web

Results 251 - 275 of 4229Sort Results By: Published Date | Title | Company Name
By: Sitecore     Published Date: Oct 12, 2015
This new report outlines the must-have functionality to look for in a content management system so you’re able to deliver customer experiences with agility and precision. It explains the evolving definition of “web content management” and charts nine key capabilities to investigate.
Tags : wcm, customer experience, cmx, content management, marketing, mcm
     Sitecore
By: Websense     Published Date: Jan 25, 2013
Increasing one's awareness of today's mobile security risks and understanding the options for solutions are two key steps in preparing for best security practices. In addition, this article discusses mobile security solutions and much more.
Tags : mobile security, solutions, websense, mobile security, solutions, major it security strategy, security, it management, data management
     Websense
By: Websense     Published Date: Aug 23, 2012
This mobile security white paper outlines the essential steps for mobile security.
Tags : mobile security, websense, mobile device management, mdm, malware, anti spyware, security management, web service security
     Websense
By: Adaptive Planning     Published Date: Apr 18, 2011
Register to view an informative webinar and learn how easy it can be to create exceptional value through FP&A in 2011.
Tags : adaptive planning, fp&a processes, higher education, nonprofits, strategic value, performance management, cross-fund reports, revenue reporting
     Adaptive Planning
By: Adaptive Planning     Published Date: Dec 06, 2011
Are you getting as much value as you can out of your budgeting, forecasting, monthly reporting, and what-if scenarios? Are they integrated and aligned? Are they really creating strategic value? Join us for an informative webinar and learn how easy it can be to create exceptional value through FP&A in 2012.
Tags : adaptive planning, nonprofit, finance, fp&a, budget, business decisions, value, reporting, forecasting
     Adaptive Planning
By: Adaptive Planning     Published Date: Apr 18, 2011
Join us for an informative webinar and learn how easy it can be to create exceptional value through FP&A in 2011.
Tags : fp&a, adaptive planning, insurance, loss and seating ratio, amortization of premiums, budgeting, forecasting, revenue stream
     Adaptive Planning
By: Adaptive Planning     Published Date: Dec 05, 2011
Join us for an informative webinar and learn how easy it can be to create exceptional value through FP&A. You will hear case studies describing how leading insurance companies worldwide have been able to move beyond Excel and save time, enhance companywide collaboration, and improve business decisions - ultimately resulting in higher revenues and profits. And you'll also see a demo of how Adaptive Planning's award-winning software creates value for insurance companies.
Tags : finance, business, budget, insurance firms, fp&a, adaptive planning, revenue, profit, expenses
     Adaptive Planning
By: Cleversafe     Published Date: Mar 29, 2013
Cloud applications and web-based services, such photo sharing sites, create some monumental challenges for a storage infrastructure.
Tags : raid, cloud storage, storage, replication, capacity, bandwith, efficiency, web applications, backup and recovery, network attached storage, storage management, storage virtualization, application integration, application performance management, best practices
     Cleversafe
By: Gleanster Research     Published Date: Aug 30, 2013
Supercharge your online shop! By combining the First Spirit CMS and IBM WebSphere Commerce you get the freedom and flexibility you need to establish a meaningful and personalized consumer experience across almost any touch-point. That means more flexibility and more revenue.
Tags : 
     Gleanster Research
By: LogMeIn     Published Date: Mar 01, 2012
This brief case study illustrates how Sling Media's transition to a remote support solution with web-based chat realized a substantial cut in session times and an increase in customer satisfaction.
Tags : customer service, integrated support, customer support, cusomter solutions, live chat, chat support, call center management, customer interaction service, customer relationship management, customer satisfaction, ebusiness
     LogMeIn
By: Akamai Technologies     Published Date: May 05, 2017
Everybody has their favorite apps…but can you name even three mobile websites you like? Probably not – and that’s because retrofitting desktop web designs fails to meet users’ mobile expectations. Yet in spite of that, smartphone traffic is at its highest point ever and will only continue to increase. This report, written by Forrester analysts, outlines why it’s time for a radical web reset and how you can make your mobile website a “first-class citizen.” Download it today.
Tags : mobile applications, ebusiness, web design, web traffic, mobile websites
     Akamai Technologies
By: Akamai Technologies     Published Date: Aug 17, 2017
Everybody has their favorite apps. But can you name even three mobile websites you like? We can’t. it’s because responsive retrofits to 20-year-old desktop web designs fail to serve us in our mobile moments of need. That’s a shame because even with lousy sites, web traffic around the world will be majority-mobile by 2019. eBusiness pros have a choice: hand your mobile moments over to a bunch of apps you don’t own, or do a radical reset of your mobile web strategy. This report carries the evidence to convince your company to make your mobile website a firstclass citizen.
Tags : mobile, app, web design, media
     Akamai Technologies
By: WatchGuard Technologies     Published Date: Apr 20, 2011
This white paper examines five steps to better security that today's retail businesses can't afford to ignore on their networks - from application control to data loss prevention - to ensure business continuity and PCI DSS compliance.
Tags : watchguard xcs, security for retailers, zeus botnet, web security, web content filtering, https inspection, data loss prevention, targeted attacks, web applications, pci dss 2.0, spear phishing, application control, drive-by download, malicious activity, network security solutions, business continuity, application security, firewalls, identity management, network security appliance
     WatchGuard Technologies
By: IBM     Published Date: Oct 09, 2009
