post

Results 326 - 350 of 463Sort Results By: Published Date | Title | Company Name
Published By: BlackBerry     Published Date: Aug 10, 2009
In recent years, law firms have enjoyed remarkable financial returns due to a strong global economy, free flowing capital and a high level of demand for legal services. Law firm revenues and profits continued to be strong, even during the dotcom bust, the post 9/11 slowdown and the increasing cost of associate recruitment and retention. This success could be partly explained by the growth imperative in law firms: they must continue to grow, either by acquisition, or by recruiting laterals or associates, because law firm economics correlates size with profits. And many firms grew rapidly in the past several years.
Tags : 
blackberry, altman weil, law, legal, research in motion, voip, smartphones, it communication
    
BlackBerry
Published By: ZoomInfo     Published Date: Sep 07, 2010
Generate highly-qualified candidate lists effortlessly and instantly connect with direct contact information. The ZoomInfoT Database is the only source of business information combining the business web, community contributors, and professionals who post their own profiles-updated 24 hours a day, 7 days a week. Unlock the power of this data with our next-generation candidate sourcing tool, ZoomInfoT Pro, featuring robust search criteria, in-depth candidate profiles, and automated alerts on profile updates and changes. Start your free trial today.
Tags : 
zoominfo, candidate, search, database, sourcing, pipeline, conversion rates
    
ZoomInfo
Published By: Quantum - Quinstreet     Published Date: Aug 10, 2011
Tape's evolving data storage role - Balancing Performance, Availability, Capacity, Energy for long-term data protection and retention
Tags : 
quantum, quinstreet, data deduplication, deduplication, nas, network attached storage, remote replication, virtual tape library
    
Quantum - Quinstreet
Published By: Quantum - Quinstreet     Published Date: Aug 10, 2011
Need a Long-Term Archive Solution? Quantum Adds LTO-5 to Scalar Tape Libraries. Find our more in this whitepaper!
Tags : 
quantum, quinstreet, data deduplication, deduplication, nas, network attached storage, remote replication, virtual tape library
    
Quantum - Quinstreet
Published By: Quantum - Quinstreet     Published Date: Aug 10, 2011
This paper outlines some of the important considerations for encrypting data on tape, and is intended to help IT administrators make the right decision for their environment and their company's data security needs.
Tags : 
quantum, quinstreet, data deduplication, deduplication, nas, network attached storage, remote replication, virtual tape library
    
Quantum - Quinstreet
Published By: Quantum - Quinstreet     Published Date: Aug 10, 2011
This white paper shows how upgrading to LTO-5 technology and consolidating storage onto fewer tapes enables organizations to achieve a 5yr ROI and a 17-month payback period.
Tags : 
quantum, quinstreet, data deduplication, deduplication, nas, network attached storage, remote replication, virtual tape library
    
Quantum - Quinstreet
Published By: Aimia     Published Date: Mar 25, 2014
Identify the most important inflection points along your customer journey from curious newcomers to brand loyalists. In this Retail Brief, learn the 10 most important loyalty moments of truth — and offer a few guidelines for getting them right.
Tags : 
aimia, inflection points, marketing, customer loyalty, customer interaction, loyalty program. post-purchase service, interaction data, purchase cycle
    
Aimia
Published By: MineralTree     Published Date: Jan 14, 2015
A Guide to solutions that make AP simpler, safer, and more efficient. Everyday AP is an arduous process. It involves receiving and manually keying data from paper invoices, chasing approvals through e-mail and phone calls, printing paper checks to pay vendors, manually collating checks with printed invoices and purchase orders, tracking down CFOs for signatures, stuffing envelopes, applying postage, and finally, delivering the resulting stack of payments to the local post office.
Tags : 
mineraltree, finance, business, payments, process, modernize, payment, secure
    
MineralTree
Published By: ForeScout     Published Date: Mar 28, 2017
Continuous monitoring (CM) can result in continuous improvement that reduces attack surfaces and improves security postures according to this 2016 survey of 292 individuals actively involved in vulnerability assessment and remediation. 63% of respondents said CM was improving their security posture.
Tags : 
sans, surface, survey
    
