Skip to main content
 

best practices

Results 2276 - 2300 of 2623Sort Results By: Published Date | Title | Company Name
Published By: Hewlett Packard Enterprise     Published Date: Mar 29, 2017
Join this dynamic LinkedIn group to be part of the cyber-security education conversation to gain an understanding for the best practices to improve security. Learn why HP says 64% of IT managers believe their printers are infected with malware, but only 45% of those IT professionals consider printers to be a medium or high risk vulnerability. The first responsibility of IT professionals is to make sure their companyís information is secure and today any device can become an access point threat. Printers and MFPs can be the Achillesí Heel of any cyber-security plan and are a goldmine for hackers looking to steal pertinent information. Join the conversation and learn whatís necessary to protect your company.
Tags : 
hewlett packard, printer security, information technology
    
Hewlett Packard Enterprise
Published By: NEC     Published Date: Aug 12, 2014
Without a doubt, performance is the database professionalís number one concern when it comes to virtualizing Microsoft SQL Server. While virtualizing SQL Server is nothing new, even today there are some people who still think that SQL Server is too resource-intensive to virtualize. Thatís definitely not the case. However, there are several tips and best practices that you need to follow to achieve optimum performance and availability for your virtual SQL Server instances. In this whitepaper, youíll learn about the best practices, techniques, and server platform for virtualizing SQL Server to obtain the maximum virtualized database performance. In this white paper, youíll learn about the best practices, techniques, and server platform for virtualizing SQL Server to obtain the maximum virtualized database performance.
Tags : 
sql, datacenter, servers, virtualization, customer value, analytics, application owners, system integrators, big data, reliability, enterprise, availability, serviceability, processor
    
NEC
Published By: Listrak     Published Date: May 02, 2008
Even though there are many email marketing solutions that allow marketers to create, deploy, track, and manage their email marketing campaigns easily, there is still a significant percentage of companies that outsource this business process to an outside advertising agency, search engine optimization firm, application service provider, or interactive marketer.
Tags : 
listrak, email marketing, best practices, html, html newsletter, roadmap
    
Listrak
Published By: TowerData     Published Date: Sep 18, 2008
Is the success of your email marketing program limited by the size of your subscriber list? Email append, the process of adding email addresses to a postal customer database, is a quick and affordable way to expand the size of your email list. If you haven’t considered it in the past, it’s time to take a look. Perceptions about email append and the methods for doing it have matured over the past few years, and it’s now a predictable and reliable email list growth tactic. This white paper provides guidelines and best practices for consumer email appending.
Tags : 
customer acquisition, email marketing, database, email database, leads, lead, towerdata, tower data
    
TowerData
Published By: Response Media     Published Date: Jan 23, 2007
Over the last 10 years of optimizing online media campaigns, Response Media has established some best practices for profitable, successful email address acquisition and email database growth. Download this brief now to learn their key strategies.
Tags : 
email marketing, deliverability, list buying, list rental, email addresses
    
Response Media
Published By: ForeSee Results     Published Date: Feb 05, 2007
To date it has been virtually impossible to find reliable and meaningful standard metrics for multi-channel customers that measure the influence of the online shopping experience on total revenues. Learn more about the Multi-Channel Value index (MCVI), a strategic metric developed by ForeSee Results that projects the contribution of the website to a multi-channel retailer's overall sales through a calculation based on the ACSI methodology.
Tags : 
website analytics, conversion analysis, brick-and-mortar, multi-channel, foresee, foresee results
    
ForeSee Results
Published By: Omniture     Published Date: Jun 27, 2007
In general, most organizations spend more time and money promoting their websites through acquisition channels such as search or affiliate marketing than they do optimizing existing conversion rates. Download this paper now to discover 7 steps to increase conversion engagement.
Tags : 
conversion, conversion analysis, lead generation, website analytics, web analytics, lead generation, lead optimization, omniture, website testing
    
