overview

Results 451 - 475 of 686Sort Results By: Published Date | Title | Company Name
Published By: BMC Software     Published Date: Aug 12, 2013
While many companies have begun using external cloud infrastructure services, and a smaller number have embarked on internal “cloud-like” initiatives, others are just starting out and trying to determine how to best use cloud computing. This paper written by BMC’s Deputy CTO Herb VanHook, provides an overview of the major models of cloud infrastructure services (IaaS) and the business benefits and best uses of each model.
Tags : 
cloud, bmc, cloud infrastructure
    
BMC Software
Published By: Symantec     Published Date: Aug 09, 2013
Get an overview and analysis of the year in global threat activity with the Symantec 2013 Internet Security Threat Report. This report provides commentary on emerging trends in the dynamic threat landscape, covers the key findings and provides best practice guidelines. Learn about strategies to combat security risks that threaten your organization. Read the report now.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec
Published By: Spredfast, Inc.     Published Date: Aug 06, 2013
This guide walks through each of the “Big Six” objectives and provides a tactical overview of the business case, team considerations and actual content examples and templates to use for your social media initiatives.
Tags : 
spredfast, social media, advertising solutions, blog comments, blog monitoring, brand loyalty, brand management, brand positioning
    
Spredfast, Inc.
Published By: eFax     Published Date: Aug 06, 2013
eFax Corporate is part of publicly-traded j2 Global™ Inc. (NASDAQ: JCOM). Founded in 1995, j2 Global provides outsourced, value-added messaging and communications services to individuals and businesses around the world. The Company offers fax, voicemail and document management solutions, Web-initiated conference calling and unified-messaging and communications services.
Tags : 
efax, value-added messaging, communications services, management solutions, unified-messaging
    
eFax
Published By: GoodData     Published Date: Aug 02, 2013
Explore over 50 critical sales metrics in a live, checkable and drill able environment. View essential metrics for executive overview, pipeline management, product and regional analysis, and team management, as well as vivid visualizations of historical performance trends. Download this White Paper for more information!
Tags : 
sales metrics, how to forecast sales, sales analysis, sales analytics, crm analytics, salesforce reports, salesforce analytics, sales projections
    
GoodData
Published By: Rapid7     Published Date: Jul 24, 2013
The Payment Card Industry (PCI) Data Security Standard (DSS) was created to confront the rising threat to credit cardholder personal information. This compliance guide will provide readers with an overview of the requirements as well as suggested steps in achieving PCI compliance.
Tags : 
rapid7, pci compliance, dss compliance, pci dss compliance, secure transactions, online payment security, security, payment processing
    
Rapid7
Published By: CDW     Published Date: Jun 10, 2013
Securing your network requires more than just new hardware and software. It’s abouta change in your organization’s culture to a more security-conscious environment. Your staff needs strong and diverse passwords.
Tags : 
cdw, external threats, malware, defense, internal threats, security
    
CDW
Published By: Telstra     Published Date: May 21, 2013
This best practice guide aims to provide colocation buyers with a complete overview of the factors that need to be considered when assessing colocation services.
Tags : 
colocation services, best practice, telstra, buyers, global
    
Telstra
Published By: Bulldog Solutions     Published Date: May 20, 2013
This executive overview focuses on one of these drivers--program effectiveness--defined by leading marketers as programs that drive a high level of conversion and prospect engagement throughout the buyer's journey. in this executive overview, we'll take a look at the current buyer landscape, and then at five five best practice areas that need to be optimized in order for your programs to reach their full potential.
Tags : 
program effectiveness, b2b, b2b buyers, message alignment, buyer insights, audience acquisition, performance monitoring, campaign
    
Bulldog Solutions
Published By: Sponsored by HP and Intel®     Published Date: May 09, 2013
The cloud promises flexibility, agile development, rapid innovation, reductions in capital costs and infrastructure complexity, and much more. Before you can realize the cloud’s true potential, though, you need to clearly understand what you can do with it. That's why IT professionals from all industries and company sizes turn to an HP Cloud Discovery Workshop for help. Read this white paper for an overview of the HP Cloud Discovery Workshop and to understand how it can help clarify your company's cloud vision. Intel and the Intel logo are trademarks of Intel Corporation in the U.S. and/or other countries.
Tags : 
cloud journey, cloud, flexibility, agile development, rapid innovation, capital costs
    
Sponsored by HP and Intel®
Published By: SilverSky     Published Date: Apr 16, 2013
SilverSky operates a major hosted infrastructure dedicated to providing world-class enterprise messaging solutions. This whitepaper is an in-depth overview of our Hosted Microsoft Exchange architecture and how we implement best practices across systems management, testing, application deployment, infrastructure and security to provide increased productivity and reduced costs.
Tags : 
microsoft exchange, architecture, silversky, hosted infrastructure, enterprise messaging, best practices, application deployment
    
