client

Results 826 - 850 of 1098Sort Results By: Published Date | Title | Company Name
Published By: Osterman Research, Inc.     Published Date: Jul 08, 2011
Join Michael Osterman of Osterman Research and GFI Software who will discuss the current state of the dangers of simple Web surfing and what you can do to address these concerns quickly and easily.
Tags : 
web monitoring, gfi, osterman, messaging, directory, email, e-mail, directories, spam, archive, archiving, instant, backup, mail, white, paper, whitepaper, migration, disaster, recovery
    
Osterman Research, Inc.
Published By: Port25 Solutions     Published Date: Mar 23, 2012
Using PowerMTA's VirtualMTA technology, Pure360 was in a position to easily provide dedicated IPs for their clients. and adhere to ReturnPath's certified sender requirements to maintain high inbox placement rates.
Tags : 
smtp server, mta, email server, mail server, email infrastructure, enterprise software, email delivery, email reporting, bounce categorization, message transfer agent, it management, data management, customer satisfaction, customer service, enterprise resource planning, infrastructure, design and facilities
    
Port25 Solutions
Published By: Port25 Solutions     Published Date: Mar 23, 2012
As the chief crisis management solution nationwide, it is essential that eAlert utilizes a delivery system with maximum reliability, delivery performance, and reporting features to meet its clients' demands - PowerMTA was the only SMTP software flexible enough to supply these necessary features and easily integrate into eAlert's current system without interruption.
Tags : 
smtp server, mta, email server, mail server, email infrastructure, enterprise software, email delivery, email reporting, bounce categorization, message transfer agent, it management, data management, customer satisfaction, customer service, enterprise resource planning, infrastructure, design and facilities
    
Port25 Solutions
Published By: Intel Corp.     Published Date: Aug 08, 2012
Enterprise Strategy Group shares why client-side deduplication is the best. Dedupe 2.0 leverages intelligence and awareness at the source, backup server, and storage device. In these scenarios, the awareness of what data is already in the deduplicated storage and the discernment to send new data or not is performed within the production server instead of the backup server or deduplicated storage. Hence, network savings begin at the production server and backups are significantly faster since only changed data is transmitted from the production server to the storage solution.
Tags : 
dedupe, 2.0, store, once, enterprise, strategy, group, client, deduplication, dedupe, awareness, backup, server, storage, device, data, it management, data management, backup and recovery, blade servers
    
Intel Corp.
Published By: IBM     Published Date: Nov 08, 2013
Because all processes should be aligned to customer metrics, process improvement is an important goal for organizations in every industry. This paper illustrates the impact analytics can make on business processes through real-world examples based on IBM client experiences, and describes the steps organizations can take to refine quality, warranty, financial, inventory and other processes that are essential to achieving operational excellence.
Tags : 
ibm, embedding business analytics, organizational processes, business analytics, building smarter processes, insight and alignment, consistent information, accurate information, business intelligence, connect business processes, performance management, customer metrics, internal processes, external processes, competitive benchmarking, critical insight and alignment, business management, business process management, content integration, productivity
    
IBM
Published By: Dyn     Published Date: Jan 14, 2015
Whether you are a seasoned expert or just beginning to look into how DNS can improve the performance of your businesses’ services, let this quick guide to DNS terminology be your comprehensive one-stop shop.
Tags : 
dns, domain name system, ip addresses, terminology, denial of service, query, cache, dns client, ddos, business intelligence, ebusiness
    
Dyn
Published By: Webroot Inc     Published Date: Mar 05, 2014
In this paper we look at 3 new approaches that can make antivirus effective and practical again, including client/cloud architecture, behavior recognition, and journaling and rollback Together, these three approaches represent a major rethinking of antivirus technology, a major shift in antivirus that creates a new type of technology that is able to detect and counter today’s Malware.
Tags : 
antivirus, journaling. rollback, behavior recognition, client/cloud, client/cloud architecture, antivirus technology, malware, networking, security
    
