attention

Results 251 - 275 of 287Sort Results By: Published Date | Title | Company Name
Published By: Quocirca     Published Date: Apr 09, 2008
Today, many organizations are increasingly reliant on software application development to deliver them competitive edge. Simultaneously, they are progressively opening up their computer networks to business partners, customers and suppliers and making use of next-generation programming languages and computing techniques to provide a richer experience for these users. However, hackers are refocusing their attention on the vulnerabilities and flaws contained in those applications.
Tags : 
quocirca, application security
    
Quocirca
Published By: Perimeter     Published Date: Jul 17, 2007
Click here and get a head start on these Hackers by learning how they are turning their attention to new ways to deliver viruses, crash unsuspecting users’ computers, and steal social security numbers, passwords, bank account numbers, etc.
Tags : 
vulnerability, hacker, hacker detection, hacker prevention, ips, intrusion prevention, intrusion detection, ids, spam, spam filtering, security policies, gateway av, risk management, perimeter, perimeter esecurity
    
Perimeter
Published By: Asentria Corporation     Published Date: Sep 04, 2007
In the high-stakes battle of Internet providers, WiMAX represents the latest up-and-comer to challenge DSL and cable technologies. This new wireless technology is gaining attention for its ability to provide high-speed, high-throughput broadband connections over distances of up to 30 miles instead of a few hundred feet. Exhibiting a surprising amount of utility, WiMAX can be used for a number of different applications.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures, fault management, network management, remote site monitoring, remote site alarms, environmental monitoring, network alarm monitoring, network alarm management, remote telemetry units, alarm management system, network management systems, network monitoring, protocol mediation
    
Asentria Corporation
Published By: ElcomSoft     Published Date: Dec 06, 2007
Information protection gets much attention these days. Many have realized that their data is a treasure, which not only should be treated properly, but should be protected as well. So a few dollars spent on defending against security threats now can reap millions in avoiding future losses due to hacking of your enterprise network.
Tags : 
passwords, password, password management, security management, good password, bad password, data protection, elcomsoft
    
ElcomSoft
Published By: ElcomSoft     Published Date: Dec 06, 2007
Information is crucial in decision making. No wonder that protection of information is paid much attention. The most part of information is created and stored digitally (Microsoft Office documents, different databases, and financial data in Intuit Quicken etc). Thus software and hardware means of protecting information are the first to talk about.
Tags : 
password, password recovery, system recovery, elcomsoft
    
ElcomSoft
Published By: Dynapar Corp.     Published Date: Jun 22, 2008
In most drilling applications encoders are used to provide position and speed feedback for proper control of equipment like top drives and pipe racking systems. However, these electronic devices require special attention when used in hazardous environments such as a drilling platform. In this paper, we discuss ways to make encoders suitable for hazardous duty.
Tags : 
dynapar, encoder, sensor, motion feedback, product design, engineer, engineering, encoder output, electronics, manufacturing
    
Dynapar Corp.
Published By: TARGUSinfo.     Published Date: Jul 31, 2008
Consumers contact you through a growing number of channels. With this Yankee Group study, you'll learn how predictive analytics can help you instantly identify your best customers and prospects, match them to the best agents and give them more personalized attention - thus maximizing customer acquisition and cross-sell opportunities.
Tags : 
targusinfo, targus info, customer, analytics, customer behavior, behavior, customer insight, feedback, crm, customer relations, loyalty
    
TARGUSinfo.
Published By: Waymedia     Published Date: Oct 23, 2008
Millions of  handsets are sold around the world daily. Handsets are by far the preferred platform of communication there is.  People spend more time using their mobile phones than any other device or gadget, and they pay special attention to everything stored in those handsets. In a few words:  If brands want to have a presence in their consumers’ environment, and if they want their message to be heard and seen, then they imperatively need to put some value content on users mobile phones. Mobile marketing is typically understood as SMS Marketing, which is managed from a distant point and it impacts the user at random times.
Tags : 
waymedia, mobile marketing, sms
    
