independent

Results 226 - 250 of 310Sort Results By: Published Date | Title | Company Name
Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
Independent Oracle User's Group insights survey report
Tags : 
    
Oracle PaaS/IaaS/Hardware
Published By: LeapFrog Interactive     Published Date: Jul 09, 2009
Integrated campaigns involving both traditional and digital marketing channels have demanded that brands utilize multiple agencies when executing a marketing campaign. To seamlessly combine all of these independent agencies, brands need to utilize agency summits, meetings that help get all sides to collaborate, cooperate, and create as a single unit rather than act as rival agencies.
Tags : 
leapfrog, agency, coordination, cooperation, marketing, advertising, campaign, digital
    
LeapFrog Interactive
Published By: Semphonic     Published Date: Jun 11, 2009
A Microsite is an independent, focused website subsidiary to a larger, parent website. Its marketing, branding, and Search/Viral potential has been increasingly recognized by marketing and website managers, but measurement and analysis of a Microsite’s effectiveness requires analytical strategies and approaches that differ from the analysis of the parent website. Learn more today!
Tags : 
microsite, microsites, semphonic, independence, integration, saturation, directionality, lifetime contribution
    
Semphonic
Published By: IBM     Published Date: Apr 04, 2013
Virtualization has moved to the forefront of many organizations’ IT agendas, because it reduces both the number of physical servers required and the associated costs. This independent study by the International Technology group found IBM PowerVM more cost-competitive over time, compared to VMware, in terms of IT costs and the costs of downtime.
Tags : 
powervm, x86 based virtualization, performance, independent servers, association costs, it costs
    
IBM
Published By: OutSystems     Published Date: Nov 07, 2014
New research conducted for OutSystems by independent research company Opinion Matters uncovers key mobile trend statistics. The study polled US and UK enterprises and found that organizations are currently struggling with a significant mobile backlog and unable to cope with business demands. Download this report today and learn about the key findings from this study.
Tags : 
mobile apps, it statistics, mobile trend statistics, mobile app backlog, it management, knowledge management
    
OutSystems
Published By: IBM     Published Date: Oct 01, 2013
The IBM PureFlex System TCO Analysis Tool was developed independently by leading ROI developer Alinean, Inc. This Analysis tool compares the total cost of ownership for the IBM PureFlex Solution versus a traditional dedicated or virtualized IT infrastructure by collecting information about the current computing needs and then projects the TCO for the two alternatives.
Tags : 
ibm, ibm pureflex, ibm pureflex system, tco, tco analysis, ibm pureflex system tco analysis tool, total cost of ownership, it management
    
IBM
Published By: IBM     Published Date: Jan 10, 2014
The IBM PureFlex System TCO Analysis Tool was developed independently by leading ROI developer Alinean, Inc. This Analysis tool compares the total cost of ownership for the IBM PureFlex Solution versus a traditional dedicated or virtualized IT infrastructure by collecting information about the current computing needs and then projects the TCO for the two alternatives.
Tags : 
pureflex, pureflex system, enterprise, pureflex, pureflex system, enterprise virtualization, ibm pureflex, system platform
    
IBM
Published By: IBM     Published Date: Apr 22, 2014
Researched and compiled independently by Chartis, the RiskTech100® evaluates and ranks the world’s most influential risk technology providers based on a range of criteria. IBM retains its top position in the 2014 RiskTech® 100 rankings with top scores for functionality, market presence and innovation. The Chartis report is acknowledged globally as one of the most comprehensive and prestigious studies of risk technology vendors. The report also tracks key trends and developments in the risk technology marketplace. Read the report to learn how IBM can support your risk and compliance efforts to drive business performance and better outcomes.
Tags : 
ibm, chartis, risktech100, risk technology, risk technology vendors, security, risk, compliance
    
