ca sm

Results 1701 - 1725 of 1848Sort Results By: Published Date | Title | Company Name
Published By: Korenix Technology     Published Date: Aug 03, 2010
This white paper describes the surveillance video multicasting technology, highlights the benefits of IGMP as well as its integration in Korenix devices for assuring high quality video communication in surveillance applications.
Tags : 
igmp, igmp snooping, igmp query, ip surveillance, video surveillance, video multicast, video multicasting, video transmission
    
Korenix Technology
Published By: GoToMeeting     Published Date: Jul 08, 2011
In this eBook, you'll find dozens of proven best practices when it comes to generating more referrals and a systematic referral process you can follow to keep a steady stream of new business flowing in and your referral engine running smoothly and efficiently.
Tags : 
citrix, sales, referral engine, systematic referral process, profit builders, referral team, effortless networking, laser introduction
    
GoToMeeting
Published By: SAS     Published Date: Apr 16, 2015
ITS technology is a general term. Two common and related forms of ITS communication technology using event stream processing are referred to as vehicle-to-vehicle (V2V) and vehicle to-infrastructure (V2X) in the US, and car-to-infrastructure (Car2X) in Europe. The two types of connected-car research and development programs often overlap and can be integrated. Car2X enables vehicle communication with the road transportation infrastructure and provides the ability to send or receive local information about traffic conditions, geo-markers (e.g. to identify pothole locations), road hazards, alerts, safety vehicles, etc. V2V focuses on connected-car technology and the anonymous communication of sensor data continuously transmitted to and from cars. Using event stream processing, this streaming data enables the real-time synthesis of information to communicate what will improve and promote driver safety, reduce crashes, and improve vehicle transportation efficiency.
Tags : 
    
SAS
Published By: we are cloud     Published Date: Sep 02, 2010
When it comes to acquiring business intelligence (BI) capabilities, many small and medium-sized businesses (SMBs) have traditionally been at a disadvantage. Here are 10 ways for them to capture value from their data.
Tags : 
smbs, data management, dashboarding, business intellignce
    
we are cloud
Published By: Visendo     Published Date: Sep 09, 2010
This whitepaper explains how SMBs can improve their mail security and increase their efficiency when storing, scanning, filtering emails with minimum investment and Visendo innovative email suite.
Tags : 
pop3 connector, antispam filter, anti-phisihing, email security for smbs
    
Visendo
Published By: Axios Systems     Published Date: Sep 16, 2010
Choosing a Service Desk or ITSM solution? Read this whitepaper first - authored by Sharon Taylor, Chief Architect of ITIL V3.
Tags : 
itil whitepaper, choosing itil tools, itil toolsets, it service catalog, itsm tool upgrade, service management systems
    
Axios Systems
Published By: HRMC     Published Date: Sep 23, 2010
HRMC Acclaim is a unique talent acquisition SaaS platform that uses artificial intelligence to automate the decisioning and selection process, and starts with an immediate interview rather than a cold, flat resume request.
Tags : 
applicant, recruiting, staffing, applicant processing, applicant evaluation, assessment, selection, hiring
    
HRMC
Published By: Fastarfunding     Published Date: Nov 25, 2010
When choosing an online accounts receivable factoring company to provide small business financing, there are several items to consider. Online factoring companies vary significantly in what they offer and how much they charge
Tags : 
invoice factoring, accounts receivable factoring, california factoring services, factoring company, small business factoring
    
Fastarfunding
Published By: Red Hat     Published Date: Jan 20, 2011
In this session, attendees will explore the new features of Red Hat Enterprise Linux 6 performance. John Shakshober (Shak) will share the scalability optimizations for larger SMP systems, > 1TB of memory, new transparent hugepage support, multi-q network performance of 10Gbit and Infiniband, and KVM enhancements that went into Red Hat Enterprise Linux 6. Shak will also share benchmark data from industry standard workloads using common applications such as database servers, Java engines, and various financial applications on the latest Intel and AMD x86_64 hardware.
Tags : 
red hat, enterprise, linux 6 performance, memory, storage, database servers
    
Red Hat
Published By: Online Tech     Published Date: Jan 18, 2011
Characteristics of Co-location for Small to Medium Sized Businesses ©
Tags : 
colocation, michigan colocation, small business colocation, michigan data centers
    
Online Tech
Published By: Quocirca     Published Date: Feb 28, 2011
How automation can help small and mid-sized businesses manage expenses
Tags : 
finance, mobility, expenses
    
Quocirca
Published By: Xolido Systems     Published Date: Mar 09, 2011
Free desktop application to e-Sign, Smart verify and TimeStamp documents and files
Tags : 
    
Xolido Systems
Published By: MicroStrategy     Published Date: Aug 21, 2019
Ready or not, the future is here. For enterprise organizations, it must be a data-driven one. Whoever can use technology to transform the customer experience, and be the first to discover and deliver on new business models, will be the disruptor. Those who can’t, the disrupted in this period known as the “era of Digital Darwinism.” The future belongs to the Intelligent Enterprise which anticipates constantly evolving regulatory, technological, market, and competitive challenges and turns them into opportunity and profit. It delivers a single version of the truth and agility. It connects to any data and distributes reports to thousands. The Intelligent Enterprise goes beyond business intelligence, delivering transformative insight to every user, constituent and partner. Are most organizations there yet? As brands hone and focus their 2020 (and even 2030) vision, MicroStrategy has surveyed 500 enterprise analytics professionals on the state of their organization’s analytics initiatives.
Tags : 
    
