designing

Results 151 - 169 of 169Sort Results By: Published Date | Title | Company Name
Published By: Winward     Published Date: Aug 21, 2009
To succeed in today's business environment, the enterprise must manage the effects of three realities: the recent, massive investment in technology has significantly increased IT complexity; the Internet has altered customers' expectations of availability, cost, and service; and the new economic climate highlights the need to leverage existing assets and improve the return on investment for new initiatives.
Tags : 
business management, cost control, it spending, analytical applications, report design, it investment, technology spending, roi, return on investment, winward, business metrics
    
Winward
Published By: Perimeter     Published Date: Jul 17, 2007
Read this interesting comparison about designing an intrusion defense strategy that identifies the value of business processes, and implements appropriate strategies to protect these systems using a layered defense approach is not only a good security practice, but also a regulation in many cases.
Tags : 
ids, intrusion defense, intrusion prevention, firewall, security, compliance, layered security, ips, perimeter, perimeter esecurity, security software, malware, trojan, anti spam, anti virus, firewalls, hacker detection, internet security, intrusion detection, security management
    
Perimeter
Published By: Integration New Media     Published Date: Apr 01, 2008
Librarians looking to build electronic libraries face numerous challenges. This new white paper by Integration New Media provides a summary of best practices for building an eLibrary. From defining your audience and content requirements, through to choosing a technology solution that makes sense for your use cases, this paper will provide a strong checklist of items to consider. The paper also looks at the three types of users and the key elements of designing the user experience for your eLibrary.
Tags : 
inm, integration new media, online library, elibrary, best practices, web development, web services, web service management
    
Integration New Media
Published By: Integration New Media, Inc.     Published Date: Sep 18, 2008
Most of the information that’s been made available about Adobe Integrated Runtime so far, has been written for the programmers that are building applications, not for the visionaries that are designing the client experiences. The objective of this paper is to provide executives, project managers, marketers and other visionaries with an introduction to Adobe AIR, and information about how Adobe AIR can be leveraged to create next generation web experiences.
Tags : 
inm, integration new media, adobe air
    
Integration New Media, Inc.
Published By: HP - Enterprise     Published Date: Jun 05, 2013
It wasnt long ago that being on the cutting edge of business meant having a website where customers could purchase your products, but that quickly changed. Soon, it wasnt enough just to have an e-commerce presence; you had to offer an interactive and engaging customer experience (see Web 2.0). Now the standard has shifted once again; in order to truly compete in the modern economy, your business needs to have a mobile storefront on smart phones and tablets. Without this mobile presence, youll lose business to competitors who have them. With this new challenge comes high risk as well as great reward. With mobility, the client side of your applications is more important than ever. Instead of accessing your website from the safe confines of work or home, your customers can now perform sensitive transactions anywhere. As a result, mobile applications, and the devices and data they interact with, can now be more easily attacked.
Tags : 
mobile applications, ecosystem, risk, defense, application, risk, application security, mobile data systems, wireless application software, wireless infrastructure, wireless security
    
HP - Enterprise
Published By: GoToTraining     Published Date: Apr 06, 2011
This 3g Selling white paper explores the advantages of online training and how to design a best-in-class VITL program that increases ROI, improves engagement, eliminates travel costs and delivers a greater business impact.
Tags : 
citrix gototraining, virtual learning, engagement, vitl program, learning and development professionals, l&d, virtual instructor-led training, virtual training
    
GoToTraining
Published By: HC Realty     Published Date: Jan 23, 2011
Methods for hospitals and healthcare facilties to increase cost savings and reduce their carbon footprint.
Tags : 
energy resource planning, designing energy efficient buildings, healthcare facilities, environmentally friendly buildings
    
HC Realty
Published By: Avocent     Published Date: Aug 22, 2011
Cloud computing implementations have the potential to drive significant improvements in operational efficiency and reductions in operational expenditures.
Tags : 
avocent, cloud computing, infrastructure, emat, responsible cloud, high-availability, nist, grid computing, high availability, it spending, spend management, financial management, expense management, data center, virtualization
    
Avocent
Published By: Accelrys     Published Date: Feb 08, 2012
This whitepaper examines how changes to the R&D process can significantly benefit a manufacturer's environmental footprint and ability to make science a component of critical business decisions.
Tags : 
sustainability, research and development, r&d, accelrys, idc
    
