ack

Results 6601 - 6625 of 6800Sort Results By: Published Date | Title | Company Name
Published By: Listrak     Published Date: May 02, 2008
Even though there are many email marketing solutions that allow marketers to create, deploy, track, and manage their email marketing campaigns easily, there is still a significant percentage of companies that outsource this business process to an outside advertising agency, search engine optimization firm, application service provider, or interactive marketer.
Tags : 
listrak, email marketing, best practices, html, html newsletter, roadmap
    
Listrak
Published By: Radius Solutions     Published Date: Apr 29, 2008
"Lean" is defined as a process to improve manufacturing and service operations, reduce waste, improve quality and drive down cost. While many packaging companies have embraced a number of Lean Manufacturing concepts, many have yet to fully realize the benefits of a fully-integrated Lean environment. Leveraging an ERP system that embraces "Lean" principles and incorporates industry specific best practices can facilitate and support the process. In this white paper, learn how lean manufacturing can apply to printing and packaging, and how an ERP system fits into the process.
Tags : 
erp, lean, lean methods, lean manufacturing, printing, packaging, radius, radius solutions
    
Radius Solutions
Published By: Radius Solutions     Published Date: Apr 29, 2008
Buying an ERP system that doesn't closely fit your business processes can be a costly mistake. This is particularly true if you try to fit a generic manufacturing ERP solution into a packaging/printing business environment. Reworking a non-industry specific system to meet the day-to-day operational needs of a printing/packaging operation requires significant modifications to the core product. The resulting software can end up so heavily customized that it can be difficult and very costly to maintain.
Tags : 
erp, erp software, erp system, software selection, radius, radius solutions
    
Radius Solutions
Published By: IBM     Published Date: Apr 23, 2008
Imagine using your personal desktop on any computer. You can, with the IBM Virtual Client Solution. This demo explains the backend process of server-hosted services, shows how a user’s desktop is delivered through a remote connection, and demonstrates how an administrator can shift servers for IT simplification without interrupting users.  Watch the demo now.
Tags : 
ibm, ibm opt it, opt it, remote desktop, vnc, virtual client, virtual machine, virtual desktop
    
IBM
Published By: IBM     Published Date: Apr 23, 2008
The IBM Active Energy Manager is a unique software tool that gives you the detailed information you need to closely and accurately monitor power consumption in your data center. Watch this IBM demo to see the extensive capabilities of Active Energy Manager, from setting automatic caps on energy usage to tracking trends over any time period you specify.
Tags : 
energy, energy efficient, power, data center, datacenter, ibm, ibm opt it, opt it
    
IBM
Published By: IBM     Published Date: Apr 23, 2008
This Q&A-style article from CIO Green Edge Zone covers some of the many ways businesses can benefit through green technologies. Becoming more energy efficient not only dramatically reduces power costs, but can actually help companies improve operational efficiencies, increase productivity, enhance customer service and heighten brand awareness.
Tags : 
ibm, opt it, ibm opt it, green, environmental, environment, productivity
    
IBM
Published By: Astrocom     Published Date: Apr 23, 2008
Quality of Service (QoS) enables outbound network traffic to be identified and controlled to give priority to certain types of traffic. Network traffic may be categorized based on a variety of criteria including addressing information, protocol, port number (TCP and UDP), and packet length.
Tags : 
astrocom, networking, traffic, quality of service, traffic management, network management
    
Astrocom
Published By: Netwrix     Published Date: Apr 22, 2008
Password practices that improve security are by their nature burdensome to the user, resulting in passwords difficult to remember which are often changed about the same time they have finally become memorized. Yet password security remains a cornerstone of system security: as much as 80% of security breaches take place not through arcane hacking and virus attacks, but through system infiltration facilitated by use of a password.
Tags : 
netwrix, authentication, passwords, password management, identity theft, fraud, login
    
Netwrix
Published By: SilverStorm Technologies     Published Date: Apr 21, 2008
If you think you know sales, you likely are bringing to this topic a history and track record that has served you well.  This paper attempts to offer the cautionary warning that what has worked in your past may not serve your current  sales reps as well today, and could actually hurt their performance. Sales 1.0 was about lone wolves, product superiority,  proven skills and making the number.
Tags : 
landslide, customer relationship, customer loyalty, loyalty, crm, sales, sales, sales 2.0
    
SilverStorm Technologies
Published By: Landslide Technologies     Published Date: Apr 21, 2008
If you think you know sales, you likely are bringing to this topic a history and track record that has served you well.  This paper attempts to offer the cautionary warning that what has worked in your past may not serve your current  sales reps as well today, and could actually hurt their performance. Sales 1.0 was about lone wolves, product superiority,  proven skills and making the number.
Tags : 
landslide, customer relationship, customer loyalty, loyalty, crm, sales, sales, sales 2.0
    
Landslide Technologies
Published By: Vision Solutions     Published Date: Apr 11, 2008
If you need more than tape backup to protect your critical applications running on AIX operating environments, download this white paper and learn your options and strategies, including how new technologies have significantly improved the recovery time and data recovery points for AIX.
Tags : 
data management, disaster recovery, business continuity, ibm aix, backup, recovery, vision, vision solutions
    
Vision Solutions
Published By: Diligent Technologies     Published Date: Apr 11, 2008
This document is intended for the use of Enterprise1 Storage Professionals, focused on Data Protection — Backup, Restore,DR and Archive operations — who are interested in evaluating the potential impact of de-duplication technologies to their business. There is much hyperbole associated with de-duplication. The purpose of this document is to help readers distill the essence from the hype, as the basis for sound decision-making.
Tags : 
diligent, diligent technologies, deduplication, de-duplication, data center, datacenter, data protection
    
