ep lan

Results 1226 - 1250 of 1272Sort Results By: Published Date | Title | Company Name
Published By: Vocus, Inc     Published Date: Jan 16, 2009
Rapid media changes make it challenging for PR professionals to keep up.  Discover methods to navigate through today’s media landscape, while you stay ahead of the changes. Uncover techniques for building strong media relationships using the latest technology, to achieve PR success.
Tags : 
vocus, media landscape, pr professionals, public relations, media relationships, pr success
    
Vocus, Inc
Published By: Neolane, Inc.     Published Date: Dec 30, 2008
Packard Bell implements targeted customer loyalty program to strengthen its brand and inspire repeat purchases. With strong roots in the consumer PC industry, Packard Bell has expanded its focus to embrace a successful digital entertainment strategy, manufacturing a range of media products for television and wireless networking. Packard Bell and Neolane were recipients of the 2007 NCDM Database Excellence Award for Multichannel Marketing Achievements.
Tags : 
neolane, customer loyalty program, customer service, packard bell, repeat purchases, crm software, custom content, deliverability
    
Neolane, Inc.
Published By: Neolane, Inc.     Published Date: Dec 30, 2008
EMI Music is one of the top global recorded music companies and represents artists spanning all musical tastes and genres including Lily Allen, Coldplay, and Pink Floyd. No longer able to rely on mass marketing to drive in-store sales, EMI Music had to figure out who, exactly, was downloading its artists' music, and how to maximize communications with those consumers to strengthen relationships and drive more revenue.  EMI Music opted for enterprise marketing software from Neolane that would help the company better capture consumer information from multiple sources and integrate its disparate CRM and customer analytics applications.
Tags : 
neolane, emi music, enterprise marketing software, customer analytics applications, crm, customer relationship management, cross-channel customer relationships, enterprise marketing platform
    
Neolane, Inc.
Published By: Network Automation     Published Date: Dec 02, 2008
The Vanderburgh County Highway Department encompasses the Highway, Local Roads, and Street and Cumulative Bridge departments within the Vanderburgh County Government. About 55 employees within these departments handle public works and general maintenance for 560 lane miles of Vanderburgh County roads, including general road repairs and resurfacing, right-of-way mowing, roadway ditch maintenance, tree maintenance and emergency response to weather conditions such as storm damage and snow removal.
Tags : 
network automation, business process automation, automatic vehicle location, it management
    
Network Automation
Published By: Melissa Data Corp.     Published Date: Nov 18, 2008
This white paper describes the seven steps you need to develop a plan for data quality – one that scales to your growing business needs.
Tags : 
melissa data, data quality, contact data verification, address verification, validate address, address verification software, address verify, address validation software
    
Melissa Data Corp.
Published By: Melissa Data     Published Date: Nov 18, 2008
This white paper describes the seven steps you need to develop a plan for data quality – one that scales to your growing business needs.
Tags : 
melissa data, data quality, contact data verification, address verification, validate address, address verification software, address verify, address validation software
    
Melissa Data
Published By: Dell     Published Date: Oct 20, 2008
Dell has improved PC deployment activities through patent-pending automation technology and offers an array of services from planning a Windows Vista migration to post-deployment management.
Tags : 
dell, deploying vista, dell deployment framework, dell deployment model, deployment automation toolset, optimized deployment, software development
    
Dell
Published By: Dell     Published Date: Oct 20, 2008
This IDC whitepaper (including the Dell PC Deployment Optimization Model) contains research that helps CIOs map out a plan to reduce their organizations' PC deployment costs while deploying more quickly and with less disruption to staff.
Tags : 
deployment optimization model, process of deploying pc, reduce deploying costs, deployment management, application loading, staging and logistics, it management
    
Dell
Published By: Dell     Published Date: Oct 20, 2008
Corporate customers are deploying Windows Vista now, and Dell Services wants to help you understand the features of the new OS and how to plan your Windows Vista deployment.
Tags : 
dell, windows vista faq, efficient application testing, windows vista deployment, vista application portfolio, vista migration planning
    
