Results 951 - 975 of 1098Sort Results By: Published Date | Title | Company Name
Published By: VMware     Published Date: Feb 24, 2017
Apple began aligning management profiles in Mac and iOS software years ago so that Macs could be managed alongside iOS devices with mobile device management (MDM). Each macOS update has delivered additional MDM controls, enabling IT to manage more endpoints together. Unified endpoint management brings together traditional client management with a modern enterprise mobility management framework to simplify the management process for IT. This whitepaper summarizes the key challenges of Mac management and outlines considerations and product features to help ensure a successful deployment.
Tags : 
Published By: Thawte     Published Date: Oct 05, 2015
En matire de protection de vos clients et de votre site Web, le savoir reste votre meilleure arme. Toutefois, face lvolution constante des menaces et des moyens de dfense, certaines ides reues ont la vie dure. Pour vous aider y voir plus clair et diffrencier le mythe de la ralit, Thawte vous invite visionner ce guide essentiel.
Tags : 
website security myths, customer protection, ever-changing threats, website security, security
Published By: Thawte     Published Date: Oct 05, 2015
A lheure o les consommateurs sont de plus en plus nombreux faire leurs achats de Nol sur Internet, leurs exigences de scurit reprsentent un enjeu plus capital que jamais. Cest donc maintenant quil faut agir. Sur le Net, un client rassur est un client moiti converti. Notre nouvelle infographie et notre dernier document technique vous en livre toutes les cls avant le grand rush de Nol.
Tags : 
online shopping growth, christmas shopping season, online-savvy, customer demand, online security, security
Published By: Thawte     Published Date: Oct 05, 2015
Lheure est la scurisation intgrale de votre site. Face des attaques de plus en plus frquentes et faciles excuter, les internautes sont plus que jamais attentifs la capacit des sites scuriser leurs donnes confidentielles. Pour les entreprises intraitables sur les questions de rputation et de protection de leurs clients, Always-On SSL simpose comme une priorit absolue. Sa mission : protger les internautes tout au long de leur parcours sur votre site des recherches aux achats, en passant par le partage dinformations. Pour en savoir plus sur ce dispositif de renforcement de la protection en ligne, tlchargez notre nouveau guide de rfrence.
Tags : 
always on ssl, online protection, confidential data, user experience, customer protection, security
Published By: IBM     Published Date: Feb 27, 2014
Learn how to transform your infrastructure to be better structured for voice, video, and collaboration with clients in order to drastically cut IT investment costs.
Tags : 
voice, video, collaboration, infrastructure, idg, ibm, virtual desktop, mobile computing
Published By: IBM     Published Date: Feb 11, 2015
According to Forrester Research, we have entered the era of Continuous Delivery. Clients are shifting from agile transformation to DevOps, while modern application delivery leaders are embracing DevOps to accelerate delivery of innovation.
Tags : 
devops, financial services, best practices, modern application delivery, financial service solutions, knowledge management, enterprise applications, data management
Published By: Oracle     Published Date: Oct 02, 2013
The debate on cloud services place in enterprise IT is over
Tags : 
oracle, cloud services, 2013 trends, client needs
Published By: IBM     Published Date: Nov 12, 2014
Modern mobile applications connect systems-of-engagement (mobile apps) with systems-of-record (traditional IT) to deliver new and innovative business value. But the lifecycle for development of mobile apps is also new and different. Emerging trends in mobile development call for faster delivery of incremental features, coupled with feedback from the users of the app "in the wild". This loop of continuous delivery and continuous feedback is how the best mobile apps keep their users engaged and also produce the most compelling apps in the market. Join us for this webcast to learn about how IBM offers a solution that enables our clients to use continuous quality as an effective means of mobile application development. Featured Speaker: Leigh Williamson - IBM Distinguished Engineer You don't have to wait to get started...Start your free trial on Bluemix today! Or build something else in the Bluemix sandbox today!
