outlines

Results 326 - 350 of 519Sort Results By: Published Date | Title | Company Name
Published By: Kenshoo     Published Date: Oct 30, 2012
This white paper outlines 5 key insights from year-over-year data with some perspective on the 2011 UK Christmas season. Read on to learn more about key metrics in the season including clicks, advertising, search advertising and more.
Tags : 
kenshoo, 2012 uk christmas, online retail, e-commerce, shopping, search marketing, advertising, online advertising
    
Kenshoo
Published By: Sitecore     Published Date: Nov 10, 2015
This new report outlines the must-have functionality to look for in a content management system so you’re able to deliver customer experiences with agility and precision. It explains the evolving definition of “web content management” and charts nine key capabilities to investigate.
Tags : 
wcm, mobile, marketing, cloud, cms, platform
    
Sitecore
Published By: IBM     Published Date: Dec 03, 2015
This paper outlines how to enhance disaster recovery testing with a structured approach to validating full business recoverability in the event of an outage.
Tags : 
ibm, resiliency program, functional validation, disaster recovery, security
    
IBM
Published By: Tripp Lite     Published Date: Sep 30, 2015
This white paper: • Explains the staggering growth of digital data volume and the increasing demand for faster access • Examines the different types of data transmission • Outlines the two potential solutions for connecting 10Gb equipment with higher-speed equipment
Tags : 
equipment, higher-speed, data transmission, infrastructure, volume, integrate, network, speed, digital
    
Tripp Lite
Published By: NetShelter - CyrusOne     Published Date: Oct 12, 2011
This whitepaper outlines issues that arise when planning for growth of IT infrastructure and explains how the colocation of data centers can provide scalability, enabling users to modify capacity quickly to meet fluctuating demand.
Tags : 
cyrus one, data center, texas, infrastructure, capacity, planning, colocation, scablability, costs, demand, data storage, backup, cyrus 1, houston, dallas, interoperability, network architecture, network management, cloud computing, data center design and management
    
NetShelter - CyrusOne
Published By: Bomgar     Published Date: Mar 04, 2008
Organizations implemented ITIL with the goal of creating a set of standards to ensure the delivery of high-quality and efficient technical support. However, many organizations are now looking to realize near-term business value from their investments in ITIL. This ITIL Quickguide outlines how organizations can leverage remote support solutions to accelerate ITIL initiatives and realize near-term business value.
Tags : 
service, customer service, customer support, remote support, online helpdesk, online support, help desk, itil, bomgar, remote access
    
Bomgar
Published By: ARX (Algorithmic Research)     Published Date: Jun 10, 2010
This white paper outlines the costs associated with a paper-based approval process and can help you establish the Return on Investment (ROI) that your organization can expect by deploying a digital signature solution.
Tags : 
arx, algorithmic research, roi calculation, digital signature, tco, automated approval process, authentication
    
ARX (Algorithmic Research)
Published By: BlackBerry     Published Date: Oct 04, 2008
This paper outlines the multitude of benefits that the BlackBerry solution offers to doctors, nurses, support staff and other clinical workers.
Tags : 
blackberry, healthcare, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: Neolane, Inc.     Published Date: Jan 08, 2010
This white paper outlines how B2B marketers can build the foundation for their own lead nurturing programs to increase campaign effectiveness, maintain the interest of prospects through the entire sales cycle, and deliver automated time- and event-triggered inbound and outbound programs.
Tags : 
neolane, b2b marketer, lead nurturing program, lead generation, campaign, marketing automation, lead management optimization, enterprise marketing software
    
Neolane, Inc.
Published By: SAS     Published Date: Mar 14, 2014
This report examines how data visualization can help organizations unleash the full value of information, and outlines key considerations to guide the solution evaluation process.
Tags : 
sas, data categorization, retrieval and quality, data visualization, data governance program, data management, data quality, business objectives, quality data, accuracy, lineage, structural consistency, relevant metrics, business relevance, visualization deployment, deployment, institute for analytics, data center
    
SAS
Published By: GoToAssist     Published Date: Oct 05, 2011
This new TSIA white paper explores 3 fundamental metrics - operational, quality and cost - that you should include in your services dashboard, outlines specific measurements to track in each area and provides industry averages for key metrics to help with benchmarking.
Tags : 
citrix, technology, metric, tsia, operations, quality, cost, dashboard, customer, benchmarking
    
GoToAssist
Published By: Taleo     Published Date: Jan 25, 2012
This paper outlines a 12 step methodology for building critical talent pipelines and provides insights into strategy and initiatives. It also describes the process and technology support that delivers Talent Intelligence information from defining roles to refining execution.
Tags : 
taleo, human resources, talent, employee, talent management, hr management
    
Taleo
Published By: Taleo     Published Date: Mar 30, 2012
This document outlines two ways that changes in business can impact succession planning and why integrating talent management processes can fill all your talent gaps.
Tags : 
employee wellness, corporate wellness, human capital management, wellness strategy, employee engagement, human resources, human resource management, talent management
    
Taleo
Published By: Qualys     Published Date: Nov 16, 2012
This report from Securosis outlines how yesterday's vulnerability scanners are evolving to meet this need, emerging as a much more strategic component of an organization's control set than in the past.
Tags : 
vulnerability management, it security, security attacks, security data, qualys cloud platform, zero-day threats, security threats, it threats, security risks, security
    