Webroot Inc
Published By: Webroot Inc     Published Date: Jan 14, 2015
Seeing traditional security software become too big and too much of a burden on endpoint devices, networks and IT staff, Webroot decided to start fresh. We built a new type of security software that completely does away with old-school approaches like signature downloads, the need for constant updates and big footprint client software. The result is Webroot SecureAnywhere Business Endpoint Protection, the fastest, least disruptive and most effective endpoint protection - ever.
Tags : 
endpoint protection, networks, security software, endpoint devices, security
    
Webroot Inc
Published By: Polycom     Published Date: Mar 13, 2015
We are now in a world of Unified Communications (UC) and your employees are using many devices and modalities to communicate. A phone is still needed, but its use as a “stand-alone” device is changing as end users now have a wider range of communications options afforded by UC including chat, video, and communications on a phone or mobile devices (BYOD). As IM becomes the new dial tone (“U there?”, “Is now a good time to talk”), when your users want to talk, they expect to be able to place their phone call from their UC client. For most companies today, that UC client is Microsoft® Lync®. While the user may want to place their phone call from Lync, they also want to be able to use a telephone dial pad to dial numbers, access features with convenient feature keys, and be able to choose between using a handset, headset, or speakerphone—and they want to use their phones in ways that are fully integrated with their Lync client.
Tags : 
mobile, lync, unified communication, concept, brand, enterprise, voice, products, services, innovative technology, manufacture, functionality, enterprise applications, data management
    
Polycom
Published By: Emarsys     Published Date: Aug 13, 2015
Adoptez une stratégie de récupération des revenus et rentabilisez vos investissements.
Tags : 
emarsys, stratégie de récupération des revenu, investissements, l’intégration, roi, distribution multicanal
    
Emarsys
Published By: Rackspace     Published Date: Jan 19, 2016
Founded in Austin, Texas, in 2001, Troux Technologies performs enterprise portfolio management and enterprise architecture for Global 2000 customers including leading global financial institutions, multinationals in various industries and governmental clients.
Tags : 
rackspace, troux, client success, private cloud, data center
    
Rackspace
Published By: IBM     Published Date: Nov 12, 2013
Listen as John Allessio, Worldwide VP, Services, Support & Client Services, Industry Solutions discusses why clients choose IBM SmartCloud Solutions.
Tags : 
software as a service, saas, saas solutions, business process innovation, analytics, business process as a service, knowledge management, enterprise applications
    
IBM
Published By: IBM     Published Date: Nov 12, 2013
Joel Reed, Product Line Management Executive, B2B and Commerce for Industry Solutions, discusses the advantages of IBM SmartCloud SaaS Solutions for clients.
Tags : 
software as a service, saas, saas solutions, business process innovation, analytics, business process as a service, knowledge management, enterprise applications
    
IBM
Published By: IBM     Published Date: May 28, 2014
Read the whitepaper to find out how one client improved business value of their data by implementing InfoSphere Optim processes and technologies.
Tags : 
ibm, data lifecycle management, infosphere optim, integrating big data, governing big data, integration, best practices, big data, ibm infosphere, it agility, performance requirements, hadoop, scalability, data integration, big data projects, high-quality data, leverage data replication, data persistence, virtualize data, lifecycle management
    
IBM
Published By: IBM     Published Date: Oct 31, 2014
Today’s empowered and enlightened banking consumers demand services according to their individual preferences whenever, wherever and however they interact.
Tags : 
omnichannel banking, customer experience, banking consumers, client-centric, best practices
    
IBM
Published By: IBM     Published Date: Nov 04, 2014
This white paper explores the five fundamental qualities of a risk-aware organization, along with five use cases of how IBM helped clients put the practices into action in the real world.
Tags : 
ibm, security, risk, byod, safeguard, protection, threat protection, it security, security iq
    
IBM
Published By: IBM     Published Date: Jan 21, 2016
We think bigger than an agency and more creatively than a consultancy, with the power to integrate the whole system. We are a next-generation services company, dedicated to creating transformative ideas that get our clients to the future first.
Tags : 
ibm, integration, ibm interactive experience, enterprise applications
    
