyses that compare Cisco Metapod to VMware vCloud Director and an OpenStack Do-It-Yourself (DIY) strategy.
Tags : 
cloud management, cloud services, cloud management, best practices, cloud computing
    
Cisco
Published By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
Citrix ShareFile Enterprise helps IT organizations retain control while improving collaboration and productivity. ShareFile completes the mobility story with a rich, enterprise-ready, follow-me data solution. Download white paper to learn more.
Tags : 
citrix, sharefile, enterprise, data
    
Citrix Systems, Inc.
Published By: Trend Micro     Published Date: Oct 12, 2012
This free white paper provides a comprehensive overview of the threat as well as the advanced protection that enterprises can now use to protect their networks and information.
Tags : 
information technology, network, trend micro, security, business technology
    
Trend Micro
Published By: Rapid7     Published Date: Jul 24, 2013
The Payment Card Industry (PCI) Data Security Standard (DSS) was created to confront the rising threat to credit cardholder personal information. This compliance guide will provide readers with an overview of the requirements as well as suggested steps in achieving PCI compliance.
Tags : 
rapid7, pci compliance, dss compliance, pci dss compliance, secure transactions, online payment security, security, payment processing, atm, business technology
    
Rapid7
Published By: Heiler     Published Date: Feb 22, 2012
Today, many companies do not have a consistent and transparent process established in their Product Information Supply Chain. In this white paper you will find out just what exactly PIM 360° means and how it relates to your business.
Tags : 
heiler, software, mdm of product data, 360-degree, pim/product information management, multichannel commerce, print-catalog, e-catalog, online-shop, sap, pim, productinformationsmanagement, product information management, productinformation, cross-selling, catalog, content services, consulting, supplier relationship management, srm
    
Heiler
Published By: Guardian Digital     Published Date: Oct 02, 2007
Open source is just a method to reaching a goal, not a goal in itself. In this overview, "The Top 5 Open Source Security Myths," you will be introduced to some of the largest misconceptions regarding open source security.
Tags : 
open source, open source security, network security, adaptability, security management, email security, guardian digital, digital guardian, security
    
Guardian Digital
Published By: Focus     Published Date: Aug 04, 2011
Get a big picture look at Business Intelligence and learn about current trends in the BI market. Download your FREE Focus Experts Briefing now!
Tags : 
focus bi, business intelligence applications, key issues, trends, smb, biq, business intelligence quotient
    
Focus
Published By: Symantec     Published Date: Aug 09, 2013
Get an overview and analysis of the year in global threat activity with the Symantec 2013 Internet Security Threat Report. This report provides commentary on emerging trends in the dynamic threat landscape, covers the key findings and provides best practice guidelines. Learn about strategies to combat security risks that threaten your organization. Read the report now.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology, business technology
    
Symantec
Published By: Arbor Networks     Published Date: Jan 31, 2013
This Frost & Sullivan whitepaper provides an overview of the latest DDoS attack trends, and offers examples of how cloud service and hosting providers can use Arbor Networks solutions to protect their data centers from DDoS attacks and more.
Tags : 
security, it management, data management, business technology, data center
    
Arbor Networks
Published By: Citrix     Published Date: Jul 18, 2014
This Citrix Key Project Design Guide provides an overview of the solution architecture and implementation used in the key project on remote access for enterprise PCs.
Tags : 
citrix, enterprise pc, remote access, remote network management, network architecture, mobile workers, xendesktop
    
Citrix
Published By: Oracle     Published Date: Feb 26, 2014
This white paper offers a brief overview of how organizations can make best use of social data by implementing a framework to integrate social data with other enterprise and public or curated data. This framework provides a platform for uncovering new insights that can be fed into business intelligence and customer-experience-management systems in near real time to help marketing, sales, service, and commerce teams accelerate decision-making and create long-term, profitable customer relationships.
Tags : 
oracle, srm, social, social data, enterprise, business intelligence, customer experience management, customer experience, customer relationships, marketing, social media
    
