paper

Results 8626 - 8650 of 9047Sort Results By: Published Date | Title | Company Name
Published By: Concur     Published Date: Apr 17, 2013
In-depth survey results from research conducted by International Accounts Payable Professionals (IAPP). Insights include, 94.9% of AP respondents still use paper checks for business-to-business payments despite all the talk about electronic payments.
Tags : 
ap trends, ap automation, accounts payable, invoice management, invoice automation, invoicing, ap report, ap study
    
Concur
Published By: Semcasting     Published Date: Jan 02, 2013
In this white paper from Semcasting, you will learn more about the limitations of cookie-based behavioral targeting and how a new solution called IP Zones can dramatically increase both the scale and accuracy of online display campaigns.
Tags : 
digital marketing, ip address targeting, ip geo targeting, internet marketing business, ip zones, retail marketing, online retail marketing, retail trade area
    
Semcasting
Published By: Semcasting     Published Date: Feb 14, 2013
This White Paper illustrates three important lessons learned as a result of executing highly targeted campaigns for 36 elected offices in November of 2012.
Tags : 
hyperlocal targeting, hyper-local targeting, location-based targeting, hyperlocal advertising, hyper-local advertising, digital marketing, ip address targeting, ip geo targeting
    
Semcasting
Published By: Semcasting     Published Date: Aug 29, 2013
This white paper will guide you through a series of third party studies that have been completed recently on the diminishing reach and effectiveness of audience targeting with cookies. The numbers are challenging and it appears it may be time for an alternative to the cookie.
Tags : 
digital targeting, ip targeting, online business marketing, online targeting, online ad targeting, internet marketing, digital target, online marketing strategies
    
Semcasting
Published By: Sage     Published Date: Aug 19, 2014
Social media is making a huge impact on the way we use the Internet, communicate with friends and family, network with business colleagues, gather information, and make decisions. In business, social media can provide unique opportunities to promote products and services, find and recruit talented employees, and deliver an interactive customer experience. But there are also risks, such as the potential to damage the company’s reputation and brand, lose intellectual property, or invite lawsuits by employees, job applicants, or customers. From an HR perspective, it can be hard to tell if social media is your friend or your foe. This white paper discusses how HR can use social media and how it can go wrong.
Tags : 
sage, social media, human resources, recruit, risk, intellectual property
    
Sage
Published By: Crimson Hexagon     Published Date: Mar 06, 2013
In this white paper, learn how to account for missing metric in financial reporting and valuations. How can we perform aggregate analysis of online consumer opinion to complement traditional marketing analysis and due diligence?
Tags : 
aggregate consumer voice, no longer on mute, social media, due diligence, financial institutions, voice of the consumer
    
Crimson Hexagon
Published By: Crimson Hexagon     Published Date: Mar 06, 2013
How can firms better understand consumer motivations to inform new product development and positioning strategies? Read this white paper and learn what Crimson Hexagon figured out.
Tags : 
consumer device, adoption, global markets, crimson hexagon, survival strategy, marketing strategy
    
Crimson Hexagon
Published By: McAfee     Published Date: Apr 10, 2013
This white paper discusses three common approaches to email encryption and explains their distinct advantages to help you determine which approach best fits the needs of your organization.
Tags : 
email encryption, email security, tls encryption, transport layer security, on premises, saas
    
McAfee
Published By: McAfee     Published Date: Apr 10, 2013
In this white paper, IDC provides an overview of messaging security and its impact on enterprises.
Tags : 
idc, hybrid email messaging security, on premises, saas, mcafee saas email protection, mcafee saas email continuity, mcafee email gateway, mcafee host dlp protection
    
McAfee
Published By: McAfee     Published Date: Sep 17, 2013
How Cybercriminals Make Money With Your Email, An Osterman Research Whitepaper
Tags : 
email protection, security, mcafee, solution, technology, research, cyberprotection
    
McAfee
Published By: F5     Published Date: Feb 01, 2013
Are you doing enough to scale your DNS and protect your business? This paper discusses how a full-proxy architecture for DNS can address those growth and security challenges to provide a complete solution for global, local, and cloud load balancing.
Tags : 
dns, protection, full proxy architecture, growth, challenges, solution, global, domain name system
    
F5
Published By: Rovi     Published Date: Feb 07, 2013
By understanding the three key IP management concepts outlined in this paper, CEO’s can lead their teams to achieve profound business results.
Tags : 
intellectual property, knowledge management, ceo, strategy, r&d, innovation, development
    
Rovi
Published By: Jive     Published Date: Mar 29, 2013
When it comes to producing collateral and other assets, marketing has been stuck in the past.
Tags : 
marketing campaigns, cmo, social, social media, campaign planning, campaign development, content, sales colateral
    
