ods

Results 326 - 350 of 622Sort Results By: Published Date | Title | Company Name
Published By: LockLizard     Published Date: Dec 08, 2008
This paper explains what components make up a document security solution and which one is right for you.  It covers the use of encryption, copy protection, digital rights management and document collaboration as the methods available to protect information.
Tags : 
locklizard, document security, encryption, copy protection, digital rights management, document collaboration
    
LockLizard
Published By: LockLizard     Published Date: Dec 09, 2008
NetMasterClass, as with all advanced elearning providers, have to be able to offer their training courses at any time with total availability – across the Internet.  NetMasterClass have made a significant investment in the development of proprietary training methods and techniques and have already experienced having their IPR stolen and made publicly available.
Tags : 
locklizard, netmasterclass, elearning, security, drm, return on investment, elearning security, protect
    
LockLizard
Published By: ATG, Inc.     Published Date: Oct 07, 2010
This 24-page study, aggregates the results of six large online companies (three retailers and three leading airlines), to measure the cost and ROI of these contact methods.
Tags : 
atg, roi, customer retention, contact management, online chat, click to call
    
ATG, Inc.
Published By: Crowdcast     Published Date: May 12, 2010
Find out how Crowdcast Collective Intelligence Platform helps companies align decision-making and understand and reduce risks associated with developing and launching new products and on-going operations.
Tags : 
crowdcast, cpg, collective intelligence, packaging, price, acceptance rate, manufacturing
    
Crowdcast
Published By: Savvis     Published Date: Jul 07, 2010
In addition to keeping the Hallmark.com site up during huge traffic spikes experienced during critical business periods, Savvis is helping Hallmark stay on the leading edge by supporting initiatives to expand upon its line of innovative new digital products and services.
Tags : 
savvis symphony, managed infrastructure, outsourcing
    
Savvis
Published By: SAS     Published Date: Oct 18, 2017
With enhanced regulatory pressure, banks must continuously evaluate their risks. To meet these demands, the AML industry has turned to analytical/statistical methodologies to reduce false-positive alerts, increase monitoring coverage and reduce the rapidly escalating financial cost of maintaining their AML programs. An effective AML transaction monitoring strategy includes segmenting the customer base by analyzing customer activity and risk characteristics in order to monitor them more effectively. This paper explains how to blend both quantitative and qualitative methods to tune scenarios to identify the activity that poses the most risk to the bank.
Tags : 
    
SAS
Published By: NetIQ     Published Date: Dec 08, 2011
In this webcast IT security expert Matt Mosley will look at traditional detection methods and discuss discuss new alternatives to identify threats.
Tags : 
    
NetIQ
Published By: VMware     Published Date: Sep 12, 2011
This white paper highlights an architectural design for a 50,000-seat VMware View architecture created by NetApp, VMware, Cisco, Fujitsu, and Wyse. Explore how the project demonstrates the most reliable methods for deploying a scalable and easily expandable environment, anywhere from 5,000 to 50,000 seats.
Tags : 
vmware, desktop virutalization, shared storage, connection servers, netapp, vsphere, end-user, desktop management
    
VMware
Published By: IBM     Published Date: Aug 08, 2012
Your goal is clear-produce high-quality goods while optimizing resources at every step of production. And in today's uncertain economy, cost-control efforts may never have been more important. Unscheduled downtime because of equipment failure can have a serious impact on your organization's bottom line. Download this white paper from IBM, and learn the basics of predictive maintenance, the benefits it provides manufacturing operations and the underlying technologies that make it possible. Predictive analytics helps you in a number of ways: identify when equipment is likely to fail or need maintenance and take action to maximize uptime and reduce future warranty claims costs; optimize allocated labor resources and spare part inventories, helping eliminate undue maintenance, prevent downtime and reduce inventory costs; and determine why certain production runs fail more often than others, identify the cause and analyze whether those runs warrant a recall.
Tags : 
ibm, technology, manufacturing, predictive maintenance, productivity, minimize downtime, reduce costs, white paper
    
