RecruitingBlogscom

Follow Us:

 

topic

Results 176 - 200 of 326Sort Results By: Published Date | Title | Company Name
Published By: Mainline Information Systems     Published Date: Oct 27, 2009
View this webcast to learn about tuning for Oracle from an AIX administrative perspective. This session covers operating system related topics including Oracle and disk; volume groups and file systems; asynchronous and concurrent I/O; and Oracle AWR.
Tags : 
aix, mainline information systems, oracle, tuning, disk
    
Mainline Information Systems
Published By: GFI Software     Published Date: Mar 21, 2011
This white paper shall cover the following topics: What archiving is and how it integrates with Microsoft Exchange or a messaging solution; What stubbing is and why Microsoft does not recommend the use of stubbing; How Journaling in Exchange can allow efficient email archiving; How does stubbing compare with Journaling?
Tags : 
gfi, email archiving, compliance, microsoft exchange, messaging solution, microsoft, journaling
    
GFI Software
Published By: Adobe     Published Date: Sep 23, 2019
The Digital Trends 2019 survey closed with more than 12,500 responses worldwide! The results are in for 2019 and once again, businesses have their sights set on improving customer experience. Data continues to dominate, with an understanding that smarter use will lead to greater rewards. Data ownership and compliance are top-of-mind. And technological advances are an exciting prospect for many. But some need more guidance to understand the benefits for their business. Discover what your top digital priorities for 2019 should be with the 2019 Digital Trends report by Econsultancy in association with Adobe. 4 KEYPOINTS Key topics that you’ll read more about in this year’s report: • Optimising customer experience and delivering personalised experiences in real time. • Using data better for smarter audience segmentation and targeting. • Be wary of walled gardens. Control and own the data, and always be compliant. • Automation is the future. Understand the benefits, learn how to u
Tags : 
    
Adobe
Published By: Enterprise Management Associates     Published Date: Dec 03, 2015
Join Julie Craig, research director at EMA, to get highlights of this new research, as well as answers to the following questions: What are the revenue implications of DevOps and/or Continuous Delivery? How are DevOps and Continuous Delivery contributing to digital transformation initiatives? How can organizations build a foundation for Continuous Delivery, and what types of tools facilitate the process? Which categories of enterprise management tools top IT “wish lists” for 2016? Join us as we discuss these and other topical questions during this informative presentation.
Tags : 
continuous delivery, digital transformation, automation, enterprise management tools, devops, enterprise applications
    
Enterprise Management Associates
Published By: IBM     Published Date: Dec 03, 2008
Energy use and environmental impact are hot topics right now. But it's not just the environment at stake, it's your IT budget. By "going green" with the energy efficient IBM System x servers featuring Intel Xeon processors, you can cut your energy costs by half and save floor space to make room for future growth. Get the details on these benefits and many others in this Solution Brief from IBM.
Tags : 
ibm, express seller, intel xeon processors, energy efficient, ibm system & servers, storage
    
IBM
Published By: IBM     Published Date: Oct 13, 2009
Explore a topic often overlooked during discussions about data security: the risk of insider threats. This report, "Stopping insider attacks: how organizations can protect their sensitive information," provides an overview of the issue of insider attacks and offers suggestions that may help organizations mitigate their risk. Plus, listen to a podcast about stopping insider threats.
Tags : 
sensitive information, ibm, personal data privacy, global business security, threats, malware, insider attacks
    
IBM
Published By: Skillsoft     Published Date: Apr 01, 2011
In this report, we will take a look at the IT-related activities from the ITPro and AnalystPerspectives collections, as well as the most popular IT and business search terms.
Tags : 
analystperspectives, itpro, books24x7, cloud computing
    
Skillsoft
Published By: Landslide Technologies     Published Date: Apr 21, 2008
If you think you know sales, you likely are bringing to this topic a history and track record that has served you well.  This paper attempts to offer the cautionary warning that what has worked in your past may not serve your current  sales reps as well today, and could actually hurt their performance. Sales 1.0 was about lone wolves, product superiority,  proven skills and making the number.
Tags : 
landslide, customer relationship, customer loyalty, loyalty, crm, sales, sales, sales 2.0, sales 1.0
    
Landslide Technologies
Published By: IBM     Published Date: May 31, 2012
The topic of security is now unquestionably a C-suite priority. An enterprise that delegates security matters solely to the CIO is compounding its risk factors. Organizations need to move toward a more systematic and proactive approach to addressing security threats and managing compliance requirements. Download the white paper to learn more.
Tags : 
ibm, cyber terrorism, digital age, c suite, security, technology, business technology, business
    
