tracking

Results 351 - 375 of 415Sort Results By: Published Date | Title | Company Name
Published By: BrightWave Marketing     Published Date: Mar 13, 2008
Denison University utilizes a multi-faceted direct marketing program to communicate with their alumni and other key constituents. Email marketing has become a more important part of their development strategy in recent years due to the cost effectiveness, tracking capabilities and growing use of email and internet to contribute to the school’s Annual Fund.
Tags : 
brightwave, email design, email marketing, philanthropy, fund raising, fund raiser, alumni, alumnus, university, college
    
BrightWave Marketing
Published By: VisiStat     Published Date: Mar 22, 2007
This report outlines five important "insider" secrets for measuring the effectiveness of your Website, along with tips on how to turn it into a lead generation machine.
Tags : 
website traffic, visitor tracking, web analytics, web metrics, site analysis, online marketing, site management, increase sales, advertising, marketing campaign, ad tracking, generate leads, sales leads, online sales, sales tool, small business, ecommerce, search engine ranking, seo, keywords
    
VisiStat
Published By: VisiStat     Published Date: Mar 22, 2007
Old Log File analytics data was good – today's hosted on-demand Web analytics reporting is much better. What once was only understandable by IT personnel now has a place on the desktops of sales, marketing and business professionals. Read about the differences, and improvements, in analytics.
Tags : 
web analytics, hosted analytics, hosted solution, snippet, page snippets, snippet technology, code snippets, code tag, web logs, log files, server logs, server log files, log-file analysis, web metrics, on demand reporting, real time data, real-time reporting, data collection, statistics analysis, business metrics
    
VisiStat
Published By: Absolute Software     Published Date: Jan 27, 2010
Deploying patches in a timely fashion soon after they become available helps secure the OS and prevent the majority of data breaches. However, many computer systems are often not patched for months or not at all.
Tags : 
computrace, absolute software, it asset management, remote data delete, geolocation tracking, theft recovery, service guarantee
    
Absolute Software
Published By: Absolute Software     Published Date: Jan 19, 2010
This whitepaper explains step-by-step how you can deploy a complete Snow Leopard disk image to a Mac OS X computer, even while it is being used. No immediate boot from a server, FireWire drive, or boot DVD is necessary, and no pre-configuration of the target computer is required.
Tags : 
computrace, absolute software, it asset management, remote data delete, geolocation tracking, theft recovery, service guarantee
    
Absolute Software
Published By: Data Guard Systems     Published Date: Aug 21, 2009
The best way to take control of employee management is to automate human resource (HR) processes, including time tracking, schedules, and payroll calculation. This document addresses the key points that cellular retailers, wholesalers, and master agents need to know about implementing and using CellularManager's centralized web-based HR management system.
Tags : 
human resource, cell phone, cellular retailer, human resources, cellularmanager, cellular manager, data guard, data guard systems
    
Data Guard Systems
Published By: IBM     Published Date: Apr 23, 2008
The IBM Active Energy Manager is a unique software tool that gives you the detailed information you need to closely and accurately monitor power consumption in your data center. Watch this IBM demo to see the extensive capabilities of Active Energy Manager, from setting automatic caps on energy usage to tracking trends over any time period you specify.
Tags : 
energy, energy efficient, power, data center, datacenter, ibm, ibm opt it, opt it, networking
    
IBM
Published By: ITI     Published Date: Aug 21, 2009
The ABAQUS/Explicit simulation to predict tracking consists of several steps. First, find the belt shape, as it is stretched around the rollers. Second, apply tensioning device forces and roller misalignments. Finally, initiate belt rotation, transient and steady state.
Tags : 
abaqus, explicit, predict tracking, product development, product testing, cad, computer aided design, cad, computer-aided design, cae, computer aided engineering, computer-aided engineering, product development lifecycle, iti
    