IBM
Published By: IBM     Published Date: Aug 10, 2012
This brief video shows how advanced analytics can incorporate survey methods designed to help you with every aspect of survey research - everything from gathering the data, to data analysis, to reporting.
Tags : 
survey data, ibm, business analytics, ibm spss, patient satisfaction, analytics solutions
    
IBM
Published By: SAP     Published Date: May 11, 2012
Both business and IT leaders will learn: . Why midmarket organizations may have some requirements for BI and analytics programs . How to navigate the many options available, and the pros and cons of various deployment styles . Easy methods and techniques to get started with BI at midmarket organizations . Practical steps and best practices for midmarket BI programs
Tags : 
midmarket, midmarket business intelligence, smb, small company, small business, medium sized company, medium sized business, intelligence trends
    
SAP
Published By: VASCO     Published Date: Jul 12, 2012
In recognizing the evolution of the authentication market and the demand for more convenient, portable, and cost-effective methods of adding security to all online applications, VASCO has embarked on a mission to add authentication on any platform, at any time, for any application. Read more to find out how to transform multi-factor authentication from "something you have" to "something you already have."
Tags : 
vasco, cloud computing, technology, saas applications, authentication, security
    
VASCO
Published By: Limelight Networks     Published Date: Mar 02, 2018
Today, digital security is top-of-mind. From the boardroom to the backroom, everyone is asking the same questions, “How do we protect our digital experiences? How do we ensure our website is safe for our visitors? How do we make sure that no one can steal our content?” But safeguarding a digital experience isn’t a one-size-fits-all solution. It often involves multiple techniques and layers of security. From verifying your identity (with HTTPS) to encrypting sensitive data to restricting access and protecting multimedia content, you must approach security in a layered manner, employing multiple means and techniques to protect the digital content through which your audience interacts. This paper explores ten different methods and technologies that an organization can employ to protect its content. This multi-layered approach can effectively protect your digital content, ensure high availability, and maintain superior quality of experience for every digital visitor. You’ll learn: 10 s
Tags : 
    
Limelight Networks
Published By: Vindicia     Published Date: Sep 23, 2014
Vindicia has witnessed numerous best practices working with innovative digital businesses and noticed that companies that communicate the most effectively tend to follow three key practices consistently. This ebook give you three essential communication practices.
Tags : 
communication lifecycle, social network, communication practices, recurring billing, customer communication, consumers, digital goods, promotional offers
    
Vindicia
Published By: Vindicia     Published Date: Sep 23, 2014
Vindicia sheds light on the factors that affect the selection of business models, including pricing, packaging, and promotions and shares insights about how the way you bill customers can affect revenue today.
Tags : 
digital services, subscription, freemium, microtransactions, digital business model, digital subscription, subscription submodels, subscription best practices
    
Vindicia
Published By: Cornerstone OnDemand     Published Date: Feb 22, 2016
For many small to medium size companies, finding the time to proactively manage employee performance is difficult. The emphasis is more often on increasing revenues and achieving stability, especially in the early days. However, as businesses grow, the need for improving staff engagement, productivity and loyalty becomes increasingly important. It is at this critical stage that Performance Management can mean the difference between businesses that experience sustained growth and those whose momentum falters. Even when organisations are aware of the importance of Performance Management, the tendency is to carry it out in an ad hoc manner. Such methods work with a low headcount, but as this increases, more formal processes are needed. 6 Steps to Performance Management Best Practice offers a practical guide for small and medium enterprises (SMEs) that have identified Performance Management as part of their long term growth strategy. Drawing on industry research, client case studies and
Tags : 
management, productivity, performance, growth, employee, human resources
    
Cornerstone OnDemand
Published By: Intel Security     Published Date: Jan 20, 2015
Companies of all sizes with multiple remote locations can benefit from plug-and-play next-generation firewalls. Traditional methods can take a long time to implement and can prove expensive. With plug-and-play deployments, on the other hand, you save money, conserve resources, reduce the likelihood of errors, and get single-pane-of-glass centralized management.
Tags : 
plug-and-play firewall, firewall deployment, easy firewall deployment, ngfw, next generation firewall, firewall roll-out, firewall replacement, firewall upgrade
    