IBM
Published By: Lumension     Published Date: Jan 22, 2013
In this age of APTs you can’t leave a single PC unpatched and vulnerable. In this on-demand webcast, Randy Franklin Smith from Ultimate Windows Security will deal with this whole topic.
Tags : 
software updates, security, patch, network security, patch management, remediation solutions
    
Lumension
Published By: SkillSoft IT     Published Date: Feb 02, 2011
In this report, we will take a look at the IT-related activities from the ITPro and AnalystPerspectives collections, as well as the most popular IT and business search terms.
Tags : 
it topics, itil, cloud computing, 2010 topics, java, programing, oracle, excel, c++, mobile, smartphone android
    
SkillSoft IT
Published By: EMA     Published Date: Sep 23, 2013
Join Steve Brasen, EMA Managing Research Director, and Kimber Spradlin, IBM Product Marketing for Endpoint Manager, for this informative, on-demand Webinar where the latest unified endpoint management research is revealed. Learn the strategic management processes necessary to empower a mobile workforce with the agility to adapt to rapidly evolving business requirements. Topics discussed include: • Securing devices without impeding user productivity • Expanding management processes to address increased device heterogeneity • Supporting employee-owned devices • Simplifying practices for delivering business IT services • Enhancing user flexibility in accessing IT resources necessary to achieve business goals
Tags : 
ibm, ema, on-demand webinar, endpoint management, mobile workforce, strategic management, technology, productivity, wireless, knowledge management, data management, business technology, data center
    
EMA
Published By: SafeNet     Published Date: Jan 14, 2014
Most service providers’ Virtual Private Network (VPN) security delivers little more than a promise to keep each customer’s data separated across a shared infrastructure. What are the risks of this virtual security model and how can it go wrong? This technical paper is prepared from an interview with Senetas CTO Julian Fay, in which these topics are discussed and practical considerations given for using encryption on VPNs to enhance organizations’ data security.
Tags : 
virtual private networks, virtual security, vpn, infrastructure, data, encryption, network, private network, virtual security, safenet, data protection
    
SafeNet
Published By: Adobe     Published Date: Oct 22, 2014
Sometimes email is the forgotten marketing channel. It’s not as new or topical as social or mobile, but it’s as reliable and profitable as ever. A study from the Direct Marketing Association says that email provides a $39.40 return on every dollar invested into it. We’ve produced a marketer’s guide that discusses the next frontier of email marketing. Learn the advantages of triggered and retargeted emails, and get real-world insights into smart email marketing from C Spire Wireless and others.
Tags : 
marketing channels, marketing guide, triggered emails, re-targeted emails, emerging marketing, internet marketing, marketing research
    
Adobe
Published By: xMatters     Published Date: Jan 26, 2015
Unsanctioned apps have become the norm, even in large enterprises with tight IT oversight. But when it comes to IT communication solutions, which frequently involve sensitive data, you simply cannot compromise. Read The 2015 IT Communications Buyers Guide and learn why you cannot afford to settle for a non-proven IT communications solution. This report details exactly what to look for, and also look out for, in an enterprise-grade vendor. Dive deep into topics such as: • Security and compliance • Enterprise specific capabilities • What constitutes a real mobile solution • Selecting a trustworthy partner • Breadth and depth of integrations • Global support • And much more...
Tags : 
security, compliance, enterprise, mobile solution, networking
    
xMatters
Published By: BitSight Technologies     Published Date: Mar 02, 2016
Cybersecurity in the financial services industry is rapidly evolving. Do you know how to stay ahead of the curve? The financial sector has been a pioneer for vendor risk management (VRM) best practices for a long time. Yes cybersecurity practices are continuing to evolve, and regulatory bodies are focusing more on third-party risk. Are you prepared for these changes? We'll dive further into this topic in this white paper and exploe: - How the threat landscape has been changing - and what can you do about it. - Some challenges the financial industries face in taking on VRM. - Four proactive tips for better VRM practices that you can put into place today. Download this free white paper now to better understand the changes to cybersecurity in the financial industry and what you can do about it.
Tags : 
bitsight, risk management, cybersecurity, vrm practices, vendor risk management, financial sector, it management, knowledge management, enterprise applications
    
BitSight Technologies
Published By: Microsoft Azure     Published Date: Apr 11, 2018
What you need to know now about moving your enterprise to a cloud computing strategy In the second edition of the Enterprise Cloud Strategy e-book, we've taken the essential information for how to establish a strategy and execute your enterprise cloud migration and put it all in one place, so you can quickly understand topics like: What to consider when choosing between hybrid, public, or private cloud environments How cloud reduces costs, and even benefits on-premises computing New analytics and IoT capabilities Security and compliance considerations This valuable asset for IT and business leaders provides a comprehensive look at moving to the cloud, as well as specific guidance on topics like prioritizing app migration, working with stakeholders and cloud architectural blueprints.
Tags : 
    
