bsp

Results 301 - 325 of 411Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Oct 09, 2009
Does your IT change as fast as the market? A service-oriented architecture (SOA) provides a foundation that enables agility and aligns IT to business goals. This interactive presentation from IBM will show you how to provide fast, flexible, reliable access to information, business-wide. It also covers methods to ensure trust, management and security across business applications.
Tags : 
application foundation, ibm, service-oriented architecture, soa, websphere, point-to-point connectivity, esb messaging, esb enrichment
    
IBM
Published By: IBM     Published Date: Nov 16, 2009
Is your information at risk? Read this whitepaper to find out how the IBM WebSphere MQ FTE solution, built on WebSphere MQ, offers reliable, secure and auditable file transfers.
Tags : 
ibm, ebf, websphere mq, file transfer edition, fte, ftp
    
IBM
Published By: iDirect     Published Date: Jan 29, 2007
Many people may not be aware of SEO’s usefulness is in business to business marketing or what a valuable marketing tool SEO can be in general.  Learn more about why B2B companies can benefit from using SEO as a key marketing tool.
Tags : 
search marketing, search engine marketing, search engine optimization, seo firms, seo firm, seo, outsource, outsourcing
    
iDirect
Published By: iDirect     Published Date: Jan 29, 2007
Very often, the people who first recognize the potential benefits of professional SEO are not the key decision makers when it comes to a company’s marketing mix.  They are the people on the front lines of the organization - the ones who deal with prospects and customers every day.
Tags : 
seo, search marketing, search engine optimization, seo firm, seo firms
    
iDirect
Published By: iDirect     Published Date: Jan 29, 2007
There are a number of guaranteed SEO companies, but many of these guarantees are meaningless and about as useful as leprechaun repellent.  Learn what to look for to avoid being taken advantage of by unscrupulous SEO companies.
Tags : 
medium blue, seo firms, seo companies, seo company, seo firm, seo, search marketing, search engine optimization, false promises
    
iDirect
Published By: NetSuite     Published Date: Nov 27, 2007
Where should mid-market companies invest valuable resource? Two out of three businesses are either buying or considering buying software via the subscription model.  This white paper will explain how Software-as-a-Service is revolutionizing the economics of growing businesses.
Tags : 
saas, software as a service, on demand, on-demand, software development, development, programming, web services, netsuite
    
NetSuite
Published By: NetSuite     Published Date: Nov 27, 2007
But what is "BI" and how do small/mid size business owners acquire it without too much cost?  This Executive White Paper will outline the issues and solutions for the "BI" requirements of growing companies.
Tags : 
analytics, business analytics, business intelligence, bi tools, business planning, erp data, netsuite
    
NetSuite
Published By: NitroSecurity     Published Date: Aug 21, 2009
NitroSecurity's Active Network Response is a new security model that delivers network protection closer to the users at the network edge - stopping attacks before they can propagate throughout the network. 
Tags : 
network security, intrusion prevention, hackers, hacker detection, ips, anr, nitro security, nitrosecurity
    
NitroSecurity
Published By: ProjectLocker     Published Date: Nov 19, 2007
Learn how you can transform your website into a marketing machine that attracts qualified prospects and converts a higher percentage of them into paying customers.  This Internet marketing whitepaper discusses 5 tips you can implement today to leverage the Internet and reach your customers more effectively.
Tags : 
website marketing, search engine, sem, seo, online marketing, blogging, adwords, google adwords, marketing, ppc, pay per click, google search, paid search, hubspot
    
ProjectLocker
Published By: PTC     Published Date: Aug 21, 2009
DITA is one of the most important innovations in XML publishing in recent memory.  Though DITA is an IBM invention and plenty of material has been written about it already, this paper must be read as well to clear the air about any errors, omissions, or misinterpretations, from previous publications on this topic.
Tags : 
xml, dita, darwin, ibm, ptc
    
PTC
Published By: Secure Computing     Published Date: Nov 20, 2006
Organizations need to be protected from both known and unknown threats, and all the varieties and forms that sophisticated malware can take.  Learn about the changing nature of malware attacks and how the Webwasher Anti-Malware from Secure Computing can provide a highly effective defense against malicious content.
Tags : 
anti spam, anti spyware, anti virus, application security, security, network security, data protection, malware, secure computing, securecomputing
    
Secure Computing
Published By: Secure Computing     Published Date: Nov 20, 2006
Spammers have now fired a new barrage of image spam using randomized images that appear identical to the human eye, yet appear to be entirely unique to most anti-spam software. Many of the changes to the images contained within spam messages are so subtle that they require a pixel-by-pixel examination of the image in order to detect the differences.  Read how Secure Computing effectively addresses this problem.
Tags : 
security, anti spam, email security, image spam, malware, spyware, crimeware, intrusion prevention, it management, phishing, secure computing, securecomputing
    
Secure Computing
Published By: Secure Computing     Published Date: Feb 22, 2007
This paper outlines these new threats and discusses the limited effectiveness of reactive legacy Web security solutions against those threats.  The paper then outlines the new reputation based, proactive security paradigm that is necessary for securing Web 2.0 applications.
Tags : 
web 2.0, web 20, web security, application security, web app security, internet security, network security, hacker detection, intrusion prevention, secure computing, securecomputing, security
    
