RecruitingBlogscom

Follow Us:

 

overview

Results 526 - 550 of 664Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jan 30, 2015
IBM is providing developers an open, flexible cloud environment connecting the enterprise and born-on-the-web developers using their choice of tools, whether IBM, third-party, or open technologies, in a scalable environment. This session provides an overview of IBM Bluemix capabilities.
Tags : 
paas, ibm, infrastructure solutions, middleware challenges, knowledge management, enterprise applications, data management, data center
    
IBM
Published By: IBM     Published Date: Jan 30, 2015
IBM DevOps for Bluemix provides an integrated set of DevOps services in the IBM Bluemix PaaS. This session provides an overview of IBM DevOps services on Bluemix, focusing on quickly getting started with new projects and collaborative development with agile tracking and planning.
Tags : 
ibm, devops, developement, product development, agile tracking, collaborative development, knowledge management, enterprise applications, data management, data center
    
IBM
Published By: Oracle     Published Date: Oct 23, 2014
Learn how DMPs can help you achieve unprecedented audience targeting precision and scale across all marketing programs. This whitepaper delivers an in-depth overview of DMPs and provides actionable, useful information for marketers and agencies hoping to implement a DMP to improve programme outcomes.
Tags : 
demystified, audience, targeting, scale, marketing, programs, actionable, agencies, outcome, crm & customer care, marketing research
    
Oracle
Published By: ActiveProspect, Inc.     Published Date: Sep 19, 2013
In this whitepaper, provided by the law firm of Klein Moynihan Turco LLP (KMT) and ActiveProspect, a marketing SaaS provider, offers a comprehensive overview of the legal aspects of the new TCPA regulations and simple solution to verify and store proof of consent for Internet leads in order to comply with the new regulations.
Tags : 
tcpa, tcpa regulations, tcpa compliance, tcpa class action, telemarketing, telemarketing compliance, telemarketing regulations, telemarketing rules, call center compliance, do not call, prior express written consent, prior express consent, proof of opt-in, consent to call, outbound marketing, autodialed calls, prerecorded call, robocalls, autodialer, leadid
    
ActiveProspect, Inc.
Published By: ActiveProspect, Inc.     Published Date: Sep 19, 2013
In this whitepaper, provided by the law firm of Klein Moynihan Turco LLP (KMT) and ActiveProspect, a marketing SaaS provider, offers a comprehensive overview of the legal aspects of the new TCPA regulations and simple solution to verify and store proof of consent for Internet leads in order to comply with the new regulations.
Tags : 
tcpa, tcpa regulations, tcpa compliance, tcpa class action, telemarketing, telemarketing compliance, telemarketing regulations, telemarketing rules, call center compliance, do not call, prior express written consent, prior express consent, proof of opt-in, consent to call, outbound marketing, autodialed calls, prerecorded call, robocalls, autodialer, leadid
    
ActiveProspect, Inc.
Published By: Symantec Corporation     Published Date: Jul 11, 2014
Symantec Certificate Intelligence Center discovers and monitors SSL certificates from any Certificate Authority as well as automates SSL certificate lifecycle management for operational efficiency and business continuity.
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals, security, software development
    
Symantec Corporation
Published By: Symantec     Published Date: Oct 01, 2015
The acquisition of SSL certificates should always be a relatively easy experience; however, the purchasing decision should never be regarded lightly. When businesses consider SSL certificates; there six Golden Rules a purchaser should keep in mind. This whitepaper provides an overview of the SSL certificated market, the six golden rules of purchasing SSL certificates and how Symantec addresses each of the golden rules. At the end of the day, people want to make sure their Web sites are secured with as little friction as possible—Symantec gives businesses every opportunity to achieve that goal.
Tags : 
e-commerce, ssl certificate, ssl golden rules, hidden dangers, website security, security
    
Symantec
Published By: Symantec     Published Date: Oct 01, 2015
The foundation of trusted Internet communications are Secure Socket Link (SSL) certificates, an encryption technology installed on Web servers that permits transmission of sensitive data through an encrypted connection. Using a public-key infrastructure (PKI), SSL certificates authenticate the end-use Website and the endpoint server, making it difficult for those sites to be imitated or forged.The acquisition of SSL certificates should always be a relatively easy experience; however, the purchasing decision should never be regarded lightly. When businesses consider SSL certificates; there six Golden Rules a purchaser should keep in mind. This whitepaper provides an overview of the SSL certificated market, the six golden rules of purchasing SSL certificates and how Symantec addresses each of the golden rules. At the end of the day, people want to make sure their Web sites are secured with as little friction as possible—Symantec gives businesses every opportunity to achieve that goal.
Tags : 
ssl certificates, public-key infrastructure, web servers, website security, sensitive data, encrypted connection, security
    
