Skip to main content
 

best practices

Results 2351 - 2375 of 2621Sort Results By: Published Date | Title | Company Name
Published By: BlueHornet     Published Date: Apr 12, 2010
Every popular email client will display HTML content sent in email. However, not every email client has a "web standards" compliant HTML rendering engine. Therefore, the same email may render differently across different email clients. This whitepaper offers practical solutions to help designers, coders, and non-designers alike build a successful email that will render well across all email platforms.
Tags : 
bluehornet, html email rendering, email platforms, best practices, css, coding
    
BlueHornet
Published By: eG Innovations     Published Date: Jun 13, 2008
This EMA white paper investigates virtualization management issues in detail, outlining the key drivers and outcomes of virtualization, explaining critical inhibitors to virtualization success (and how to overcome them), and describing core virtualization performance management solution requirements. It also briefly describes one such solution, the eG Enterprise Suite, and includes a short case study highlighting this solution in action.
Tags : 
virtualization management, application performance management, it infrastructure management, root cause diagnostics, eg innovations, virtualization
    
eG Innovations
Published By: Bronto     Published Date: Jan 03, 2013
In light of the increasing use of preview panes, filters and the default blocking of images in popular email clients such as Outlook, Gmail and AOL, Bronto has outlined design best practices that will help you successfully reach your audience.
Tags : 
esp, email marketing, retail, automation, automated, marketing, digital marketing, software, advertising agencies, crm & customer care
    
Bronto
Published By: KEMP Technologies     Published Date: Aug 04, 2008
Chances are, if you’re utilizing SSL, you’re not utilizing it to its full potential. SSL is a powerful technology that can help organizations protect their data as well as their users. While the technology behind SSL is solid, the most common best practices for its implementation do not take full advantage of the benefits that SSL brings. And this may be inadequate to provide proper security to the modern web application environment.
Tags : 
ssl, load balancer, load balancing, application delivery, ssl acceleration, application optimization, windows terminal services, terminal services, content switching, server load balancing, application security, network security, kemp, kemp technologies, web security, secure socket layer
    
KEMP Technologies
Published By: ZSL Inc.     Published Date: Jul 20, 2009
Organizations have implemented enterprise applications such as ERP and CRM for business process execution but have failed to address the key enterprise asset: data. In the current economic environment, enterprises that fail to capitalize on their data assets jeopardize their cost structures and their earnings potential. It is vital for organizations to leverage their data assets to measure their business performance, identify the weak poles and strategic improvement spots to scale their business to new heights. Business Intelligence (BI), the recent innovation in IT, has emerged to be a potential hope for the organizations to build a strong business milieu without any new asset investments and utilizing the existing key assets of the organizations.
Tags : 
business intelligence, zsl, erp, crm, enterprise application, enterprises, investments, business transformation, olap, dashboards, metrics, business monitoring
    
ZSL Inc.
Published By: HP - Enterprise     Published Date: Nov 19, 2008
Matt Rose, Senior Software Security Consultant at Fortify Software, shares his findings from a year analyzing millions of lines of code. He unveils his top ten most common vulnerabilities and provides detailed examples of each. These technical examples come from his experience working with fortune 500 companies, government agencies, and major ISVs.
Tags : 
security, application security, java, vulnerabilities, developer, source code, analysis, fortify software, fortify, security best practices, common vulnerabilities, code
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Jan 24, 2013
This research brief details best practices for all organizations that would like to produce more secure applications.
Tags : 
research, security, application security, vulnerability testing, software development
    
HP - Enterprise
Published By: Oracle Corp.     Published Date: Sep 05, 2012
Exalogic Backup and Recovery:Best Practices
Tags : 
oracle, backing up, exalogic operating system, best practices
    
Oracle Corp.
Published By: BMC Control M     Published Date: Jul 16, 2009
Read "A Comprehensive Approach to Practicing ITIL Change Management" a compelling white paper from Enterprise Management Associates, to learn best practices for integrating your batch process automation and change management solutions.
Tags : 
ema, bmc, itil, change, management, enterprise, e-commerce, solution, result, effective, practice, cmdb, problem
    
BMC Control M
Published By: BMC Control M     Published Date: Jul 22, 2009
Read "A Comprehensive Approach to Practicing ITIL Change Management"; a compelling white paper from Enterprise Management Associates, to learn best practices for integrating your batch process automation and change management solutions
Tags : 
ema, bmc, itil, change, management, enterprise, e-commerce, solution, result, effective, practice, cmdb, problem
    
BMC Control M
Published By: BMC ESM     Published Date: Jul 17, 2009
IT Infrastructure Library® (ITIL®) best practices promote a well-functioning, collaborative IT environment that can enable the business and your IT organization to cope with the effects of economic stress.
Tags : 
itil, it infrastructure library, bmc, bmc software, it environment, integration, business objectives, configuration management database, cmdb, business service management, bsm, mean time to repair, mttr, roi and value on investment, voi
    
