client

Results 1051 - 1075 of 1098Sort Results By: Published Date | Title | Company Name
Published By: Bulldog Solutions     Published Date: Jul 20, 2009
If you’re under increasing pressure to be as efficient as possible with your marketing spend, you need to avoid wasting resources on strategies and messages targeted at the wrong audience. This white paper is a step-by-step guide on creating buyer personas to help focus your marketing efforts.
Tags : 
audience, bds, bulldog solutions, client list, pain points, motivators, validation, map, mapping, audience development, resources, buyer personas, sales development, sales leads, in-person environment, audience segmentation, promotion planning, audience, b2b, btob
    
Bulldog Solutions
Published By: NetCom Info     Published Date: Jul 16, 2009
NetCom's CCNA certification course teaches clients how to configure, install and maintain the following protocols:• Introduction to wireless networking concepts & terminology• Internet Protocol (lP)• Enhanced Interior Gateway Routing Protocol (EIGRP)• Serial Line Interface Protocol Frame Relay• Routing Information Protocol Version 2 (RIPv2)• Virtual Local Area Network (VLANs)• Ethernet and access control lists (ACLs)
Tags : 
ccna, cisco, networking, routing and switching, cisco certification, ccnp, it career advancement
    
NetCom Info
Published By: BMC Control M     Published Date: Jul 16, 2009
Le traitement par lots est une activité critique dans la plupart des entreprises. C’est le fondement technique sur lequel reposent bon nombre d’applications : commerce électronique, comptabilité, contrôle des stocks et de l’inventaire, planification des ressources d’entreprise, service à la clientèle, pour n’en citer que quelques-unes. L’interruption d’un traitement par lots crucial peut avoir des répercussions majeures sur l’activité : arrêt, perte de revenu, pénalités contractuelles, et autres.
Tags : 
itil, cmdb, bmc, software, bmc control-m, smart
    
BMC Control M
Published By: IBM     Published Date: Jun 24, 2009
WebSphere Portal remains IBM's strategic front end for SOA. It enables our clients to closely align their business objectives on standards-based platforms with role-based delivery of composite applications across and beyond their enterprise. At the end of June we delivered a new version of WebSphere Portal Version 6.1. This release significantly improves performance by tapping into the 64-bit capabilities of the IBM System z platform. Click here to learn more!
Tags : 
websphere, portal, version 6.1, web 2.0, web interfaces, intuitive applications, enhanced web 2.0, ibm, business applications, leveraging, ibm, system z, platform, mission critical applications, web facing, workloads, z/os, ibm racf, workload manager, soa
    
IBM
Published By: SAP Inc.     Published Date: Jun 16, 2009
To succeed in the professional services industry, your firm must continually improve its service delivery methods. Read how you can increase client value and lower costs through implementing more efficient resourcing and partnering processes and co-creating value with your clients.
Tags : 
sap, service delivery innovation, financial metrics, enterprise applications, business analytics, international computing
    
SAP Inc.
Published By: SAP Inc.     Published Date: Jun 16, 2009
Improving your call center may be more easily attainable — and more important — now than ever before. Recognizing that customer interaction is an important differentiator, organizations can increase the focus on their customers’ experience while keeping a firm grip on costs by leveraging the full potential of state-of-the-art technology.
Tags : 
customer service, customer satisfaction, customer retention, retention, loyalty, crm, customer, client, customer interaction, sap, enterprise applications, customer relationship management, international computing
    
SAP Inc.
Published By: IBM     Published Date: Jun 15, 2009
Read the white paper to see how IBM Lotus Notes and Domino software empowers users to take action, create and share knowledge and collaborate with teams. And discover how this new kind of desktop application, leveraged from 20 years of leadership can help deliver an enhanced user experience, drive greater business value and boost IT performance.
Tags : 
ibm, lotus, lotus notes, lotus domino, it performance, collaboration, connect, desktop application, connect, socialize, communicate, user experience, eclipse, alloy, developers, client, sap, it performance, green, optimize
    
IBM
Published By: IBM     Published Date: Jun 15, 2009
In this white paper, you'll see how Lotus Notes 8.5 boosts bandwidth by storing one copy of attachments, rather than allowing duplicate via threads. You'll also discover how upgrading lets you elevate collaboration and enhance efficiency with tools that empower users to take action, create and share knowledge, and collaborate with teams.
Tags : 
ibm lotus, domino, 8.5, collaboration, green, empower, access, connect, domino, notes, ibm, 8.5, server, enterprise-class messaging, collaborative capabilities, lotus, lotus notes, lotus domino, it performance, collaboration
    
