Skip to main content
 

nic

Results 4026 - 4050 of 4299Sort Results By: Published Date | Title | Company Name
Published By: HP - Enterprise     Published Date: Nov 19, 2008
Matt Rose, Senior Software Security Consultant at Fortify Software, shares his findings from a year analyzing millions of lines of code. He unveils his top ten most common vulnerabilities and provides detailed examples of each. These technical examples come from his experience working with fortune 500 companies, government agencies, and major ISVs.
Tags : 
security, application security, java, vulnerabilities, developer, source code, analysis, fortify software, fortify, security best practices, common vulnerabilities, code
    
HP - Enterprise
Published By: K Alliance, LLC     Published Date: Nov 14, 2008
The Cisco CCENT (Cisco Certified Entry Networking Technician) certification validates the skills required for entry-level network support positions, the starting point for many successful careers in networking and our course will help you prepare for passing the certification exam with flying colors. In this training course you’ll learn: Common Physical Components of a Network , Interpreting a Network Diagram and Impact of User Applications on the NetworkTest drive our Unlimited Online IT Training Library for FREE FOR 1 week!
Tags : 
k-alliance, cisco, cisco certification, it certification, interpreting a network diagram
    
K Alliance, LLC
Published By: IBM     Published Date: Nov 13, 2008
Telecommunications services are becoming more and more complex. They now run over virtual network paths, less constrained by individual pieces of hardware. Get this white paper and see how service quality management solutions from IBM can improve the customer experience.Learn how telecomm providers can deliver optimal service quality
Tags : 
ibm, sla, voip, virtual private network, blackberry, tivoli, tivoli, ibm, ibm mbi, service quality, telecommunications, management solutions, customer experience, dashboards, sla, netcool, service level agreement, key quality indicators, kqis, ip-tv
    
IBM
Published By: IBM     Published Date: Nov 13, 2008
To grow your subscriber base, reduce churn and control costs, it is imperative that you achieve and maintain a deep understanding of the customer experience throughout your organization. This white paper highlights IBM Tivoli® Netcool® Service Quality Manager Service Solutions — how it can change the way telecommunications providers are taking new services to market and helping to crystallize.
Tags : 
ibm, tivoli, voip, iptv, blackberry, service level agreement
    
IBM
Published By: BlackBerry     Published Date: Nov 08, 2008
This paper is the first in a four-part series examines the ways that wireless technology and mobile communications can enhance the efficiency and quality of institutional healthcare, improving the processes through which doctors, nurses, specialists and support staff members deliver medical treatment. Part One offers an overview of the current healthcare situation and suggests ways in which wireless technology solutions address healthcare challenges.
Tags : 
blackberry, healthcare, voip, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: Microsoft Office     Published Date: Nov 07, 2008
To allow organizations and individuals the flexibility to address their specific challenges, Microsoft has a variety of Microsoft® Office suites to select from. This paper describes the commonalities and differences among the suites of the 2007 Microsoft Office system: Microsoft Office Standard 2007, Microsoft Office Professional Plus 2007, Microsoft Office Enterprise 2007, and Microsoft Office Ultimate 2007. Each suite provides the core Microsoft Office applications as well as features that support integrated content management, information rights and policy, and integrated electronic forms; however, they differ in the selection of included applications and the ways in which advanced features are implemented.
Tags : 
microsoft, office, office suites 2007
    
Microsoft Office
Published By: Microsoft Office SharePoint Server     Published Date: Nov 07, 2008
Until recently, St. Vincent Heart Center used an HTML-based intranet to disseminate various types of information to its 470 employees and 200 contract workers. But information on that system wasn’t easy to find. Microsoft® Office SharePoint® Server 2007 offers the organization easy access to information—and it enhances productivity and supports increased security for confidential information. Read more about the benefits.
Tags : 
microsoft office, sharepoint server, hp proliant
    
Microsoft Office SharePoint Server
Published By: Progress Software BTA Telecommunications     Published Date: Nov 04, 2008
The right software for managing critical applications can actually optimize your business results. Consider this... your critical applications are those that are vital to increasing revenue or productivity. In other words, they execute your key business transactions and are key business assets that support revenue generation, productivity, and customer satisfaction.
Tags : 
progress actional buyers guide, business critical applications, manage critical applications, manage business applications, managing mission critical applications, managing business applications, mission critical applications, progress software
    
Progress Software BTA Telecommunications
Published By: Godfrey     Published Date: Oct 24, 2008
B-to-B Strategic Search has been created by Godfrey to provide the customer-centric, content-driven approach needed for successful business-to-business search performance. It uses all available tools to help B-to-B marketers achieve a presence in the search results of users who are looking for their technology or product. It thus includes both search engine optimization (SEO), the practice of modifying your site to improve organic search results, and search engine marketing (SEM), or paid search.
Tags : 
godfrey, search, b-to-b search, b-to-b strategic search, business-to-business search, search engine optimization, seo, search engine marketing, sem, analytics, integration, web content, keywords, keyword analysis, strategic keyword analysis, search performance, links, analytics, integration
    