Waymedia
Published By: Prodiance Corp.     Published Date: Dec 22, 2008
Since the National Association of Insurance Commissioners (NAIC) made revisions to the Financial Reporting Model Regulation (Model Audit Rule) in June 2006, the insurance industry’s attention to the risks associated with financial reporting has been on the rise. Structured similarly to Section 404 of the Sarbanes‐Oxley Act, the Model Audit rule places a significant burden on C‐level executives to ensure their oversight in the internal controls for financial reporting (ICFR) process. Executives within these insurance organizations, both public and private, will be required to evaluate their internal controls in preparation for the first reports due in 2010 for the 2009 reporting period.
Tags : 
prodiance, sarbanes‐oxley act, security and integrity of data, analytics, risk assessment, optimization
    
Prodiance Corp.
Published By: SAS     Published Date: Aug 03, 2016
The concept and practice of stress testing has been around for many years. While traditional stress testing methodologies are still valid for firmwide scenario analysis and stress testing, special techniques and attentions are needed to successfully achieve the goal of firmwide capital adequacy in forwardlooking stress scenarios. During the 2007 financial crisis, many financial institutions were not sufficiently prepared for the ensuing liquidity crunch and capital drains. Perhaps if banks had worked through different economic scenarios prior to the crisis, they would have been in a better position to weather the storm. Inadequate preparation for crisis can lead to systemic risk and severe economic and political turmoil.
Tags : 
best practices, risk management, security, analytics
    
SAS
Published By: SAS     Published Date: Aug 03, 2016
With this increased attention on building a brand as a strategic differentiator, how are marketers approaching it? A recent eMarketer global survey revealed that nearly 56 percent of marketers would increase spending on brand-building activities over the next year compared to 42 percent who said they would be focusing on demand generation. Brand awareness was a higher priority for marketers than demand generation, global business expansion efforts or event spending.
Tags : 
best practices, marketing, demand generation, business expansion, emarketer
    
SAS
Published By: SAS     Published Date: Aug 04, 2016
The Internet of Things (IoT) devices and sensors connected to computing systems and networks has received enormous attention in the last few years. The attention is due, in part, to the proliferation of connected devices, from about a million in the early 1990s to more than five billion today. In addition, the technology for connecting the devices has become more affordable and easier to integrate. The result is that IoT is helping to digitize more and more business processes, from the factory floor to tracking shipments across oceans. Digitized processes are providing a continuous stream of digital data. By analyzing the data stream, businesses can refine their processes by better understanding how those processes are performing, identifying possible issues sooner and uncovering areas for improvement.
Tags : 
best practices, technology, data, competitive advantage, data stream, digitized process
    
SAS
Published By: Spredfast, Inc.     Published Date: Feb 03, 2014
Learn how metrics effectively measure your social media presence and how they can help you understand which social channels your organization may need to focus more attention on.
Tags : 
metrics, social media presence, social media, social channels, brand, facebook, twitter, linkedin
    
Spredfast, Inc.
Published By: Riverbed     Published Date: Nov 08, 2012
No one likes to wait. Today everyone expects instantaneous responded from website and applications, and the longer they take to deliver, the more likely people will shift their attention. Learn how Stingray accelerates websites and other web apps.
Tags : 
stingray, aptimizer, web content optimization, accelerate websites, riverbed
    
Riverbed
Published By: Adobe     Published Date: Mar 07, 2013
Our eighth Digital Intelligence Briefing, in association with Econsultancy highlights key digital marketing trends for 2013, and outlines the challenges and opportunities which organisations are (or should be) paying close attention to this year.
Tags : 
digital marketing trends, adobe, social media engagement, targeting and personalisation, mobile optimisation
    
Adobe
Published By: Adobe     Published Date: Aug 22, 2013
With the exponential growth of smartphone and tablet use for search, research, and online purchases, mobile is quickly becoming the focal point of digital marketing. For most marketers, these increasingly ubiquitous devices are transforming the way customers engage with companies and their brands. Recent Adobe Digital Index reports have confirmed that smartphone and tablet traffic is rapidly on the rise, making these channels that advertisers need to be paying attention to as mobility trends continue to evolve.
Tags : 
search, search marketing, mobile marketing, mobile marketing trends, mobility trends
    