MicroStrategy
Published By: Integrated Research     Published Date: Apr 13, 2011
"How to be a Sustainable IT Hero: Building a Business Case for PC Power Management" explains the benefits of implementing a PC Power Management solution, and shows how to avoid the common pitfalls along the way.
Tags : 
energy management software, power management, pc power management, power management software, computer power management, green technology, how to save electricity, save power
    
Integrated Research
Published By: GMS Inc     Published Date: May 18, 2011
Insights into the service and support offerings of GMS and business software providers alike
Tags : 
accounting, causes, charity, community, consultants, donation, donations, donorexpress
    
GMS Inc
Published By: Hitachi ID     Published Date: Jun 09, 2011
Over the years, password management software has evolved from a simple self-service web application to reset forgotten passwords to a complex platform for managing multiple authentication factors and encryption keys.
Tags : 
password reset, authentication management, proliferation of passwords, locked-out users, mobile users and cached passwords, full disk encryption, user enrollment and adoption, privileged accounts and passwords
    
Hitachi ID
Published By: TriNet     Published Date: Jan 22, 2013
The word “venture” in the phrase “venture capital” is a romantic euphemism for risk. But that’s not to say that every new startup business is a “gamble.”
Tags : 
trinet, 6 vcs weigh in, ipo
    
TriNet
Published By: CA Technologies     Published Date: Jul 06, 2011
Written by Malcolm Fry, this whitepaper is based on the service life cycle approach to service management and it provides a great foundation to organisations who want to reduce risk and gain maximum benefit from cloud computing.
Tags : 
ca. service management, it service management, cloud-computing, cloud, servicedesk, itsm, private-cloud, cloud computing
    
CA Technologies
Published By: KeyedIn Solutions     Published Date: Feb 02, 2012
This paper will first outline the challenges of ERP selection and implementation and then offer practical advice and critical success factors to make sure your ERP process is smooth and effective.
Tags : 
erp, saas, software, implementation, keyedin, keyed in
    
KeyedIn Solutions
Published By: Adaptive Planning     Published Date: Oct 19, 2011
Grounded in extensive research, Reinventing the CFO outlines seven critical roles--from streamlining redundant processes to regulating risk to identifying a few key measures--that CFOs must take on to transform the finance operation successfully. Challenging many of the finance field's accepted practices and systems, this bold book revolutionizes the role of financial managers and frees them to make smart, ethical, strategic decisions that add real value to the firm.
Tags : 
adaptive, marketry, cfo, harvard review, business, finance, finance operations
    
Adaptive Planning
Published By: Dell Storage     Published Date: Aug 14, 2012
Engagement with customers online has evolved from novelty to necessity, with an estimated $202 billion spent in 2011 and projected 10% growth to $327 billion in 2016, according to Forrester Research. Businesses are maneuvering to connect with the growing pool of online customers, but the move to eCommerce brings new security risks with the exchange of sensitive consumer information, including cardholder data and personally identifiable information that can enable identity theft. At stake is reputation of brand, ongoing access to merchant credit lines, and substantial penalties and remediation in the event of a breach. This white paper elucidates the aspects of PCI DSS (Payment Card Industry Data Security Standards) compliance that must be considered when choosing a secure environment for servers involved in eCommerce. Whether deciding to outsource or keep data hosting in-house, any company collecting, storing or transmitting customer cardholder data needs to be compliant, and this document helps pinpoint the specific concerns and standards a company should be aware of when choosing how to keep their data secure. Understanding requirements and best practices for security policies and procedures, physical safeguards, and security technologies is essential to establishing cardholder data security and meeting QSA and SAQ audit requirements.
Tags : 
pci, compliant, data, centers, engagement, connect, ecommerce, compliance
    
Dell Storage
Published By: Tririga     Published Date: Nov 14, 2011
Take a look at this white paper to find out how asset and integrated workplace management can help create smarter buildings!
Tags : 
sustainable, operations, business, integrated, resources, consumption, competitive advantage
    
Tririga
Published By: Allscripts     Published Date: Sep 09, 2014
Download this case study to learn how Family Medical Center in Seymour, Indiana increased revenue, patient visits and attained incentives with Allscripts.
Tags : 
ehr replacement, electronic medical record replacement, electronic medical record, electronic health record, electronic health record replacement, ehr ambulatory practice, ehr physician practice, ehr practice
    
Allscripts
Published By: HP and Intel® Xeon® processors     Published Date: May 08, 2012
In this on-demand webinar, join Eric Pelletier, System Architect with HP Networking, as he discusses how to reduce power consumption as you design your network, buy networking gear, and during network operation.
Tags : 
media rich applications, media rich, applications, smb, networking, power, power consumption, network operations
    
HP and Intel® Xeon® processors
Published By: Urban Airship     Published Date: Jun 20, 2012
Push is a permission-based, staggeringly powerful mobile customer communication channel. Learn the "7 Rules of Good Push", in this useful primer, from Urban Airship, the world's largest provider of push messaging. A must-read for marketers everywhere!
Tags : 
push, push communications, push messaging, push notifications, mobile communications, smartphone alerts, smartphone push, push messages
    
Urban Airship
Start   Previous    60 61 62 63 64 65 66 67 68 69 70 71 72 73 74    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.