Godfrey
Published By: Godfrey     Published Date: Oct 24, 2008
Godfrey’s Channel Strategy Audit is intended as a guide to assist you in providing the information we need to generate a distribution channel strategy analysis. This audit is organized into several parts, starting with a cursory survey of your business environment, and then concentrating on the key issues that can result in strengthening or reshaping your distribution channel strategy. Although our face-to-face meeting time may be limited, we hope this audit will allow you to provide more thoughtful and detailed information, so that our deliverable to you has significant value.
Tags : 
godfrey, channel strategy audit, b2b marcom, channel communications, distribution network, channel marketing, marketing to distributors, distribution channel, sales and marketing distribution, channel distribution, b2b communications
    
Godfrey
Published By: Godfrey     Published Date: Oct 24, 2008
Recently, however, the explosive growth of online media has changed the PR game, creating a deeper, richer two-way communication between a marketer and its target audiences. Now, marketers can use social media strategies and tactics to engage their audiences directly. Those tactics include press release optimization, online media monitoring and reporting, social media press releases, RSS feeds, blogs, podcasts, webcasts and a host of other emerging technologies.
Tags : 
godfrey, convergent, public relations, business-to-business, traditional pr, media relations, press kits, trade show support, feature articles, case histories, application stories, press releases, social media, blogs, podcasts, press releases, rss feeds, webcasts, press release optimization, online media monitoring
    
Godfrey
Published By: Godfrey     Published Date: Oct 24, 2008
 Recently, however, the explosive growth of online media has changed the PR game, creating a deeper, richer two-way communication between a marketer and its target audiences. Now, marketers can use social media strategies and tactics to engage their audiences directly. Those tactics include press release optimization, online media monitoring and reporting, social media press releases, RSS feeds, blogs, podcasts, webcasts and a host of other emerging technologies.
Tags : 
godfrey, b-to-b search, search, search engine optimization, seo, search engine marketing, sem, keywords, organic search, paid search, click-throughs, click-through rate, backlinks, link equity, link farms
    
Godfrey
Published By: Godfrey     Published Date: Oct 24, 2008
This document is intended to provide us with the information we need to generate an audit of your existing system for sales lead management. This audit is organized into several parts, starting with a cursory survey of your business environment, and then focusing on the key aspects and issues of sales lead management. Since our face-to-face meeting time may be limited, we hope this audit will allow you to provide more thoughtful and detailed information, so that our deliverable to you is of significant value.
Tags : 
godfrey, lead management system, lead-generating communications, lead processing, lead reporting
    
Godfrey
Published By: Godfrey     Published Date: Oct 24, 2008
Why are podcasts important? First, podcasts are another innovative way for B2B marketers to communicate directly with their target audiences. Second, podcasts allow marketers to deliver fresh, authentic content, to humanize their companies, to position their companies as thought leaders and to encourage creative thinking. And third, podcasts are becoming the "medium of choice" for customers and prospects who want information fast — in an easily digestible format.
Tags : 
godfrey, organic search, paid search, offline communications, search engine performance, search engine optimization, pay-per-click advertising
    
Godfrey
Published By: Godfrey     Published Date: Oct 24, 2008
With the constantly-changing media landscape and the growing demand for media communication via 2.0 channels, you need to reconsider both your news and the vendor partners on whom you rely to distribute it. It could mean the difference between a purposeful, engaging and long interactive life for even the "smallest" news item, and a costly yet low-impact news distribution program that saps valuable resources. This white paper tells you some key considerations to help guide your selection process.
Tags : 
godfrey, white paper, b to b, business to business, 2.0, vendor, analytics, brand management, integrated marketing, wire distribution
    
Godfrey
Published By: HP - Enterprise     Published Date: Oct 23, 2008
Fortify's report summarizes electronic as well as traditional methods of voting including absentee ballots.  This voting guide will provide recommendations for voters who want to make sure their vote counts and for federal and state governments on how to devise efficient and accurate voting processes and systems.
Tags : 
fortify, application security, security risks, voting, fortify, fortify software, election process, local government, state government, federal government, privacy, vulnerability voting, election
    
HP - Enterprise
Published By: Waymedia     Published Date: Oct 23, 2008
Millions of  handsets are sold around the world daily. Handsets are by far the preferred platform of communication there is.  People spend more time using their mobile phones than any other device or gadget, and they pay special attention to everything stored in those handsets. In a few words:  If brands want to have a presence in their consumers’ environment, and if they want their message to be heard and seen, then they imperatively need to put some value content on users mobile phones. Mobile marketing is typically understood as SMS Marketing, which is managed from a distant point and it impacts the user at random times.
Tags : 
waymedia, mobile marketing, sms
    