Succeeding in today's economy not only means utilizing technology to create intelligent, instrumented and interconnected solutions, but leveraging technology to optimize costs and do more with less. This brochure describes how the 3 key attributes of IBM's application foundation help deliver higher quality of service at a lower cost than JBoss.
Tags : websphere application server, ibm, jboss, application foundation, open source, tco, configuration, oss, total cost of ownership, web sphere, configuration management
     IBM
By: Taleo     Published Date: Nov 11, 2010
Podcast interview with Gerry Crispin of CareerXroads and Peter Clayton of Total Picture Radio on how recruiters are using Web 2.0 technologies to recruit, brand, collect data, and strategize new avenues in today's talent landscape.
Tags : talent management, human capital management, hcm, integrated, integration, visibility, integrate, alignment, employee performance, quality of hire
     Taleo
By: IBM     Published Date: Apr 18, 2012
This webcast features a conversation with Tom Lentz, Manager of IT and Finance for the Facilities Department at The Johns Hopkins Hospital in Baltimore, MD/USA. During this Webcast, Axendia Industry Analyst Daniel Matlis discusses with Mr. Lentz how The Johns Hopkins Hospital uses its Integrated Asset and Service Management solution to improve uptime to support patient care; control costs for procurement, maintenance, labor and materials; support regulatory compliance activities; and use workflow capabilities for internal controls.
Tags : healthcare, johns hopkins, cost, asset management, service management, ibm
     IBM
By: IBM     Published Date: Apr 27, 2012
During this Webcast, Axendia Industry Analyst Daniel Matlis discusses with Mr. Lentz how The Johns Hopkins Hospital uses its Integrated Asset and Service Management solution to improve uptime to support patient care; control costs for procurement, maintenance, labor and materials; support regulatory compliance activities; and use workflow capabilities for internal controls.
Tags : healthcare, ibm, labor, maintenance, patient care
     IBM
By: Entrust Datacard     Published Date: Jun 29, 2017
Customers are the ones in control. And they give their business to the businesses keeping pace. To learn how you can keep pace, get a sneak peek into the upcoming webinar – “The Bottom Line About Instant Card Issuance” by downloading the new insight infographic.
Tags : 
     Entrust Datacard
By: AcquireWeb     Published Date: Jan 22, 2007
This article addresses one of the biggest challenges associated with e-mail marketing programs – establishing meaningful contact with customer targets in order to increase sales, while protecting and enhancing your brand. It illustrates that successful e-mail marketing designed to drive sales and build brands requires adopting a methodology that includes more precise prospect targeting, better permission-based models, a better overall consumer experience and better quality lists.
Tags : email marketing, best practices, permission marketing, brand management, direct marketing, newsletter design, acquireweb, integrated marketing, e-mail, acquisition e-mail, lead generation, e-mail marketing, e-mail appending, acquirelocal, local marketing, local store marketing, restaurant marketing, franchise marketing, acquisition marketing
     AcquireWeb
By: MuleSoft     Published Date: Nov 27, 2018
IT teams across industries face growing pressure to deliver projects faster while reducing costs. All too often, dated legacy systems hinder IT’s ability to accomplish either of these objectives. Legacy systems can also slow the speed at which IT can deliver new projects to support the business. For these reasons, legacy modernization has emerged as a key strategic imperative. But where should organizations start? One large global bank provides a detailed blueprint for how large enterprises can do so. Read this legacy modernization blueprint to learn: The bank’s legacy modernization strategy, and how they used Anypoint Platform Best practices for modernizing legacy SOA web services How to think about re-architecting monolithic applications into microservices The role that APIs play in driving an effective legacy modernization strategy
Tags : 
     MuleSoft
By: AWS     Published Date: Dec 17, 2018
Watch this webinar to learn best practices from Zaloni for creating flexible, responsive, and cost-effective data lakes for advanced analytics that leverage Amazon Web Services (AWS).
Tags : 
     AWS
By: KEMP Technologies     Published Date: Aug 04, 2008
Today’s small-to-medium sized businesses (SMB) are undergoing the same IT evolution as their enterprise counterparts, only on a smaller scale. For SMBs, website reliability, flexible scalability, performance and ease of management are as essential to SMB website infrastructure as they are to an enterprise. It’s fare to say that these capabilities are an important operational imperative for businesses of all sizes.
Tags : load balancer, load balancing, application delivery, ssl acceleration, application optimization, windows terminal services, terminal services, content switching, server load balancing, application security, network security, kemp, kemp technologies, servers, small business networks, application performance management
     KEMP Technologies
By: Webroot Inc     Published Date: Sep 09, 2016
This guide will examine a number of mitigation strategies that will help protect your organizations’ data from crypto-ransomware attacks. Crypto-ransomware is no longer an annoyance. It’s a highly persistent and organized criminal activity with Ransomware as a Service (RaaS) at its core.
Tags : security management, web service security
     Webroot Inc
By: LogicNow     Published Date: Mar 10, 2016
Cyber crime is one of the most innovative businesses in existence today – and make no mistake, it is a business. This guide looks at how cyber crime has evolved and continues to evolve - and the necessity now of taking a user-focused approach to network security. If you’re in the business of helping your customers businesses stay secure – or if you’re thinking about it
Tags : logicnow, web protection, cyber crime, cyber security, security, best practices, enterprise software, risk management
     LogicNow
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search White Papers      

Add White Papers

Get your company's white papers in the hands of targeted business professionals.