IBM
Published By: IBM     Published Date: Jun 15, 2009
Read this astounding case study to see how migrating to IBM Lotus software with a broadly functional messaging platform increased the efficiency and support of mobile users for the Kentucky Baptist Convention. Then you'll learn how your own business can improve communications, drive down costs and eliminate the need for additional Web software.
Tags : 
kentucky baptist convention, case study, nonprofit, lotus software, messaging platform, ibm lotus, domino, 8.5, collaboration, green, empower, access, connect, domino, notes, ibm, 8.5, server, enterprise-class messaging, collaborative capabilities
    
IBM
Published By: Trend Micro SPN     Published Date: May 15, 2009
Measuring the effectiveness of your security infrastructure is key to any enterprise as threats change on a minute by minute basis. See an example of the report you would receive following a Trend Micro Threat Discovery Assessment.
Tags : 
trend micro, trend, cloud-client, malware, anti-virus, hijacked, fraud, virus, security, threat discovery assessment, secure, threat discovery, worms, trojans, infected, recovering, instant messaging, anti spam, anti spyware, anti virus
    
Trend Micro SPN
Published By: Absolute Software     Published Date: May 08, 2009
Keeping data secure in a mobile environment is not just a daunting challenge, but a critical requirement. Loss and theft of computers leaves sensitive data vulnerable, creating serious financial and legal risks.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security, hacker detection, identity management
    
Absolute Software
Published By: Pardot     Published Date: Apr 29, 2009
You've laid the groundwork and attracted the visitors, now conversion is key. As a B2B marketer, you typically have a very limited window to prove your value proposition. Learn eight simple techniques, including progressive profiling, form validation and multivariate testing, that will help you fine tune your landing pages and increase conversion rates.
Tags : 
pardot, b2b conversions, double b2b conversions, b2b marketer, groundwork, landing pages, conversion rates, ctr, click-thru, form validation, multivariate testing, b2c, website caller id, jigsaw, whois, prospect, suspect, lead source, error messages, drop off
    
Pardot
Published By: Powered Inc.     Published Date: Mar 26, 2009
Read this report to learn how to harness the power of managed online communities to increase ROI and build relationships with your customers. Unlike other marketing programs, online communities allow businesses to engage with customers through a combination of expert content and online community interactions. Throughout the Customer Lifecycle - from Awareness to Advocacy – clients achieve measureable results with real-time data and insights.
Tags : 
powered, social marketing, roi, benchmarking, customer satisfaction, brand affinity, brand loyalty, customer lifecycle, purchase intent, persuasive communications, advocacy, word of mouth, managed online communities
    
Powered Inc.
Published By: Citrix Online     Published Date: Mar 25, 2009
Providing exceptional service to more than 1,000 clients and wooing thousands of prospects was a costly endeavor for Business Fitness, a consulting firm specializing in business efficiency. The company desperately needed a cost-effective tool to help it educate, nurture and convert leads to happy customers without racking up frequent flyer miles.
Tags : 
gotowebinar, gotomeeting, go to meeting, gtm, gtw, citrix, sales tools, marketing tools, marketing, sales, business fitness
    
Citrix Online
Published By: DataDirect Technologies     Published Date: Mar 17, 2009
Connecting to a database requires a number of independent layers. The application needs to incorporate software that establishes the connection and calls to the database. A database connectivity layer needs to be in place to help manage security, communications, and data flow with the database. The database has a set of interfaces that help translate the client requests into actions within the database engine. And with the advent of .NET, the costs of managed versus non-managed code must also be considered.
Tags : 
.net, data direct, microsoft .net architecture, scaling, effective architectural design, virtual machine, intermediate language, component object model, com, windows operating system, com-based code, cpu utilization, optimize database connectivity, software development, c++, java, web development
    
DataDirect Technologies
Published By: Quocirca     Published Date: Mar 12, 2009
For many years, server-based computing has been seen as a means of, at best, providing those within highly task-based environments with a controlled desktop environment. However, changes in software, hardware, security and management systems are leading towards server-based computing being suitable for a far larger proportion of an organization's user base.
Tags : 
quocirca, desktop environment, software, hardware, security, management systems, data security, business continuity, asset life cycles, tco, server-based computing, security, information management, enterprise applications, data management, business management, total cost of ownership, database security
    
Quocirca
Published By: Stratus Technologies     Published Date: Mar 10, 2009
Learn how Stratus Mission-Critical Managed services have delivered 100% business capability for a clients' global operation - so they can 'have their cake and eat it too!'
Tags : 
stratus, business capability, business process, it components, business centric managed service, slas, mission critical environments, disaster prevention, knowledge management, enterprise applications, application performance management, business management, business process automation, business process management, sla
    
