esi

Results 2776 - 2800 of 3139Sort Results By: Published Date | Title | Company Name
Published By: Siperian     Published Date: Jan 24, 2007
Master Data Management is a cohesive strategy for managing all master data domains.  Where is your organization most likely to derive business value from a Master Data Management solutions?  This report answers these questions and details the path forward:  Adaptive Master Data Management.
Tags : 
data management, master data management, mdm, business intelligence, data integration, data quality, siperian
    
Siperian
Published By: Avalere     Published Date: Apr 02, 2007
Companies struggle with cleanly separating an employee, contractor or consultant with their company and critical information.  Avalere enables companies to review how information has been used prior to an employee’s departure in order to protect the company and the employee.
Tags : 
data protection, employee performance, fired, employee departure, employee quit, employee resigned, access control, avalere
    
Avalere
Published By: Campaigner     Published Date: Jan 08, 2007
This white paper is designed to educate you about the main obstacles that can prevent your email from reaching a recipient’s inbox; and the simple tactics that you can implement to avoid these obstacles.
Tags : 
email deliverability, email marketing, email, email filtering, customer reach, customer relationship management, got corp, got corporation
    
Campaigner
Published By: Campaigner     Published Date: Jan 08, 2007
Email marketing is by far the best way to attract interest in, build desire for, and generate sales of your products and services. Without a well-managed opt-in email list, you can say goodbye to your email marketing investment. This white paper provides powerful tactics to help you grow bigger, better and more relevant opt-in lists - and turn your Web browsers into buyers.
Tags : 
email marketing, opting in, opt in, opt-in, email lists, list rentals, ebusiness, return on investment, conversion rate, conversion, got corp, got corporation
    
Campaigner
Published By: LANDesk     Published Date: Feb 12, 2007
This paper shows how LANDesk Process Manager can allow you to design processes once, automate them everywhere and refine them as needed - saving money, ensuring compliance and keeping even the most complex processes running reliably.
Tags : 
it management, productivity, change management, project management, groupware workflow, automating it, it automation, process management, landesk
    
LANDesk
Published By: Indigo Rose Corporation     Published Date: Feb 14, 2007
Designed to empower both software developers and non-developers alike, AutoPlay Media Studio 6.0 brings advanced multimedia development abilities to business users, video producers, educators, content distributors, and anyone with an intermediate level of computer knowledge.
Tags : 
enterprise applications, sales & marketing software, multimedia software, multimedia studio, indigo rose
    
Indigo Rose Corporation
Published By: Indigo Rose Corporation     Published Date: Feb 14, 2007
Setup Factory 7.0 is the result of over a decade of experience in creating software installation tools. Unlike other installer builders that require week-long training courses in order to get up to speed, Setup Factory was designed to be fast and easy to use.
Tags : 
software development, software installer, installer, indigo rose
    
Indigo Rose Corporation
Published By: Indigo Rose Corporation     Published Date: Feb 14, 2007
There is simply no easier way to make compact, professional quality patches for your software and electronic content. Visual Patch 2.0's point-and-click design workflow takes the difficulty out of building even complex full-history patches.
Tags : 
sofware development, patch, updates, binary patches, indigo rose
    
Indigo Rose Corporation
Published By: Infor     Published Date: Feb 27, 2007
SupplyWEB® is an advanced, web-enabled Supply Chain Management and Execution solution from Infor. It is designed to reduce supply chain costs, reduce inventory and increase operational efficiencies. It delivers significant ROI by increasing supplier visibility, enabling inter-enterprise communication,and providing a high level of systems integration.
Tags : 
supply chain management, scm, operations, manufacturing, edi, erp, enterprise resource planning, roi, return on investment, kanban, supplier managed inventory, supplier relationship, procurement, infor
    
Infor
Published By: Infor     Published Date: Feb 27, 2007
In order to align their production plans with customer's demand, metal fabricators must integrate seamlessly into the customer's own processes. As a result, integrated systems are essential, bringing design, product lifecycle management and service together in ways that predict, act and rapidly change in accordance with the customer's needs.
Tags : 
productivity, customer experience management, supply chain management, scm, business process management, bpm, manufacturing, metal, infor
    
