method

Results 326 - 350 of 853Sort Results By: Published Date | Title | Company Name
Published By: SAP Inc.     Published Date: Jun 16, 2009
There’s an old management axiom: You can’t manage what you don’t measure. Yet many organizations do a very poor job (or no job at all) of measuring the business value of their IT investments. Four existing methodologies can be adopted as is or customized to suit specific needs. Firms should pick one, institutionalize it as part of an overall governance framework, and embed it in IT portfolio management.
Tags : 
sap, measurement methodologies, business value of it, financial metrics, tei, val it, enterprise applications, business intelligence, it spending, international computing
    
SAP Inc.
Published By: SAP Inc.     Published Date: Jun 16, 2009
To succeed in the professional services industry, your firm must continually improve its service delivery methods. Read how you can increase client value and lower costs through implementing more efficient resourcing and partnering processes and co-creating value with your clients.
Tags : 
sap, service delivery innovation, financial metrics, enterprise applications, business analytics, international computing
    
SAP Inc.
Published By: Okta     Published Date: Apr 03, 2015
As threats to password security have increased in recent years, multi-factor authentication (MFA) has rapidly gained adoption as a method for increasing the assurance of authentication for consumer and enterprise web and mobile applications. In this whitepaper we provide some selected practical advice for people building multi-factor authentication for their applications, based on our observations working with engineering and product teams.
Tags : 
multi-factor authentication, assurance of authentication, consumer and enterprise web, mobile applications, knowledge management, enterprise applications
    
Okta
Published By: M86 Security     Published Date: Nov 02, 2010
This white paper examines the Crimeware industry and the Web-based methods currently used to sustain cybercrime.
Tags : 
m86 security, real-time code analysis, malware threats, cybercrime, anti-virus, anti spam, anti spyware, anti virus, internet security, security management
    
M86 Security
Published By: Saba Software     Published Date: Jun 19, 2012
With human capital accounting for nearly 70% of an organization's cost, optimizing the investment demands constant vigilance. HCI's findings confirm that organizational planning, or creating and adjusting the organizational structure to meet business goals, enables a new level of organizational agility when done with a methodical process on a regular basis. Download to find out more.
Tags : 
human concepts, human resources, hr management, business strategy, hci, talent, structure
    
Saba Software
Published By: Epsilon     Published Date: Sep 18, 2012
To be successful in the current landscape, retail marketers must adapt their marketing messages to match the specific format, time and methods of consumers. Download this whitepaper to learn how retailers are boosting their CEM strategies.
Tags : 
customer experience marketing, real-time messaging, rtm, cem, customers' needs, competitive advantage, customer identification, customer segmentation, customer engagement, customer experience/engagement
    
Epsilon
Published By: Jive Software     Published Date: Jun 26, 2013
Successful marketing is, at its core, all about collaboration. Yet working together—across teams, departments and agencies, as well as with customers and partners—is getting more difficult as the pace of business and the number of moving parts increase. Most marketers still depend on the same tools and methods they used 20 years ago: email, meetings, phone calls and desktop apps, leading to a lot of disconnects, inefficiency and pain. But change is finally at hand.
Tags : 
marketing, social business technology
    
Jive Software
Published By: Enterprise Mobile     Published Date: Jul 09, 2013
Device-centric management strategies have prevailed over the last several years, but this approach can no longer keep pace with the increasing number of remote workers who need to access more applications across multiple platforms. Enterprise IT leaders must shift from locking down devices to securing the corporate applications, data, and other proprietary content that reside on these devices. It’s time to move beyond mobile device management to a more holistic management method.
Tags : 
mobility-as-a service, enterprise mobile, mobility, enterprise mobility, mobile strategy, mobile security, mobile management, device management, enterprise mobile devices, mobile computing, mobile device management
    
Enterprise Mobile
Published By: Tripp Lite     Published Date: May 15, 2018
A Practical Guide to IDF/MDF Infrastructure Implementation Once relegated to early adopters and casual home users, VoIP (voice over Internet protocol) has matured. An essential element of any unified communications (UC) system, it is now the standard method of voice communication in business, education, government and healthcare. If your organization has not already migrated to VoIP, the question is not so much if it will, but when. Cost is the primary driver, since the data network performs double duty by carrying voice traffic as well. VoIP also offers capabilities that far exceed traditional phone systems, with unified communication platforms promising to integrate messaging, mobility, collaboration, relationship management, zoned security, intelligent call routing, disaster recovery, video, teleconferencing, status updates and other advanced features. The transition to VoIP presents a number of challenges, including assessing the ability of your network to handle not only additio
Tags : 
    
