Skip to main content
 

nic

Results 4101 - 4125 of 4359Sort Results By: Published Date | Title | Company Name
Published By: HP - Enterprise     Published Date: Oct 23, 2008
Fortify's report summarizes electronic as well as traditional methods of voting including absentee ballots.  This voting guide will provide recommendations for voters who want to make sure their vote counts and for federal and state governments on how to devise efficient and accurate voting processes and systems.
Tags : 
fortify, application security, security risks, voting, fortify, fortify software, election process, local government, state government, federal government, privacy, vulnerability voting, election
    
HP - Enterprise
Published By: Waymedia     Published Date: Oct 23, 2008
Millions of  handsets are sold around the world daily. Handsets are by far the preferred platform of communication there is.  People spend more time using their mobile phones than any other device or gadget, and they pay special attention to everything stored in those handsets. In a few words:  If brands want to have a presence in their consumers’ environment, and if they want their message to be heard and seen, then they imperatively need to put some value content on users mobile phones. Mobile marketing is typically understood as SMS Marketing, which is managed from a distant point and it impacts the user at random times.
Tags : 
waymedia, mobile marketing, sms
    
Waymedia
Published By: HP - Enterprise     Published Date: Oct 16, 2008
As the military and US government rely more heavily on custom-built applications for communications and management, they also become more vulnerable to cyber attacks. Worse, according to the Dept. of Homeland Security, the number of attacks on custom-built applications is doubling every year. Learn about critical threats, methods that military and civilian agencies can use to deal with cyber attacks and technologies that improve security for custom-built applications.
Tags : 
security, application security, audit, risk, vulnerabilities, fortify, fortify software, hackers, cyber threats, application security standards, threats, assessment, remediation, department of homeland security, us government, military agency, civilian agency, military
    
HP - Enterprise
Published By: Progress Software BTA Telecommunications     Published Date: Oct 15, 2008
This Assessment Guide helps you to create a high-level overview for each business-critical application, detailing the context of the application, highlighting risk factors and overall effectiveness of each application. This assessment, in turn, will provide a foundation for further investigation and actions to optimize the outcomes of your business-critical transactions and mitigate risk.
Tags : 
soa risks, application risks, integration risks, actional, application assessment, progress software, soa infrastructure, soa security, it governance, soa, soa governance
    
Progress Software BTA Telecommunications
Published By: BlackBerry     Published Date: Oct 12, 2008
The healthcare industry has lagged behind other industry sectors in adopting wireless technologies. Is the problem one of functionality, reliability or suitability to the required tasks? Or, is it simply the conservative nature of healthcare, where a solution must be of proven value and unassail-able virtue before investments are made and policies are changed. This paper examines the characteristics of wireless mobility solutions and considers how effectively these solutions meet healthcare industry requirements.
Tags : 
blackberry, healthcare, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: Sparta Social Networks     Published Date: Oct 10, 2008
This case-study talks about how the Packet8 broadband voice over Internet protocol (VoIP) and video communications service which lets broadband Internet users add digital voice and video communications services to their high-speed Internet connection. Videophone users now account for almost 5 percent of Packet8’s 74,000 lines, and are one of several drivers in the company's quarterly growth, up 54 percent in the most period to $6 million in revenue. Download to learn more.
Tags : 
sparta, social network, packet8, internet protocol (voip)
    
Sparta Social Networks
Published By: Microsoft Office     Published Date: Oct 09, 2008
Living in a connected world, many of the economic and intellectual barriers that once separated the world’s businesses no longer exist. Free trade, growing labor markets, increased capital, and business and technology standards contribute to a worldwide information-based economy. People and businesses work together in ways never before possible. As local economies adapt to this new world of work, certain worldwide trends emerge. These trends define how your company conducts business and how you work with information and other people.Learn more by downloading this paper.
Tags : 
microsoft, office, content management
    
Microsoft Office
Published By: Citrix Online     Published Date: Oct 09, 2008
By 2011, the mobile workforce in the U.S. is expected to reach 120.1 million people. Embracing this trend is more of a question of "how" rather than "if": How will you measure, manage and build relationships with increasingly distributed teams and workers?
Tags : 
collaboration, mobile workforce, mobile workers, expense, travel, citrix online, citrix, communications, streamline, wiki, conferences, collaborative, productivity
    
Citrix Online
Published By: Trend Micro SaaS     Published Date: Oct 08, 2008
Unternehmen verzeichnen gegenwärtig einen dramatischen Anstieg von Spamund E-Mail-Angriffen. Diese Angriffe beeinträchtigen nicht nur die Produktivität der Mitarbeiter, sondern verbrauchen auch wertvolle IT-Arbeitszeit und Infrastruktur-Ressourcen. Diese Bedrohungen können auch Datenlecks und rechtliche Risiken mit sich bringen.
Tags : 
spamund, produktivität, trend, erkennung, sicherheitslösung
    