ForeScout
Published By: Tripwire     Published Date: Apr 28, 2008
Learn more about the security risks and vulnerabilities faced by organizations, and the elements of a proactive security approach. Then find out how Tripwire helps organizations attain and maintain a good security posture using industry-leading configuration assessment and change auditing to harden systems against security breaches, automate compliance with security standards and policies, identify configuration changes, and resolve vulnerabilities.
Tags : 
tripwire, security, risk management, configuration management, change management, change audit, change auditing, security policies
    
Tripwire
Published By: IBM     Published Date: Nov 04, 2014
Are you doing enough to drive the repeat sales that turn holiday buyers into loyal customers? Many businesses are leaving money on the table by neglecting existing, one-time customers in favor of increasing new business. Download this ebook and get examples of 15 post-purchase emails that will inspire contacts to buy again and become brand advocates.
Tags : 
consumer loyalty, repeat sales, post-purchase emails
    
IBM
Published By: Symantec     Published Date: Jul 11, 2017
In the fast moving web environment, where hackers frequently change their tactics, a defense-in-depth strategy of deploying the ProxySG in conjunction with an NGFW is essential for providing optimal protection. The ProxySG is engineered to withstand evasion techniques, making it a perfect complement to your NGFW. Its leading web-proxy technology identifies and blocks malicious web content, and its open architecture allows integration with best-of-breed products for an enhanced security posture. These top 10 advantages represent just a few of the reasons why SWG and NGFW technologies are complementary in nature and why enterprises should implement them together for a layered defense against advanced attacks and targeted threats.
Tags : 
proxy deployment, firewall, threat detection, threat protection
    
Symantec
Published By: IBM     Published Date: Jun 07, 2016
In a multi-database world, startups and enterprises are embracing a wide variety of tools to build sophisticated and scalable applications. IBM Compose Enterprise delivers a fully managed cloud data platform so you can run MongoDB, Redis, Elasticsearch, PostgreSQL, RethinkDB, RabbitMQ and etcd in dedicated data clusters.
Tags : 
ibm, analytics, database, ibm compose enterprise, networking, knowledge management, database development
    
IBM
Published By: IBM     Published Date: Oct 18, 2016
The worldwide growth rate of digital data is staggering. If you're a CIO or a data center administrator, data growth statistics aren't just big numbers, they are a big problem -- for your company. Email messages, social media and blog posts, text and instant messages, photos, video and audio, machine-generated data, and transactional detail are on track to overwhelm your storage capacity. Read this paper for practical advice and smarter solutions for managing the information in your organization and getting back to a position of mastery over your data. Get this valuable resource now.
Tags : 
ibm, analytics, big data, information governance, ecm, information lifecycle governance, knowledge management, enterprise applications
    
IBM
Published By: IBM     Published Date: Jun 21, 2017
Today, it’s unlikely that a single database will meet all your needs. For a variety of reasons—including the need to support cloud-scale solutions and increasingly dynamic app ecosystems—startups and enterprises alike are embracing a wide variety of open source databases. These varied databases—including MongoDB, Redis and PostgreSQL— open doors to building sophisticated and scalable applications on battle-hardened, non-proprietary databases.
Tags : 
ibm, data base, cloud, scalability, app ecosystem
    
IBM
Published By: VeriSign Incorp.     Published Date: Apr 15, 2009
A trust mark posted on the site tells online shoppers that a creditable third party, such as VeriSign, has found the site to be trustworthy.
Tags : 
verisign, internet trust marks, internet security, extended validation, green bar, online security, optimize, sgc
    
VeriSign Incorp.
Published By: VMS     Published Date: Jul 31, 2009
If management has not already cut your budget, be prepared to “prove it or lose it” soon. This report will help you think through your measurement strategies, and either fine-tune an existing program, or get one started post haste.
Tags : 
vms, economy, measurement strategies, budget, pr objective, objective, smart media, share
    
