techniques

Results 376 - 400 of 424Sort Results By: Published Date | Title | Company Name
Published By: Godfrey     Published Date: Oct 24, 2008
Many B2B marketing professionals are happy with a 2% response on their mailings. Others are thrilled to get a 0.5% click-thru-rate on their email marketing campaign. If that’s you, you are probably using mass direct marketing techniques; not the relationship marketing possible with today’s targeted direct marketing technologies.
Tags : 
godfrey, click-thru-rate, email marketing campaign, targeted mailing approach, direct marketing plan, b2b direct marketing
    
Godfrey
Published By: Ericsson     Published Date: Feb 06, 2009
Using digital control in power supplies is considerably more flexible than analog control in its ability to adapt to changes and digital control inside the power supply results in advantages to the system application such as improved efficiency, fewer external components and reduced overall cost.
Tags : 
ericsson, analog control, digital control power supply, system application, digital power management, digital power, digital techniques, power conversion
    
Ericsson
Published By: Ping Identity     Published Date: May 05, 2009
Web Services are emerging as the preeminent method for program-to-program communication across corporate networks as well as the Internet. Securing web Services has been a challenge until recently, as typical Web authentication and authorization techniques employed browser-to-server architectures (not program-to-program). This resulted in user identity ending at the Web Application Server, forcing the Web Services Provider to trust blindly that the Web Services Requester had established identity and trust with the end user.
Tags : 
pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml, security assertion markup language, pki, public key infrastructure, soa, oasis, ws-trust, sso, single sign-on, service oriented architecture, rest, user identity mapping, ldap
    
Ping Identity
    
Lionbridge
Published By: Athena Security     Published Date: Nov 20, 2009
This paper presents some techniques to cleaning up the rule base along with an effective solution that addresses these automatically for you using Athena FirePAC for Firewall Rule Cleanup.
Tags : 
firewall rules, cisco firewall, netscreen firewall, check point firewall, firewall pci, firewall audit, firewall analysis, firewall rule cleanup, firewall unused rules, cisco pix, juniper netscreen, cisco asa, cisco fwsm.
    
Athena Security
Published By: Discovery Corps, Inc.     Published Date: Nov 20, 2009
Seeing into the hearts and minds of our customers is impossible; but this article describes how Data Mining techniques can be used to create strategies and tactics to increase customer retention and value.
Tags : 
data mining, business intelligence, predictive modeling, customer retention, high-value customers, decision support, clustering, discovery corps
    
Discovery Corps, Inc.
Published By: IBM Software     Published Date: May 12, 2011
Learn the six myths that surround direct marketing best practices and how your organization can use specific analytical techniques and tools to bust these myths and maximize your bottom line - so you won't just survive, you'll thrive.
Tags : 
ibm cognos, predictive analytics volume, direct marketing, best practices, analytical techniques
    
IBM Software
Published By: IBM Software     Published Date: May 12, 2011
Learn the six myths that surround direct marketing best practices and how your organization can use specific analytical techniques and tools to bust these myths and maximize your bottom line - so you won't just survive, you'll thrive.
Tags : 
ibm cognos, predictive analytics volume, direct marketing, best practices, analytical techniques
    
IBM Software
Published By: SAS     Published Date: Aug 03, 2016
The concept and practice of stress testing has been around for many years. While traditional stress testing methodologies are still valid for firmwide scenario analysis and stress testing, special techniques and attentions are needed to successfully achieve the goal of firmwide capital adequacy in forwardlooking stress scenarios. During the 2007 financial crisis, many financial institutions were not sufficiently prepared for the ensuing liquidity crunch and capital drains. Perhaps if banks had worked through different economic scenarios prior to the crisis, they would have been in a better position to weather the storm. Inadequate preparation for crisis can lead to systemic risk and severe economic and political turmoil.
Tags : 
best practices, risk management, security, analytics
    
SAS
Published By: Aternity     Published Date: Dec 30, 2011
Many enterprises have developed sophisticated Application Performance Management (APM) capabilities only to find that many of the techniques that work in the data center won't work in the cloud. The cloud turns the idea of locating and predicting performance problems across cloud applications on its head.
Tags : 
aternity, technology, end user experience, cloud applications, cloud computing
    
Aternity
Published By: Virgin Pulse     Published Date: Mar 01, 2012
Game techniques - like challenges, rewards, competition and leadership - appeal to the players' emotions and provide a sense of achievement and pride. If designed properly, game mechanics can be successfully added into workplace wellness programs to amplify results and build engagement and excitement. Discover more about the role of game techniques in corporate health programs in the new research paper, Let the Games Begin!
Tags : 
human resources, employee health program, employees, hr management, corporate health programs, employee development
    
Virgin Pulse
Published By: Virgin Pulse     Published Date: Dec 07, 2012
Launching an employee health and wellness program doesn’t guarantee positive results. You may face challenges, like lack of employee awareness and engagement. Discover techniques to engage your employees in your workforce health initiative.
Tags : 
workforce management, workforce health, employee engagement, workforce initiatives
    