Waymedia
Published By: HP - Enterprise     Published Date: Oct 16, 2008
As the military and US government rely more heavily on custom-built applications for communications and management, they also become more vulnerable to cyber attacks. Worse, according to the Dept. of Homeland Security, the number of attacks on custom-built applications is doubling every year. Learn about critical threats, methods that military and civilian agencies can use to deal with cyber attacks and technologies that improve security for custom-built applications.
Tags : 
security, application security, audit, risk, vulnerabilities, fortify, fortify software, hackers, cyber threats, application security standards, threats, assessment, remediation, department of homeland security, us government, military agency, civilian agency, military
    
HP - Enterprise
Published By: Progress Software BTA Telecommunications     Published Date: Oct 15, 2008
This Assessment Guide helps you to create a high-level overview for each business-critical application, detailing the context of the application, highlighting risk factors and overall effectiveness of each application. This assessment, in turn, will provide a foundation for further investigation and actions to optimize the outcomes of your business-critical transactions and mitigate risk.
Tags : 
soa risks, application risks, integration risks, actional, application assessment, progress software, soa infrastructure, soa security, it governance, soa, soa governance
    
Progress Software BTA Telecommunications
Published By: BlackBerry     Published Date: Oct 12, 2008
The healthcare industry has lagged behind other industry sectors in adopting wireless technologies. Is the problem one of functionality, reliability or suitability to the required tasks? Or, is it simply the conservative nature of healthcare, where a solution must be of proven value and unassail-able virtue before investments are made and policies are changed. This paper examines the characteristics of wireless mobility solutions and considers how effectively these solutions meet healthcare industry requirements.
Tags : 
blackberry, healthcare, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: Sparta Social Networks     Published Date: Oct 10, 2008
This case-study talks about how the Packet8 broadband voice over Internet protocol (VoIP) and video communications service which lets broadband Internet users add digital voice and video communications services to their high-speed Internet connection. Videophone users now account for almost 5 percent of Packet8’s 74,000 lines, and are one of several drivers in the company's quarterly growth, up 54 percent in the most period to $6 million in revenue. Download to learn more.
Tags : 
sparta, social network, packet8, internet protocol (voip)
    
Sparta Social Networks
Published By: Microsoft Office     Published Date: Oct 09, 2008
Living in a connected world, many of the economic and intellectual barriers that once separated the world’s businesses no longer exist. Free trade, growing labor markets, increased capital, and business and technology standards contribute to a worldwide information-based economy. People and businesses work together in ways never before possible. As local economies adapt to this new world of work, certain worldwide trends emerge. These trends define how your company conducts business and how you work with information and other people.Learn more by downloading this paper.
Tags : 
microsoft, office, content management
    
Microsoft Office
Published By: Citrix Online     Published Date: Oct 09, 2008
By 2011, the mobile workforce in the U.S. is expected to reach 120.1 million people. Embracing this trend is more of a question of "how" rather than "if": How will you measure, manage and build relationships with increasingly distributed teams and workers?
Tags : 
collaboration, mobile workforce, mobile workers, expense, travel, citrix online, citrix, communications, streamline, wiki, conferences, collaborative, productivity
    
Citrix Online
Published By: Trend Micro SaaS     Published Date: Oct 08, 2008
Unternehmen verzeichnen gegenwärtig einen dramatischen Anstieg von Spamund E-Mail-Angriffen. Diese Angriffe beeinträchtigen nicht nur die Produktivität der Mitarbeiter, sondern verbrauchen auch wertvolle IT-Arbeitszeit und Infrastruktur-Ressourcen. Diese Bedrohungen können auch Datenlecks und rechtliche Risiken mit sich bringen.
Tags : 
spamund, produktivität, trend, erkennung, sicherheitslösung
    
Trend Micro SaaS
Published By: SECNAP Network Security Corporation     Published Date: Oct 07, 2008
Politics, Religion and Economics exert enormous influence on decision-making and the integrity of IT programs—and often result in sub-par decisions that open the door to malicious intrusion or attack.  Michael Scheidell and his talented technical team know how difficult it can be to create positive change in an organization, even when obvious vulnerabilities exist.  When it comes to navigating the executive suite and undocumented layers of the OSI model, the staff at SECNAP® Network Security have the experience to assist IT management in developing effective strategies to successfully drive security improvements.   Download This Paper Now…
Tags : 
secnap, network security, data security, compliance, osi, malware, antispam, anti-spam, cybercrime
    
SECNAP Network Security Corporation
Start   Previous    155 156 157 158 159 160 161 162 163 164 165 166 167 168 169    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.