VMS
Published By: SPSS Inc.     Published Date: Mar 15, 2010
This paper focuses on six myths that surround direct marketing best practices and discusses how you can use specific analytical techniques and tools to beat these myths, increase response rates and boost ROI.
Tags : 
spss, direct marketing software, campaign optimization, response rate, roi, segmentation, cluster analysis, customer persona
    
SPSS Inc.
Published By: GoToMeeting     Published Date: Apr 05, 2011
This Wainhouse Research brief explores how web conferencing is transforming the way teams get work done.
Tags : 
web conferencing, online meetings, web meetings, travel, collaboration software, smtp, pstn, post
    
GoToMeeting
Published By: SAS     Published Date: Jul 22, 2019
Text is the largest human-generated data source. It grows every day as we post on social media, interact with chatbots and digital assistants, send emails, conduct business online, generate reports and essentially document our daily thoughts and activities using computers and mobile devices. Increasingly, organizations want to know how all of that data can be used to drive improvements. For many, unstructured text represents a massive untapped data source with great potential for producing valuable insights that could result in significant business transformations or spur incredible social innovation. This paper looks at how organizations in banking, health care and life sciences, manufacturing and government are using SAS text analytics to drive better customer experiences, reduce fraud and improve society.
Tags : 
    
SAS
Published By: Esker     Published Date: Jun 29, 2017
Accounts receivable (AR) is no second-rate department. Not only is it usually the largest company asset, it deals directly with customers and cash flow — things businesses can’t do without. You'd think internal AR processes would be on the cutting edge of innovation, right? Yeahhh … not so much. While departments like sales, marketing and payroll have embraced the use of software solutions, AR has been slow to catch up, with many still relying on sticky notes, calendar reminders and spreadsheets to manage post-sale collections activities. Read this eBook to discover how automation can: • Be a complementary tool that eliminates tedious tasks • Be multi-dimensional, in that its usage can be extended into other areas of AR • Drive repeat sales and allow you to get paid faster Download the eBook now to discover more about Accounts Receivable Automation!
Tags : 
accounts receivable management, invoice management, collections management, ar best practices, invoice portal, invoice delivery
    
Esker
Published By: Esker     Published Date: Jun 29, 2017
Wasted time is wasted money — and accounts receivable (AR) departments can waste a lot of both with antiquated billing and collections methods. Download the new white paper‚ Winning the Billing & Collections Battle‚ to learn how your organization can overcome common obstacles in every phase of AR by: • Automating invoice delivery without format restrictions • Giving your customers self-service access to invoices • Modernizing post-sale collections interactions • Going beyond DSO with advanced KPIs and analytics With a complete AR management solution‚ time and money is on your side!
Tags : 
accounts receivable management, invoice management, collections management, ar best practices, invoice portal, invoice delivery
    
Esker
Published By: SilverSky     Published Date: May 09, 2014
This paper provides an overview of the benefits of outsourced security solutions such as managed security services. The managed security services option saves money, improves the network security posture, and maximizes the efficiency of existing corporate resources.
Tags : 
silversky, business value, security services, the cloud, security conundrum, decrease threats, service providers, managed solutions
    
SilverSky
Published By: OutSystems     Published Date: Jul 15, 2014
It is certainly possible to disrupt without innovating. In this post I will reveal how new cloud-based solutions that incorporate platform-as-a-service (PaaS) offerings can enable innovation without disruption. DevOps—the latest socio-technical adaptation in IT that everyone is buzzing about—is a classic example and they have been benefiting from this new paradigm in spades. Let’s take a closer look.
Tags : 
outsystems, paas, devops, innovation, cloud based solutions, cloud computing, it management, data center
    
OutSystems
Published By: IBM     Published Date: Feb 04, 2014
Take a look at the Smarter Commerce approach to trade promotion optimization for CPG manufacturers
Tags : 
ibm, collaboration, competitive edge, trade planning, limited visibility, trade promotion, promotion optimization, pricing pressures
    
IBM
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.