it evolution

Results 351 - 375 of 457Sort Results By: Published Date | Title | Company Name
Published By: Jobvite     Published Date: Mar 14, 2014
As recruiting continues its evolution into a more marketing focused function, recruiters are increasingly craving enhanced technology that speaks directly to their needs. But getting executive leadership to understand this fact—and invest in recruiting beyond the generic HR suite—is still an uphill battle. If you band with the right alliances, however, and uncover a vendor solution that can deliver the ROI you need while satisfying your IT and reporting requirements, you will make a strong business case that executives will have difficulty denying.
Tags : 
vendor solution, reporting requirements, business sponsor, hr suites, job seekers, ats, technology requirements, business technology
    
Jobvite
Published By: FireEye     Published Date: Mar 05, 2014
If information is the lifeblood of today's digital economy, data centers are the heart. These mini-metropolises of silicon, metal, and cable are as essential to modern business as steel, motors, and coal were to the last great industrial revolution. In addition to their vital role in most business processes, data centers are the building blocks of emerging trends such as Big Data, global collaboration, and even bring-your-own-device (BYOD). The white paper describes: The widening gap between the offensive capabilities of today's cyber attackers and the weak traditional defenses deployed in most data centers; How organizations can better protect data centers.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors, real-time security, malicious code installs, block callbacks, threat intelligence, malware forensics, cyber warfare
    
FireEye
Published By: IBM     Published Date: Feb 27, 2014
If you're looking for ways to expedite time-to-market, ensure business agility, and deliver high-quality smart products while cutting costs, this ebook is for you. This IBM Limited Edition ebook, "Systems Engineering For Dummies," explains what systems engineering is and how it can help you simplify the development of smart, connected products.
Tags : 
ibm, ibm software, systems engineering, business agility, smart products, cut costs, systems engineering for dummies, revolutionizing requirements, system modeling, collaboration, change management, tip-top quality, role requirements, systems development cycle, software house, integrating hardware, software development, it management
    
IBM
Published By: Bronto     Published Date: Feb 21, 2014
How will you maximize sales this year? What new strategies and automation tactics should you implement? With the constant evolution of commerce marketing, online retailers need to find new ways to reach customers and keep them engaged. This white paper offers interviews with Bronto’s marketing strategists as they provide insight on how to create personalized campaigns
Tags : 
bronto, marketing, ecommerce, online marketing, trends, marketing strategy, mobile marketing, purchasing, online shopping, content delivery, multichannel, email marketing, retargeting, display, impressions, revenue
    
Bronto
Published By: Varonis     Published Date: Feb 05, 2014
Varonis has conducted several surveys over the last year, and the results indicate that most organizations recognize they need to do a better job securing their own data, and a much better job securing your data. The most disturbing discovery, though, is that in large numbers they lack the fundamental controls necessary to ensure safe digital collaboration.
Tags : 
varonis, data, data migration, digital revolution, digital collaboration, it management
    
Varonis
Published By: Avalara     Published Date: Jan 28, 2014
Sales tax is in the news more than ever today with national legislation being debated in Congress, and many states struggling to gain a hold on internet sales and the related tax liabilities. The current controversies between a certain internet seller and a number of state revenue officials certainly made the front page in 2011. Sales tax policy is a fascinating subject and the internet revolution is pushing discussion of sales taxes to the public center. These developments indicate the high level of concern held by business leaders, politicians and bureaucrats in the sales tax field. The current focus on sales tax policy will hopefully produce a more rational sales tax compliance environment.
Tags : 
sales tax, tax liability, internet sales tax, best practices, business technology
    
Avalara
Published By: Oracle     Published Date: Jan 22, 2014
Because the majority of B2B buying decisions are made before a sales person even gets involved, the role of marketing has changed. This evolution in buying behavior demands a radical shift in how companies are aligning marketing and sales to maximize conversion rates.
Tags : 
conversion, modern marketing, tenants, customer journey, segmentation, lead generation, eloqua, oracle
    
Oracle
Published By: F5 Networks Inc     Published Date: Jan 21, 2014
Information technology is at a crucial turning point. Enterprise IT departments are under constant pressure to meet user and application demands, aware that cloud deployments offer an easier and faster alternative but often pinned down by legacy deployment models. The problem stems from the inability of those legacy models to adapt to meet expectations for rapid provisioning, continuous delivery, and consistent performance across multiple environments. Read this whitepaper to learn more about the evolution of application delivery and the services your enterprise can utilize to successfully manage the increased pressure on network and application infrastructure.
Tags : 
f5 networks, f5 software, software defined application services, application services, application layer, application delivery, cloud, deployment, network infrastructure, software development, data center
    