Omniture
Published By: SitePal     Published Date: Jul 02, 2007
Discover the benefits and potential pitfalls of using speaking avatars (virtual animated characters) for your small business websites. Learn the best practices to use to increase conversions with a talking character!
Tags : 
conversion analysis, landing page, landing pages, content personalization, ecommerce, e-commerce, e-business, live support, help desk, online assistance, avatar, online help, web site, sitepal
    
SitePal
Published By: AirTight Networks     Published Date: Nov 30, 1999
Making corporate data accessible through Wi-Fi networks means intruders and other unwanted visitors can easily access such networks if proper precautions and tools aren't used to protect them. This paper will discuss best practices in all five areas to secure the enterprise network, whether wired or wireless.
Tags : 
wireless, best practices, enterprise security, wi-fi, wireless security, network security, intrusion prevention, lan, local area network, local area networking, hacker detection, airtight, airtight networks
    
AirTight Networks
Published By: Schneider Electric     Published Date: Feb 12, 2018
Use of cloud computing by enterprise companiesis growing rapidly. A greater dependence on cloud-based applications means businesses must rethink the level of redundancy of the physical infrastructure equipment (power, cooling, networking) remaining on-premise, at the ďEdgeĒ. In this paper, we describe and critique the common physical infrastructure practices seen today, propose a method of analyzing the resiliency needed, and discuss best practices that will ensure employees remain connected to their business critical applications.
Tags : 
    
Schneider Electric
Published By: Applix     Published Date: Mar 13, 2007
This whitepaper will help organizations understand how driver based planning and control activities can be transformed into the proactive management function that add greater value through faster decision making.
Tags : 
productivity, best practices, business process management, bpm, business management, erp, enterprise resource planning, applix
    
Applix
Published By: Aventail     Published Date: Aug 21, 2009
Disaster recovery is not only needed for catastrophic events like natural disasters or pandemics, but for any event, like a snow storm or power outage that keeps your workers from getting to the office and disrupts your business. This white paper by business continuity expert Tim Clark of Fact Point Group, explores best practices for disaster recovery and the key role of SSL VPNs in that process.
Tags : 
disaster plan, disaster recovery plan, disaster recovery, high availability, business continuity, best practices, ssl, vpn, ssl vpn, security management, disaster planning, aventail
    
Aventail
Published By: Bocada     Published Date: Aug 21, 2009
This white paper focuses on Sarbanes-Oxley Act (SOX) regulations relevant to data protection, and describes both best practices and automated tools used by today's leading storage managers and backup/recovery teams to meet the mandates of SOX.
Tags : 
sarbanes oxley act, sarbanes oxley, sarbox, sox, sox compliance, compliance, financial, finance, auditing, security audit, audit, sox audit, data protection, storage management, bocada, bocata
    
Bocada
Published By: Bocada     Published Date: Aug 21, 2009
This white paper shares the best practices for company data security used by some of today's most progressive IT leaders to help align their group's efforts with company goals and to make their data protection activities more successful.
Tags : 
data protection, best practices, business goals, business management, it management, change management, bocata, bocada
    
Bocada
Published By: HP     Published Date: Aug 21, 2009
When deploying Microsoft Exchange Server 2003, there are a number of factors that must be addressed to ensure a successful application deployment. Click here to receive a guide to design and configuration of the EVA8000 for Exchange Server 2003 deployments.
Tags : 
best practices, microsoft exchange, servers, network management, server deployment, application deployment.
    
HP
Published By: IBM     Published Date: Dec 12, 2006
This white paper will define different vendor approaches to developing business services and the relative cost implications of each approach for the customer. 
Tags : 
service oriented architecture, soa, customer data integration, cdi, best practices, data integration, service-oriented architecture, customer interaction service, ibm
    
IBM
Published By: IBM     Published Date: Mar 28, 2008
In this era of unprecedented change, organizations need agility to adapt rapidly. Part of what separates winners from losers is the ability to respond quickly and intelligently to market opportunities, competitive threats and regulatory constraints — in short, to innovate and create value. The best companies understand how to use technology for strategic advantage to help accomplish these goals.
Tags : 
    
