Skip to main content
 

sam

Results 176 - 200 of 1169Sort Results By: Published Date | Title | Company Name
Published By: Kenexa     Published Date: Aug 30, 2011
White paper examining the importance of accurately written job descriptions and how they affect an organization with some practical steps to writing effective job descriptions.
Tags : 
kenexa, writing job descriptions, competencies, competency, job role, position descriptions, sample job descriptions, guideline for writing job descriptions
    
Kenexa
Published By: Quest Software     Published Date: Apr 19, 2012
In this Quest white paper, discover best practices for a successful post-migration operation. See why you MUST have the same level of post-migration planning that you had for pre-migration, and learn four key aspects of post-migration management.
Tags : 
scriptlogic, quest, desktop authority, best practices, post-migration, operation, pre-migration
    
Quest Software
Published By: BlueHornet     Published Date: Jun 06, 2008
Applying opt-in email marketing strategies and best practices to transactional emails can be a win-win for customers and marketers. But the two types of communications are not the same. This white paper is written to help email marketers and online retailers understand: What sets transactional emails apart from commercial messages; how they must comply with all federal regulations; and where to take advantage of opportunities to optimize their transactional email program.
Tags : 
email marketing, email messaging, blue hornet, bluehornet
    
BlueHornet
Published By: VMware AirWatch     Published Date: Nov 12, 2015
Es ist noch nicht einmal ein Jahr her, dass analytische Prognosen für den Bereich Mobile Device Management (MDM) nichts Gutes verhießen. Auf einer Veranstaltung im Jahr 2013 verkündete ein Ausschuss von Analysten, dass das BYOD-Phänomen (Bring Your Own Device) zu stark herabgesetzten Preisen führen würde, was wiederum Umsatzeinbußen und schlussendlich den Untergang der gesamten Branche zur Folge haben könnte. "Die Mobile Device Management-Branche befindet sich in einem chaotischen Zustand und ich denke, dieser Markt wird untergehen“, teilte Gartner-Analyst John Girard (laut Bericht von CRN.com) dem Publikum mit. Girard prognostizierte einen Trend zum Management auf Anwendungsebene, verursacht durch das BYOD-Phänomen und die ablehnende Haltung von Mitarbeitern gegenüber dem Management ihrer persönlichen Geräte.
Tags : 
mdm, containerization, security, enterprise mobility
    
VMware AirWatch
Published By: Act-On     Published Date: Aug 28, 2012
You'll improve your marketing results when you target your messaging to segments, rather than blasting the same campaign out to all your prospects. Learn how to segment your prospects into groups with shared needs and concerns.
Tags : 
customer engagement, segmentation, online marketing, segmenting prospects, dynamic content, dynamic segmentation
    
Act-On
Published By: Salesforce     Published Date: Dec 02, 2015
When Salesforce CEO Marc Benioff co-founded the cloud computing company back in 1999, one of the first things he did was define his management process. As he shares in his book Beyond the Cloud, Benioff wanted to put into words what his focus was and then clearly communicate it to the rest of the business. The result was the V2MOM (pronounced “V2 mom”), an acronym that stands for vision, values, methods, obstacles, and measures. Benioff says this system has helped keep everyone at the fast-growing company on the same page over the years. Below are the basic steps of Benioff’s V2MOM system. You can use them to start defining your management process.
Tags : 
    
Salesforce
Published By: Citrix Systems     Published Date: Jan 29, 2013
This paper provides IT executives with guidance to develop a complete BYOD strategy which gives people optimal freedom of choice while helping IT adapt to consumerization - at the same time addressing requirements for security, simplicity and more.
Tags : 
ipad, android, tablet, mobility, byo, smartphone, citrix
    
Citrix Systems
Published By: Thismoment     Published Date: Oct 08, 2014
Content marketing has changed the landscape of brand marketing and digital advertising, so why hasn’t it done the same for rep enablement across your sales and customer support channels? Here are our 4 tips on how to empower your sales reps with better, smarter, real-time, mobile content.
Tags : 
content marketing, content marketing tactics, best practices, rep enablement, sales
    
Thismoment
Published By: NCM Fathom     Published Date: Dec 09, 2011
Content is king online and on screen, right? Then the same must be true for in-person gatherings. Attendance is the key element to a successful event. Read this great guide to getting people to your event.
Tags : 
ncm fathom, business events, attendance, events
    