Stratus Technologies
Published By: IBM     Published Date: Mar 04, 2009
Download IBM® Lotus® Sametime® Standard V8.0, a platform for unified communications and collaboration that combines security features with an extensible, open solution including integrated Voice over IP, geographic location awareness, mobile clients, and a robust Business Partner community offering telephony and video integration. Lotus Sametime Standard V8.0 expands on the existing instant messaging, Web conferencing, VoIP, point-to-point video, mobile clients, external IM gateway, and extensible client with additional platform support and enhancements to the end user experience, administration, and performance.
Tags : 
ibm, lotus, sametime, communications and collaboration, instant messaging, web conferencing, voip, point-to-point video, mobile clients, external im gateway, extensible client, wireless, enterprise applications, mobile computing, mobile workers, wireless infrastructure, video conferencing, voice recognition, voice over ip
    
IBM
Published By: Trend Micro SaaS     Published Date: Feb 09, 2009
Today's confidentiality and privacy requirements drive organizations of all sizes and industries to secure sensitive data in email. Often particular types of data need to be encrypted, such as credit card numbers, intellectual property, or client information. Organizations also need to protect confidential emails for particular groups, such as executive management, human resources or legal departments. Many organizations are turning to policy-based encryption to meet their encryption needs because it automatically encrypts data using content filtering rules that identify types of content or email for particular groups. Encryption is applied when the rules are triggered. With policy-based encryption, organizations avoid relying on individual users to secure important content.
Tags : 
saas, trend, trend micro, software as a service, trendlabs, email security, security, interscan messaging, service level agreement, sla, virus, spam, phishing, distributed denial of service, ddos, encryption, policy based, filtering, anti spam, anti spyware
    
Trend Micro SaaS
Published By: Dell Storage     Published Date: Jan 16, 2009
Dickinson Wright PLLC has a long history of success – founded in 1878, the law firm has been serving clients for more than a century. From offices in Michigan and Washington D.C., Dickinson Wright’s 450+ employees deliver comprehensive legal services to organizations of all sizes – from individuals and new ventures to small and large companies to government units.
Tags : 
dell, dickinson wright, equallogic san, storage area networks, legal services, equallogic functionality, storage, iscsi, storage management
    
Dell Storage
Published By: SubscriberMail     Published Date: Dec 12, 2008
The benefits of addressing the image suppression issue are significant. A recent controlled study by SubscriberMail demonstrated the response improvements gained by optimizing an email message to have impact even when images are not displayed. In this study, an email message that was not optimized for image suppression was sent to a test panel of approximately 50,000 subscribers. Simultaneously, a panel of similar makeup received a version of the same message optimized for non-graphical display. Compared to the non-optimized version, the optimized version saw an 87 percent increase in clicks.
Tags : 
subscribermail, image blocking, image suppression
    
SubscriberMail
Published By: Network Automation     Published Date: Dec 08, 2008
Healthcare Management Solutions (HMS) is an industry leader in outsourced revenue cycle management for hundreds of healthcare industry clients. Its client base includes large for-profit and not-for-profit integrated healthcare delivery networks, stand-alone hospitals of all sizes, physician groups and managed care organizations of all types.
Tags : 
network automation, process automation, data management, networking, it management, network management, network performance management, business process automation
    
Network Automation
Published By: Dell     Published Date: Oct 23, 2008
Windows Vista® offers a new way to deliver manageable IT services that are planned for security service-level agreements (SLAs), while helping to lower the cost of ownership, management, and deployment.
Tags : 
dell, service-level agreements, lower cost of vista deployment, application compatibility, client deployment solutions, image management, it management, data management, employee performance, itil
    
Dell
Published By: ZSL Inc.     Published Date: Sep 25, 2008
The hotspot in the current IT world is optimized Web Services. Now the enterprises have started their vision towards next generation Web Services. This white paper gives information for the business managers and engineers in developing and deploying Web Services using Rational Application Developer (RAD) and WebSphere Application Server (WAS), respectively. This paper explains the process to:* create a Web Service and Web Server client* build security to that web service* deploy the web service in WebSphere application server
Tags : 
zsl, soap, java, wsdl, uddi, web service security, risk exposure, security, software development
    
ZSL Inc.
Published By: Integration New Media, Inc.     Published Date: Sep 18, 2008
Most of the information that’s been made available about Adobe Integrated Runtime so far, has been written for the programmers that are building applications, not for the visionaries that are designing the client experiences. The objective of this paper is to provide executives, project managers, marketers and other visionaries with an introduction to Adobe AIR, and information about how Adobe AIR can be leveraged to create next generation web experiences.
Tags : 
inm, integration new media, adobe air
    
Integration New Media, Inc.
Start   Previous    30 31 32 33 34 35 36 37 38 39 40 41 42 43 44    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.