IBM
Published By: Kapost     Published Date: Jan 16, 2014
Over the past 10 years, the Internet has provided unprecedented access to information. Consequently, B2B buyers are constantly online learning about industry trends and innovative solutions to their pain points. Given their busy schedules, buyers have grown accustomed to the convenience of researching and comparing multiple options online, narrowing their choices independently of the vendor and, only then, engaging with sales. While buyers have always made the final purchase decision, in today’s world, the vendor is not given an opportunity to engage until the buyer is close to a choice. Today, the buyer is in control of their own journey.
Tags : 
content marketing, content strategy, content management, content planning, content distribution, marketing campaigns, marketing campaign management, content marketing platform
    
Kapost
Published By: Cisco     Published Date: Apr 08, 2015
Most large organizations address network security with an army of tactical point tools like firewalls, VPN gateways, IDSs/IPSs, network proxies, malware sandboxes, web and e-mail gateways, etc. This messy array of independent technologies was adequate ten years ago, but now presents a plethora of operational, policy enforcement, and monitoring challenges. Worse yet, network security defenses are becoming less and less effective at blocking targeted and sophisticated threats and advanced malware attacks.
Tags : 
next generation, firewall, malware, threat, complexity, costs, visibility, protection
    
Cisco
Published By: Cisco     Published Date: Apr 10, 2015
The Cisco Intelligent WAN (IWAN) solution provides design and implementation guidance for organizations looking to deploy wide area network (WAN) transport with a transport-independent design (TID), intelligent path control, application optimization, and secure encrypted communications between branch locations while reducing the operating cost of the WAN. IWAN takes full advantage of cost-effective transport services in order to increase bandwidth capacity without compromising performance, reliability, or security of collaboration or cloud-based applications.
Tags : 
cisco, wan, iwan, network transport, path control, cloud computing
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
Nemertes Business Value Analysis independently evaluates technology products and services to identify the value to enterprise organizations. Through detailed interviews with technology professionals who use the products or services, Nemertes analyzes and quantifies the real-world benefits and improvements to the efficiency of their organizations.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
In the last few months, WR has observed that the SX10 has found its way into offices and small meeting rooms of many of our enterprise consulting clients. In some cases, the SX10 was the first Cisco video product ever installed in those environments. This prompted us to take a closer look at this system. This document contains the results of WR’s independent, third-party testing, and our overall opinions of the Cisco TelePresence SX10 Quick Set group video conferencing system.1
Tags : 
    
Cisco
Published By: HP Enterprise Services     Published Date: Mar 24, 2014
HP helped plan and deliver secure, next generation infrastructures for Kraft Foods Inc.’s launch as two independent public companies. Read how this fast-paced drive toward business agility through client virtualization and a versatile cloud architecture lowered operational costs, increased efficiencies, and improved resource control; giving the two giant “start-ups” the ability to be immediately productive.
Tags : 
disaster recovery, business continuity, recovery services, resiliency services, recovery-as-a-service, cloud continuity, data center
    
HP Enterprise Services
Published By: Riverbed     Published Date: Jun 02, 2015
The transition to a hybrid environment has created challenges in optimizing application performance because the primary compute location has shifted and become distributed. Learn to ease these challenges adapt to transitions.
Tags : 
hybrid network, cloud infrastructure, increase reliability, reduce costs, hybrid networking
    
Riverbed
Published By: Optimizely     Published Date: Sep 28, 2015
In Optimizely’s independent survey of digital channel owners with Dimensional Research, we observed an emerging set of behaviors that indicate sophisticated optimization being done by teams actively running A/B and multivariate experiments. These teams are doubling down on the people and processes needed to accelerate the development of their optimization programs. The result? Faster business benefits and in greater orders of magnitude.
Tags : 
a/b testing, customer experience, sophisticated optimization, optimization programs
    
Optimizely
Published By: Cisco     Published Date: Dec 19, 2016
NSS Labs performed an independent test of the Cisco Firepower 8120 with NGIPS v6.0 and Advanced Malware Protection v5.3.2016071117. The product was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Breach Detection Systems (BDS) Test Methodology v3.0, available at www.nsslabs.com. This test was conducted free of charge and NSS did not receive any compensation in return for Cisco’s participation.
Tags : 
    
