reach

Results 1 - 25 of 1513Sort Results By: Published Date | Title | Company Name
Published By: ABB     Published Date: Feb 27, 2019
In recent years, Europe has seen a real boost in the building of renewable generation capacity. Germany is a notable example of a country with significant growth in renewables. As shown in Figure 1 below, since 2000, the average annual growth of installed capacity in Germany has been more than 15 percent, reaching 18-20 percent between 2009 and 2010. For the most part, favorable conditions for the development of renewables have been caused by support schemes, previously based on feed-in-tariffs and competitive auctions. Now the country has reached a point where renewables account for around 53 percent of installed capacity and around 36 percent share in total electricity demand, already exceeding the 2020 target of 35 percent. To find out more download this whitepaper today!
Tags : 
    
ABB
Published By: ABB     Published Date: Mar 21, 2019
In recent years, Europe has seen a real boost in the building of renewable generation capacity. Germany is a notable example of a country with significant growth in renewables. As shown in Figure 1 below, since 2000, the average annual growth of installed capacity in Germany has been more than 15 percent, reaching 18-20 percent between 2009 and 2010. For the most part, favorable conditions for the development of renewables have been caused by support schemes, previously based on feed-in-tariffs and competitive auctions. Now the country has reached a point where renewables account for around 53 percent of installed capacity and around 36 percent share in total electricity demand, already exceeding the 2020 target of 35 percent.
Tags : 
    
ABB
Published By: Absolute Software     Published Date: May 08, 2009
Keeping data secure in a mobile environment is not just a daunting challenge, but a critical requirement. Loss and theft of computers leaves sensitive data vulnerable, creating serious financial and legal risks.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense
    
Absolute Software
Published By: Absolute Software     Published Date: May 08, 2009
In this whitepaper, the Ponemon Institute shares its findings on the use of encryption on laptops by corporate employees. It shows that many employees may not be taking the most basic precautions to secure their company laptop.
Tags : 
absolute, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence
    
Absolute Software
Published By: Absolute Software     Published Date: Jan 29, 2008
Does your PC lifecycle management (PCLM) reflect the issues associated with mobile users? Many organizations face expensive inefficiencies by not managing mobile assets effectively. These inefficiencies include dispersed and manual data collection, and inventory tools that are dependent on a connection to the company network.
Tags : 
absolute, intel, laptop, saas, managing laptops, pclm, computrace, absolute software
    
Absolute Software
Published By: Absolute Software     Published Date: Jan 27, 2010
Deploying patches in a timely fashion soon after they become available helps secure the OS and prevent the majority of data breaches. However, many computer systems are often not patched for months or not at all.
Tags : 
computrace, absolute software, it asset management, remote data delete, geolocation tracking, theft recovery, service guarantee, application integration
    
Absolute Software
Published By: Absolute Software     Published Date: Feb 04, 2010
Absolute Software has announced it has completed its acquisition of the LANrev systems management platform. Absolute plans to integrate LANrev's popular Mac and PC lifecycle configuration management technology with its flagship security and asset management suite, Computrace.
Tags : 
absolute, laptop, saas, lifecycle management, enterprise management, lock down, rapid recovery, stolen
    
Absolute Software
Published By: Absolute Software     Published Date: Sep 06, 2011
Let us walk you through Absolute Manage's capabilities in this 10-minute demo; see how Absolute Manage can help you centrally manage both Mac and PCs.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense
    
Absolute Software
Published By: Absolute Software     Published Date: Sep 06, 2011
Watch this webcast as Support Manager for La Jolla Institute for Allergy & Immunology relates how he successfully frees up 30 IT support hours a week.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense
    
Absolute Software
Published By: Absolute Software     Published Date: Sep 06, 2011
Vice President and Research Fellow for Aberdeen Group, shares trends, best practices and actionable insight on management of iOS mobile devices.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense
    
Absolute Software
Published By: Absolute Software     Published Date: Sep 06, 2011
Forrester Research and Absolute Software discuss the importance for IT to create a "layered approach" for endpoint security and management
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense
    
Absolute Software
Published By: Absolute Software     Published Date: Sep 06, 2011
See how Absolute Manage Mobile Device Management allows organizations to remotely manage their Apple iOS devices (iPhone, iPod Touch, iPadT).
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense
    
Absolute Software
Published By: Absolute Software     Published Date: Sep 09, 2011
Only the introduction of end-point security - the ability to force mobile computers to secure themselves - offers end-users the freedom to embrace mobility and IT departments robust protection for sensitive information.
Tags : 
absolute, end-point security, data breach protection, authentication, organizational policy, encryption, asset management, computrace
    
Absolute Software
Published By: Absolute Software     Published Date: May 31, 2016
With companies embracing mobility to maintain competitive advantage in the digital era, information security threats have increased exponentially. Userfriendly technologies such as mobile devices, mobile apps, and cloud storage are often hacker-friendly too, creating opportunities for cybercriminals to covertly infiltrate company data. This opens the door to data loss, reputational damage, loss of proprietary information not to mention the associated regulatory penalties and potential legal fees. IT bears the brunt of responsibility for information security, yet according to Forrester, internal incidents top the list of security breach causes in 2014.
Tags : 
mobility, competitive advantage, best practices, mobile devices, mobile applications, mobile computing, mobile data systems, wireless application software
    