Adobe
Published By: Adobe     Published Date: May 13, 2015
Forbes and Forrester conducted a joint survey of 303 marketing and IT leaders that assesses the maturity of marketing and IT partnerships and how those relationships have evolved since our first version of this study in 2011. The results show some progress in taking action on items that require joint attention,but the devil is in the details, particularly around leadership and domain expertise.
Tags : 
cmo and cio relationship, marketing technology in practice, marketing partnerships survey, marketing collaboration
    
Adobe
Published By: Adobe     Published Date: May 13, 2015
Forbes and Forrester conducted a joint survey of 303 marketing and IT leaders that assesses the maturity of marketing and IT partnerships and how those relationships have evolved since our first version of this study in 2011. The results show some progress in taking action on items that require joint attention,but the devil is in the details, particularly around leadership and domain expertise.
Tags : 
cmo and cio relationship, marketing technology in practice, marketing partnerships survey, marketing collaboration
    
Adobe
Published By: Adobe     Published Date: May 13, 2015
Forbes and Forrester conducted a joint survey of 303 marketing and IT leaders that assesses the maturity of marketing and IT partnerships and how those relationships have evolved since our first version of this study in 2011. The results show some progress in taking action on items that require joint attention,but the devil is in the details, particularly around leadership and domain expertise.
Tags : 
cmo and cio relationship, marketing technology in practice, marketing partnerships survey, marketing collaboration
    
Adobe
Published By: BlackBerry     Published Date: Oct 03, 2012
Finally, there's a way for IT to give both aspects the attention they deserve. Find out what BlackBerry Balance can do for your organization.
Tags : 
it control, information technology, user experience, mobile solutions, mobile security
    
BlackBerry
Published By: Blackberry     Published Date: Oct 03, 2012
Finally, there's a way for IT to give both aspects the attention they deserve. Find out what BlackBerry Balance can do for your organization.
Tags : 
it control, information technology, user experience, mobile solutions, mobile security
    
Blackberry
Published By: ServiceNow     Published Date: Apr 19, 2013
A robust configuration management database (CMDB) is the heart of a successful service knowledge management system. It is the faithful source of configuration details and relationships people rely on to manage services throughout their lifecycle. Like personal relationships, building and maintaining an effective CMDB is a commitment that requires care and attention to get the best value.
Tags : 
configuration management, database, database management
    
ServiceNow
Published By: Oracle     Published Date: May 07, 2018
2017 was a momentous year in security, even though the DDoS landscape appeared to plateau. Maybe it was because Mirai hit so hard at the end of 2016 and the owners of other botnets were retooling to catch up. Maybe it was because news of large data breaches captured so many headlines, drawing the attention of both criminals and the public. Or maybe it is simply due to the cyclical nature of attack popularity that we have seen in the past. No matter the cause, our prediction is that the trend wont continue in 2018, and it is not time to be complacent. The Mirai botnet is far from played out, as botnet creators are continuing to modify the source code for their individual needs and, with more connected platforms devices than ever, the Internet will continue to offer fertile ground for largescale attacks.
Tags : 
internet, security, cryptocurrency, data, breaches, botnet
    
Oracle
Published By: Riverbed     Published Date: Apr 14, 2017
Many organizations transitioning from on-premises Microsoft applications to Office 365 will experience performance problems due to geographic factors and use of the Internet for connectivity. IT can minimize performance issues and deliver an acceptable experience to end users by paying careful attention to network design.
Tags : 
    
Riverbed
Published By: eDataSource     Published Date: Jun 15, 2015
Among the many useful elements of eDataSources visibility into the email activity of 50,000 brands is what we can see of how each subscriber in an email marketers audience is being mailed by specific other brands. This view provides a picture of which other brands are competing against yours for attention in your audiences inboxes.
Tags : 
    
eDataSource
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search Resource Library