Infor
Published By: AKS-Labs     Published Date: Mar 20, 2007
Business professionals lack essential information about real-life metrics and information on how to build a Balanced Scorecard, which supports weights and scores, which allows calculating the performance values. This whitepaper is a Balanced Scorecard design toolkit, which contains some "how-to" ideas.
Tags : 
balanced scorecard, business analytics, business metrics, business intelligence, business integration, customer satisfaction, enterprise resource planning, scorecard, aks-labs, aks labs
    
AKS-Labs
Published By: CCSS     Published Date: May 01, 2008
IT Managers are not in the business of luck. They need to prepare for every disaster scenario, every contingency and ensure that even when every object, job and process is running 100% perfectly on the system, some other unforeseen network element doesn't swoop in and ruin all their efforts, just because it resides outside the parameters of the System i. After all, in a situation like this, people remember the one thing that went wrong – not the millions of things that went right – it's unfortunate, but that's life.
Tags : 
network, network management, network monitoring, ccss
    
CCSS
Published By: Gold Lasso     Published Date: Jul 13, 2007
Since the introduction of e-mail as a viable marketing and communications vehicle, the focus has shifted from a "one size fits all" model to content that is relevant and specific to the intended recipient. This paper reviews general concepts behind personalization, further investigates its advantages, discusses the challenges to personalizing campaigns and provides solutions to overcome the challenges.
Tags : 
personalization, newsletter design, content personalization, return on investment, email marketing, ebusiness, ecommerce, e-commerce, customer relationship, crm, gold lasso
    
Gold Lasso
Published By: Perimeter     Published Date: Jul 17, 2007
Read this interesting comparison about designing an intrusion defense strategy that identifies the value of business processes, and implements appropriate strategies to protect these systems using a layered defense approach is not only a good security practice, but also a regulation in many cases.
Tags : 
ids, intrusion defense, intrusion prevention, firewall, security, compliance, layered security, ips, perimeter, perimeter esecurity, security software, malware, trojan
    
Perimeter
Published By: ProofSpace     Published Date: Jul 31, 2007
This paper details the processes by which ProofMark tags electronic records with a self-validating cryptographic seal that acts as a "tamper indicator" based on a true and provable time-reference datum.  With this it is able to provide instantaneous and irrefutable proof of authenticity, no matter where the data resides or who has controlled it.
Tags : 
proofspace, proofmark, proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography, public key cryptography, time stamp, timestamp, time and data stamping, file authentication, x9.95, accredited standards committee x9, x9.95-compliant, transient key technology, timestamp
    
ProofSpace
Published By: COMDOM Software     Published Date: Aug 09, 2007
This paper provides an overview of costs of spam facing large organizations, such as multinational enterprises, universities, and governments, as well as small and medium sized businesses that own or operate networks used by employees and other end users.
Tags : 
spam, bayesian, filter, filtering, block, blocking, spamming, phishing, total cost of ownership, tco, messaging, email, email security, mail server, mail servers, comdom, comdom software
    
COMDOM Software
Published By: InsideCRM.com     Published Date: Nov 05, 2007
Shopping for a contact-center solution can be confusing and frustrating, so let us do the leg work for you! This easy-to-use guide compares the major vendors offering contact-center solutions today, including Genesys, Oracle, Verizon and many others.
Tags : 
software, call center, call center software, contact center, contact center software, genesis, oracle, verizon, contactual, interactive intelligence, crm, customer relationship management, insidecrm, inside crm
    
InsideCRM.com
Published By: Ultimus     Published Date: Aug 16, 2007
Windows Workflow Foundation (WF) and the Ultimus BPM Suite compliment each other. WF can be used to extend the capabilities of Ultimus by performing specialized services. The Ultimus BPM Suite can be invoked by WF activities to perform workflows that are not simple and require extensive and robust human-centric capabilities.
Tags : 
ultimus, bpm, business process management, automation, bpa, productivity, bpm basics, profitability, business process modeling, modeling, workflow, enterprise, enterprise applications, microsoft, sharepoint
    
