RecruitingBlogscom

Follow Us:

 

business

Results 13501 - 13525 of 13816Sort Results By: Published Date | Title | Company Name
Published By: Cast Iron Systems     Published Date: Feb 14, 2008
Discover why traditional software and custom coding solutions are obsolete when solving integration problems in a SaaS environment and how they’re rapidly being replaced by Integration Appliances that use “configuration, not coding” to quickly integrate your SaaS applications with your business-critical data.
Tags : 
saas, software as a service, erp, scm, crm, data integration, application integration, marketing automation, sales automation, castiron, cast iron
    
Cast Iron Systems
Published By: Elastic Collision     Published Date: Feb 14, 2008
Media coverage of Second Life typically favors the opinions of industry analysts and naysayers. All too often, the concerns of regular users are overlooked. In October 2007, as part of a larger survey, we asked more than 800 Second Life residents what advice they would give to real-world organizations establishing a presence in Second Life.
Tags : 
elastic collision, virtual, virtual world, virtual reality, sims, avatar, avatars, social networking
    
Elastic Collision
Published By: Stratus Technologies     Published Date: Feb 12, 2008
Application vulnerabilities and risks must be weighed to identify resources, performance requirements and service level objectives to ensure business continuity. Using real-world case studies, this white paper examines Information Lifecycle Management (ILM) best practices for disaster preparedness.
Tags : 
risk management, vulnerability, info management, information management, best practices, disaster recovery, stratus, stratus technologies
    
Stratus Technologies
Published By: IDology     Published Date: Feb 11, 2008
There is a new automated technology available now that is helping businesses combat identity theft and prevent fraud. It is called identity proofing and it is specifically designed to verify consumer identities online. With all the fraud prevention solutions available in the market today you are probably wondering, does my company really need to use an identity proofing solution?
Tags : 
identity management, iam, access management, iam, risk management, identity theft, hackers, fraud, identity, idology
    
IDology
Published By: IBM     Published Date: Feb 08, 2008
Appropriately sizing and hosting your online game project’s infrastructure can improve your bottom line. In this white paper, IBM describes the current state and direction of key technological trends and how they impact the business of games, focusing on what online game companies need to know to more rapidly and efficiently build a better game.
Tags : 
game, online games, video games, ibm, game project, software development
    
IBM
Published By: IBM     Published Date: Feb 08, 2008
As manufacturing goes global, initiatives to standardize processes and key performance measurements across the enterprise to unite the greater supply chain are emerging. The main catalyst? Driving down costs in response to customer and market pressures. However, mid-size companies in particular are driving performance improvements with a more proactive, strategic vision for improving performance than reactively responding to cost pressure.
Tags : 
scm, supply chain, manufacturing, manufacturer, bpm, business process, erp, enterprise resource planning, business intelligence, ibm, enterprise applications
    
IBM
Published By: IBM     Published Date: Feb 08, 2008
Unexpected disasters threaten organizations across the globe daily. Surprisingly, many businesses are not prepared for such disasters. They lack business continuity plans which can provide both proactive and reactive strategies to minimize the impact of unforeseen setbacks.
Tags : 
disaster recovery, business continuity, natural disaster, infrastructure, ibm
    
IBM
Published By: IBM     Published Date: Feb 08, 2008
It’s tough for community financial institutions to succeed, especially when faced with fierce competition from large banks with large budgets. See how IBM can help with solutions tailored for community banks. Click now and receive the new 18-page report from TowerGroup on CRM Metrics and how smart banks measure success.
Tags : 
customer data, customer centric, customer-centric, crm, customer relationship, bank, banks, finserv, finserve, financial services, finance, financial, smb, small business, ibm
    
