fte

Results 1676 - 1700 of 1739Sort Results By: Published Date | Title | Company Name
Published By: Catalyst SF     Published Date: Apr 30, 2008
This white paper is intended to provide an overview of the mobile marketing options available to marketers today. It is designed for the person who wants an entry level perspective on the platform. Ultimately, this document is meant as a starting point in your pursuit for greater understanding of emerging media options, in this case mobile. After reading, you should have some idea of how to proceed to explore digital marketing for your brand.
Tags : 
catalyst, mobile marketing, mobile, cell, cell phone, smart phone
    
Catalyst SF
Published By: Astrocom     Published Date: Apr 23, 2008
The Domain Name System (DNS) is a hierarchical system that provides the IP addresses that correspond to a given Fully Qualified Domain Name (FQDN, often called a hostname or domain name). At the top of the tree structure are thirteen “root” Domain Name Servers that have the primary and secondary IP addresses of the DNS Authorities for all domains on the Internet.
Tags : 
dns, ip networks, networking, network management, powerlink, astrocom
    
Astrocom
Published By: Netwrix     Published Date: Apr 22, 2008
Password practices that improve security are by their nature burdensome to the user, resulting in passwords difficult to remember which are often changed about the same time they have finally become memorized. Yet password security remains a cornerstone of system security: as much as 80% of security breaches take place not through arcane hacking and virus attacks, but through system infiltration facilitated by use of a password.
Tags : 
netwrix, authentication, passwords, password management, identity theft, fraud, login
    
Netwrix
Published By: Burton Group     Published Date: Apr 08, 2008
In this Methodologies and Best Practices document, Burton Group Research Director Daniel Blum recounts customer perspectives on the anti-malware battlefield playing out at the enterprise level. The document explores lessons learned, and what keeps customers awake at night even after good defensive strategies are in place. The Reference RFI alone is valuable for those switching anti-malware products, or seeking new ones.
Tags : 
burton group, best practices, malware, security, email security, network security, content filtering
    
Burton Group
Published By: Ektron     Published Date: Apr 08, 2008
As the Internet evolves, users become more and more savvy about what they want from the experience. Web sites are updated daily when they used to change monthly, and social networking sites such as Facebook and Myspace are checked more often than e-mail. Users know what they want and where to get it.
Tags : 
intranets, ektron, facebook, myspace, user experience, twitter, social networking, support, infrastructure
    
Ektron
Published By: AcquireWeb     Published Date: Apr 07, 2008
This article, published by Target Marketing in April 2008, examines principles and practices associated with acquisition e-mail, which also apply to CRM programs, that are often overlooked by marketers when building their e-mail strategies. These fundamentals serve as strategies to consider and employ to yield higher response rates and a more effective e-mail marketing effort.
Tags : 
acquireweb, acquisition email, email marketing, integrated marketing, e-mail, acquisition e-mail, lead generation, e-mail marketing, e-mail appending, acquirelocal, local marketing, local store marketing, restaurant marketing, franchise marketing, acquisition marketing
    
AcquireWeb
Published By: Quocirca     Published Date: Mar 20, 2008
After years of uncontrolled growth, many data centers face a crisis as they run into space and power constraints. While remedies exist, present business practices do not encourage the prioritization of power reduction within one of the most power hungry areas of a business — the data center.
Tags : 
quocirca, scalability, power, data centre, data center, servers, network management, it management, ups
    
Quocirca
Published By: CopiaTECH     Published Date: Mar 18, 2008
Words like “integrated” and “centralized” have been used to describe application software solutions for some years now, often because of marketing messaging that implies more interoperability than the given technology can actually provide to the business customer. The terms are broad enough to be almost meaningless in some instances. In the field of IT security, the sheer range of tools and techniques in the hacker or virus writer’s armory that one must guard against has driven up the number of solutions required to prevent attacks.
Tags : 
copiatech
    
CopiaTECH
Published By: Adaptive Growth     Published Date: Mar 12, 2008
ERP system acquisition projects are rarely deemed to fail.  All the well-advertised failures come later, during implementation and afterward.  Nevertheless, the seeds of these failures are invariably planted in the earliest stages of ERP acquisition planning.
Tags : 
erp, adaptive growth, project management, enterprise applications, enterprise resource planning, adaptivegrowth
    