IBM
Published By: IBM     Published Date: Jul 29, 2016
B2B sales processes are being transformed by buyers who are demanding a more personalized buying experience similar to what they have experienced in their personal shopping. This paper lays out why this transformation should be on the minds of many if not most B2B organizations. This document helps guide relevant stakeholders within Exceed your B2B clients' expectations - emulate the B2C model B2B organizations to develop and execute plans to increase their e-commerce proficiency with the goal of increasing sales, profits, customer retention and customer satisfaction.
Tags : 
ibm, commerce, b2b, enterprise sales model, b2b sales, sales process, b2b organizations, enterprise applications
    
IBM
Published By: IBM     Published Date: Oct 11, 2016
B2B sales processes are being transformed by buyers who are demanding a more personalized buying experience similar to what they have experienced in their personal shopping. This paper lays out why this transformation should be on the minds of many if not most B2B organizations. This document helps guide relevant stakeholders within Exceed your B2B clients' expectations - emulate the B2C model B2B organizations to develop and execute plans to increase their e-commerce proficiency with the goal of increasing sales, profits, customer retention and customer satisfaction.
Tags : 
ibm, commerce, business to business, b2b, sales, enterprise, sales model, enterprise sales model, sales process, convergence, knowledge management, enterprise applications
    
IBM
Published By: Symantec     Published Date: Jul 11, 2017
The technology pendulum is always swinging. And chief information security officers must be prepared to swing with it—or get clocked. A look at recent history illustrates the oscillating nature of technology. In the 1980s, IBM mainframes dominated the landscape. In the ’90s, client-server computing came on the scene and data was distributed on personal computers. When the Web assumed predominance, the pendulum started to swing back to a centralized server. Then, just as quickly, mobile took the lead, with apps downloaded to workers’ devices—the new client server. Now, as mobile devices continue to populate the enterprise at a rapid rate, the IT model is changing again—to the provisioning of information on a just-what’s-needed, just-in-time basis from centralized servers consolidated in the cloud. The pendulum continues to swing and IT workloads are moving to the cloud en masse.
Tags : 
cloud, security, data protection, data loss, information security
    
Symantec
Published By: IBM     Published Date: Sep 15, 2014
This white paper highlights how a real world FIS client’s utilization of IBM FlashSystem together with the FIS Profile® banking solution1 yielded dramatic performance improvements, truly accelerating the pace of global banking. This client has been an FIS outsourcing client for 14+ years and counting.
Tags : 
global banking, banking solutions, fis outsourcing, banking information technology, flash technology, business activity monitoring, business analytics, business process automation, project management, service management
    
IBM
Published By: IBM     Published Date: Jan 09, 2015
To help enterprises create trusted insight as the volume, velocity and variety of data continue to explode, IBM offers several solutions designed to help organizations uncover previously unavailable insights and use them to support and inform decisions across the business. Combining the power of IBM® InfoSphere® Master Data Management (MDM) with the IBM big data portfolio creates a valuable connection: big data technology can supply insights to MDM, and MDM can supply master data definitions to big data.
Tags : 
big data, mdm, client analytics, real-time analysis, it management, knowledge management, data management
    
IBM
Published By: IBM     Published Date: Feb 11, 2015
This paper explores how companies can more safely introduce employee - or corporate-owned mobile devices into the workplace, identify the risks inherent in their broader access to corporate data, and derive enhanced business value.
Tags : 
corporate data, business value, mobile devices, client services, security, it management, business intelligence, data protection, database security
    
IBM
Published By: IBM     Published Date: Oct 02, 2015
IBM BigFix is recognized as a leader in Gartner's Magic Quadrant for the fourth year in a row. Despite being a relatively mature technology, new product capabilities and diverging vendor strategies make selecting a client management tool vendor as challenging as ever for end-user computing and support managers.
Tags : 
client management, ibm, bigfix, gartner magic quadrant, cmt, business management, customer interaction service, customer relationship management, project management, service management
    
IBM
Published By: IBM     Published Date: Nov 03, 2015
Read this whitepaper to see how cogntive technologies are transforming the wealth management landscape.
Tags : 
ibm, watson, application, powerful information, networking, software development, it management, enterprise applications, data management, knowledge management, it career advancement
    
IBM
Start   Previous    27 28 29 30 31 32 33 34 35 36 37 38 39 40 41    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.