RecruitingBlogscom

Follow Us:

 

overview

Results 326 - 350 of 664Sort Results By: Published Date | Title | Company Name
Published By: Indigo Rose Corporation     Published Date: Feb 14, 2007
Visual Patch 2.0 is a fast and efficient solution for software developers and content distributors who need to create software patches. Read through a comprehensive list of features, and learn about the system requirements of Visual Patch 2.0.
Tags : 
software development, software patch, patches, software updates, indigo rose
    
Indigo Rose Corporation
Published By: Infacta     Published Date: Jan 22, 2007
In this series, we will provide an overview on email marketing, offer tips to help make your e-mail marketing campaigns more successful, review the tools necessary for effective email marketing and expose email marketing mistakes to avoid.
Tags : 
email marketing
    
Infacta
Published By: Infoblox     Published Date: Jun 18, 2015
This white paper gives you an overview of how you can secure external DNS from cyberattacks and secure internal DNS from infrastructure attacks, APTs and malware that exploit DNS, and data exfiltration via DNS.
Tags : 
infoblox, dns security, cyberattacks, apts, malware
    
Infoblox
Published By: Infor     Published Date: Feb 27, 2007
Infor PLM Optiva streamlines the innovation process and enables food and beverage, home and personal care and specialty chemical companies to develop innovative products for the global market in less time and at lower cost, while significantly reducing the risks associated with new product innovation. Download this solution overview to learn more.
Tags : 
product lifecycle management, supply chain management, plm, scm, bpm, business process management, infor
    
Infor
Published By: Informatica     Published Date: Nov 21, 2011
This chalk talk provides an overview of those challenges, the unique differentiators of Informatica Data Replication, and the most in-demand use cases
Tags : 
data replication, data, replication, challenges, use cases
    
Informatica
Published By: Ingate Systems     Published Date: Jun 21, 2007
A complete guide to SIP trunks, this whitepaper provides a comprehensive overview on the basics of SIP trunking, including a discussion of infrastructure needs and deployment issues and solutions. In-depth sections dedicated to interoperability, security as well as quality and reliability issues are also included.
Tags : 
pbx, phone, phone system, phone systems, best practices, sip, ip telephony, voip, voice over ip, infrastructure, ingate, ingate systems, communication, communications
    
Ingate Systems
Published By: Ingenico     Published Date: May 02, 2018
The time of mobile point of sale (mPOS) has arrived. While the mission to adopt EMV has dominated the payments industry over the past few years, many hotels, resorts and casinos are now focusing their efforts on rapid planning and implementation of mPOS strategies. A number of emerging trends are driving this new focus, including an emphasis on enhancing guest experiences and building brand loyalty by leveraging digital and mobile technologies. Innovative hotels, resorts and casinos are using these solutions to create entirely new guest experiences that improve service speed and convenience while creating distinct competitive advantages. mPOS is increasingly becoming a key part of the picture, providing unique opportunities to improve guest service quality and engagement, create new efficiencies and cost savings, and strengthen their brand. This eBook will provide an overview of those opportunities, some key trends in the hotel & lodging industry, and guide you through the key requirem
Tags : 
    
Ingenico
Published By: Inovis     Published Date: Aug 06, 2007
This white paper provides an overview of the growing opportunities for EDI managers and coordinators. It highlights how their role can change from being responsible for implementation of technologies for operational activities to being infrastructure leaders. It shows how they can deliver increased efficiencies and velocity for value chain automation, which increases visibility, control and agility for a business.
Tags : 
edi, electronic data interchange, electronic data, inovis, supply chain, manufacturing, productivity, infrastructure, bpm, bpa, business process, roi, spend management, cost control, xml, data management
    
Inovis
Published By: InsideCRM.com     Published Date: Aug 13, 2007
In the market for a CRM? This white paper outlines the general benefits and drawbacks of hosted vs. on-premise CRMs and lists the basic features to look for in your hosted solution. With an up-to-date overview of the CRM market and a rundown of the general costs of various CRMs today, you'll be prepared to start looking for your new solution immediately.
Tags : 
crm, customer relationship managment, crm tool, crm tools, buying guide, collaboration, customer management, contact management, records management, salesforce, sales software, sales tools, marketing, operations, insidecrm, inside crm, insidecrm.com, tippit
    
InsideCRM.com
Published By: InsideCRM.com     Published Date: Nov 05, 2007
Considering adding a contact center to your business? Our analyst-written buyer's guide is a great place to start your search. We provide you with an in depth  market overview, a rundown of standard and advanced features and will point you in the direction that will be most beneficial and efficient for your organization.
Tags : 
software, call center, call center software, contact center, contact center software, crm, customer relationship management, insidecrm, inside crm, buying guide, buyers guide
    
InsideCRM.com
Published By: Intel     Published Date: Aug 10, 2012
3rd generation Intel® CoreT vProT overview covering threat management, identity and access, data protection, and monitoring and remediation.
Tags : 
security, it management, it security, total cost of ownership, tco, intel, solutions, speed, manageability, return on investment, roi, threat management, hardware-based, identity, monitoring, remdiation, reporting, data management, business technology
    