Trend Micro SaaS
Published By: SECNAP Network Security Corporation     Published Date: Oct 07, 2008
Politics, Religion and Economics exert enormous influence on decision-making and the integrity of IT programs—and often result in sub-par decisions that open the door to malicious intrusion or attack.  Michael Scheidell and his talented technical team know how difficult it can be to create positive change in an organization, even when obvious vulnerabilities exist.  When it comes to navigating the executive suite and undocumented layers of the OSI model, the staff at SECNAP® Network Security have the experience to assist IT management in developing effective strategies to successfully drive security improvements.   Download This Paper Now…
Tags : 
secnap, network security, data security, compliance, osi, malware, antispam, anti-spam, cybercrime
    
SECNAP Network Security Corporation
Published By: Orchid Technologies Engineering & Consulting     Published Date: Oct 07, 2008
As electronic product designs age, component parts become increasingly difficult to obtain.  Component buyers may experience difficulty in obtaining key parts within the design.  Component part prices may increase.  A point comes when component parts begin going end-of-life at an alarming rate.  Quick fixes are no longer sufficient.  Sometimes an OEM will procure a 'life-time' supply of problem parts – but this supply can be quickly wiped out should unforeseen demand develop.  Lack of component parts puts an end to production.There is an alternative.  Profitable, old products can be redesigned.  Either preserving the original form fit and function, or adding new features. Product redesign is a cost effective means by which to extend the life of a marketable product.
Tags : 
orchid technologies, texas instruments, original equipment manufacturers, (oem’s)
    
Orchid Technologies Engineering & Consulting
Published By: BlackBerry     Published Date: Oct 04, 2008
This paper outlines the multitude of benefits that the BlackBerry solution offers to doctors, nurses, support staff and other clinical workers.
Tags : 
blackberry, healthcare, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: DataMotion     Published Date: Oct 02, 2008
This white paper focuses on the need to monitor and manage outbound content, discusses the key drivers that are making it necessary and discusses the steps that an organization should take to mitigate the risks it faces from employee use of communication tools. Also included in this document are brief descriptions of the companies that have co-sponsored it.
Tags : 
certifiedmail, borderware, postini, symantec, workshare
    
DataMotion
Published By: Godfrey     Published Date: Oct 02, 2008
Branding has always been about much more than logos and graphics. It comprises the total experience customers and prospects have with your company. By adding newer, richer choices, today’s new communications technologies – everything from blogs and podcasts to wikis and mobile – are changing the fundamental basis of business-to-business marketing. Almost daily. While some are saying that branding is no longer relevant in that increasingly fragmented media world, we believe branding actually is more important than ever. In fact, it’s critical to your success.
Tags : 
godfrey, b-to-b branding, business-to-business branding, b-to-b branding in web 2.0, b-to-b interactive media, brand guardians, brand ambassadors, media proliferation, brand fragmentation, business-to-business marketing
    
Godfrey
Published By: Godfrey     Published Date: Oct 02, 2008
Differentiation is a business decision made at the highest levels about the company’s positioning and values–how the company adds value to a customer relationship. There are many ways a company can make those decisions, and many different approaches to doing so. The most successful companies adopt a positioning that offers sustainable competitive advantage–a way of adding value that competitors cannot easily duplicate.
Tags : 
godfrey, b-to-b, business-to-business, branding, b-to-b branding, b-to-b differentiation, brand differentiation, branding differentiation, b-to-b brand, b-to-b brand positioning, brand positioning, brand affinity, brand advertising, brand communications, branding research, b-to-b marketer, b-to-b buying process, b-to-b branding program, integration, marketing communications integration
    
Godfrey
Published By: Godfrey     Published Date: Oct 02, 2008
One of the most important questions a company can ask itself is “what is our differentiation?” The reason is simple: it’s how you define yourself in the minds of your customers and beat the competition. Beyond that, it’s what guides business strategy as you face decisions and choices on a daily basis. A company that knows who it is and how it adds value for customers and prospects has a solid foundation for making those decisions. One that has an unclear position or, worse yet, constantly shifts position, has a difficult path in a challenging market. That’s why branding discussions need to go well beyond graphics and touch on the values and identity that are at the core of any successful company.
Tags : 
godfrey, b-to-b, business-to-business, web 2.0, branding, b-to-b branding, b-to-b differentiation, brand differentiation, branding differentiation, b-to-b brand, b-to-b brand positioning, brand positioning, brand affinity, brand advertising, brand communications, branding research, b-to-b marketer, b-to-b buying process, b-to-b branding program, integration
    
Godfrey
Published By: Godfrey     Published Date: Oct 02, 2008
A key difference between consumer and business-to-business branding is the influence of selling channels, including sales reps, dealers and distributors. While many consumer products are also sold through a channel, the marketer generally reaches past the channel with branding messages, relegating the channel to the status of a local point of sale. By contrast, in many B-to-B markets, the local dealer or distributor really “owns” the end customer and can control access and communications to and from the customer.
Tags : 
godfrey, b-to-b, business-to-business, branding, b-to-b branding, b-to-b brand, distribution, b-to-b distribution, channels, distribution channels, b-to-b distribution channels, branding and distribution, distributors, dealers, brand, b-to-b marketer, b-to-b buying
    