ITI
Published By: Dell Software     Published Date: Jul 18, 2012
Choosing a help desk solution
Tags : 
technology, help desk, management, tracking problems, ticket requests, white paper, customer service, business technology, research
    
Dell Software
Published By: Infor     Published Date: Apr 19, 2007
This paper includes a comparison between using RFID and barcoding for asset management as well as real-life examples of how RFID technology is being used by enterprising organizations today to gain significant time savings and enable better asset and maintenance management.
Tags : 
wireless, wireless hardware, wireless infrastructure, rfid, radio frequency, mobile data systems, asset management, barcode, barcoding, infor, erp
    
Infor
Published By: GAO RFID Inc.     Published Date: Feb 28, 2007
The applications for the healthcare industry are multiple, including asset tracking, patient tracking, staff location, baby monitoring, blood bank distribution, and more. Learn more in this overview by GAO RFID.
Tags : 
rfid, rfid tags, healthcare, wireless infrastructure, wireless data systems, wireless hardware, gao group, gao, gao rfid
    
GAO RFID Inc.
Published By: Microsoft Dynamics     Published Date: Nov 06, 2008
The Rodgers & Hammerstein Organization (R&H) manages and administers musical and theatrical licensing rights for the heirs of Richard Rodgers, Oscar Hammerstein II, and many other talented writers. The company implemented Microsoft Dynamics AX in 2006 to gain complete control and visibility over its licensing and business operations. More recently, the company wanted to give employees quick and easy access to the information they need to perform their jobs more efficiently. R&H enrolled in the Microsoft Technology Adoption Program and became one of the first companies in the world to implement Microsoft Dynamics AX 2009. Now, employees throughout the organization have almost instant access to company information tailored to their specific roles. Employees spend less time tracking tasks and more time efficiently serving customers.
Tags : 
microsoft dynamics, rodgers & hammerstein, enterprise applications
    
Microsoft Dynamics
Published By: Concur     Published Date: Jan 07, 2013
Download this whitepaper and you will get an overview of how automated solutions simplify the process of logging and tracking T&E, virtually eliminating mistakes, and ensuring compliance.
Tags : 
expenses, automated solutions, eliminating mistakes, compliance, management, travel and entertainment
    
Concur
Published By: Borer Data Systems Ltd.     Published Date: Nov 07, 2007
At the Defcon security conference on August 2007, a hacker and Defcon staffer who goes by the name Zac Franken, showed how a small homemade device he calls "Gecko", which can perform a hack on the type of access card readers used on office doors throughout the country.
Tags : 
security, security management, access control, identity management, iam, authentication, wiegand, tracking, workforce, workforce management, employee management, borer, access control, wiegand, security, borer, borer data systems, hacker, defcon, zac franken
    
Borer Data Systems Ltd.
Published By: Borer Data Systems Ltd.     Published Date: Nov 07, 2007
Swiping a card to gain access to a company building is now a perfectly accepted feature of everyday corporate life. Over the years, we have all grown familiar with the routine and the advantages it brings to access control. But where cards were once used exclusively to open doors, controlling who went where and when in a building, now they can be used for a wide variety of extra functions.
Tags : 
security, security management, access control, identity management, iam, authentication, tracking, workforce, workforce management, employee management, borer, access control, ip world, borer, borer data systems, office security, building security, card technology
    
Borer Data Systems Ltd.
Published By: Borer Data Systems Ltd.     Published Date: Nov 07, 2007
Developed by Borer in conjunction with AND-Group, the CruSafe software and hardware system provides a state-of-the-art safety system specifically developed to address the key requirement for real-time tracking of personnel. AND CruSafe is a state-of-the-art safety system which has been specifically developed to address the key requirement for real-time tracking of personnel (often known as POB- Personnel On Board). CruSafe has already been proven to reduce muster times by 70%.
Tags : 
security, security management, access control, identity management, iam, authentication, crusafe, and-group, tracking, workforce, workforce management, employee management, borer, crusafe, and group, borer, borer data systems, access control, locker, locker management
    