Intel
Published By: Intel     Published Date: Aug 10, 2012
3rd generation Intel® CoreT vProT overview animation covering threat management, identity and access, data protection, monitoring and remediation.
Tags : 
security, it management, it security, total cost of ownership, tco, intel, solutions, speed, manageability, return on investment, roi, threat management, hardware-based, identity, monitoring, remdiation, reporting, animation, business technology, data center
    
Intel
Published By: Intel Corp.     Published Date: Apr 25, 2012
Access this white paper for an overview of scale-out storage and gain insights on the cloud storage architectures.
Tags : 
cloud, intel, emc, atmos, emc atmos, scale-out storage, storage, architectures, knowledge management, data management
    
Intel Corp.
Published By: Intel Corp.     Published Date: Jul 09, 2012
Enterprise performance and embedded security technology benefits are covered in the 3rd gen Intel® CoreT vProT processor overview.
Tags : 
intel, 3rd generation, core vpro
    
Intel Corp.
Published By: Intel Corp.     Published Date: Aug 08, 2012
This document provides a high level overview of how to build a high performance, highly available IP SAN with deduplicated disk protection and long-term tape archive. This document will also put that solution into context with the rest of a typical IT environment.
Tags : 
designing, data, protection, strategy, p4000, storeonce, tape, white, paper, san, deduplicated, disk, protection, archive, it management, storage, data management
    
Intel Corp.
Published By: Intel Corp.     Published Date: Nov 21, 2017
this Whitepaper will provide an overview on personalizing customer experiences to pinpointing undetected fraud, to identifying business efficiencies, Intel's Saffron Natural Intelligence Platform helps financial institutions increase revenue and prevent loss.
Tags : 
    
Intel Corp.
Published By: Intel Corp.     Published Date: Nov 21, 2017
This whitepaper will provide an overview on how powerful computing and software technologies enable real time fraud detection to cut losses and reduce risks.
Tags : 
    
Intel Corp.
Published By: Intel Corp.     Published Date: Nov 21, 2017
This white paper provides an overview how banks seek to stop fraud in its tracks with simpler, stronger authentication.
Tags : 
    
Intel Corp.
Published By: Intel Corp.     Published Date: Nov 21, 2017
This whitepaper will provide an overview into Artificial Intelligence, as the next big wave in computing.
Tags : 
    
Intel Corp.
Published By: Intel Corp.     Published Date: Nov 21, 2017
This whitepaper provides an overview on technology dominated discussions at Sibos 2016 to an extent we have not seen previously.
Tags : 
    
Intel Corp.
Published By: Intel Security     Published Date: Jan 20, 2015
This book provides an overview of network security in general, and explains how cybercriminals can use hidden or currently undetectable methods to penetrate protected network systems. Advanced evasion techniques (AETs) bypass current common network security solutions. They can transport any attack or exploit through network security devices and firewalls, next generation firewalls, intrusion detection and prevention systems, and even routers doing deep packet inspection. In this book you’ll find out all about AETs, and get useful pointers and advice to help you secure your organization. If you’re working in government, the military, banking, industry, e-commerce or with other critical infrastructures, read this book to find out what you’re up against and how to better protect against advanced evasions.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, security
    
Intel Security
Published By: Intermec     Published Date: Sep 07, 2011
This is a guide to 2D bar code imaging technology, including an overview of capabilities and performance in traditional applications.
Tags : 
intermec, 2d imagers, laser scanners, bar code, qr code, digital imagining, document processing
    
Intermec
Published By: Intermedia     Published Date: Nov 10, 2008
This WebCast introduces Osterman Research who shows and overview of Exchange 2007 and it's growth in terms to help security issues faced by Financial Services and how Exchange 2007 addresses them. Focused on the messaging, Web and collaboration industries. There are also practice areas which include archiving, security, encryption, content management, etc...download to learn more!
Tags : 
intermedia, email security, exchange 2007, archiving, encryption, content management, security
    
Intermedia
Published By: Intralinks     Published Date: Jan 16, 2015
In their newly released report, “On the Radar: Intralinks,” MWD Advisors probes 10 key questions about how Intralinks VIA™ supports workforce mobility by giving organizations the controls to manage and secure business data, wherever it goes. This On the Radar briefing note follows a simple “ten questions” format, designed to provide a concise but thorough overview of a company and its products and services, answering the simple questions like: “Why is it interesting?” “What’s Next?” “Should I consider it?” You’ll learn how organizations should consider the benefits of an enterprise- grade content collaboration solution that’s designed to embrace workforce mobility “but with the security of administrative controls that make it much easier to manage that collaboration and maintain an audit trail.” Download the MWD report and find out why Intralinks VIA “…keep[s] IT and compliance officers happy, while not cramping end users’ mobility.”
Tags : 
workforce mobility, manage and secure, business data, enterprise, collaboration solution, security, enterprise applications
    
Intralinks
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top