Godfrey
Published By: Godfrey     Published Date: Oct 02, 2008
It’s not unusual for business-to-business companies to cut communications budgets when faced with uncertain times like economic downturns, mergers/acquisitions, reorganization, significant competitive threats, technology changes and the like.And yet, it is precisely these situations in which communications that support the brand are most helpful. If there’s ever a time when you need the strength, continuity, and support of a healthy brand, it’s when there’s uncertainty.
Tags : 
b-to-b branding, business-to-business branding, b-to-b branding in web 2.0, b-to-b interactive media, brand guardians, brand ambassadors, media proliferation, brand fragmentation, business-to-business marketing
    
Godfrey
Published By: Quocirca     Published Date: Oct 01, 2008
The internet has grown rapidly from a random collection of mainly academic networks and military control and routing protocols into a global, integrated and sophisticated commercial utility. No longer simply an 'Information Superhighway', it has extended to embrace voice telephony, video and mobile communications as part of a converged network. Connection options and services have expanded, with opportunities for internet service providers (ISPs) to add value beyond simply forwarding bit and bytes.
Tags : 
quocirca, isp, isps, internet service provider, convergence, ip telephony, voip
    
Quocirca
Published By: CA WA 2     Published Date: Oct 01, 2008
Virtualization and clustering can bring many benefits to your business—better IT asset utilization, improved business continuity and improved operational efficiency. At the same time, virtualization can create a new level of complexity for IT. This white paper describes some of the technical challenges inherent in managing these complex environments and recommends strategies for successful deployment that will maximize the value of virtualization technology in your organization.
Tags : 
virtual, virtual machine, virtual storage, virtual server, virtualization, ca wa, ca wa 2
    
CA WA 2
Published By: Mimecast     Published Date: Sep 30, 2008
Today, email management is not only a filing and storage challenge. Because law firms and attorneys must be equipped to take control of litigation, email authenticity must be unquestionable with strong chains of custody, constant availability, and tamper-proof security. This white paper summarizes the author's experiences of litigating in fractured environments, particularly as they pertain to email. Learn the 12 steps that will help you gain control of your electronically stored data.
Tags : 
mimecast, saas, email solutions, evidence, security, email managemeng, archiving, ediscovery, mailbox, compliance
    
Mimecast
Published By: VMware Dell     Published Date: Sep 29, 2008
This technical report will discuss the installation and configuration of Site Recovery Manager with the Dell EqualLogic PS Series storage arrays. It will cover setup, testing, failover, failback and troubleshooting. This document is designed to be used in conjunction with the Administrator Guide for Site Recovery Manager and assumes a prior knowledge of VMware Virtual Infrastructure.
Tags : 
vmware, dell, equallogic, site recovery, disaster recovery, iscsi, windows server, microsoft, data protection
    
VMware Dell
Published By: Microsoft Office SharePoint Server     Published Date: Sep 29, 2008
In this white paper, explore the Microsoft® communication and collaboration platform and see how it offers a flexible solution set to businesses of all types.
Tags : 
microsoft, sharepoint, collaboration, business process, microsoft sharepoint, sharepoint server
    
Microsoft Office SharePoint Server
Published By: Microsoft Office SharePoint Server     Published Date: Sep 29, 2008
Enterprise search has been a service in one form or another on the Microsoft intranet for more than a decade. With the release of Microsoft® Office SharePoint® Portal Server 2003, the landscape for enterprise search at Microsoft began to change. This became the foundation for the current solution, the Enterprise Search feature provided in Microsoft Office SharePoint Server 2007. Read more about the enhancements of this feature in this technical white paper.
Tags : 
microsoft, sharepoint, microsoft office, search, database search, dba, database
    
Microsoft Office SharePoint Server
Published By: LogRhythm     Published Date: Sep 26, 2008
LogRhythm, the leader in Log and Security Event Management Solutions, has prepared a "Quick Read" whitepaper to help you understand what's required to ensure compliance with: CIP- 003-1 – Cyber Security – Security Management controls; CIP- 005-1 – Cyber Security – Electronic Security Perimeter(s); CIP- 006-1 – Cyber Security – Physical Security of Critical Cyber Assets; CIP -007-1 – Cyber Security – Systems Security Management; CIP -008-1 – Cyber Security – Incident Reporting and Response PlanningThe whitepaper also contains a compliance reference chart with the specific CIP requirements matched with recommended steps to ensure compliance.
Tags : 
nerc, nerc cip, nerc cip requirements, critical cyber assets, electronic security perimeter, critical cyber assets, compliance, comply, security, information technology, information security management, log management, log analysis, log collection, log analyzer, log tool, logrhythm, security event management, web logs, log collection
    
LogRhythm
Start   Previous    158 159 160 161 162 163 164 165 166 167 168 169 170 171 172    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.