Dell
Published By: HP - Enterprise     Published Date: Oct 16, 2008
As the military and US government rely more heavily on custom-built applications for communications and management, they also become more vulnerable to cyber attacks. Worse, according to the Dept. of Homeland Security, the number of attacks on custom-built applications is doubling every year. Learn about critical threats, methods that military and civilian agencies can use to deal with cyber attacks and technologies that improve security for custom-built applications.
Tags : 
security, application security, audit, risk, vulnerabilities, fortify, fortify software, hackers
    
HP - Enterprise
Published By: DataMotion     Published Date: Oct 01, 2008
With HIPAA audits now randomized, you must be prepared for them every day. And with state regulations requiring compliance-breach reporting, you must become your own auditor. HIPAA is the Health Insurance Portability and Accountability Act, the 1996 federal regulation that mandated health-data privacy.This regulation requires compliance by all insurers and health care providers, including physician’s offices, hospitals, health plans, employers, public health authorities, life insurers, clearinghouses, billing agencies, information systems vendors, service organizations, and universities.But that’s not all.
Tags : 
certifiedmail technology, act's privacy rule, health insurance portability, accountability act, it management, data management
    
DataMotion
Published By: Microsoft Office SharePoint Server     Published Date: Sep 29, 2008
This paper is intended to represent the process that a medium-to-large organization may undergo when deploying Microsoft® Office SharePoint® Server 2007 in a practical scenario. Included are typical approach and implementation techniques that may occur when planning, customizing, and deploying an Office SharePoint Server 2007 installation.
Tags : 
microsoft, sharepoint, sharepoint server, productivity, collaboration, it management
    
Microsoft Office SharePoint Server
Published By: Microsoft Office SharePoint Server     Published Date: Sep 29, 2008
Enterprise search has been a service in one form or another on the Microsoft intranet for more than a decade. With the release of Microsoft® Office SharePoint® Portal Server 2003, the landscape for enterprise search at Microsoft began to change. This became the foundation for the current solution, the Enterprise Search feature provided in Microsoft Office SharePoint Server 2007. Read more about the enhancements of this feature in this technical white paper.
Tags : 
microsoft, sharepoint, microsoft office, search, database search, dba, database, data management
    
Microsoft Office SharePoint Server
Published By: LogRhythm     Published Date: Sep 26, 2008
LogRhythm, the leader in Log and Security Event Management Solutions, has prepared a "Quick Read" whitepaper to help you understand what's required to ensure compliance with: CIP- 003-1 – Cyber Security – Security Management controls; CIP- 005-1 – Cyber Security – Electronic Security Perimeter(s); CIP- 006-1 – Cyber Security – Physical Security of Critical Cyber Assets; CIP -007-1 – Cyber Security – Systems Security Management; CIP -008-1 – Cyber Security – Incident Reporting and Response PlanningThe whitepaper also contains a compliance reference chart with the specific CIP requirements matched with recommended steps to ensure compliance.
Tags : 
nerc, nerc cip, nerc cip requirements, critical cyber assets, electronic security perimeter, critical cyber assets, compliance, comply
    
LogRhythm
Published By: Tail-f Systems     Published Date: Sep 16, 2008
This whitepaper describes how NETCONF and YANG can help drastically simplify network configuration management. The IETF has recently standardized the NETCONF configuration management protocol and is currently in the process of standardizing a NETCONF-oriented data modeling language called YANG. These two new technologies promise to drastically simplify network configuration management.
Tags : 
configuration management, netconf, yang, next-generation network management, next-generation networks, netconf protocol, tail-f, tailf
    
Tail-f Systems
Published By: HP Service Management     Published Date: Sep 03, 2008
In this first chapter of "The Shortcut Guide to IT Service Management and Automation," you will be led through a step by step analysis of your company's IT and business relationships, providing you with a basis for a strategic plan to turn service lifecycle management into a valuable business asset. Author and compliance expert Rebecca Herold demonstrates how technology acts as a strategic differentiator by enabling business growth, driving operational efficiencies to lower maintenance costs, optimizing outcomes, and reducing IT risks.
Tags : 
itil, itil v3, bsm, bsa, dca, itsm, it service management, operations
    