Tripp Lite
Published By: Adobe     Published Date: Oct 24, 2018
The report combines data from a February 2018 executive survey of 401 email marketers and documented ESP demos related to three key themes. We also utilized vendor questionnaires and our near two-decades of knowledge of the providers in this sector. One-on-one phone interviews with several of the marketers who use these tools and our executive survey clients provided satisfaction data. The methodology details our entire recipe, but readers can feel confident in knowing that our vendor evaluation process is objective and does not stem from one analyst’s singular point of view. This guide also includes our analysis and perspective on vendors that did not for a variety of reasons participate in this research.
Tags : 
    
Adobe
Published By: Mobify     Published Date: Jul 22, 2014
Hoping to improve your Mobile ecommerce strategy and increase conversions? The 2014 Mobile E-Commerce Strategy Playbook will give you four strategic methods to increase mobile conversion rates, revenue and customer satisfaction.
Tags : 
mobile commerce, mcommerce, ecommerce, mobile shopping, m-commerce, e-commerce, retail, online retail, responsive websites, mobile websites, mobify, tablets, smartphones, phablets, mobile conversions, conversions, online sales, responsive design
    
Mobify
Published By: Sailthru     Published Date: Aug 15, 2016
Download this guide to discover how to find a partner that moves beyond antiquated batch-and-blast methodologies to impact: -Audience retention rates -Subscription conversion -Advertising revenue -Effective reporting and predictive analytics Who should download: -Online Media and Digital Publishing Executives -Directors of Audience Development, CRM, and Engagement -Email Marketing Managers
Tags : 
sailthru, online media, digital publishing, rfp, request for proposal, email marketing, direct marketing, internet marketing, marketing research, sales
    
Sailthru
Published By: Sailthru     Published Date: Aug 15, 2016
Download this guide to discover how to find a partner that moves beyond antiquated batch-and-blast methodologies to impact: -Customer retention rates and revenue -Personalization sophistication -Cross-channel marketing capabilities -Effective reporting, impactful data and predictive analytics Who should download: -Internet Retailer Top 1,000 Digital Marketing executives -Directors of CRM and Ecomme
Tags : 
sailthru, retail, rfp, request for proposal, marketing, internet retailer, top 1000, internet marketing, e-commerce, sales
    
Sailthru
Published By: SolarWinds     Published Date: May 18, 2015
Learn how to prevent application downtime and optimize performance with this EMA Whitepaper “It’s All About the App: Application-Centric Systems Management” that provides the methodology an IT admin needs to utilize an application-focused approach.
Tags : 
application downtime, performance optimization, it admin, it infrastructure, application performace, it management
    
SolarWinds
Published By: Affirm     Published Date: Jan 22, 2016
This article will help merchants understand the new payment options companies offer, when and why consumers use each, and why merchants might consider offering them to increase consumer delight and maximize sales.
Tags : 
affirm, payment, sales, ecommerce, conversions, sales, enterprise applications, business technology
    
Affirm
Published By: AWS     Published Date: Aug 20, 2018
A modern data warehouse is designed to support rapid data growth and interactive analytics over a variety of relational, non-relational, and streaming data types leveraging a single, easy-to-use interface. It provides a common architectural platform for leveraging new big data technologies to existing data warehouse methods, thereby enabling organizations to derive deeper business insights. Key elements of a modern data warehouse: • Data ingestion: take advantage of relational, non-relational, and streaming data sources • Federated querying: ability to run a query across heterogeneous sources of data • Data consumption: support numerous types of analysis - ad-hoc exploration, predefined reporting/dashboards, predictive and advanced analytics
Tags : 
    
AWS
Published By: CA Technologies EMEA     Published Date: May 23, 2018
Unternehmen aller Größen müssen sich stetig darum bemühen, privilegierte Zugriffe zu schützen und Sicherheitsverstöße zu verhindern. Angreifer verwenden immer vielfältigere und ausgefeiltere Methoden, um anfällige Systeme zu hacken. Auch wenn Nachrichten zu Datenschutzverletzungen durch Externe häufig in den Schlagzeilen sind, müssen Unternehmen auch in der Lage sein, sich vor Bedrohungen durch Insider zu schützen. Da heutzutage viele wichtige Aufgaben ausgegliedert oder gemeinsam mit Partnern erledigt werden, erhalten inzwischen immer mehr Anwender privilegierten Zugang zu zentralen Unternehmenssystemen. Außerdem ist es für Systemadministratoren heute unerlässlich, zu verstehen, wie Systeme verwendet werden, wer sie verwendet und unter welchen Bedingungen. Serienmäßige Security-Lösungen können interne/privilegierte Zugriffe jedoch nicht angemessen sichern und weisen schwerwiegende Lücken auf, die ein Risiko für Ihr Unternehmen darstellen.
Tags : 
    
