RecruitingBlogscom

Follow Us:

 

overview

Results 501 - 525 of 674Sort Results By: Published Date | Title | Company Name
Published By: Oracle     Published Date: Feb 26, 2014
This white paper offers a brief overview of how organizations can make best use of social data by implementing a framework to integrate social data with other enterprise and public or curated data. This framework provides a platform for uncovering new insights that can be fed into business intelligence and customer-experience-management systems in near real time to help marketing, sales, service, and commerce teams accelerate decision-making and create long-term, profitable customer relationships.
Tags : 
oracle, srm, social, social data, enterprise, business intelligence, customer experience management, customer experience, customer relationships, marketing, social media
    
Oracle
Published By: Symantec     Published Date: Oct 07, 2014
The Internet Security Threat Report provides an overview and analysis of the year’s global internet threat activity. The report is based on data from the Symantec™ Global Intelligence Network, which Symantec’s analysts use to identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape. Highlights from the 2014 Internet Security Threat Report Key Findings • 91% increase in targeted attacks campaigns in 2013 • 62% increase in the number of breaches in 2013
Tags : 
internet security, target attacks, breaches, threat activity, emerging trends, cybercrime, security
    
Symantec
Published By: Cisco     Published Date: Jan 15, 2015
Empirical data from our individual Product Analysis Reports (PARs) and Comparative Analysis Reports (CARs) is used to create the unique Security Value MapTM (SVM). The SVM provides a quick, clear overview of the relative value of security investment options by mapping security effectiveness and value (TCO per protected Mbps) of tested product configurations.
Tags : 
comparitive analysis, datacenter, social, analytics, security, data management
    
Cisco
Published By: Smarsh     Published Date: Feb 27, 2014
An overview of the important considerations that both senior business management and IT management should think about as they decide whether or not to migrate some or all of their messaging and collaboration capabilities to the cloud.
Tags : 
compliance, e-discovery, archiving, enterprise, communications compliance, email archiving, social media archiving, byod, email retention, email encryption, cloud-based archiving, enterprise applications, data management, business technology, data center
    
Smarsh
Published By: DNN Corp.     Published Date: Jun 30, 2014
This planning checklist offers an overview of the 5 most important elements to consider when planning a customer support community.
Tags : 
dnn, online communities, marketing communities, community management, email marketing, emerging marketing, social media, internet marketing
    
DNN Corp.
Published By: Riverbed     Published Date: Aug 22, 2014
The Riverbed Optimization System (RiOS™) is the software that powers Riverbed’s unique award-winning line of Steelhead™ application acceleration appliances and Steelhead Mobile client software. RiOS is based on patented technologies that solve a range of problems affecting wide area networks (WANs) and application performance.
Tags : 
optimization, rios, technical, software, application, acceleration, technologies, solve problems, networks, performance
    
Riverbed
Published By: AlienVault     Published Date: Oct 21, 2014
The state of threat intelligence in the information security community is still very immature. Many organizations are still combating threats in a reactive manner, only learning what they're dealing with, well...when they're dealing with it. There is a wealth of information in the community, and many organizations have been gathering data about attackers and trends for years. How can we share that information, and what kinds of intelligence are most valuable? In this presentation, we'll start with a brief overview of AlienVault's Open Threat Exchange™ (OTX), and then we'll discuss attack trends and techniques seen in enterprise networks today, with supporting data from AlienVault OTX. We'll also take a look at some new models for collaboration and improving the state of threat intelligence going forward.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault
Published By: OpenText     Published Date: Aug 19, 2014
An integrated production faxing solution offers a number of benefits to the enterprise. This paper highlights the financial and workflow improvements you can expect by automating the document delivery process in your organization. See why companies that have made considerable investment in back-office automation systems take this next logical step to automate delivery of high volume, transactional paper documents.
Tags : 
opentext, fax, document delivery, workflow improvements, automation systems, transactional paper documents, knowledge management, enterprise applications
    
OpenText
Published By: OpenText     Published Date: Aug 19, 2014
While perhaps not the most exciting way to exchange information, faxing is one of the most widely used, secure and compliant ways. This paper explains a solution that allows your organization to take full advantage of all of the benefits of faxing, while eliminating the associated costs such as lost productivity, overhead and lost business.
Tags : 
opentext, fax, document delivery, workflow improvements, automation systems, transactional paper documents, security, knowledge management, enterprise applications
    
OpenText
Published By: Riverbed     Published Date: Aug 19, 2014
Riverbed Optimization System (RiOS™) is the software that powers Riverbed’s unique award-winning line of Steelhead™ application acceleration appliances and Steelhead Mobile client software.
Tags : 
optimization, wan bandwidth, high-latency, traffic, wan
    
Riverbed
Published By: IBM     Published Date: Jun 10, 2014
Download this short paper for an overview of the benchmark, the result and understand the importance to businesses deploying Hadoop into their data warehouse environments.
Tags : 
ibm, big sql, hadoop, sql
    
IBM
Published By: VMware AirWatch     Published Date: Mar 02, 2017
Workspace™ ONE™ is VMware’s digital workspace solution, designed to give access to any application from any type of device under automated and granular policy control. VMware was one of the first adopters of Workspace ONE, deploying across its full user population in early-to mid 2016. This white paper describes the objectives that drove VMware’s decisions of how and when to deploy, plus an overview of the business results we’ve achieved so far.
Tags : 
    