Virgin Pulse
Published By: Encore Consulting     Published Date: Dec 09, 2010
A Simple, Practical Article on How to Sell Value Over Price
Tags : 
selling skills, sales training, sales trainers, selling techniques, selling tips, sales workshops, sales seminars, brain tracy, sales, selling, how to sell, consultative selling, strategic selling
    
Encore Consulting
Published By: Discovery Corps, Inc     Published Date: Jan 11, 2011
Article on how to handle missing values in a dataset during a data mining project
Tags : 
data mining, missing values, techniques, diagnosis, tips, missing data
    
Discovery Corps, Inc
Published By: Stevens & Tate Marketing     Published Date: Apr 12, 2011
Businesses looking to market their products and services to this new generation of consumers need to understand and embrace the benefits of using digital and mobile platforms to reach the audience of today.
Tags : 
mobile marketing, digital advertising, internet marketing, mobile advertising
    
Stevens & Tate Marketing
Published By: IBM Software     Published Date: Jun 08, 2011
Learn the six myths that surround direct marketing best practices and how your organization can use specific analytical techniques and tools to bust these myths and maximize your bottom line - so you won't just survive, you'll thrive.
Tags : 
ibm cognos, predictive analytics volume, direct marketing, best practices, analytical techniques
    
IBM Software
Published By: Kaon     Published Date: Jul 07, 2011
In this white paper, learn why the marketer's primary mission is to clarify that differentiation and how to find successful marketing tools and techniques to do just that.
Tags : 
kaon interactive, differentiation, competitive advantage, marketing challenge, perception, key product information, interactivity
    
Kaon
Published By: Globoforce     Published Date: Jan 17, 2012
Successful recognition programs are the ones that are adopted virally. Learn how innovative communication techniques can turn your recognition strategy into unequivocal success.
Tags : 
globoforce, human resources, recognition programs, performance management, employee management
    
Globoforce
Published By: AtTask     Published Date: Feb 11, 2012
Regardless the structure of your projects and work, the right work management approach can be the formula for success in your organization. This easy to read, 3 page guide, will introduce you to this formula.
Tags : 
successful project techniques, project management success, achieving business success, project management techniques, project success, project success criteria, project success factors, measuring project success, it project success
    
AtTask
Published By: AtTask     Published Date: Feb 11, 2012
It really doesn't matter if you are leading an army into battle or a product into market, sometimes the best solutions seem counter-intuitive. The same is true with project management. This document will safeguard your success.
Tags : 
project management mistakes, project management failures, it project failures, project failure statistics, project failure reasons, project failure examples, reasons for project failure, project failure rates, project failure case study, project estimation techniques
    
AtTask
Published By: AtTask     Published Date: Feb 11, 2012
In this free case study Forrester Research explains how the melding of task management with social networking is increasing transparency and team member buy-in for projects - dramatically increasing projects delivered on time and within budget.
Tags : 
task management software, task tracking software, task software, task project management, business task management software, task it, task tracking, task tracker, online task tracking, task tracking system, task tracking tool
    
AtTask
Published By: Adobe     Published Date: Oct 30, 2014
The Best of the Best Benchmark report compares the overall average versus websites in the top 20% on 6 key performance indicators across six regions — United Kingdom, France, Germany, BeNeLux, Nordics and United States.
Tags : 
measuring your online presence, best of the best benchmark report, evaluating marketing techniques, increasing marketing trending
    
Adobe
Published By: SAP     Published Date: Jul 17, 2012
In spite of the growth of virtual business activities performed via the World Wide Web, every business transaction or operation is performed at a physical place. And as handheld GPS devices drive a growing awareness of the concept of "location," people are increasingly looking for operational efficiencies, revenue growth, or more effective management as a result of geographic data services and location-based intelligence. In this white paper, David Loshin, president of Knowledge Integrity, Inc., introduces geographic data services (such as geocoding and proximity matching) and discusses how they are employed in both operational and analytical business applications. The paper also reviews analytical techniques applied across many types of organizations and examines a number of industry-specific usage scenarios.
Tags : 
business, sap, white paper, technology, location, intelligence, business value, data services
    
SAP
Published By: Arbor     Published Date: Sep 20, 2013
In this white paper, John Pescatore of SANS Institute explores how DDoS is used as part of advanced targeted attacks (ATAs) and describes how DDoS detection and prevention tools and techniques can be used against ATAs as well. Today’s DDoS attacks, as damaging as they are, sometimes mask even more threatening and dangerous advanced targeted threats. The good news is that some of the same tools that can detect the footprints of DDoS attacks can also find the telltale signs of ATAs. To be successful, though, enterprises need to coordinate their use of both types of logs and adjust their monitoring parameters correctly. They must also eliminate operational gaps, such as unclear lines of security authority, and limit the use of managed security services that can deprive enterprise security managers of the data they need to detect and stop DDoS attacks and ATAs.
Tags : 
distributed denial of services, ddos attack, ddos detection, ddos mitigation, security, advanced targeted attacks, mitigation, detection
    
Arbor
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.