NCM Fathom
Published By: BlackBerry     Published Date: Apr 13, 2010
The BlackBerry Enterprise Server Express is designed to be a secure, centralized link between an organization's wireless network, communications software, applications, and BlackBerry devices. The BlackBerry Enterprise Server Express integrates with your organization's existing infrastructure, which can include messaging software, calendar and contact information, wireless Internet and intranet access, and custom applications, to provide BlackBerry device users with mobile access to your organization's resources. You can install the BlackBerry Enterprise Server Express on the same server as Microsoft Exchange or Windows Small Business Server, or you can install the BlackBerry Enterprise Server Express on a separate server.
Tags : 
blackberry, server express, microsoft exchange, v5.0.1, administration guide, mobile applications, cio, pim
    
BlackBerry
Published By: BlackLine     Published Date: Aug 06, 2018
The biotechnology and pharmaceutical industry is among the most heavily regulated industries in the world, challenged by evolving regulations, complex compliance requirements and close regulatory scrutiny. At the same time, companies must address the market pressures of globalization, the use of predictive data analytics and digital technologies, and the industry’s ongoing consolidation. In this challenging environment, confidence in internal controls is crucial.
Tags : 
    
BlackLine
Published By: Quocirca     Published Date: Nov 09, 2006
This paper looks at the particular challenges in public sector IT – the need to find efficiency savings at the same time as offering better service to citizens – and discusses the particular circumstances in which blade computing will be right for the public sector IT manager.
Tags : 
blade, blade server, blade servers, government, citizen, constituents, server selection, server implementation
    
Quocirca
Published By: ThreatMetrix     Published Date: Jan 21, 2009
This white paper highlights a surprising new approach to fraud prevention: remotely recognizing a fraudster’s PC (or other device). Even with identity (password/credit card) theft, the device stays the same!
Tags : 
threatmetrix, online fraudsters, identity thieves, fraud prevention, device intelligence
    
ThreatMetrix
Published By: ThreatMetrix.     Published Date: Jan 30, 2009
This white paper highlights a surprising new approach to fraud prevention: remotely recognizing a fraudster’s PC (or other device). Even with identity (password/credit card) theft, the device stays the same!
Tags : 
threatmetrix, online fraudsters, identity thieves, fraud prevention, device intelligence
    
ThreatMetrix.
Published By: Bluecore     Published Date: Sep 27, 2018
Review a sampling of behavioral and catalog triggers as well as personalized batch sends used by a variety of retailers during the holiday season.
Tags : 
bluecore, email marketing, holiday shopping, holiday season
    
Bluecore
Published By: Bluecore     Published Date: Dec 14, 2018
A sampling of marketing campaigns launched by our retail customers that showcase the variety of ways you can engage consumers to create a truly relevant shopping experience.
Tags : 
    
Bluecore
Published By: NCM Fathom     Published Date: Feb 23, 2010
The same elements of powerful storytelling that captivate us in our everyday lives can benefit companies and their brands. NCM Fathom's white paper explores how businesses can tell their story to engage audiences, build brand preference and loyalty and deliver results that meet objectives. Bold companies like Kleenex and Siemens have shared their brand's story with customers and employees in cinemas nationwide. Download the white paper to learn more.
Tags : 
ncm, fathom, revenue, branding, advertising, ad management, digital cinema network
    
NCM Fathom
Published By: Ecessa Corporation     Published Date: Mar 11, 2009
Today’s Wide Area Networks (WANs) are experiencing increased saturation with the deployment of bandwidth-intensive applications, increased numbers of users, and the need for reliable security transmissions. IT personnel responsible for these issues acknowledge the increased congestion and have strived to maintain high levels of network performance. At the same time, IT departments are tasked with the job of lowering the cost of network infrastructure and ongoing operations. Network administrators continually face the challenge of balancing the increased use of critical applications on the Internet, while eliminating downtime and congestion from affecting user quality and day-to-day business operations.
Tags : 
adsl load balancing, vpn load balancing and redundancy, bandwidth aggregation, qos, bandwidth control, bandwidth management, multi-homing, bgp multihoming
    