Accelrys
Published By: HP and Intel Xeon processors     Published Date: May 08, 2012
Read this whitepaper to learn the three key factors any IT manager should consider when designing a flexible and scalable network for today's mobile workforce.
Tags : 
smb, mobile, smartphones, employees, wi-fi, text, ipad, cloud computing, social networking, mobile workforce, wireless, virtualization, design and facilities
    
HP and Intel Xeon processors
Published By: Adobe     Published Date: Aug 22, 2013
This report gives customer experience professionals the tools and processes they need to act on digital customer experience improvement across touchpoints like websites, mobile phones, and tablets. Forrester recommends 10 tactics for evaluating digital touchpoints and determining customers' needs, proven and emerging methodologies for redesigning digital interactions, and best practices for ensuring that your digital experiences support your business objectives.
Tags : 
customer experience management, digital experiences, customer experience
    
Adobe
Published By: PostUp     Published Date: Sep 25, 2014
Learn about the best practices regarding mobile email design and see what process your organization should be following in order to decide between a responsive or scaleable design.
Tags : 
postup, mobile responsive, mobile email, email marketing best practices, design mobile, designing for mobile, mobile email design
    
PostUp
Published By: IBM     Published Date: Jul 14, 2016
Fraud can happen in any organizationbig or small even in yours. Read this e-book to learn how to identify risks in your organization. It details how and why fraud happens in many organizations, four steps to prevent and detect fraud through internal controls, and why properly designing controls is a crucial step.
Tags : 
best practices, detect fraud, business management, internal control, security, business intelligence
    
IBM
Published By: Rosetta Stone     Published Date: Nov 02, 2017
Designing the most comprehensive language program involves proven and cost-effective technology. Rosetta Stone's Language Learning Suite for K-12 has interactive solutions that complement any language curriculum. Take a look at the infographic to discover how the rise of technology enhances instruction and encourages learning.
Tags : 
    
Rosetta Stone
Published By: Datastax     Published Date: Aug 07, 2018
"As an Enterprise Architect (or an aspiring one), your job is to help define, build, and manage your company's technology architecture for its single most important asset - its information - in order to meet your company's business goals. Read this comprehensive guide to learn the ins and outs of designing data management architectures to manage mixed workloads at scale."
Tags : 
    
Datastax
Published By: Datastax     Published Date: Aug 15, 2018
"As an Enterprise Architect (or an aspiring one), your job is to help define, build, and manage your company's technology architecture for its single most important asset - its information - in order to meet your company's business goals. Read this comprehensive guide to learn the ins and outs of designing data management architectures to manage mixed workloads at scale."
Tags : 
    
Datastax
Published By: Datastax     Published Date: Aug 15, 2018
"As an Enterprise Architect (or an aspiring one), your job is to help define, build, and manage your company's technology architecture for its single most important asset - its information - in order to meet your company's business goals. Read this comprehensive guide to learn the ins and outs of designing data management architectures to manage mixed workloads at scale."
Tags : 
    
Datastax
Published By: DigiCert     Published Date: Jun 19, 2018
Code signing is at a crossroads. In many enterprises, the traditional approach remains standard procedure: you purchase a code-signing certificate, download it, and deploy it locally for all your code-signing needs. When carefully managed, this approach can still be very effective in guarding against malware. But recent events have shown that many companies are finding it a challenge to manage their code signing certificate deploymentsand failures in certificate management can have serious consequences. To discover how our Secure App Service solution can help you manage your codesigning efforts and provide enterprise-level support, all at a predictable cost, download this whitepaper today and find out more.
Tags : 
    
DigiCert
Published By: KPMG     Published Date: Jul 12, 2018
With disruptive ideas and technologies coming thick and fast, formulating a strategic response is critical to long-term survival. How can you prepare a strategy for success? Read this report to find out: how established organisations are meeting the challenge from disruptors what models theyre using to gain first-mover access to technology innovation why designing an overall portfolio of disruption responses is key how to navigate disruption successfully, with a clear four-step approach. Download the report now
Tags : 
    
KPMG
Start   Previous    1 2 3 4 5 6 7     Next   End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.