HP Service Management
Published By: IBM     Published Date: Aug 21, 2008
The goal of having one enterprise resource planning (ERP) solution for all business processes remains popular. However, there are still many misconceptions associated with using enterprise resource planning solutions in asset-intensive industries. This white paper discusses and demystifies the myths for decision makers in asset-intensive industries. You’ll also see how IBM Maximo Asset Management can enhance the quality of asset data, contribute to the safety of the workforce, and help facilitate best practices that significantly impact the long-term success of your business.
Tags : 
erp, asset management, best practices, bpm, business process, ibm mi, ibm, ibm grm
    
IBM
Published By: Utimaco     Published Date: Aug 18, 2008
Better safe than sorry! When outsourcing, keeping an eye on data security right from the planning stage can save your company from nasty surprises. Readers should learn how to protect their confidential data when they exchange information with external partners.
Tags : 
leak, leakage, data protection, pci, cardholder, cardholder data, utimaco, database security
    
Utimaco
Published By: Tripwire     Published Date: Jul 25, 2008
Tripwire surveyed IT professionals to learn how virtualization is expanding and if security, change controls and compliance requirements are keeping pace. Read this white paper to learn more about the state of virtualization today and why most of the respondents agree that a dedicated configuration tool is needed and are in the process of evaluating or planning to acquire such a tool.
Tags : 
virtual, virtualization, tripwire, configuration, change managemement
    
Tripwire
Published By: Quocirca     Published Date: Jul 03, 2008
Technology is no longer a nice to have, or a tool for the few. With many organizations now being completely dependent on their IT systems, the need for the IT department to be seen to be responding to the organization's requirements is of critical importance.  Business Service Management, or BSM, can help in providing underpinnings to the IT function. This paper looks at how the changing processes and market conditions within an organization can be augmented through the use of a Business Service Management (BSM) approach, creating a flexible and responsive technology infrastructure aimed at supporting a rapidly changing commercial landscape and enabling greater competitiveness in the markets.
Tags : 
quocirca, business service management, bsm, service management, business management
    
Quocirca
Published By: LeapFrog Interactive     Published Date: Jul 02, 2008
It has been projected that interactive marketing spending will hit the $61 billion mark by 2012. With this much competition, a brand needs to make sure the dollars it invests in interactive marketing are well spent or risk being lost in the growing ad clutter. To help ensure its ad money won’t be wasted, a brand needs a blueprint to follow in order to guide it to interactive marketing success.
Tags : 
interactive, marketing strategy, leapfrog, leap frog, interactive agency, marketing plan, branding
    
LeapFrog Interactive
Published By: HP     Published Date: Jun 23, 2008
To stay competitive in today's business climate, organizations must find ways to meet their business needs while controlling IT costs. IT departments face flat budgets and, at the same time, find that their organizations have become increasingly dependent on uninterrupted access to business-critical data. In today's world, prudent IT administrators prepare to recover from two types of disasters as part of a complete Business Continuity and Availability (BC and A) plan.
Tags : 
3 data center replication, 3dc, 4aa0-3153enw, storageworks, xp continuous access async, xp continuous access journal, xp continuous access synchronous, xp10000 disk array
    
HP
Published By: Clearswift     Published Date: Jun 09, 2008
This short guide summarizes ten steps to web security. Do them all, and you'll be better protected than 98% of enterprises out there. But the target never stands still. More than the steps listed here, it's important to focus on the principles behind the steps, including: policy, vigilance, simplification, automation and transparency.
Tags : 
clearswift, web security, internet security
    
Clearswift
Published By: Epicor     Published Date: May 28, 2008
This white paper describes lean manufacturing and how it can be applied to supply chain management.
Tags : 
erp, supply chain management, scm, epicor, enterprise resource planning, visibility, globalizing, ventana research
    
Epicor
Published By: AppSense     Published Date: May 02, 2008
Email marketing provides a lot more flexibility as the delivery schedule isn't dependent on outside factors. However, just because email gives you instant access to your subscribers doesn't mean you can email them impulsively or impetuously. Your emails must follow a plan that is as well thought-out and deliberate as all of your other marketing initiatives in order to remain effective.
Tags : 
marketing plan, email marketing, email marketing plan, email strategy, loyalty, email frequency, listrak
    
AppSense
Start   Previous    37 38 39 40 41 42 43 44 45 46 47 48 49 50 51    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.