IBM
Published By: IBM     Published Date: May 29, 2008
The lack of trusted information - information that is accurate, timely and relevant - is on the minds of CEOs and senior executives around the world. The cost and complexity of managing increasing volumes of data and content, combined with the need to provide trusted information to every user for every transaction, is driving CIOs to rethink their approach to information delivery.
Tags : 
information management, data management, best practices, ibm, ibm li, li campaign, leveraging information
    
IBM
Published By: IBM     Published Date: Aug 21, 2008
Today, an IT-driven, customer-centric business approach isn’t a luxury — it’s imperative. More and more businesses are moving out of a cost-centric view of their IT potential and into a realization that IT can transform business processes. This white paper shows how you can maximize your IT function by leveraging ITIL best practice processes. These guidelines can help you effectively manage IT changes, assets, personnel and service levels all while reducing costs—going beyond simple IT asset management to deliver proactive IT business improvements.
Tags : 
itil, best practices, service management, asset management, ibm, ibm mi, ibm grm
    
IBM
Published By: IBM     Published Date: Aug 21, 2008
The goal of having one enterprise resource planning (ERP) solution for all business processes remains popular. However, there are still many misconceptions associated with using enterprise resource planning solutions in asset-intensive industries. This white paper discusses and demystifies the myths for decision makers in asset-intensive industries. You’ll also see how IBM Maximo Asset Management can enhance the quality of asset data, contribute to the safety of the workforce, and help facilitate best practices that significantly impact the long-term success of your business.
Tags : 
erp, asset management, best practices, bpm, business process, ibm mi, ibm, ibm grm, enterprise resource planning, erp solutions, erp vendors, erp modules, asset-intensive
    
IBM
Published By: IBM     Published Date: Aug 21, 2008
For a growing business, it’s increasingly difficult to integrate technological solutions and services to improve service management. So various frameworks have been created to help today’s IT professionals optimize their use of technology in managing IT processes. The third version of the Information Technology Infrastructure Library (ITIL) provides the latest set of process best practices for any service management improvement effort.
Tags : 
ibm, ibm mi, ibm grm, itil, service management, it management
    
IBM
Published By: IBM     Published Date: Sep 18, 2008
When bound to regulation and compliance, process manufacturers find opportunities to grow through enterprise resource planning (ERP). However, 50% of process manufacturers execute non-integrated ERP strategies. This Aberdeen Group research study reveals best practices to help you adapt or select an ERP vendor that improves your business performance.
Tags : 
erp, enterprise resource planning, cindy jutras, process, process industry, chemical, food and beverage, food, beverage, pharmaceutical, pharma, best-in-class, material requirements planning, mrp, global competition, manufacturing process, microsoft dynamics, acsis, fullscope, traceability
    
IBM
Published By: IBM     Published Date: Sep 18, 2008
IBM conducted an in-depth assessment to identify vulnerabilities in New Hanover Health Network's information security practices, with emphasis on their auditing activity and capabilities. This white paper will explain how IBM helped them implement a series of best practices, thereby improving the confidentiality, integrity, and availability of their information systems.
Tags : 
ibm, ibm mmdg, hipaa, hippa, healthcare, health care, compliance, privacy, patient, patient privacy
    
IBM
Published By: IBM     Published Date: Dec 30, 2008
Does your business need to safeguard information, keep auditors and regulators satisfied, and improve data quality? Data governance is the answer. This informative video outlines the latest challenges and best practices in data governance. IBM data governance solutions help businesses with:• Audit and reporting • Data architecture/infrastructure • Data quality • Information lifecyle management • Metadata/business glossaries • Organizational design/development • Policy/risk management • Security/privacy/compliance • Stewardship/value creation
Tags : 
ibm, data governance, safeguard information, data quality, data architecture, data infrastructure, information lifecycle management, metadata, business glossaries, organizational design, organizational development, policy management, risk management, security, privacy, compliance, stewardship, value creation
    
IBM
Published By: IBM     Published Date: Jan 13, 2009
This treasure trove of information can help cut IT support costs and boost service desk success.
Tags : 
aldon, itil, it infrastructure library, it processes, process automation
    
IBM
Start   Previous    85 86 87 88 89 90 91 92 93 94 95 96 97 98 99    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.