SilverSky
Published By: BrightEdge     Published Date: Apr 15, 2013
Download this survey for an overview of the priorities and needs of the top search marketers around the globe. With over 500 search algorithm changes in the past year, this survey seeks to offer guidance on how leaders continue to stay ahead in the competitive search marketing industry.
Tags : 
enterprise seo, content optimization, enterprise seo management, search engine optimization, seo, seo blog, seo careers, seo managment
    
BrightEdge
Published By: BrightEdge     Published Date: Apr 15, 2013
Download this whitepaper for an overview of how BrightEdge and Facebook are working together to target the "Social SEO" opportunity. This paper outlines simple and highly effective ways to address the Social SEO opportunity.
Tags : 
enterprise seo, content optimization, enterprise seo management, search engine optimization, seo, seo blog, seo careers, seo managment
    
BrightEdge
Published By: BrightEdge     Published Date: Apr 15, 2013
Download this white paper for an overview of how backlinks influence search results, why it's critical to use only white hat methods and how tools like BrightEdge, MajesticSEO and interactive agencies like Rosetta can be used to gain visibility and insight.
Tags : 
enterprise seo, content optimization, enterprise seo management, search engine optimization, seo, seo blog, seo careers, seo managment
    
BrightEdge
Published By: McAfee     Published Date: Apr 10, 2013
In this white paper, IDC provides an overview of messaging security and its impact on enterprises.
Tags : 
idc, hybrid email messaging security, on premises, saas, mcafee saas email protection, mcafee saas email continuity, mcafee email gateway, mcafee host dlp protection
    
McAfee
Published By: Oracle Corporation     Published Date: Apr 01, 2013
Discover how to accelerate database performance, handle change and growth in scalable, incremental steps, and deliver mission-critical data availability and protection with this unique commercial solution.
Tags : 
database, oracle, storage, data, data warehousing
    
Oracle Corporation
Published By: Oracle Corporation     Published Date: Mar 28, 2013
Download this data sheet for an overview of features and benefits, including a performance increase of 10x when scanning and analyzing data.
Tags : 
storage server, database, oracle, high capacity, sql
    
Oracle Corporation
Published By: Scalebase     Published Date: Mar 08, 2013
Technology analyst firm 451 Research offers a brief overview of ScaleBase’s Data Traffic Manager software for dramatic scaling of MySQL databases beyond the capabilities of MySQL 5.6.
Tags : 
shard, cluster, high availability, failover, mariadb, mysql, read/write, scalability
    
Scalebase
Published By: Sponsored by HP and Intel®     Published Date: Mar 05, 2013
Read this white paper sponsored by HP and Intel® for an overview of the HP Cloud Discovery Workshop and to understand how it can help clarify your company's cloud vision -- through costs, potential and innovations.
Tags : 
adapt technology, cloud, organization of cloud, cloud infrastructure, it infrastructure, cloud implementation, intel
    
Sponsored by HP and Intel®
Published By: Oracle Corp - Storage     Published Date: Feb 15, 2013
This white paper provides an overview of how Oracle’s optimized storage enables business transformation while saving up to 40 percent on storage costs and lowering risk for deployments.
Tags : 
storage, database, optimization, oracle, database, application performance, risk management
    
Oracle Corp - Storage
Published By: Okta     Published Date: Feb 05, 2013
Okta is an enterprise grade identity management service, built from the ground up in the cloud and delivered with an unwavering focus on customer success.
Tags : 
okta, customer service, architectural overview, online portals, 3rd party portal integration
    
Okta
Published By: dynatrace     Published Date: Feb 01, 2013
Studies have shown that poor performance of e-commerce web sites can directly result in loss of revenue, poor customer satisfaction and damaged reputation. This white paper provides an overview to application performance management for e-commerce.
Tags : 
    
dynatrace
Published By: Trend Micro     Published Date: Feb 01, 2013
This whitepaper will explore the anatomy of targeted attacks: the inner workings of the APT lifecycle. It will also provide an in-depth overview of Trend Micro Deep Discovery advanced threat protection solution, and how it enables enterprise IT to adopt a custom defense strategy that modernizes its risk management program to defend against targeted attacks. Deep Discovery is at the heart of the Trend Micro Custom Defense solution against targeted attacks.
Tags : 
advanced persistent, threat challenge, custom defense solution, trend micro, risk management
    
Trend Micro
Published By: Arbor Networks     Published Date: Jan 31, 2013
This Frost & Sullivan whitepaper provides an overview of the latest DDoS attack trends, and offers examples of how cloud service and hosting providers can use Arbor Networks solutions to protect their data centers from DDoS attacks and more.
Tags : 
    
Arbor Networks
Published By: Symantec     Published Date: Jan 31, 2013
Read the report to learn about the Endpoint Protection landscape, growth drivers and challenges, and where vendors are positioned.
Tags : 
endpoint protection, security, overview
    
Symantec
Start   Previous    12 13 14 15 16 17 18 19 20 21 22 23 24 25 26    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.