IBM
Published By: IBM     Published Date: Feb 08, 2008
Marketing executives, face a constant stream of business pressure. At the same time, customer expectations are increasing and customer satisfaction is becoming increasingly difficult  This report provides a blueprint of what best-in-class CMO's (Chief Marketing Officers) do differently to improve marketing effectiveness through marketing automation.
Tags : 
marketing roi, customer satisfaction, return on marketing investment (romi), chief marketing officer or cmo, customer centricity, customer behavior, multi-channel marketing, marketing strategy, marketing analytics, ibm
    
IBM
Published By: Motorola     Published Date: Feb 06, 2008
Aberdeen's research shows that Unified Communications (UC) solutions have a measurable impact on the productivity of an organization's workforce. Read this report to learn how best-in-class organizations are leveraging their UC solutions as part of an integrated business-process mapping program to understand how UC solutions help the workforce most effectively impact those core business processes.
Tags : 
unified communications, soft phones, ivr, mobile, mobility, fixed mobile convergence, productivity, motorola, motorola good, wireless
    
Motorola
Published By: Motorola     Published Date: Feb 06, 2008
This White Paper outlines how mobile solutions help organizations work efficiently in a global business environment. It also discusses how organizations can best create processes around device usage, data/service access and security.
Tags : 
mobile strategy, wireless, mobility, adoption, htc, mobile workers, security, network, wireless knowledge, mobile messaging, mobile device, data access, motorola, motorola good
    
Motorola
Published By: Motorola     Published Date: Feb 06, 2008
DMX Music has always been at the leading edge of technology. As remote access to e-mail became a viable business solution, DMX Music's IT department began to consider the possibilities a wireless messaging system could bring to its business. Read this case study to learn what they found out.
Tags : 
motorola, motorola good, case study
    
Motorola
Published By: Motorola     Published Date: Feb 06, 2008
The mortgage banking business is ultra-competitive and rapidly changing. To compete in this environment requires a highly productive workforce with dependable, reliable and flexible communications so that employees can provide the best customer service possible. Read this case study to learn how George Mason Mortgage found a more robust and easy-to-manage mobility solution that helped the company accomplish its goals.
Tags : 
motorola, case study, motorola good
    
Motorola
Published By: Motorola     Published Date: Feb 06, 2008
To stay competitive in the specialty pharmaceutical business, it is critical that a company's sales force, marketing team and executives have the business tools they need to keep them one step ahead of their rivals. Read this case study to learn how Good™ Mobile Messaging has helped the employees of MedPointe Pharmaceuticals stay connected to crucial information while they're on the road.
Tags : 
motorola, motorola good, case study
    
Motorola
Published By: Panda Security     Published Date: Feb 06, 2008
Today’s targeted malware attacks are infecting unsuspecting businesses at astonishing rates, rendering traditional antivirus solutions ineffective. Reported and known viruses are becoming less important compared to the increase in unknown threats and attacks.
Tags : 
security, threats, ips, intrusion prevention, internet security, hackers, hacker, virus, antivirus, anti-virus, holes, vulnerability, vulnerabilities, panda, panda security
    
Panda Security
Published By: Fathom SEO     Published Date: Feb 06, 2008
Watch what it takes to takes to produce online videos that drive sales, leads and publicity for your business. This quick presentation explains why Internet video is growing at such a rapid pace and offers tips on how to begin your own video marketing campaigns.
Tags : 
video, sales presentation, lead generation, videos, sales pitch, fathom, fathom seo
    
Fathom SEO
Published By: Aerohive     Published Date: Feb 06, 2008
Yesterday’s fat access points and legacy wireless LANs typically can’t handle mission-critical, real-time applications, nor do they have a migration path to 802.11n. Aerohive Networks has developed a new controller-less architecture that provides an innovative way to handle tomorrow’s wireless challenges – like voice over WLAN and migrating to 802.11n – without costing you a fortune. This paper discusses the benefits of this approach and the key underlying technologies of cooperative control, including best path forwarding and policy enforcement at the edge.
Tags : 
business, roi, tco, wireless lan, enterprise wireless, economics, cooperative control, aerohive, aerohive networks, networking, wireless
    