Adaptive Growth
Published By: Salesforce.com     Published Date: Mar 11, 2008
This 34 page guide readies you for a Salesforce Mobile rollout. Salesforce Mobile helps your mobile teams succeed by keeping them in touch with the latest data, whenever and wherever they need it, directly from mobile devices. With Salesforce Mobile, field professionals are prompted to log information directly in Salesforce or AppExchange apps immediately after important customer calls, emails, and appointments, so critical information is logged in near real time.
Tags : 
salesforce, crm, customer relationship management, sales tools, collaboration, smart phones, blackberry, appexchange, salesforce mobile
    
Salesforce.com
Published By: IBM     Published Date: Feb 25, 2008
Transitioning to a green data center and optimizing operating efficiency can be a complex undertaking. There are multiple components to factor into the equation—and best results can often be achieved by integrating improvements from multiple fronts. The good news is that IBM can provide many solutions and techniques to support such a transition.
Tags : 
green, environment, environmental, compliance, cost, green strategy, datacenter, data center, ibm, it management
    
IBM
Published By: IBM     Published Date: Feb 25, 2008
In preparation for disasters, it’s critical to have a backup site that can be used if your primary location goes down. Does your business have the right procedures and equipment to recover after a disaster? Get answers. Download this article about a new enterprise data center and learn more about protecting your IT infrastructure.
Tags : 
disaster recovery, business continuity, preparedness, natural disaster, redundancy, hurricane, backup, recovery, data management, ibm, ibm opt it, opt it, hurricane fay
    
IBM
Published By: APC     Published Date: Feb 19, 2008
Cooling for IT wiring closets is rarely planned and typically only implemented after failures or overheating occur. Historically, no clear standard exists for specifying sufficient cooling to achieve predictable behavior within wiring closets. An appropriate specification for cooling IT wiring closets should assure compatibility with anticipated loads, provide unambiguous instruction for design and installation of cooling equipment, prevent oversizing, maximize electrical efficiency, and be flexible enough to work in various shapes and types of closets. This paper describes the science and practical application of an improved method for the specification of cooling for wiring closets.
Tags : 
apc, power, cooling, it wiring, heat removal, green computing
    
APC
Published By: Elastic Collision     Published Date: Feb 14, 2008
Media coverage of Second Life typically favors the opinions of industry analysts and naysayers. All too often, the concerns of regular users are overlooked. In October 2007, as part of a larger survey, we asked more than 800 Second Life residents what advice they would give to real-world organizations establishing a presence in Second Life.
Tags : 
elastic collision, virtual, virtual world, virtual reality, sims, avatar, avatars, social networking
    
Elastic Collision
Published By: IBM     Published Date: Feb 08, 2008
Throughout the industrialized world, healthcare systems are in crisis. Aging populations and skyrocketing costs are putting unprecedented financial and organizational pressure on healthcare providers and payers. The result is often a decreasing level of care. In response, fundamental changes are taking place. Patient-centric systems are evolving in which the patient's well-being and the responsibility for good health are defining treatment and operational policies.
Tags : 
health, healthcare, medical, medical records, patient, patient records, hipaa, customer-centric, medicine, hospital, hospitals, ibm
    
IBM
Published By: Motorola     Published Date: Feb 06, 2008
Striving to exceed expectations of clients in 44 countries requires Russell Investment Group associates to remain accessible to clients and each other no matter where they are. That includes availability before and after "regular" office hours in every region of the world. Unfortunately, their former mobility solution wasn't getting the job done.
Tags : 
motorola, motorola good, case study
    
Motorola
Published By: SAP     Published Date: Feb 05, 2008
Take a look at how organizations are taking strides to align business strategy with actual initiatives, projects, and daily activities - in short, to close the gap between strategy and execution. Studies show that even well-formulated plans often fall short; here's how to change that.
Tags : 
sap, enterprise performance, strategy management, managing initiatives
    