CA Technologies EMEA
Published By: OKTA     Published Date: Sep 26, 2017
Traditional web applications pre-date modern standards like SAML and OpenIDConnect, so they often use legacy authentication methods to grant end users access. Historically, providing Single Sign-On and centralized access management for end users across these legacy applications required a Web Access Management, or WAM, product. These on-premises software tools could be expensive to maintain and complex to deploy. Now, modern identity providers like Okta in conjunction with best-of-breed network management technologies offer a better way. This white paper describes how web applications that lack modern standard support can be integrated into a cloud-based Identity-as-a-service architecture.
Tags : 
    
OKTA
Published By: OKTA     Published Date: Sep 26, 2017
As threats to password security have increased in recent years, multi-factor authentication (MFA) has rapidly gained adoption as a method for increasing the assurance of authentication for consumer and enterprise web and mobile applications.
Tags : 
    
OKTA
Published By: Red Hat     Published Date: Jan 07, 2019
Many organizations are discovering that traditional storage methods can be the bottleneck that slows their agility and scalability. This has led to the development of containers, built to permit applications to scale rapidly, be more reliable, and offer better performance than more conventional means or methods. Read the e-book to learn how container-native storage is the key to your organization running more efficiently and cost?effectively.
Tags : 
    
Red Hat
Published By: Red Hat     Published Date: Jun 26, 2019
An introduction to the Forrester analyst report: How to Capture the Benefits of Microservice Design There has always been a relationship between an application and the platform and services which run it. For a long time, that relationship was very tight and encompassed a lot of areas related to the application design, from the language the application could be written in to administrative behaviors like monitoring and logging, even things like transaction management, frontend UI development, or integration methods. In a sense, the application platform was just another design consideration for the application. A few years ago, as significant changes in platform technology like cloud, containers, and virtual machines started rolling out, the primary emphasis for CTOs and application architects was on how to move to those platforms. The platform choice was a major part of the application. The focus was — one way or another — getting into “the cloud.” There’s been a shift in customers’ pri
Tags : 
    
Red Hat
Published By: Forcepoint     Published Date: May 14, 2019
As more and more companies are encouraging their employees to work from anywhere, on any device, data loss prevention (DLP) has evolved from an option to a requirement. In the past, DLP has been associated with complicated deployments and pervading operational management issues, yet DLP is not so much a product but a strategy—success depends on methodology and execution. Download the whitepaper for insightful guidance on implementing DLP. Key topics include: • Latest data-breach trends • Assessing DLP vendors • Nine-step framework • Best practices to ensure success
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Jun 06, 2019
As more and more companies are encouraging their employees to work from anywhere, on any device, data loss prevention (DLP) has evolved from an option to a requirement. In the past, DLP has been associated with complicated deployments and pervading operational management issues, yet DLP is not so much a product but a strategy—success depends on methodology and execution. Download the whitepaper for insightful guidance on implementing DLP. Key topics include: • Latest data-breach trends • Assessing DLP vendors • Nine-step framework • Best practices to ensure success
Tags : 
    
Forcepoint
Published By: Uberall     Published Date: May 13, 2019
Businesses have been told about the urgency of being ‘voice search ready’ without understanding what it means or how to accomplish it. In creating the Voice Search Readiness Report, we set out to answer one simple question - ‘are businesses voice search ready?’ and then provide a simple method for helping them to measure their own voice search readiness. We analyzed more than 73,000 SMB, mid-market and enterprise business locations in one of the largest voice search studies ever conducted to find out if businesses were taking the necessary steps to reach consumers who use voice search.
Tags : 
local marketing, location analytics, location-based marketing, location-based services, mobile marketing, real-time location systems, marketing research, geofencing, location management, local listings management, local review management, local reputation management
    
Uberall
Published By: Icertis     Published Date: Aug 06, 2019
Is your company evaluating a new contract management system? Icertis can be up and running in weeks, not months, delivering a fast return on investment.
Tags : 
enterprise contact management, contract management software
    
Icertis
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Search the Library

Add Research

Get your company's research in the hands of targeted business professionals.