Symantec
Published By: AlienVault     Published Date: Mar 30, 2016
An Intrusion Detection System (IDS) is an essential tool in every security practitioner’s arsenal. Intrusion Detection Systems are designed to gather and analyze information from networks and hosts to detect malicious activity both before and after a security breach. In this guide, you will learn about the critical components of host and network IDS, requirements to evaluate IDS solutions, as well as how AlienVault Unified Security Management (USM) meets those requirements. Topics covered to help you evaluate IDS solutions include: • An overview of network and host-based IDS • Signature-based vs. anomaly-based systems • Throughput of IDS solutions • Protocol analysis • Aggregation capabilities • Integration capabilities • Contextual enhancement Download your version now to learn what capabilities you should consider when evaluating IDS solutions.
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Mar 30, 2016
Achieving PCI compliance takes focus, determination, and the right set of tools. By building these essential security capabilities into an integrated, complete solution, AlienVault Unified Security Management™ (USM) delivers a workflow-centric approach that materially reduces your organization’s time to compliance versus a solution stitched together from individual point products. In this paper you will read an overview of AlienVault USM™ as well as learn about the capabilities and benefits it includes to help you comply with PCI DSS requirements.
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Oct 20, 2017
In this report, you'll read 451 Research's review of AlienVault USM Anywhere. USM Anywhere is AlienVault's offering of centralized security information and event management for resource-constrained organizations embracing Amazon and Microsoft cloud architectures. The report covers the following areas: • 451's overview of AlienVault USM Anywhere • A brief look at the history of AlienVault • How USM Anywhere compares to competitors • A SWOT analysis of USM Anywhere Download the report now to learn more about AlienVault's unique approach to threat detection in cloud and hybrid cloud environments
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Oct 20, 2017
Achieving PCI compliance takes focus, determination, and the right set of tools. By building these essential security capabilities into an integrated, complete solution, AlienVault Unified Security Management™ (USM) delivers a workflow-centric approach that materially reduces your organization’s time to compliance versus a solution stitched together from individual point products. In this paper you will read an overview of AlienVault USM™ as well as learn about the capabilities and benefits it includes to help you comply with PCI DSS requirements.
Tags : 
    
AlienVault
Published By: Brandwatch     Published Date: Feb 25, 2015
This guide is an introductory overview of best practices for crisis and issues communications in the social media age, focusing on: • What reputation monitoring actually means • How to identify a crisis & assess the damage • Real-world examples from Marriott, United Airlines and Walmart/Asda
Tags : 
social media, social analytics, social media monitoring, crisis management, reputation management, social listening, social business intelligence, brand monitoring, social media management, emerging marketing, marketing research
    
Brandwatch
Published By: Radius Intelligence     Published Date: Jun 15, 2015
Marketing technology is the fuel on which modern marketing organizations run. As the marketing technology landscape rapidly expands, CMOs are desperately trying to keep up with an evolving stack. Technology is taking over marketing. Rather than detailing an exhaustive list of available technologies, this will present an overview of the current marketing technology landscape. It will include trends, challenges, and advice to marketing leaders navigating the turbulent and dynamic space.
Tags : 
predictive marketing, predictive analytics, b2b marketing, predictive b2b marketing, predictive technology, b2b marketing technology, customer insights, customer acquisition, segmentation, targeting, real-time analytics, total addressable market, multi-channel optimization, pipeline prioritization, predictive scoring, lead prediction, account targeting, predictive intelligence, marketing intelligence, emerging marketing
    
Radius Intelligence
Published By: Infacta     Published Date: Jan 22, 2007
In this series, we will provide an overview on email marketing, offer tips to help make your e-mail marketing campaigns more successful, review the tools necessary for effective email marketing and expose email marketing mistakes to avoid.
Tags : 
email marketing
    
Infacta
Published By: Aladdin     Published Date: Aug 21, 2009
In this Aladdin white paper you will discover an overview of spyware, security threats seen with spyware, the technical underpinnings to spyware, the technology challenges inherent in trying to block spyware, and spyware's legal issues.
Tags : 
spyware, malware, antispyware, anti-spyware, anti spyware, email security, aladdin, security
    