F5 Networks Inc
Published By: Oracle     Published Date: Jan 21, 2014
Because the majority of B2B buying decisions are made before a sales person even gets involved, the role of marketing has changed. This evolution in buying behavior demands a radical shift in how companies are aligning marketing and sales to maximize conversion rates.
Tags : 
conversion, modern marketing, tenants, customer journey, segmentation, lead generation, eloqua, oracle
    
Oracle
Published By: IBM     Published Date: Jan 09, 2014
Simply put, software defined storage is the abstraction of storage services from storage hardware. This term is more than just marketing hype, it’s the logical evolution of storage virtualization from simply being a storage aggregator to the end goal of storage as a service. To achieve this goal, software defined storage needs a platform from which to centralize.
Tags : 
ibm, storage switzerland, storage platform, sds, software defined storage, data center, storage virtualization, data protection, shared storage, storage capacity, centric systems, high performance databases, storage efficiency, range of solutions, vendor options, volume management, software selection, data service, data management, performance loss
    
IBM
Published By: Clarabridge     Published Date: Dec 03, 2013
This paper explores the impact of social media on the marketplace and customer behaviors, and provides a six-step “road map” that guides organizations through the process of implementing a social media program.
Tags : 
clarabridge, digital communications, digital revolution, product information, using social media, customer behaviors, social media program, interacting with customers, product and service problems, respond quickly, customer satisfaction, customer loyalty, market share, marketplace, voice of the customer, voc, customer insights
    
Clarabridge
Published By: ServiceNow     Published Date: Nov 22, 2013
As technology continues to advance and the new reality is based on an infrastructure that includes physical, virtual and cloud resources, IT departments need to find new ways of managing and securing this vastly different technology ecosystem.
Tags : 
servicenow, enterprise it, it department, cloud generation, social networks, mobile workforce, virtualization, cloud computing, collaborative, service-oriented, cloud platform, drive down expenses, increase efficiency, cloud-driven technology, streamlines operations, fluid systems manageable, it management
    
ServiceNow
Published By: Qualys     Published Date: Nov 05, 2013
Organizations have traditionally viewed vulnerability scanners as a tactical product, largely commoditized and only providing value around audit time. But with limited resources and a real need to reduce risk, organizations need the ability to pull in threat-related data, combine it with an understanding of what is vulnerable, and figure out what is at risk. This report from Securosis outlines how yesterday's vulnerability scanners are evolving to meet this need, emerging as a much more strategic component of an organization's control set than in the past. Learn how vulnerability scanners are evolving to provide real value beyond vulnerability reports for auditors - emerging as a strategic component helping organizations effectively lower risks.
Tags : 
qualys, securosis, vulnerability, vulnerability management, scanning, infrastructure, core technologies, value-add technologies, enterprise applications, enterprise integration, vulnerability scanners, threat management, security platforms, cloud
    
Qualys
Published By: LogMeIn Rescue     Published Date: Oct 21, 2013
Customer service has evolved from a reactive activity viewed largely as a cost center-based tactical necessity, to a proactive management task that can in many ways set a company apart from the competition. At the same time, the channels by which customers receive support are growing and fragmenting very rapidly. The telephone is still the primary mode of support, but is steadily declining as text, social media, chat, knowledge bases, email and online communities provide new avenues for customers to get the help they need. Some organizations are embracing this evolution by implementing technologies that enable them to interact with customers regardless of the channel or the device they’re using. This approach not only improves customer service, but also boosts the brand image and helps companies achieve broader business goals.
Tags : 
logmein, infoworld, customer service, customer support, support, support strategy, social media, mobile support, email support, remote pc access software, remote desktop connection, remote computer support, customer support channels, business technology
    
LogMeIn Rescue
Published By: ServiceNow     Published Date: Oct 18, 2013
To reach the customers of IT services, you have to abandon long-entrenched models of IT thinking & replace them with a customer-focused model that focuses on value, experience & context. Join the webinar to understand the issues internal customers face with IT, & see how IT can evolve from being the department of no to the department of now.
Tags : 
servicenow, enterprise it, service automation, applications, webinar, customer relationships, perception of it, change management, customer value, marketing it, it service management, service relationship management, evolution of service, applications, custom applications, it management
    