Microsoft Azure
Published By: HPE Intel     Published Date: Mar 09, 2016
State agency and higher education CIOs are under intense pressure to modernize their legacy IT systems. Whether that requires moving from one infrastructure to another, or moving to or from the cloud, the chief challenge remains: How to migrate data and applications without disrupting critical operations, ensure improved performance and avoid pricing and other traps that often accompany virtualizing in the cloud. Learn what’s made the difference in overcoming the impediments to workload migrations from IT leaders who’ve lived through big data and application moves. Topics include: Preparing workloads for cloud on-boarding – and off-boarding Tools for simplifying the consolidation and migration of apps and supporting services Forecasting workloads, and planning for associated testing, training, and other costs
Tags : 
    
HPE Intel
Published By: Amazon     Published Date: Nov 07, 2013
This planning and implementation guide discusses planning topics, architectural considerations, and configuration steps relevant before and after launching the necessary AWS services such as Amazon Elastic Compute Cloud (Amazon EC2) and Amazon Virtual Private Cloud (Amazon VPC) to run a high-availability and site-resilient Exchange architecture.
Tags : 
amazon web services, microsoft exchange, aws cloud, cloud, web services, servers, processor, memory, storage, log replication, network traffic, resiliency, availability, configuration, deployment
    
Amazon
Published By: Skillsoft     Published Date: Mar 03, 2015
The face of corporate learning has changed. It is no longer possible to develop your human capital with a single approach. Today’s corporate environment calls for out-of-the-box thinking, incorporating the advantages of many types of learning to benefit your company’s single biggest investment: your people. This handy guide will help you navigate the growing number of learning solutions and equip you with eight must-ask questions as you develop your learning program.
Tags : 
skillsoft, development, programs, processes, business management, elearning, corporate education, courses, courseware, technology, resources, access, devices, support, mobile, video, content, on-demand, build, buy
    
Skillsoft
Published By: Sponsored by HP and Intel®     Published Date: Mar 05, 2013
This essential guide from HP and Intel® provides key insights on the value that a converged infrastructure can offer and how to take advantage of one in your organization. Learn detailed instructions on various topics, and more.
Tags : 
converged infrastructure for dummies, converged infrastructure, dummies, era of convergence, intel, for dummies, requirements and design principles
    
Sponsored by HP and Intel®
Published By: Qualys     Published Date: Jun 30, 2016
Few would argue with the statement that security is a top priority for IT departments at companies large and small today. Data is the currency of the digital age and the lifeblood of organizations, so strategies to protect corporate data are growing in importance and are now a topic of C-suite consideration. So with high-profile data breaches continuing to occur across industries, security leaders are revamping their strategies to keep pace.
Tags : 
security, cloud, cloud management, data security, it management
    
Qualys
Published By: Marketo     Published Date: Mar 11, 2014
Lead generation has become an important strategy for modern marketers, as they strive to create demand and get their messages heard by increasingly sophisticated, multi-channel buyers. In today’s complex world, marketers should use lead generation to build brand awareness, nurture prospects and customers, qualify leads, and ultimately generate measurable revenue. In this comprehensive, 160 page guide, we cover topics ranging from content marketing and website SEO to telesales and content syndication — all through the lens of lead generation. Packed full of checklists, charts, and thought leadership from the leading experts in marketing today, The Definitive Guide to Lead Generation will teach you how to collect information from prospects across every channel, and deliver the highest quality leads to your sales team.
Tags : 
marketo, lead generation, defining a lead, seo, landing pages, social media, email marketing, middle of the funnel, optimization, metrics, testing, emerging marketing, business technology, advertising agencies, marketing research, traditional marketing
    
Marketo
Published By: Sponsored by HP and Intel®     Published Date: Feb 20, 2013
This paper looks at the benefits to be realized in the combined scenario of HP StoreOnce appliances being used with HP’s own Data Protector 7 backup software while considering the topic of “where” the deduplication occurs.
Tags : 
hp storeonce, better together, hp data protector, deduplication, data protector 7, hp data protector 7, it management, data management, business technology, data center
    
Sponsored by HP and Intel®
Published By: MoreVisibility     Published Date: Dec 19, 2017
Although keyword-targeting and on-page search engine optimization are just some areas that search engines evaluate when ranking pages, it is important to get these elements “right.” This complimentary white paper offers tips and a template to help establish a useful foundation for your on-page optimization efforts. Topics include: How to create content for users first, search engines second Body Copy Optimization Checklist Keyword Targeting Best Practices Meta Data Checklist with Downloadable Template Images & Multimedia Content Checklist
Tags : 
    
MoreVisibility
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top