Qualys
Published By: Quantum - Quinstreet     Published Date: Aug 10, 2011
This paper outlines some of the important considerations for encrypting data on tape, and is intended to help IT administrators make the right decision for their environment and their company's data security needs.
Tags : 
quantum, quinstreet, data deduplication, deduplication, nas, network attached storage, remote replication, virtual tape library, data backup, reduce backup costs, deliver roi, retain data long term, back up virtual servers, secure your stored data, data deduplication and replication, symantec openstorage technology (ost), energy-effcient technology, media and entertainment, broadcast, postproduction
    
Quantum - Quinstreet
Published By: Taleo     Published Date: Feb 01, 2012
This paper outlines a 12 step methodology for building critical talent pipelines and provides insights into strategy and initiatives.
Tags : 
recruitment, recruitment software, talent management, talent management software, taleo
    
Taleo
Published By: Intel Corp.     Published Date: Aug 08, 2012
Virtualization reduces the number of physical servers IT needs to provision and maintain, but it also transforms the data protection paradigm. Now businesses can recover from failures in minutes, not hours, with unprecedented affordability. The key to achieving the best business uptime and cost savings is the effective design of storage management and data protection. This white paper outlines an end-to-end storage and data protection architecture optimized for VMware vSphere and Microsoft® Hyper-V environments.
Tags : 
complete, storage, data, protection, architecture, virtual, environments, virtualization, physical, servers, server, transforms, data, management, security, infrastructure, server hardware, data center design and management, data center
    
Intel Corp.
Published By: Intel Corp.     Published Date: Aug 08, 2012
The report outlines the benefits of using HP StoreOnce with NetBackup's integrated Network Data Management Protocol (NDMP) backup capabilities to enhance administrators' abilities to effectively manage NDMP-enabled NAS server backup and recovery.
Tags : 
using, storeonce, ndmp, backup, symantec, netbackup, report, outlines, benefits, network, network, data, management, protocol, nas, server, infrastructure, disaster recovery, cloud computing, virtualization
    
Intel Corp.
Published By: Bridgeline Digital     Published Date: May 17, 2013
Digital touchpoints support an increasingly large percentage of the overall customer experience. 2012 saw the emergence of several important digital customer experience trends that will gain momentum as firms look to unify the cross-touchpoint experiences they deliver in 2013. This report outlines key trends that will make up the landscape that customer experience professionals will be working in as they take strides to improve their digital customer experiences in 2013.
Tags : 
forrester, digital customer experience, customer experience management, customer experience trends, digital experiences
    
Bridgeline Digital
Published By: IBM     Published Date: Sep 03, 2013
This paper describes how workgroups and midsize companies can transform their spreadsheet-only process to create flexible and timely plans, budgets and forecasts. It outlines recommendations for implementing a complete performance management system, using IBM Cognos Express, an integrated reporting, analysis and planning solution purpose-built for workgroups and midsize companies.
Tags : 
transforming spreadsheets, planning, budgeting, forecasting, midsize companies, cognos express, management system, ibm
    
IBM
Published By: Coveo     Published Date: Nov 13, 2013
This eBook outlines cutting-edge strategies and technologies that transform knowledge management initiatives by turning data and information from anywhere into actionable knowledge.
Tags : 
big data, internal knowledgebase, knowledge management, unified search
    
Coveo
Published By: Imperva     Published Date: Nov 07, 2013
This white paper outlines the application threat landscape; explains why next generation firewalls are ill-equipped to stop web attacks; and provides six essential requirements for protecting web applications.
Tags : 
imperva, web applications, web application security, ddos, web attack, data protection, firewalls, next gen firewalls, validation, sql injection, hacker detection, single sign on
    
Imperva
Published By: Litmos     Published Date: Apr 23, 2015
This guide outlines the foundational building blocks of a Rockstar Customer Training Department. This guide applies to everyone tasked with customer training, regardless of company size.
Tags : 
customer training, scaling, litmos, curriculum design, content creation, digital media creation, learning management system
    
Litmos
Published By: Polycom     Published Date: Jun 08, 2016
"Build your business case. There is a transformational shift around enterprise voice solutions as organizations move from the PBX to unified communications (UC) for their voice needs. In parallel, many organizations are moving their existing on-premises infrastructure into the cloud. This brief outlines the benefits and considerations such as: • Microsoft Office 365 and the cloud • Selecting phones for Skype for Business • Replacing the PBX and making the transition • And more Download this brief that helps you realize the benefits that UC and collaboration brings to the modern workplace."
Tags : 
business optimization, business strategy, network management, business applications, best practices, business process management, productivity
    
Polycom
Published By: Intel Security     Published Date: Apr 06, 2016
This solution brief outlines how security operations must evolve to a continuous operation focused on assessing readiness, acquiring and integrating threat intelligence, and increasing the speed of threat response capability
Tags : 
advanced malware, targeted malware, layered malware defense, targeted attacks, critical infrastructure threats, forensic analysis, static detection, dynamic detection, forensic analysis, application control, vulnerability scanning, real-time kernel protection, change management monitoring, database activity monitoring, siem, network ips, global intelligence, advanced threat defense
    
Intel Security
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.