Absolute Software
Published By: Absolute Software     Published Date: May 31, 2016
The OCR conducts HIPAA audits of covered entities and their business associates and subcontractors. If HIPAA violations are discovered during these audits, the OCR will implement significant penalties. Additionally, since OCR is posting the details of every breach affecting 500 or more individuals on a public website1 , the organizations involved have become susceptible to class-action lawsuits.
Tags : 
best practices, business analytics, productivity, business intelligence, business management
    
Absolute Software
Published By: Absolute Software     Published Date: May 31, 2016
IT leaders today are reinventing their infrastructure to support a mobile workforce and a complex array of connected devices. Against this backdrop of mobility and connectivity, Healthcare IT is tasked with meeting compliance challenges in an intricate and transformational regulatory environment. With a host of new data protection regulations and increasingly high settlement fees for data breaches, data security has never been more important to Healthcare organizations
Tags : 
mobility, mobile computing, best practices, data security, security management, business analytics, business integration, business intelligence
    
Absolute Software
Published By: Aconex     Published Date: Jun 18, 2008
In the construction industry, as in business generally, risk management involves identifying risks, assessing them and then developing strategies to manage them. Organizations that manage risk well enjoy financial savings, greater productivity and service quality, improved success rates of new projects and better decision making. It is clear that, in today's complex business environment, risk factors are wide reaching, and are intrinsically linked to achieving organizational objectives.
Tags : 
risk management, collaboration, web collaboration, web-based collaboration, aconex
    
Aconex
Published By: Act-On     Published Date: May 10, 2012
For an email campaign to be successful, marketers must reach the right person at the right time, with the right offer. By learning the basics of deliverability, you're better prepared to build emails that will actually reach your potential customers.
Tags : 
email deliverability, deliverability, best practices, spamtrap, spam filtering, blacklists, blocklists, soft bounce
    
Act-On
Published By: Act-On     Published Date: May 10, 2012
Gleanster Principal Analyst Ian Michels discussed how to estimate the number of leads required to reach a desired number of sales, and how to estimate the marketing budget need to meet those goals.
Tags : 
lead lifecycle, buying cycle, kpi, benchmark, benchmarketing, metrics, perpetual revenue growth, yoy growth
    
Act-On
Published By: Act-On     Published Date: Oct 09, 2015
Many times the social media team is siloed, outsourced, or even non-existent. But the only way to fully harness the power of social media marketing is to put it on the table with every other marketing channel and integrate it into a larger cross-channel marketing plan. Our eBook will give you five things you can do right now to integrate social media marketing into your current marketing strategy.
Tags : 
reachmail, social media, social media marketing, marketing plan, cross channel, cross channel marketing plan, marketing strategy
    
Act-On
Published By: Act-On     Published Date: Oct 09, 2015
As marketers, we often find ourselves on the dreaded execution treadmill. Running from campaign to campaign and tactic to tactic without understanding the impact were having on the bottom line. A high-performance marketing plan can help you understand how your programs are doing, tie them back to revenue, and show you where you should be prioritizing your time. Get started on your plan today with this six-step blueprint for developing a high-performance marketing plan.
Tags : 
reachmail, marketing, marketing plan, developing a marketing plan, effective marketing plan, successful marketing plan
    
Act-On
Published By: Act-On     Published Date: Oct 09, 2015
LinkedIn has evolved into a powerful lead generation tool for many businesses. Its features, like Publisher and Groups, lend themselves well to connecting businesses with prospects. With so many great features, it can be quite challenging to figure out how to use the ones that best fit your needs. To help you navigate your way through LinkedIn, weve put together 10 things you should be doing today to make the most of LinkedIn.
Tags : 
reachmail, linkedin, b2b best practices on linkedin, b2b companies
    
Act-On
Published By: Act-On     Published Date: Oct 09, 2015
Tweets with hashtags receive 2X more engagement than those without hashtags (Buddy Media). Used correctly, hashtags will amplify your message like nothing else on social media. All you have to do is apply the right ones at the right times, with a bit of finesse. To give you the tools you need to create and manage your hashtag strategies, weve put together this eBook to show you the ropes.
Tags : 
reachmail, social media, hashtags, effective hashtags, hashtag strategies
    
Act-On
Published By: Act-On     Published Date: Oct 09, 2015
42% of marketers cite the lack of a content marketing strategy as their main challenge to achieving content marketing success (Ascend2 research). While many marketers are using content marketing, an effective content marketing strategy doesnt create itself. It requires careful planning and focused execution. So how do you get started? Our eBook will give you six best practices to develop and deploy a content marketing strategy that drives results.
Tags : 
marketing, content marketing, creating content, content marketing strategy, reachmail, best practices
    
Act-On
Published By: Act-On     Published Date: Oct 09, 2015
Marketing technology is now an incredibly complex and diverse ecosystem of vendors and products. In fact, the 2015 edition of Brinkers Marketing Technology Landscape Supergraphic includes 1,876 marketing technology vendors across 43 categories. Our guide will help you cut through the clutter and complexity of the marketing technology landscape so you can make better decisions about where and how to plan your technology investments.
Tags : 
marketing, marketing technology, marketing tech vendors, reachmail, marketing technology guide, marketing technology investments
    
Act-On
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.