small business

Results 51 - 75 of 656Sort Results By: Published Date | Title | Company Name
Published By: Breece Hill, LLC     Published Date: Mar 15, 2007
Once a business clears the financial hurdle and begins to plan their data protection strategy the choices can appear daunting. Do they select tape or disk? Apply differential or incremental backups? How much will a new system cost and how much time will it take to implement? What data should be included in the backup? This article attempts to address these concerns.
Tags : 
smb, storage, archiving, backup, hardware, small business networks, storage, backup and recovery
    
Breece Hill, LLC
Published By: Brightpearl     Published Date: Nov 19, 2012
If you're a small business selling inventory then you are sure to have come across some of the pitfalls it entails, but getting it right could be more important than you think. Read on to learn the 10 reasons why accurate inventory is important.
Tags : 
brightpearl, accurate inventory, sales stock, low inventory, economic order quantity, eoq
    
Brightpearl
Published By: Brother     Published Date: Jul 31, 2015
Read this white paper to learn more about key printing trends like device underuse and unbalanced fleets and their SMB impact.
Tags : 
printing trends, brother, multifunction printers, document management systems, productivity, cost savings, small business, medium-sized business
    
Brother
Published By: Business Advisory Board     Published Date: Jun 12, 2014
Download your FREE Small Business Project Management Software Buying Guide from Business Advisory Board and learn about the different types of project management software out there and how to choose the right product for your business.
Tags : 
business advisory board, business advice, buyer recommendation, project management, project management software, software vendors, software recommendation, it spending
    
Business Advisory Board
Published By: Business Software     Published Date: Apr 04, 2013
As today’s global marketplace becomes more sophisticated, the number and complexity of mission-critical financial transactions that companies conduct on a day-to-day basis continues to grow exponentially. Even small and mid-sized businesses are plagued by a rapidly increasing volume of financial processes that are highly intricate and multi-faceted. These activities, while important, are administrative in nature and often distract staff from more strategic planning initiatives that directly impact company prosperity and growth. Additionally, as legislative pressures continue to grow, and the rules imposed by Sarbanes Oxley, BASEL II, and other regulations become more stringent, businesses need to find better ways to ensure compliance by effectively logging, tracking, auditing, and reporting their financial data.
Tags : 
various types of business transactions, cost effectiveness, business-software.com, revealed
    
Business Software
Published By: BuyDomains     Published Date: Nov 27, 2007
Defining an effective Internet and domain name strategy is vital to any business — especially small- or medium-sized businesses which have limited development and promotional budgets. From defining this strategy, to understanding the keys to Web promotion, here is vital information that every entrepreneur should know.
Tags : 
web development, web site, web marketing, buy domains, buydomains
    
BuyDomains
Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
Today’s DevOps and agile–loving enterprises are striving for fast changes and quick deployments. To these companies, the microservices architecture is a boon, but not a silver bullet. Organizations can enable smaller development teams with more autonomy and agility, and as a result, the business will notice IT being more in tune with their changing demands.
Tags : 
api, application programming interface, psd2, open banking, json, github
    
CA Technologies EMEA
Published By: Carbonite     Published Date: Jan 04, 2018
Malware that encrypts a victim’s data until the extortionist’s demands are met is one of the most common forms of cybercrime. And the prevalence of ransomware attacks continues to increase. Cybercriminals are now using more than 50 different forms of ransomware to target and extort money from unsuspecting individuals and businesses. Ransomware attacks are pervasive. More than 4,000 ransomware attacks happen every day, and the volume of attacks is increasing at a rate of 300 percent annually. According to an IDT911 study, 84 percent of small and midsize businesses will not meet or report ransomware demands. No one is safe from ransomware, as it attacks enterprises and SMBs, government agencies, and individuals indiscriminately. While ransomware demands more than doubled in 2016 to $679 from $294 in 2015, the cost of remediating the damage and lost productivity is many multiples higher.
Tags : 
    
Carbonite
Published By: Carbonite     Published Date: Jan 04, 2018
It’s the moment every IT department dreads: A data loss event takes your business offline and the countdown clock begins. Despite spending countless hours safeguarding against and preparing for this moment, the impact of downtime is immediate and all-consuming. While IT pros can’t always avoid data loss events, they can prepare for them to ensure minimal downtime. To better understand the IT experience during a data disaster, EVault commissioned Spiceworks Voice of IT to survey IT pros regarding disaster recovery practices and perceptions. All survey respondents were based in the U.S. and have influence over backup/disaster recovery purchase decisions. This e-book will explore the impact of downtime and data loss on IT departments for small and midsize businesses.
Tags : 
    
Carbonite
Published By: Carbonite     Published Date: Apr 09, 2018
Malware that encrypts a victim’s data until the extortionist’s demands are met is one of the most common forms of cybercrime. And the prevalence of ransomware attacks continues to increase. Cybercriminals are now using more than 50 different forms of ransomware to target and extort money from unsuspecting individuals and businesses. Ransomware attacks are pervasive. More than 4,000 ransomware attacks happen every day, and the volume of attacks is increasing at a rate of 300 percent annually.1 According to an IDT911 study, 84 percent of small and midsize businesses will not meet or report ransomware demands.2 No one is safe from ransomware, as it attacks enterprises and SMBs, government agencies, and individuals indiscriminately. While ransomware demands more than doubled in 2016 to $679 from $294 in 2015, the cost of remediating the damage and lost productivity is many multiples higher.3 Ransomware is the equivalent of catastrophic data loss, except
Tags : 
    