Diligent Technologies
Published By: Quocirca     Published Date: Apr 09, 2008
Today, many organizations are increasingly reliant on software application development to deliver them competitive edge. Simultaneously, they are progressively opening up their computer networks to business partners, customers and suppliers and making use of next-generation programming languages and computing techniques to provide a richer experience for these users. However, hackers are refocusing their attention on the vulnerabilities and flaws contained in those applications.
Tags : 
quocirca, application security
    
Quocirca
Published By: iLinc     Published Date: Mar 31, 2008
iLinc's patented Green Meter technology works continuously in the background of all of iLinc web collaboration sessions (online meetings, webinars, and training/learning).
Tags : 
ilinc, salesforce, webinar, presentation, green, web collaboration, green meter, web conferencing
    
iLinc
Published By: IBM     Published Date: Mar 28, 2008
We live and work in a fast-moving and dynamic world, caught between a host of conflicting demands on our time and attention. Against this backdrop we’re called on to boil an ocean of information in order to support the decisions that we have to make on an hour-by-hour basis.
Tags : 
    
IBM
Published By: Sunbelt Software     Published Date: Mar 27, 2008
Messaging, internal and Web-based threats are increasing in number and severity. Because the profit motive now drives spammers, hackers and other purveyors of malicious content, as well as the development of more sophisticated techniques to circumvent corporate defenses, organizations must continue to improve their defenses.
Tags : 
messaging, security, web threats, email threats, email security, spam, trojan, sunbelt
    
Sunbelt Software
Published By: Oce Business Services     Published Date: Mar 24, 2008
Effective records management has never been more crucial to meeting corporate governance, risk management and operational mandates. Yet half of enterprises lack a fully implemented records management program. Download this white paper to learn how strategic outsourcing can help you mitigate risks, apply best practices, meet compliance mandates and improve overall records management ROI.
Tags : 
oce, records management
    
Oce Business Services
Published By: CopiaTECH     Published Date: Mar 18, 2008
Larger businesses have more to lose in terms of absolute dollars, but it is the narrow profit margin under which smaller businesses work which makes it important for them to have their information backed up. Learn how to protect your small business in this guide.
Tags : 
copiatech
    
CopiaTECH
Published By: CopiaTECH     Published Date: Mar 18, 2008
Words like “integrated” and “centralized” have been used to describe application software solutions for some years now, often because of marketing messaging that implies more interoperability than the given technology can actually provide to the business customer. The terms are broad enough to be almost meaningless in some instances. In the field of IT security, the sheer range of tools and techniques in the hacker or virus writer’s armory that one must guard against has driven up the number of solutions required to prevent attacks.
Tags : 
copiatech
    
CopiaTECH
Published By: IBM     Published Date: Mar 17, 2008
Smaller businesses represent the entrepreneurial engine of the U.S. economy - that's why IBM has extended the BladeCenter value proposition to smaller businesses and organizations in a compact, affordable package. Read more about how BladeCenter can benefit your business in this report by Pund-IT.
Tags : 
ibm, blade, blade center, bladecenter, bladesystem, blade system, move up, infrastructure
    
IBM
Published By: IBM     Published Date: Mar 17, 2008
By doing more with less, you can realize savings and reduce complexity at the same time. IBM BladeCenter is a complete, compact and integrated system designed to simplify IT in small and mid-sized offices and distributed environments. It's packed with energy-saving features that lower operating costs and it's flexible enough to grow with your business. Learn about the features and options of the IBM BladeCenter and see why it's the right choice for your diverse business needs.
Tags : 
ibm, move up, blade system, blade center, blade, blade server, bladesystem, bladecenter
    
IBM
Published By: IBM     Published Date: Mar 17, 2008
This report presents the results of tests conducted by Edison Group to compare the power consumption of the IBM BladeCenter blade server system with a comparable BladeSystem blade server configuration from HP. It provides background, configuration details, and methodology by which Edison reached its conclusion: that IBM BladeCenter H requires nearly 10 percent less power than the equivalently configured HP BladeSystem c7000.
Tags : 
ibm, move up, ibm move up, blade center, bladecenter, green, power consumption, cooling
    
IBM
Published By: Red Condor     Published Date: Mar 17, 2008
Your network is defenseless against image-based spam attacks. Red Condor reveals how a simple approach can result in a less than 0.01% false-positive rate while achieving long term spam block rates greater than 98%. Get this white paper to arm yourself against the latest malicious email threats. Follow the instructions below and you'll learn the secret to living in a spam-free world.
Tags : 
image-based, image based spam, spam, image spam, red condor, redcondor
    
Red Condor
Published By: BrightWave Marketing     Published Date: Mar 13, 2008
Denison University utilizes a multi-faceted direct marketing program to communicate with their alumni and other key constituents. Email marketing has become a more important part of their development strategy in recent years due to the cost effectiveness, tracking capabilities and growing use of email and internet to contribute to the school’s Annual Fund.
Tags : 
brightwave, email design, email marketing, philanthropy, fund raising, fund raiser, alumni, alumnus
    
BrightWave Marketing
Published By: SEPATON     Published Date: Mar 11, 2008
Is backup and recovery unnecessarily draining your budget and resources? This report measures the TCO of an enterprise environment using various data protection models, including tape, virtual tape library, and data deduplication solutions.  Learn how each stacks up in this comparative report.
Tags : 
backup, data deduplication, deduplication, sepaton, tco
    
SEPATON
Start   Previous    258 259 260 261 262 263 264 265 266 267 268 269 270 271 272    Next    End
Search Resource Library