Aerohive
Published By: Aerohive     Published Date: Feb 06, 2008
Are you looking to reduce the operational cost of your existing wireless LAN, and to make it support mission-critical, real-time applications and 802.11n? At the same time, are you challenged with the cost and complexity associated with most next-generation wireless LAN architectures? Check out the enterprise-class, cost-effective new cooperative control architecture from Aerohive Networks. In this real-world case study, you’ll see how Aerohive Networks' cooperative control architecture combines the linear cost modeling of autonomous APs and the operational advantages of controller-based approaches.
Tags : 
business, roi, tco, wireless lan, enterprise wireless, economics, cooperative control, aerohive, aerohive networks, wireless
    
Aerohive
Published By: SAP     Published Date: Feb 05, 2008
Take a look at how organizations are taking strides to align business strategy with actual initiatives, projects, and daily activities - in short, to close the gap between strategy and execution. Studies show that even well-formulated plans often fall short; here's how to change that.
Tags : 
sap, enterprise performance, strategy management, managing initiatives
    
SAP
Published By: SAP     Published Date: Feb 05, 2008
Many CEOs have told us that business transformation needs to be done effectively and efficiently, without much disruption to the business. And it should be a continuous process, not a one-time event. Continuous business transformation, accomplished over time, requires a new degree of flexibility and adaptability in all parts of the enterprise. So how do you get ready to change and continue to change?
Tags : 
sap, business transformation, enterprise applications, market leadership
    
SAP
Published By: Aveksa     Published Date: Feb 04, 2008
User access-related business risk comprises a broad array of potentially damaging events that may be caused or made possible by inadequate governance of access to an enterprise’s information assets. Such events range from relatively minor policy and compliance violations to disastrous business losses.  The stakes involved in access-related risk have risen dramatically in recent years as organizations have become thoroughly operationalized by technology.
Tags : 
access control, user access, access, permissions, risk, risk management, compliance, governance, aveksa
    
Aveksa
Published By: ESET     Published Date: Feb 01, 2008
It is important for businesses to have a plan in place that addresses the changing threat landscape.  This podcast discusses various items for businesses to consider when developing an IT threat model.
Tags : 
threat planning, testing, penetration testing, defense in depth, multilayered, firewall, filtering, white listing, it strategy, eset, nod32, antivirus, malware, internet threats, web based threats, web 2.0, smb, small business, medium business, eset
    
ESET
Published By: Accelerance     Published Date: Feb 01, 2008
Companies exploring offshore software development often find an overwhelming array of options. For example, is India the best choice? What about China, Russia or Brazil? Time, distance and language barriers also make it difficult to assess the quality of offshore developers. How can businesses reduce the risks of offshoring?
Tags : 
offshoring, vendor selection, offshore, outsource, outsourcing, india, development, developer, programming, programmer, accelerance, software development
    
Accelerance
Published By: VMware Dell     Published Date: Jan 31, 2008
A virtualized data center is a more nimble, responsive, and efficient data center. This report discusses the trend towards x86 virtualization and customer benefits, and examines how (in defiance of conventional wisdom) SMB customers have been embracing – and benefiting from – x86 virtualization at about the same rate as larger enterprises.
Tags : 
gabriel, gabriel consulting, vmware, virtual, virtual server, server, server software, small business, mid-sized business, smb, cost savings, server costs, spend management, smbs, virtual machine
    
VMware Dell
Published By: newScale     Published Date: Jan 30, 2008
Demand for IT services is outpacing the growth of IT budgets. The business constantly requests new services, requires higher service levels, and expects more consistent service delivery. With supply constrained, the only solution is to manage this demand more effectively. The new version of ITIL prescribes essential changes to help IT and the business tackle this difficult task.
Tags : 
service, service management, service catalog, newscale, itil, service catalog, service catalogue, itil service catalogue, it service catalogue, it management
    
newScale
Start   Previous    534 535 536 537 538 539 540 541 542 543 544 545 546 547 548    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top