Carbonite
Published By: Cartera Commerce     Published Date: Feb 15, 2012
Want to boost sales with offers linked to shoppers' debit, credit and loyalty cards? This primer highlights the card-linked offer-how it works, projections for market growth and a merchant case study with real results.
Tags : 
cartera commerce, mall networks, cartera, catera, vesdia, vesdia, mallnetworks, merchant-funded
    
Cartera Commerce
Published By: Cartera Commerce     Published Date: Mar 07, 2012
As a local merchant, do you want to understand the exploding deal landscape--coupons, daily deals, check-in deals, gamification, card-linked offers and more? Download Deals Deconstructed: The Definitive Merchant Guide to Deals, Discounts and Offers today.
Tags : 
cartera commerce, mall networks, cartera, vesdia, merchant-funded, loyalty, customer loyalty, merchant network
    
Cartera Commerce
Published By: Cartera Commerce     Published Date: Mar 21, 2012
For many local merchants, offers linked to consumer credit/debit cards let you optimize your overall marketing program. Download the eBook and understand the new way for local business to attract new customers-and keep them.
Tags : 
cartera commerce, mall networks, cartera, vesdia, merchant-funded, loyalty, customer loyalty, merchant network
    
Cartera Commerce
Published By: Cartera Commerce     Published Date: Jul 16, 2012
Want to attract new, valuable customers and keep them coming back? This demo shows how card-linked offers from OfferLink let you reward customers in the currencies they crave; no changes to POS, no vouchers, no coupons.
Tags : 
cartera commerce, mall networks, cartera, catera, vesdia, vesdia, mallnetworks, merchant-funded
    
Cartera Commerce
Published By: Castelle     Published Date: Nov 01, 2006
Castelle’s integration provides seamless fax integration with native Notes services like logging and reporting, and lets faxes be managed just like other Notes email, with all of Domino’s native security, administration, and customization capabilities.
Tags : 
ip networks, ip telephony, network management, servers, small business networks, tcp/ip protocol, contact management, messaging
    
Castelle
Published By: CDW     Published Date: Nov 12, 2012
You've dipped your toe into the virtualization waters, and now you'd like to learn how you can dive in and fully reap the money-saving and business-building advantages.
Tags : 
server virtualization, it infrastructure, virtualization solutions, data center
    
CDW
Published By: CDW     Published Date: Nov 12, 2012
By migrating to VCE Vblock, ATS Cloud can scale up enterprise IT services to small and medium-sized businesses in real time.
Tags : 
case study, converged infrastructure, data centers, cloud computing
    
CDW
Published By: CDW     Published Date: Nov 13, 2012
With the right SaaS security solutions, small businesses can gain enterprise-class safeguards at an affordable price.
Tags : 
cdw, cloud, cloud computing, cloud based security, cybertheft, data breaches
    
CDW
Published By: CDW     Published Date: Sep 15, 2014
Learn how one unified storage system can meet all the needs of your small business while it continues to grow and see how a better storage system will help your organization expand as you collect more data.
Tags : 
affordable, solution-focused, unified, storage, platform, smaller businesses, software, application
    
CDW
Published By: CDW     Published Date: Sep 15, 2014
Learn how you can safely store your massive amounts of data with a single storage solution.
Tags : 
affordable, solution-focused, unified, storage, platform, smaller businesses, software, application
    
CDW
Published By: CDW     Published Date: Aug 28, 2015
It’s the last storage architecture you will ever need—regardless of whether your organization is a small or midsized business, a large global enterprise, or a service provider. With a range of models to meet the needs of small to large data centers running key business applications up through enterprise-wide deployment of mission-critical applications and beyond, HP 3PAR StoreServ Storage has you covered.
Tags : 
storage, servers, cloud computing, architecture
    
CDW
Published By: CDW     Published Date: Aug 04, 2016
Tools for extracting actionable insights from growing mounds of data are becoming smarter and easier to use. Organizations are awash in data generated by customers, supply chain partners and numerous other humanand machine-based sources. With the growth of the Internet of Things (IoT) starting to churn out even more data, many enterprises are considering how to transform their growing stores of raw information into actionable insights. Business intelligence (BI) and data analytics were once mostly limited to large enterprises, but 85 percent of small and midsize businesses have expressed interest in these solutions, according Gartner subsidiary Software Advice. Further, Accuray Research reports that the global business intelligence and analytics software market is poised to grow swiftly in the coming years to approximately $24 billion by 2020.
Tags : 
data, technology, data analytics, business intelligence, enterprise, data analytics
    
CDW
Published By: CDW-Trend Micro     Published Date: Jul 17, 2015
A small business owner named Pete needs a complete security solution that protects everyone on his staff when they email, browse, and share using their Macs, PCs, or mobile devices. Watch this video and see Pete discover Trend Micro™ Worry-Free™ Business Security is an easy-to-use solution that provides complete user protection for all his employees. Webinar Brought To You By CDW-Trend Micro
Tags : 
security solution, cyber attack, mobile devices, business security, user protection
    
CDW-Trend Micro
Published By: Certify     Published Date: Sep 13, 2013
Learn about expense management and what companies should be looking for in expense management software as this whitepaper by PBP Media outlines today's top 5 software vendors
Tags : 
expense report, expense reporting, expense management, receipt management, employee expense, business travel, online expense management, expense management software
    
Certify
Published By: Certify     Published Date: Sep 13, 2013
Learn the best practice for solution selection as this whitepaper from the Aberdeen Group outlines the Best-In-Class organizations and how they are actively leveraging specific components of technology in order to improve their T&E expense management programs
Tags : 
expense report, expense reporting, expense management, receipt management, employee expense, business travel, online expense management, expense management software
    
Certify
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.