Oracle
Published By: Symantec     Published Date: Oct 07, 2014
The Internet Security Threat Report provides an overview and analysis of the year’s global internet threat activity. The report is based on data from the Symantec™ Global Intelligence Network, which Symantec’s analysts use to identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape. Highlights from the 2014 Internet Security Threat Report Key Findings • 91% increase in targeted attacks campaigns in 2013 • 62% increase in the number of breaches in 2013
Tags : 
internet security, target attacks, breaches, threat activity, emerging trends, cybercrime, security
    
Symantec
Published By: Cisco     Published Date: Jan 15, 2015
Empirical data from our individual Product Analysis Reports (PARs) and Comparative Analysis Reports (CARs) is used to create the unique Security Value MapTM (SVM). The SVM provides a quick, clear overview of the relative value of security investment options by mapping security effectiveness and value (TCO per protected Mbps) of tested product configurations.
Tags : 
comparitive analysis, datacenter, social, analytics, security, data management
    
Cisco
Published By: Smarsh     Published Date: Feb 27, 2014
An overview of the important considerations that both senior business management and IT management should think about as they decide whether or not to migrate some or all of their messaging and collaboration capabilities to the cloud.
Tags : 
compliance, e-discovery, archiving, enterprise, communications compliance, email archiving, social media archiving, byod, email retention, email encryption, cloud-based archiving, enterprise applications, data management, business technology, data center
    
Smarsh
Published By: DNN Corp.     Published Date: Jun 30, 2014
This planning checklist offers an overview of the 5 most important elements to consider when planning a customer support community.
Tags : 
dnn, online communities, marketing communities, community management, email marketing, emerging marketing, social media, internet marketing
    
DNN Corp.
Published By: Riverbed     Published Date: Aug 22, 2014
The Riverbed Optimization System (RiOS™) is the software that powers Riverbed’s unique award-winning line of Steelhead™ application acceleration appliances and Steelhead Mobile client software. RiOS is based on patented technologies that solve a range of problems affecting wide area networks (WANs) and application performance.
Tags : 
optimization, rios, technical, software, application, acceleration, technologies, solve problems, networks, performance
    
Riverbed
Published By: AlienVault     Published Date: Oct 21, 2014
The state of threat intelligence in the information security community is still very immature. Many organizations are still combating threats in a reactive manner, only learning what they're dealing with, well...when they're dealing with it. There is a wealth of information in the community, and many organizations have been gathering data about attackers and trends for years. How can we share that information, and what kinds of intelligence are most valuable? In this presentation, we'll start with a brief overview of AlienVault's Open Threat Exchange™ (OTX), and then we'll discuss attack trends and techniques seen in enterprise networks today, with supporting data from AlienVault OTX. We'll also take a look at some new models for collaboration and improving the state of threat intelligence going forward.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault
Published By: OpenText     Published Date: Aug 19, 2014
An integrated production faxing solution offers a number of benefits to the enterprise. This paper highlights the financial and workflow improvements you can expect by automating the document delivery process in your organization. See why companies that have made considerable investment in back-office automation systems take this next logical step to automate delivery of high volume, transactional paper documents.
Tags : 
opentext, fax, document delivery, workflow improvements, automation systems, transactional paper documents, knowledge management, enterprise applications
    
OpenText
Published By: OpenText     Published Date: Aug 19, 2014
While perhaps not the most exciting way to exchange information, faxing is one of the most widely used, secure and compliant ways. This paper explains a solution that allows your organization to take full advantage of all of the benefits of faxing, while eliminating the associated costs such as lost productivity, overhead and lost business.
Tags : 
opentext, fax, document delivery, workflow improvements, automation systems, transactional paper documents, security, knowledge management, enterprise applications
    
OpenText
Published By: Riverbed     Published Date: Aug 19, 2014
Riverbed Optimization System (RiOS™) is the software that powers Riverbed’s unique award-winning line of Steelhead™ application acceleration appliances and Steelhead Mobile client software.
Tags : 
optimization, wan bandwidth, high-latency, traffic, wan
    
Riverbed
Start   Previous    13 14 15 16 17 18 19 20 21 22 23 24 25 26 27    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top