Tags : 
mobile quality, mobile solutions, mobile apps, mobile development, it management, knowledge management, enterprise applications
Published By: IBM     Published Date: Jan 26, 2015
Join us for this webcast to learn about how IBM offers a solution that enables our clients to use continuous quality as an effective means of mobile application development.
Tags : 
mobile quality assurance, mobile apps, time-to-feedback, mobile trends, it management, enterprise applications, data management
Published By: Symantec     Published Date: Nov 30, 2015
El ao pasado, un 7% de los espaoles1 realizaron sus compras navideas por Internet, as que es evidente que los vendedores tienen que poner a punto la maquinaria del comercio electrnico. Entre las compras en lnea, la opcin de reserva por Internet y recogida en tienda y las cartas a los Reyes, estas navidades se disparar el volumen de datos y de ventas. As que tendr que garantizar la seguridad de los clientes que visitan su sitio web si no quiere recibir carbn
Tags : 
Published By: NetCom Info     Published Date: Jul 16, 2009
NetCom's CCNA certification course teaches clients how to configure, install and maintain the following protocols:• Introduction to wireless networking concepts & terminology• Internet Protocol (lP)• Enhanced Interior Gateway Routing Protocol (EIGRP)• Serial Line Interface Protocol Frame Relay• Routing Information Protocol Version 2 (RIPv2)• Virtual Local Area Network (VLANs)• Ethernet and access control lists (ACLs)
Tags : 
ccna, cisco, networking, routing and switching, cisco certification, ccnp, it career advancement
NetCom Info
Published By: Powered Inc.     Published Date: Mar 26, 2009
Read this report to learn how to harness the power of managed online communities to increase ROI and build relationships with your customers. Unlike other marketing programs, online communities allow businesses to engage with customers through a combination of expert content and online community interactions. Throughout the Customer Lifecycle - from Awareness to Advocacy – clients achieve measureable results with real-time data and insights.
Tags : 
powered, social marketing, roi, benchmarking, customer satisfaction, brand affinity, brand loyalty, customer lifecycle
Powered Inc.
Published By: Symantec     Published Date: Dec 04, 2014
SSL/TLS has been & will be a core enabling technology critical for securing communications. The most significant challenge facing the SSL ecosystem is its implementation. Researchers have recently published reports indicating widespread errors & shortcomings in the implementation of SSL/TLS in mobile applications. These issues often result from flawed use of SDKs or APIs used by developers. This paper lists necessary steps to take to create a stronger, more trustworthy SSL implementation. All SSL client non-browser applications should follow all these practices to ensure strong authentication, confidentiality & integrity.
Tags : 
ssl/tls, sdks, apis, quick guide, apps, ssl ecosystem, security
Published By: Symantec     Published Date: Oct 01, 2015
Security software and settings on your web server are up-to-date. Your Internet browser and client are up-to-date. Your client computers are free of malware. You keep an eye on the expiry date of your organizations TLS/SSL certificates and replace them in a timely manner.
Tags : 
tls/ssl, application best practices, security software, malware, software settings, security
Published By: AlienVault     Published Date: Oct 20, 2017
This 2017 Spotlight report reveals the latest data points and trends in how organizations are leveraging Managed Security Services Providers (MSSPs) to augment, or in some cases completely outsource their security programs. You'll learn about key findings including: The predominant driver for organizations to consider managed security services The most critical capabilities organizations look for in MSSPs The most requested security services offered by MSSPs Key benefits respondents have achieved by partnering with an MSSP Whether you are evaluating using an MSSP, or are an MSSP yourself, download this report to gain valuable insights into how MSSPs are helping their clients improve their security posture.
Tags : 
Published By: Act-On     Published Date: Aug 18, 2014
Your clients are doing more online marketing and they expect you to help and guide them. Learn how you can use marketing automation tailored for agency needs to help your clients succeed and to grow your business. Discover the nine essentials on how marketing automation for agencies can give you a sharper competitive edge.