Intel Security
Published By: LiveHive     Published Date: Jan 20, 2015
In today’s online and social driven world the power has shifted from the seller to the buyer. Only 47% of information used during the purchase decision comes from the supplier. This decline in face to face selling has led to a rise in screen to screen interaction. For sales reps there’s now a need to not only communicate through digital content, but also to understand the impact of the materials they share. It’s a new era and sales reps require new tools to keep up with it. This whitepaper will show you how your sales reps can employ new methods to find out how much a prospect knows, how interested and engaged they are, and where they are in the buying process. All in real time!
Tags : 
digital listening, accelerate sales, purchase decision, digital content, buying proces
    
LiveHive
Published By: ThreatTrack Security     Published Date: May 21, 2015
Watch this webinar for a discussion on: • Advanced threats and their potential points of entry • Why Advanced Targeted Attacks will continue to confound organizations with even the best defenses • Methods, practices, and technologies to help quickly detect and respond to these advanced attacks
Tags : 
advanced threats, advanced targeted attacks, security, cybersecurity
    
ThreatTrack Security
Published By: Storiant     Published Date: Apr 30, 2015
Emerging storage vendors offer data center managers and storage administrators new antidotes for their storage challenges. This research details five companies that provide innovative storage capabilities via new architecture and deployment methods, and looks back at two past Cool Vendors.
Tags : 
storage technologies, it storage vendors, storiant, storage infrastructures, automated storage
    
Storiant
Published By: Affirm     Published Date: Jan 05, 2016
This article will help merchants understand the new payment options companies offer, when and why consumers use each, and why merchants might consider offering them to increase consumer delight and maximize sales.
Tags : 
affirm, payment, sales, ecommerce, conversions, sales
    
Affirm
Published By: LogRhythm     Published Date: Feb 22, 2018
The traditional approach to cybersecurity has been to use a prevention-centric strategy focused on blocking attacks. While prevention-centric approaches do stop many threats, many of today’s advanced and motivated threat actors are circumventing these defenses with creative, stealthy, targeted, and persistent attacks that often go undetected for significant periods of time.
Tags : 
    
LogRhythm
Published By: Fitbit     Published Date: Mar 21, 2017
If you’re like most wellness professionals, marketing communication is your most important “side job.” From figuring out when to send emails, identifying the right methods, to designing your communications calendar – it can be a challenge. View this webinar to hear from a leading consumer marketer and learn how to harness best practices that you can use in your day-to-day role. Fitbit’s Head of Lifecycle Marketing, Steven Marjon, will show you: - Tested best practices for communications - How to set up different communications tracks for onboarding new employees - Tools and resources to gauge the effectiveness of your communications
Tags : 
    
Fitbit
Published By: Zebra Technologies     Published Date: Aug 09, 2018
The exponential growth of omnichannel shopping and ever-burgeoning demand for faster merchandise deliveries is redefining the supply chain’s distribution of consumer products goods. A seminal shift in how shoppers increasingly buy via multiple touch points — online from desktop computers, mobile devices and in-store — has created the need for the “smarter” warehouse to serve today’s connected consumer. As retailers look to merge their brick-and-mortar and online operations to cut costs and boost efficiency, warehouse management systems must keep pace. For this report, Zebra Technologies analyzed the state of the warehousing marketplace among firms in the US and Canada with at least $15 million in annual revenues. The online survey asked IT and operations personnel in the manufacturing, retail, transportation and wholesale market segments to share their insights and business plans over the next five years, in light of a rapidly changing industry.
Tags : 
fulfillment, vision, study, technology, manufacturer
    
Zebra Technologies
Published By: Epson     Published Date: Jan 10, 2019
Since the earliest days of the industry, insurance companies have faced a never-ending struggle: processing the voluminous amount of paperwork that underwriting, claims, and compliance require. But the days of enduring the burdens caused by mountains of paper can become a distant memory. By investing in new, proven methods of converting paper documents to readable digital formats, insurance organizations can fully automate document processing to accelerate workflows, minimize processing times and enable more efficient operations.
Tags : 
    
Epson
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search Offers      
Get your company's offers in the hands of targeted business professionals.