Cisco
Published By: DocuSign     Published Date: Apr 24, 2018
"With every eSignature vendor claiming they are “eiDAS compliant”, you should equip yourself with the right level of knowledge to filter through what is right for your business. Download the whitepaper to learn why it is important choose an eSignature service provider that: • Delivers all the various e-signature types defined by eIDAS: Simple, Advanced and Qualified • Is independently accredited against European Commission-recommended technical standards • Offers international reach and experience to accommodate your business"
Tags : 
    
DocuSign
Published By: Auth0     Published Date: May 16, 2016
When computers were mostly standalone systems, authentication (checking people are who they say they are) and authorization (allowing them access to specific information) codes, along with databases containing user information, were self-contained on the device. Even in the early days of the web, sites would handle security independently, using custom and proprietary code.
Tags : 
autho, industry identity, authentication, database information, custom and proprietary code
    
Auth0
Published By: IBM     Published Date: Apr 07, 2015
This report explores how cloud-based solution providers, such as managed service providers (MSPs) and independent software vendors (ISVs) are using an embedded approach to analytics in an effort to empower their customers and build a competitive advantage.
Tags : 
ibm, cloud computing, analytics, business intelligence
    
IBM
Published By: Jive     Published Date: Feb 12, 2015
With its in-depth guidance and independent third-party vendor evaluations, Gartner’s Magic Quadrant market assessment can assist your organization in implementing an effective communication and collaboration solution. The full report covers 17 vendors, with specific information on their ability to execute and completeness of vision.
Tags : 
enterprise, transition, interaction, digital business, social networks, vendor evaluations, vision, communication
    
Jive
Published By: Sophos     Published Date: Jan 10, 2013
Evaluating the many components that make up an endpoint security solution may seem overwhelming. This buyers guide is designed to help. We’ve provided you with independent research and test results to help you determine your endpoint security solution requirements and identify the vendor that best meets your needs.
Tags : 
sophos, security applications, web protection, spyware, secure data, antispam
    
Sophos
Published By: Cisco     Published Date: Apr 04, 2016
Miercom was engaged to perfirm independent, hands-on, comparative testing of competitive IEEE 802.11ac Wave 2-based WiFi Access Points (APs) from Cisco Systems, Aruba Networks and Ruckus Wireless. This report summarizes the results of the Wave 2 AP comparative testing in these areas: - Client density: Downlink throughput as the number of client per AP scales from 10 to 100. - Single vs Multi-User MIMO: Downlink throughput for MU-MIMO (Multi-User, Multiple-Input Multiple-Output), a hallmark of 802.11ac Wave 2, vs Single-User (SU-MIMO) environments. - 1 Gbps+ Link Aggregation: Tests found that Wave 2 APs can support more than 1Gbps of aggregate downlink throughput, tested over two 1-Gbps LAG (link aggregation) connections.
Tags : 
cisco systems, meiercom, client density, mimo, link aggregation, networking, it management, data management
    
Cisco
Published By: HubSpot, Inc.     Published Date: May 19, 2010
MarketingSherpa has compiled 25 marketing lessons based on independent research featured in MarketingSherpa's Benchmark Reports. You have questions - get the answers.
Tags : 
hubspot, search, sem, search engine marketing, marketing sherpa, email lists, lead generation, demand generation
    
HubSpot, Inc.
Published By: Business-Software     Published Date: Mar 30, 2009
If your company is looking to purchase an Enterprise Resource Planning (ERP) software solution, the 2009 Top 10 ERP Software Vendor Report from Business-Software.com can help you find the software that is right for your company.  Must read!
Tags : 
erp, manufacturing, erp software, enterprise resource planning, mrp, manufacturing software
    
Business-Software
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.