Ecessa Corporation
Published By: Intralinks     Published Date: Oct 30, 2014
While file sharing proliferates in the enterprise environment, the unsecure and unsanctioned deployment of file sharing technologies poses significant risk to organizations. Extensive new research conducted by Ponemon Institute in North America and Europe, sponsored by Intralinks, reveals that individuals are behaving badly, organizations are addressing the challenges inadequately, and IT professionals feel a loss of control. Here is just a sample of the results: Half of all respondents lack the confidence to deal with risky file sharing practices 62% of respondents accidently sent files to unauthorized individuals outside the organization 70% of organizations do not conduct regular audits to determine if file sharing activities are in compliance with regulations Download this research report now to find out: The extent of the risk associated with unsecure file sharing The individual behaviors driving and organizational responses to information lossThe key considerations for secur
Tags : 
file sharing, enterprise environment, fire sharing technologies, risk to organizations, compliance with regulations
    
Intralinks
Published By: Intralinks     Published Date: Apr 13, 2015
While file sharing proliferates in the enterprise environment, the unsecure and unsanctioned deployment of file sharing technologies poses significant risk to organizations. Extensive new research conducted by Ponemon Institute in North America and Europe, sponsored by Intralinks, reveals that individuals are behaving badly, organizations are addressing the challenges inadequately, and IT professionals feel a loss of control. Here is just a sample of the results: • Half of all respondents lack the confidence to deal with risky file sharing practices • 62% of respondents accidently sent files to unauthorized individuals outside the organization • 70% of organizations do not conduct regular audits to determine if file sharing activities are in compliance with regulations Download this research report now to find out: • The extent of the risk associated with unsecure file sharing • The individual behaviors driving and organizational responses to information loss
Tags : 
    
Intralinks
Published By: Samsung     Published Date: Dec 18, 2015
This eBook provides a few samples of mobile technology in retail so you can find just the right fit.
Tags : 
    
Samsung
Published By: IBM     Published Date: Sep 18, 2008
When bound to regulation and compliance, process manufacturers find opportunities to grow through enterprise resource planning (ERP). However, 50% of process manufacturers execute non-integrated ERP strategies. This Aberdeen Group research study reveals best practices to help you adapt or select an ERP vendor that improves your business performance.
Tags : 
erp, enterprise resource planning, cindy jutras, process, process industry, chemical, food and beverage, food
    
IBM
Published By: Prevero     Published Date: Feb 23, 2018
In vielen Unternehmen werden Planung und Budgetierung nach wie vor im ERP-System oder im Tabellenkalkulationsprogramm durchgeführt. Der Planungsprozess dauert meistens mehrere Monate: Startend beim Strategieprozess werden zentral Planungsmappen erstellt und an die Fachbereiche versendet. Die Controlling- Abteilung sammelt die Daten und verdichtet sie zu einem ersten Planungsstand. Zahlreiche Planungsrunden folgen.
Tags : 
budgetplanung, volatilen, zeiten, meistern
    
Prevero
Published By: IBM     Published Date: Oct 21, 2016
Between the Internet of Things, customer experience and loyalty programs, social network monitoring, connected enterprise systems and other information sources, today's organizations have access to more data than they ever had before-and frankly, more than they may know what to do with. The challenge is to not just understand that data, but actualize it and use it to recognize real business value. This ebook will walk you through a sample scenario with Albert, a data scientist who wants to put text analytics to work by using the Word2vec algorithm and other data science tools.
Tags : 
ibm, analytics, aps, aps data, open data science, data science, word2vec
    
IBM
Published By: Domino Data Lab     Published Date: Feb 08, 2019
As organizations increasingly strive to become model-driven, they recognize the necessity of a data science platform. According to a recent survey report “Key Factors on the Journey to Become Model-Driven”, 86% of model-driven companies differentiate themselves by using a data science platform. And yet the question of whether to build or buy still remains. This paper presents a framework to facilitate the decision process, and considers the four-year projection of total costs for both approaches in a sample scenario. Read this whitepaper to understand three major factors in your decision process: Total cost of ownership - Internal build costs often run into the tens of millions Opportunity costs - Distraction from your core competency Risk factors - Missed deadlines and delayed time to market
Tags : 
    
Domino Data Lab
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.