Jive
Published By: Arbor     Published Date: Sep 20, 2013
In this white paper, John Pescatore of SANS Institute explores how DDoS is used as part of advanced targeted attacks (ATAs) and describes how DDoS detection and prevention tools and techniques can be used against ATAs as well. Today’s DDoS attacks, as damaging as they are, sometimes mask even more threatening and dangerous advanced targeted threats. The good news is that some of the same tools that can detect the footprints of DDoS attacks can also find the telltale signs of ATAs. To be successful, though, enterprises need to coordinate their use of both types of logs and adjust their monitoring parameters correctly. They must also eliminate operational gaps, such as unclear lines of security authority, and limit the use of managed security services that can deprive enterprise security managers of the data they need to detect and stop DDoS attacks and ATAs.
Tags : 
distributed denial of services, ddos attack, ddos detection, ddos mitigation, security, advanced targeted attacks, mitigation, detection
    
Arbor
Published By: Arbor     Published Date: Sep 20, 2013
Today’s hosting provider can increase revenue by capitalizing on the growing demand of business customers for hosted online operations—provided, of course, that it can safeguard these critical operations against DDoS-related outages. Using the simple, step-by-step approach described in this paper, providers can model the financial impact of a DDoS attack on their operations and calculate the ROI of an effective DDoS defense solution.
Tags : 
distributed denial of services, defense solutions, security, financial management, ddos attacks, ddos protection, ddos defense system, ddos protection solutions
    
Arbor
Published By: Optis     Published Date: Mar 07, 2013
Companies can realize significant savings with an automated absence management system. Download the Optis study to see how one company saved over $8 million by reducing lost time and getting a handle on leave.
Tags : 
people data management, disparate people data, analyze leave data, employment data, employee benefits data, workforce data management, integrated people data, people data strategy
    
Optis
Published By: Optis     Published Date: Mar 07, 2013
When employee absences can make up 36 percent of an employer’s payroll, companies need to manage leave without adding costs. Find out how an integrated system will improve the bottom line and bring people data together.
Tags : 
people data management, disparate people data, analyze leave data, employment data, employee benefits data, workforce data management, integrated people data, people data strategy
    
Optis
Published By: Sponsored by HP and Intel® Xeon® processors     Published Date: Feb 19, 2013
This Enterprise Strategy Group paper examines the specific demands facing any mid range storage system offering with a focus on HP 3PAR StoreServ 7000’s ability to deliver.
Tags : 
intel, comtemporary, meaning, midrange storage, hp 3par
    
Sponsored by HP and Intel® Xeon® processors
Published By: Sponsored by HP and Intel® Xeon® processors     Published Date: Feb 19, 2013
This Taneja Group Solution Profile takes a closer look at what business continuity means in a storage system, and examines the approaches that vendors typically take to providing it. This paper looks into HP3PAR StoreServ 7000 and more.
Tags : 
san storage, intel, intel, hp 3par, hp storeserv
    
Sponsored by HP and Intel® Xeon® processors
Published By: Sponsored by HP and Intel® Xeon® processors     Published Date: Feb 19, 2013
This Enterprise Strategy Group whitepaper reviews HP 3PAR Storage Adaptive Optimization software -- granular, automated, and policy-based service-level optimization and more. Learn how this combination is a thoughtful approach that can deliver.
Tags : 
hp 3par, optimization, io service levels, optimizing
    
Sponsored by HP and Intel® Xeon® processors
Published By: Sponsored by HP and Intel® Xeon® processors     Published Date: Feb 19, 2013
In this paper, Evaluator Group highlights the critical features necessary to move beyond server virtualization by leveraging key integration capabilities between IT components with a particular focus on the important role that storage plays and more.
Tags : 
evolving datacenter architecture, technologies, cloud ready it
    
Sponsored by HP and Intel® Xeon® processors
Published By: NETIQ     Published Date: Mar 12, 2013
In this paper, we will analyze the relationship between SIEM and log management, focusing not only on the technical differences and different uses for these technologies, but also on architecting their joint deployments.
Tags : 
security information, event management, log management, pci dss, security
    
NETIQ
Published By: NETIQ     Published Date: Mar 12, 2013
This whitepaper discusses the challenges of meeting PCI DSS compliance, as well as the ways in which organizations can leverage that work to provide better security.
Tags : 
pci dss compliance, security compliance, it management
    
NETIQ
Published By: NETIQ     Published Date: Sep 09, 2013
This Forrester Technology Adoption Profile (TAP) shows how growth in mission-critical applications is driving disaster recovery initiatives, enhanced disaster recovery capabilities shorten recovery objectives and the future of disaster recovery rests with advanced continuity tools. To learn more, download your copy of this informative Forrester TAP today.
Tags : 
netiq, disaster recovery, replication, recovery, forrester, technology adoption profile, mission critical, white paper
    
NETIQ
Published By: NETIQ     Published Date: Sep 09, 2013
This flash point paper contains 4 simple rules to help you cut your organization’s privileged user access issues and facilitate resolution if and when a problem does arise.
Tags : 
netiq, privileged users, it security, hidden risk, super users, administrative access, security breach, corporate policies
    
NETIQ
Start   Previous    339 340 341 342 343 344 345 346 347 348 349 350 351 352 353    Next    End
Search Resource Library