BMC ESM
Published By: BMC ESM     Published Date: Jul 22, 2009
IT Infrastructure Library® (ITIL®) best practices promote a well-functioning, collaborative IT environment that can enable the business and your IT organization to cope with the effects of economic stress.
Tags : 
itil, it infrastructure library, bmc, bmc software, it environment, integration, business objectives, configuration management database, cmdb, business service management, bsm, mean time to repair, mttr, roi and value on investment, voi
    
BMC ESM
Published By: Intermec     Published Date: Sep 08, 2011
This white paper identifies best practices for workforce optimization, resource management, revenue assurance and performance control, explains how technology supports these processes, provides leveraging current mobile and wireless technology to enhance processes to improve productivity and profitability.
Tags : 
intermec, mobile technology, workforce optimization, data management, revenue assurance, asset tracking
    
Intermec
Published By: Net Atlantic     Published Date: Jan 08, 2010
Email Marketing Best Practices
Tags : 
webinar
    
Net Atlantic
Published By: Bazaarvoice     Published Date: Nov 02, 2010
Each year, the Social Commerce Summit London brings together innovative brands and thought leaders to share best practices and trends in social media. This paper encapsulates the highlights and key learnings from this event.
Tags : 
bazaarvoice, engagement, empowerment, uk shopper, channel switch, social media, twitter, facebook, ecommerce, mobile phones, mobile marketing, wireless
    
Bazaarvoice
Published By: MoreVisibility     Published Date: Mar 28, 2012
Curious if your social media efforts are measuring up for your business? Then take a moment to see what best practices we advise upon to ensure social media success.
Tags : 
morevisibility, google, marketing, social media, emerging marketing, internet marketing, digital media
    
MoreVisibility
Published By: MoreVisibility     Published Date: Jun 04, 2012
Want to maximize your PPC advertising efforts? Take a moment to see what best practices we advise to ensure search engine marketing success.
Tags : 
    
MoreVisibility
Published By: Symantec.cloud     Published Date: Feb 03, 2010
Best-Practices Guidelines for Managing Workplace Email and Web Use to Minimize Risks and Maximize Compliance.
Tags : 
messagelabs, symantec hosted services, workplace email, web acceptable usage policy, compliance, security, productivity
    
Symantec.cloud
Published By: Symantec.cloud     Published Date: Aug 10, 2010
This document is intended to give a broad overview of our security policies, processes and practices current at the date of writing.
Tags : 
messagelabs, symantec hosted services, security policies, best practices, cloud computing, software as a service, saas, data security
    
Symantec.cloud
Published By: Symantec.cloud     Published Date: Nov 29, 2010
This paper will look at aligning security processes, the human element of security, with the latest security technologies - creating a secure barrier against today's most insidious threats.
Tags : 
messagelabs symantec hosted services, best practices, security process, security technology, threats, anti-virus
    
Symantec.cloud
Published By: Symantec.cloud     Published Date: Nov 29, 2010
This paper will provide advice, best practices, and insight on how to create security and management policies for a wireless workforce.
Tags : 
messagelabs symantec hosted services, wireless workforce, mobile data security, data and services, business practices, security, management policy
    
Symantec.cloud
Published By: Symantec.cloud     Published Date: Dec 06, 2010
This white paper discusses the fundamentals of financial services compliance.
Tags : 
messagelabs symantec hosted services, best practices, financial services compliance, archiving, security, saas
    
Symantec.cloud
Published By: Symantec.cloud     Published Date: Apr 14, 2011
In this white paper, Osterman Research discusses how the daily occurrence of malware within organizations has become decidedly worse over the past several years.
Tags : 
symantec cloud, messaging, web security best practices, malware
    
Symantec.cloud
Published By: NetApp     Published Date: Mar 09, 2010
This reference architecture showcases virtualizing Microsoft applications on VMware® vSphere 4™ and NetApp® unified storage and includes best practices for effective backup and recovery in a virtualized environment.
Tags : 
netapp, microsoft, vmware vsphere 4, virtual infrastructure, unified storage, fibre channel, backup, recovery
    
NetApp
Published By: Focus     Published Date: Jan 06, 2011
Mitigate the risks of data breach and loss with these best practices for managing security on mobile devices.
Tags : 
amy babinchak, best practices, bob egan, expert content, information technology, it security, josh lipton, ken wineberg, martyn davies, mobile and wireless, mobile security, mobile wireless, rasib hassan khan, smartphones
    
Focus
Start   Previous    88 89 90 91 92 93 94 95 96 97 98 99 100 101 102    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.