Ultimus
Published By: Interactive Intelligence     Published Date: Feb 21, 2013
Comfort & Security in the Cloud - Read this white paper to learn how communications as a service delivers superior technology stability and resiliency. Learn about the world of the contact center and the technology today that offers richness and more
Tags : 
comfort and security in the cloud, white papers, learn communications, call centers, caas. communications as service, interactive intelligence
    
Interactive Intelligence
Published By: OneNeck IT Services     Published Date: Aug 24, 2007
"Service to our gym owners is our number one priority," said Linda Mason, Vice President of IT for The Little Gym International. "This clearly drove our decision-making process in searching for an outsourcer." Learn why OneNeck was their number one choice for outsourcing their IT services.
Tags : 
oneneck, erp hosting, erp outsourcing, it outsourcing, it hosting, baan, microsoft dynamics ax, fusion, outsourcing, governance, outsource, the little gym
    
OneNeck IT Services
Published By: AT&T     Published Date: Jun 25, 2008
To maximize investments in mobile technology, companies must be able to measure productivity gains from mobile working. Professor Marco Iansiti of the Harvard Business School and Jay Jamrog, Senior Vice President of Research with the Institute for Corporate Productivity, offer advice.
Tags : 
productivity, mobility, mobile technology, mobile technologies, pda, at&t
    
AT&T
Published By: AT&T     Published Date: Jun 25, 2008
Class of Service (CoS) functionality can help optimize network performance. For a successful deployment, network designers should identify all applications, understand requirements associated with each application, designate appropriate mapping for groups of applications and provide mechanisms in the underlying network to deliver CoS. CoS mapping and deployment are important; adhering to tested strategies and avoiding common misconceptions helps IT managers advance optimization across the wide area network.
Tags : 
class of service, service management, traffic management, bandwidth, at&t, att, network performance management
    
AT&T
Published By: AT&T     Published Date: Jun 25, 2008
Whether you’re implementing new technologies, upgrading existing infrastructure or evaluating current needs, consultants can help you identify and document the gap between your current situation and a desired future state. When an assessment is done correctly, it can provide a solid foundation for successful implementation and improvement. The consultant first interviews stakeholders, analyzes data, and compares your business against best practices or specific industry competitors.
Tags : 
consulting, consult, consultant, management, expert, expertise, guidance, implementation, at&t, att
    
AT&T
Published By: AT&T     Published Date: Jun 30, 2008
A leader in its industry, adidas America recognized that it could increase its sales potential by automating many components of the sales process. Tim Oligmueller, sales force automation manager for adidas America, wanted to reduce the number of calls from sales representatives in the field to check on product availability, enabling them to capture "at-once" business and show customers that the company is on the cutting edge not only in footwear and apparel design, but also in customer service.
Tags : 
sales force automation, salesforce automation, salesforce, blackberry, sales automation, business analytics, inventory, inventory management, wireless, mobile workforce, mobile sales force, outside sales, at&t, att, at&t wireless
    
AT&T
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
Chartered in 1973, San Francisco-based Spectrum Federal Credit Union serves over 12,000 members. When the issue arose on how to protect their members’ personal data residing on backup tapes, Spectrum FCU took no chances – they and their Techical Advisory Board made the decision to encrypt this important information with the help of NeoScale Systems, an undisputed leader in this emerging market.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management, key management for enterprise, effective encryption key management, key management system, information security, protecting offsite tape storage, disaster recovery, data privacy regulations, backup tapes, security appliance, data security, secure key management, wire-speed encryption
    
Neoscale Systems, Inc.
Start   Previous    105 106 107 108 109 110 111 112 113 114 115 116 117 118 119    Next    End
Search Offers      
Get your company's offers in the hands of targeted business professionals.