Aladdin
Published By: Aventail     Published Date: Aug 21, 2009
The SSL VPN Toolkit provides vital information to help you at every stage of your decision process. In this one download you'll get Aventail's SSL VPN Technical Primer (a technology overview and an objective comparison of IPSec VPNs and SSL VPNs); SSL VPN Buyer's Guide (assessment criteria and questions to ask VPN vendors); and SSL VPN Purchase Checklist (SSL VPN requirements in six feature/function categories).
Tags : 
ssl, vpn, ssl vpn, ssl vpn purchase, vpn purchase, buyers guide, buying guide, ipsec, ipsec vpn, comparison, system requirements, aventail
    
Aventail
Published By: Clearvale by BroadVision     Published Date: Aug 21, 2009
This white paper provides an overview of the most useful personalization techniques and discusses how to combine personalization strategy with personalization techniques.
Tags : 
email marketing, personalization, customization, personalize, customize, broadvision
    
Clearvale by BroadVision
Published By: HP     Published Date: Jul 08, 2009
Today's economic climate has heightened the goal of every IT department to provide high-quality IT service to the business, at the lowest possible cost, while improving business outcomes. Looking outside of the infrastructure itself, there are two key challenges related to data storage: provisioning capacity for applications and reducing risk through a sound data protection strategy. This white paper discusses the challenges of creating the right storage infrastructure, provides an overview of data storage options, and examines a storage solution that combines blade servers and network-attached storage.
Tags : 
storage, storageworks, hp bladesystem, server, infrastructure, nas, network-attached storage, blade servers, data protection, san, fibre channel, iscsi, serial attached scsi, sas, proliant, msa, disk arrays, ethernet, rack, servers
    
HP
Published By: IBM     Published Date: Dec 12, 2006
This paper gives the reader an overview of the functionality of IBM's WebSphere Customer Center, and explains why IBM is the strategic partner that more Fortune 500 companies select as their strategic platform for Customer Data Integration.
Tags : 
cdi, customer data integration, data management, data integration, customer service, customer interaction service, websphere, name matching, ibm, it management, enterprise applications
    
IBM
Published By: IBM     Published Date: Feb 13, 2007
This paper provides an overview of opportunities and benefits of business communications integration and includes two "before and after" scenarios - one in financial services and one in healthcare - that demonstrate how IBM clients have benefited from integrated business communications.
Tags : 
networking, convergence, ip telephony, application integration, business integration, ibm, business innovation, ip faxing, network convergence, ip networks, collaboration
    
IBM
Published By: IBM     Published Date: Feb 25, 2008
An organization’s success and ability to react to market and environmental changes are now more dependent than ever on an effective and efficient IT infrastructure. This white paper provides a starting point for organizations contemplating server consolidation. Download this guide for an overview of server consolidation concepts and techniques, plus guidance on methodologies that should be employed.
Tags : 
servers, migration, consolidation, infrastructure, server hardware, ibm
    
IBM
Published By: IBM     Published Date: Jun 12, 2008
The e-book provides a concise and consistent overview of the IBM to approach to SOA: our methods, architectures, and products for being successful with SOA. It compiles together various SOA materials in one place and gives it a consistent narrative that ties all of the pieces together. Download it now to get an informative overview of the IBM approach to SOA.
Tags : 
soa, governance, soa governance, service oriented, service-oriented, ibm, ibm ebf
    
IBM
Published By: IBM     Published Date: Dec 03, 2008
Affordable System x Express servers from IBM include features designed to keep your data safe and rapidly accessible. This e-kit includes white papers, datasheets and product guides for individual products, as well as overviews that help you compare systems and storage solutions so you can choose what works best for your business.
Tags : 
ibm express seller, data protection, security, ibm, data security, storage solutions, data management
    
IBM
Published By: IBM     Published Date: Jan 07, 2009
Check the health of your SOA applications now to avoid costly and troublesome “rescue missions” down the road. SOA Healthcheck for infrastructure helps you with your implementations to ensure they meet all the requirements needed to return on your investment. This demo is an overview of the SOA Healthcheck and its benefits. Fix small problems now to avoid big ones later.
Tags : 
ibm, soa healthcheck demo, soa applications, soa healthcheck for infrastructure, data management
    
IBM
Start   Previous    13 14 15 16 17 18 19 20 21 22 23 24 25 26 27    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top