VMware AirWatch
Published By: FORTRUST     Published Date: Oct 30, 2015
This white paper provides an overview of foundational compliance requirements, including those for PCI and the Health Insurance Portability and Accountability Act (HIPAA).
Tags : 
fortrust, compliance, pci compliance, hipaa
    
FORTRUST
Published By: CrowdTwist     Published Date: Aug 04, 2017
Millennials have officially surpassed the Baby Boomers as the nation’s largest living generation and newcomers Generation Z are rising in the ranks, poised for consumer domination with $44 billion in spending power. It’s expected that Generation Z will make up 40 percent of consumers by 2020. Never has understanding these two generations been as critical for brands in their pursuit of establishing consumer loyalty. CrowdTwist conducted research into the similarities and differences between Generation Z and Millennials, how they engage with brands, their shopping habits, their brand loyalty and their attitudes towards loyalty programs. This report provides an overview of those findings as well as recommendations for brands investing in loyalty strategies for current and future consumers.
Tags : 
gen z, millennials, crowdtwist, branding, loyalty, consumers
    
CrowdTwist
Published By: CrowdTwist     Published Date: Aug 29, 2017
Millennials have officially surpassed the Baby Boomers as the nation’s largest living generation and newcomers Generation Z are rising in the ranks, poised for consumer domination with $44 billion in spending power. It’s expected that Generation Z will make up 40 percent of consumers by 2020. Never has understanding these two generations been as critical for brands in their pursuit of establishing consumer loyalty. CrowdTwist conducted research into the similarities and differences between Generation Z and Millennials, how they engage with brands, their shopping habits, their brand loyalty and their attitudes towards loyalty programs. This report provides an overview of those ?ndings as well as recommendations for brands investing in loyalty strategies for current and future consumers.
Tags : 
    
CrowdTwist
Published By: DocuSign     Published Date: Mar 23, 2016
Every day, all over the world, businesses and individuals are forgoing paper and signing important business and personal documents online. From signing a vendor contract, to signing a home mortgage, and everything in between. This white paper gives an overview on how you can use electronic signatures to sign and send documents digitally to keep life and business moving forward.
Tags : 
docusign, client satisfaction, technology, electronic contract, paperless, reduce costs
    
DocuSign
Published By: DocuSign     Published Date: Aug 16, 2016
Introduction Electronic signatures have become common practice in the United States, but confusion still persists regarding the law at a state and federal level. This document provides an overview covering: 1) the legislation enabling electronic signature usage, and 2) the key legal factors arising in electronic transactions.
Tags : 
docusign, client satisfaction, technology, electronic contract, paperless, reduce costs
    
DocuSign
Published By: DocuSign     Published Date: Feb 13, 2017
Watch this on-demand webinar for an overview of the latest trends and practices regarding the adoption, use, and verification of digital and electronic signatures for 2016 and beyond.
Tags : 
    
DocuSign
Published By: DocuSign     Published Date: Apr 12, 2017
Every day, all over the world, businesses and individuals are forgoing paper and signing important business and personal documents online. From signing a vendor contract, to signing a home mortgage, and everything in between. This white paper gives an overview on how you can use electronic signatures to sign and send documents digitally to keep life and business moving forward.
Tags : 
    
DocuSign
Published By: DocuSign     Published Date: Apr 12, 2017
Electronic signatures have become common practice in the United States, but confusion still persists regarding the law at a state and federal level. This whitepaper provides an overview covering: 1) the legislation enabling electronic signature usage, and 2) the key legal factors arising in electronic transactions.
Tags : 
    
DocuSign
Published By: VMware     Published Date: Feb 24, 2017
With Windows 10, Microsoft introduces a consolidated operating system (OS) platform that changes how organizations treat the management of End-User Computing (EUC) environments. This new way of managing Windows is more closely aligned to the enterprise mobile management (EMM) based approaches found in mobile management tools today. This whitepaper provides an overview of how Windows management evolved from a rigid and disruptive PC-centric approach to one offering a flexible and light-touch model. It will also delve into the specific management technologies that Windows 10 introduces, as well as leveraging conventional Windows management tools that are in use today.
Tags : 
    
VMware
Published By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
Get an overview of the cyberthreat landscape and see key findings from the “2015 Cyberthreat Defense Report.”
Tags : 
citrix, cyberthreat, infographic, 2015 report
    
Citrix Systems, Inc.
Published By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
The SVM provides a quick, clear overview of the relative value of security investment options by mapping security effectiveness and value of tested product configurations.
Tags : 
citrix, waf, firewall, tco, security
    
Citrix Systems, Inc.
Published By: Adobe     Published Date: Mar 17, 2016
An electronic signature - also known as an “e-signature” - is a simple, legally-binding way to indicate consent or approval digitally. While legally valid and enforceable in nearly every industrialized country around the world, some countries may have different laws when it comes to e-signatures.
Tags : 
adobe, electronic signature, digital signature, business technology, sales
    
Adobe
Published By: Adobe     Published Date: Mar 17, 2016
The ESIGN Act, signed in 2000, granted electronic signatures the same legal status as handwritten signatures throughout the United States. Electronic signatures – commonly called “e-signatures” – greatly simplify the way companies gather, track and manager signatures, approvals, and workflows. Learn more now!
Tags : 
adobe, electronic signature, workflow, business technology
    
Adobe
Start   Previous    13 14 15 16 17 18 19 20 21 22 23 24 25 26 27    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top