Tags : 
act-on, marketing, online, agency, automation
Published By: Seamless     Published Date: Jun 18, 2013
Michael Farino is the Hospitality Manager for the New York office of DLA Piper (DLA), one of the worlds largest business law firms.Michael and his team oversee the firms meal program and all caterin gand special events. With 500 employees in the office and dozens of client meetings and special events each month, this is no small task. DLA worked with Seamless to create a set of rules that would govern when and how employees could order food. Each and every one of DLAs 500 NYC-based employees was given a username and password. Everyone was free to log-in and order their own meals. Everyone was also assigned to a specific budget group. These budget groups are based each persons role at the Firm and can accommodate different spending limits and permission levels. As Michael notes, right away, Seamless gave us the power to enforce our rules,but still be flexible so people get what they need. Its a win-win.
Tags : 
Published By: IndustryBrains     Published Date: Jan 16, 2007
Based on the principle that not all clicks are equal, IndustryBrains’ site-specific content targeting solution enables Direct Agents’ financial and technology direct marketing clients to reach the highest quality audience.
Tags : 
industrybrains, pay per click
Published By: BrightWave Marketing     Published Date: Mar 13, 2008
In August 2007, launched its First Annual State of Email Metrics survey. Approximately 55% of respondents were from client side and 45% from agencies or ESPs. Download this study to find out what the email professionals want and need in the coming years.
Tags : 
brightwave, email, ctr, click through, click-thru, conversion, email marketing
BrightWave Marketing
Published By: Infacta     Published Date: Jan 22, 2007
In this report, we will review the Can-SPAM Act and set out 5 key requirements that will ensure that our email is considered legitimate by our customers, email clients and ISPs.
Tags : 
permission, email permission, permission email
Published By: Aladdin     Published Date: Aug 21, 2009
The Spyware Neutralizer is a clientless add-on tool for the eSafe content security solution from Aladdin Knowledge Systems. Client-side software installation and without the need to implement, manage, or update any client-side software or agents.
Tags : 
phishing, security management, anti spyware, malware, security software, network management, remote access, remote network management
Published By: AppSense     Published Date: Aug 21, 2009
Learn how AppSense Application Manager enables IT Administrators to reliably and effectively enforce software licensing policies on client devices, and therefore gain greater control over the deployment of applications in a Windows Terminal Server environment.
Tags : 
windows server, application management, application, application performance management, windows server, windows terminal server, network management, software licensing
Published By: Bocada     Published Date: Aug 21, 2009
Today, the common approach to collecting information about computing activity across the enterprise is to use software agents installed on individual clients and servers. However, when this approach is applied to data protection management in the enterprise environment, it has proven both ineffective and inefficient.
Tags : 
data protection, network security, software agent, agentless, bocata, bocada, servers
Published By: ClearNova     Published Date: Aug 21, 2009
In the 1990s, client/server was the predominant architecture used to build business applications. The applications had rich functionality, were responsive, and satisfied users' needs. Client/server worked in a time where the only networks were the ones owned and controlled by the enterprise and the only user base was internal.
Tags : 
internet apps, web applications, web application, web application development, j2ee, open source, ajax, web architecture
Published By: Connectus     Published Date: Aug 21, 2009
Long ago dubbed the 'killer app', email marketing has now reached the height of its potential and is poised to assume its place as the medium of choice for maintaining customer relationships. In fact, despite the threat of spam, marketers are continuing to turn to email marketing initiatives - with impressive results. Email marketing continues to be the most affordable, efficient and personalized way to connect with clients and future prospects.
Tags : 
crm, customer relationship management, customer relationship lifecycle, email marketing, customer loyalty, loyalty and retention, loyalty, retention
Start   Previous    30 31 32 33 34 35 36 37 38 39 40 41 42 43 44    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.