ServiceNow
Published By: IBM     Published Date: Oct 17, 2013
Have you heard about the DevOps revolution? What’s all the buzz about? Find out more in this report by Kurt Bittner, Analyst, Forrester Research, Inc. Even if full continuous delivery is not your goal, proceeding toward it can help increase reliability, reduce risks, and decrease costs. As Kurt shares, “The revolution is just beginning, but it’s real — and the time to act is now.”
Tags : 
forrester report, ibm, alm, application lifecycle, application lifecycle management, delivery, devops, continuous delivery, ad&d, application development, business technology
    
IBM
Published By: IBM     Published Date: Oct 10, 2013
The growth of cloud, mobility, social business and big data mean that botnets, credit card theft, cyber criminals and other external threats pose increasing risk to business continuity, financial stability and brand reputation. Read the white paper, “Preventing security risks in real time,” to learn how this new reality is forcing the evolution of organizations’ defenses to become more intelligent—using global analytics to scale visibility across broad data sets, both diverse and complementary, in real time.
Tags : 
cloud, mobility, social business, big data, external threats, business risks, business continuity, financial stability, brand reputation, protecting reputation, prevent theft, organizational defenses, global analytics, broad data, real time data, security risks, prevent risks
    
IBM
Published By: IBM     Published Date: Oct 10, 2013
The growth of cloud, mobility, social business and big data mean that botnets, credit card theft, cyber criminals and other external threats pose increasing risk to business continuity, financial stability and brand reputation. Read the white paper, “Preventing security risks in real time,” to learn how this new reality is forcing the evolution of organizations’ defenses to become more intelligent—using global analytics to scale visibility across broad data sets, both diverse and complementary, in real time.
Tags : 
ibm, cloud, mobility, social business, data, big dta, theft, cyber theft, cyber criminals, security, security risks, global analytics, visibility, data sets, protection, external threats, risk, risk management, finanical stability, it management
    
IBM
Published By: GlobalSCAPE     Published Date: Oct 10, 2013
This whitepaper examines the "Bring Your Own Device" (BYOD) movement, from carrying around a floppy disk to today's "cloud" services.
Tags : 
globalscape, ftp, mft, secure file transfer, cloud sharing, file sharing, byod, mobile devices, mobile workers, mobile security
    
GlobalSCAPE
Published By: IBM     Published Date: Sep 27, 2013
This analyst paper providing an overview of IBM PureSystems
Tags : 
ibm, ibm pureflex system, enterprise, enterprise it evolution, it evolution, computing, integrated solutions, expert integrated systems, business applications, data management, data center
    
IBM
Published By: Verizon     Published Date: Sep 27, 2013
Embracing IaaS to Bridge the Divide between IT and the Lines of Business
Tags : 
verizon, iaas, social media, global competition, third industrial revolution, software development, it management
    
Verizon
Published By: Bridgeline Digital     Published Date: Sep 26, 2013
Is your website ready for the mobile revolution? If you haven’t already, marketers everywhere should be considering how to revamp their digital marketing strategy to cope with the mobile takeover.
Tags : 
website design, responsive design
    
Bridgeline Digital
Published By: inPowered     Published Date: Sep 20, 2013
Read this white paper from inPowered and Marketing Evolution to understand how major brand marketers are leveraging their earned media, written by trusted category experts, to drive serious lifts in brand favorability, advocacy, and purchase intent and achieve ROI 7-14x campaign investment levels.
Tags : 
forrester, inpowered, marketing, earned media, media
    
inPowered
Published By: Webroot     Published Date: Sep 18, 2013
This white paper describes how new threats have stretched the capabilities of “fat client” security architectures to the limit, making it impractical to keep endpoints updated with signatures for all the new viruses. It discusses how a revolutionary approach is making traditional antivirus obsolete by replacing bloated clients and large signature downloads with: • Cloud/client architecture • Journaling and rollback • Behavioral recognition of malware These improve performance and effectively address the new threat environment, which includes protecting against zero day threats.
Tags : 
cloud architecture, behavior recognition, security, antivirus, journaling, rollback, malware, software development, business technology
    
Webroot
Published By: Webroot UK     Published Date: Sep 05, 2013
Webroot SecureAnywhere Business - Endpoint Protection offers a revolutionary approach to malware protection. It brings together Webroot's innovative file pattern and predictive behavior recognition technology, with the almost limitless power of cloud computing, to stop known threats and prevent unknown zero-day attacks more effectively than anything else. Read this white paper to learn about ultimate performance and minimal management security software from Webroot.
Tags : 
webroot, secureanywhere, business, software, security software, revolutionary software, predictive behavior, known threats, zero day attacks, ultimate protection
    
Webroot UK
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.