SAP
Published By: Accelerance     Published Date: Feb 01, 2008
Companies exploring offshore software development often find an overwhelming array of options. For example, is India the best choice? What about China, Russia or Brazil? Time, distance and language barriers also make it difficult to assess the quality of offshore developers. How can businesses reduce the risks of offshoring?
Tags : 
offshoring, vendor selection, offshore, outsource, outsourcing, india, development, developer, programming, programmer, accelerance, software development
    
Accelerance
Published By: ESET     Published Date: Jan 30, 2008
Spam looks like a simple enough issue until you have to try to define it: after all, we all think we know it when we see it. Most people have a working definition along the lines of “email I don’t want.” While that’s perfectly understandable, it is difficult to implement technical solutions based on such a subjective definition. Read this paper to learn why SPAM is more than just unwanted email.
Tags : 
malware, threats, email, threat summary, viruses, eset, antivirus, nod32, internet threats, web-borne threats, phishing, trojans, spam, attacks, exploits, computers, malicious software, spam solution, email spam
    
ESET
Published By: Secure Computing     Published Date: Jan 25, 2008
Enterprises are increasingly opening up their networks to a greater constituency of remote users, but they often do not take into consideration the protection of user identity as a critical component of their strategy. The mobile workforce can now work productively from a remote location such as a home office, the airport, a hotel, or a customer site.
Tags : 
cell phone, cell phones, wireless security, mobile security, mobile workers, authentication, 2-factor authentication, iam, identity management, access control, securecomputing, secure computing, remote access
    
Secure Computing
Published By: Vendor Guru     Published Date: Jan 16, 2008
Small businesses are faced with a difficult task when it comes to selecting or upgrading their telecommunications system. Very often, companies will conduct research based on their current size and where they project they will be in a year.
Tags : 
voip, ip telephony, voice over ip, small business, soho, vonage, packet 8, vendor guru, vendorguru, telecom, telecommunications, phone, phone system, ip pbx, ippbx, pbx, telephone, voip
    
Vendor Guru
Published By: Everest Software     Published Date: Jan 11, 2008
After maxing out on Quickbooks, Gunther Gifts needed a software solution that could support their growth and enable complete integration across inventory, accounting, purchasing and sales. Download this paper to read about their results.
Tags : 
business management, small business, mid-sized business, smb, smbs, soho, productivity, erp, software integration, integration, business integration, cost control, growth, accounting, inventory, everest, everest software
    
Everest Software
Published By: WebEx Communications     Published Date: Dec 14, 2007
The Internet is revolutionizing technical support. But, this efficiency often comes with a price in customer satisfaction. Customers expect to be able to solve their own problems or immediately communicate with a person who can make things right. But too often, these expectations aren't met. What's needed is a new class of software: web-based Automated Contact Distribution.
Tags : 
remote support, contact management, customer, customer service, customer support, online support, online help desk, help desk, crm, webex
    
WebEx Communications
Published By: Borer Data Systems Ltd.     Published Date: Nov 07, 2007
Developed by Borer in conjunction with AND-Group, the CruSafe software and hardware system provides a state-of-the-art safety system specifically developed to address the key requirement for real-time tracking of personnel. AND CruSafe is a state-of-the-art safety system which has been specifically developed to address the key requirement for real-time tracking of personnel (often known as POB- Personnel On Board). CruSafe has already been proven to reduce muster times by 70%.
Tags : 
security, security management, access control, identity management, iam, authentication, crusafe, and-group, tracking, workforce, workforce management, employee management, borer, crusafe, and group, borer, borer data systems, access control, locker, locker management
    
Borer Data Systems Ltd.
Published By: eGain     Published Date: Oct 12, 2007
The Internet, years after its emergence, continues to be a challenge for most organizations. This paper examines the notion of eService and the need for it in large, global organizations in particular. It also provides guidelines for developing an effective eService plan, and concludes with a discussion of the most significant benefits of implementing such a plan.
Tags : 
eservice, customer service, online customer service, online help, helpdesk, help desk, e-service, online support, online assistance, global support, egain
    
eGain
Start   Previous    56 57 58 59 60 61 62 63 64 65 66 67 68 69 70    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.