Secure Computing
Published By: SilverStorm Technologies     Published Date: Apr 21, 2008
If you think you know sales, you likely are bringing to this topic a history and track record that has served you well.  This paper attempts to offer the cautionary warning that what has worked in your past may not serve your current  sales reps as well today, and could actually hurt their performance. Sales 1.0 was about lone wolves, product superiority,  proven skills and making the number.
Tags : 
landslide, customer relationship, customer loyalty, loyalty, crm, sales, sales, sales 2.0, sales 1.0
    
SilverStorm Technologies
Published By: Third Brigade     Published Date: Aug 21, 2009
Businesses today are under intense pressure to open up their networks, comply with increasingly rigorous regulatory requirements, AND ensure their IT assets are protected from attacks. This white paper explores these security challenges and explains how host-based Intrusion Prevention Systems  play a critical role in an organization's overall security strategy.
Tags : 
intrusion prevention, security, network security, compliance, security compliance, attacks, hacker detection, ips, intrusion prevention system, security strategy, security management, third brigade
    
Third Brigade
Published By: Third Brigade     Published Date: Nov 27, 2006
This white paper identifies critical vulnerabilities that most organizations overlook when they secure their web applications. It also introduces host intrusion defense with deep packet inspection as a new, effective  approach for shielding these vulnerabilities.
Tags : 
web application security, application security, web security, web service security, security management, internet security, ips, intrusion prevention, intrusion detection, hacker detection, third brigade, security, it management, platforms
    
Third Brigade
Published By: Villanova     Published Date: Aug 21, 2009
Earned value (EV) has grown in popularity over the last several years. With 76% of IT projects failing (Crawford, 2002), project management and control systems must be implemented to ensure IT project success.  Learn how EV links to the work breakdown structure (WBS) the schedule and the budget.
Tags : 
project management, employee performance, budget, project success, villanova, it management
    
Villanova
Published By: Villanova     Published Date: Aug 21, 2009
Professionals who master Six Sigma disciplines can become recognized leaders, guiding key projects that result in breakthrough improvements, improving bottom-line results.  This white paper discusses how Project Managers can deliver projects as much as 90% faster, and reduce costs by 25%.
Tags : 
project management, project management tips, 6 sigma, lean methods, lean, pmp, cost control, productivity, business management, villanova, it management
    
Villanova
Published By: XOsoft     Published Date: Aug 21, 2009
The primary information management concern in the enterprise today is to ensure that the knowledge necessary to drive critical business processes is available where it needs to be, when it needs to be. The costs of failure to do this are high. 
Tags : 
cost control, data loss, data protection, information management, data management, business process management, xosoft, knowledge management, storage
    
XOsoft
Published By: EMC     Published Date: Nov 06, 2006
The amount of data on business computers has grown astronomically over the past few decades.  If a company loses this data, business grinds to a halt. The following tips can help you select the hardware and software you need to safeguard the integrity of your data, guarantee accurate restores, and manage backups without placing an undue burden on IT personnel.
Tags : 
data protection, raid, disaster plan, smb, smbs, small business, top 10, backup and recovery, emc, emc insignia, storage
    
EMC
Published By: Quocirca     Published Date: Nov 13, 2006
IT in the UK public sector is under intense scrutiny and needs to deliver better results:  much investment has been made which has too often failed to deliver. Projects have a history of being protracted and complex, offering significant challenges to all involved.
Tags : 
public sector, it management, government, project management, efficiency, productivity, quocirca
    
Quocirca
Published By: Quocirca     Published Date: Dec 04, 2006
Service Oriented Architectures (SOAs) will provide greater flexibility for those utilizing them, but will also bring greater issues for data and functional connectivity.  This paper contrasts and compares the capabilities of a point-to-point and an enterprise service bus approach.
Tags : 
soa, connectivity, service-oriented architecture, service oriented architecture, data management, enterprise, quocirca, it management, knowledge management
    
Quocirca
Published By: Quocirca     Published Date: Apr 23, 2007
The need to understand how the performance and problems within the technical infrastructure impacts the capabilities of the business is massive.  However, the majority of companies can only measure application and specific asset performance, whereas many issues within the infrastructure lie at the transport level, where packet switching presents both great opportunities and major issues.
Tags : 
networking, infrastructure, network management, tcp/ip protocol, wide area networks, wan, wans, packet switching, packets, protocol, data packet, business metrics, quocirca
    
Quocirca
Published By: Quocirca     Published Date: Apr 23, 2007
Information management, which includes both data and content management, is an essential building block for Service-Oriented Architecture (SOA).  By taking a service oriented approach to information, you can achieve much greater value from your information assets.
Tags : 
information management, service oriented architecture, service-oriented architecture, soa, data management, mdm, master data management, content management, content management system, information integration, quocirca
    
Quocirca
Published By: Quocirca     Published Date: Jul 11, 2007
SOA enables composite applications or collections of services that have been assembled to support a company’s business processes.  Portal and collaboration software delivers the essential people-focused capabilities of the SOA strategy to provide significant value to the organisation.
Tags : 
productivity, soa, service oriented, service-oriented, collaboration, bpm, business process management, portals, workforce management, team management, quocirca, it management
    
Quocirca
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.