Borer Data Systems Ltd.
Published By: Borer Data Systems Ltd.     Published Date: Nov 07, 2007
Clear Image was awarded a contract to supply and fit CCTV and Access control to NISA, one of the largest picking warehouses in Europe. The company runs 3 shifts per day and wanted to allocate lockers to employees. The simple solution would have been to give each employee a locker, but between Borer and Clear Image, a better solution was devised. Thanks to our technology, we can create one to many relationships between our devices. 
Tags : 
security, security management, access control, identity management, iam, authentication, nisa, physical security, tracking, workforce, workforce management, employee management, borer, nisa, clear image, borer, borer data systems, access control, muster, roll call
    
Borer Data Systems Ltd.
Published By: Deep Software     Published Date: Nov 14, 2007
With so much of today's commerce being conducted electronically, providing staff with internet access has become a business necessity. The improper use of e-mail and instant messengers can lead to extremely expensive lawsuits, and the proliferation of mobile devices has made it considerably easier for errant employees to steal sensitive information. This white paper will detail the risks to which organizations that do not monitor their employees are exposed and explain the right way for organizations to go about monitoring.
Tags : 
security, security management, access control, identity management, data protection, email security, iam, authentication, instant messaging, tracking, workforce, workforce management, employee management, deep software
    
Deep Software
Published By: Mediative     Published Date: Jan 14, 2008
More and more, companies are realizing the importance of creating a strong online presence both in the free organic search results and the paid advertisements that appear alongside those results. The tracking features of website logs and the measurability of pay-per-click ads enable marketers to monitor the traffic of their organic listings and the performance of their online advertising campaigns. However, it's comparatively more difficult to determine how the placement of those search listings and online ads affect consumer brand perceptions.
Tags : 
search marketing, organic search, buying behavior, buying behaviors, ctr, search, branding, google, eyetracking, heatmapping, heatmap, enquiro, enquiro research
    
Mediative
Published By: Mediative     Published Date: Jan 14, 2008
Comparing the two search engines predominantly used by Chinese searchers – Baidu and Google.cn – Enquiro conducted an eye tracking study with Chinese students to answer how Search user interaction can differ between cultures, languages and reading patterns. How do Google and Baidu compare? And how do Chinese searchers use organic vs. paid listings?
Tags : 
china, asia, international, baldu, chinese, chinese government, culture, cultural influence, google.cn, google, search engine, search marketing, enquiro, enquiro research
    
Mediative
Published By: IFS     Published Date: Dec 27, 2012
Setting the price of goods for sale can be considered either an art or a science. And accurately tracking the cost of the thousands of component parts that go into a piece of complex machinery can be some combination of both.
Tags : 
erp, enterprise resource planning, enterprise, integration, process management, project management, costing, pricing
    
IFS
Published By: Project Success, Inc.     Published Date: Jun 23, 2008
For some projects, tracking actuals is unnecessary or is not worth the effort required. In other cases, however, tracking actual costs and resource usage is an essential aspect of the project control function. Why then is tracking actual costs and resource usage on a project ever worth the effort required to accomplish it?
Tags : 
project management, project success, psi
    
Project Success, Inc.
Published By: CA ITAM     Published Date: Sep 09, 2008
This white paper discusses how to make the leap from basic asset tracking to a more robust asset management program that can improve decision-making and service levels, reduce costs and mitigate risks. The focus is the CA IT Asset Management solution's ability to accelerate your IT Asset Management program's maturity by providing asset ownership information (the complement to discovery information).
Tags : 
    
CA ITAM
Published By: Likewise Software     Published Date: Oct 07, 2008
This document describes how Likewise and Microsoft Active Directory can foster compliance with the Payment Card Industry Data Security Standard, a set of requirements for businesses that process payment card information. Developed by Visa, American Express, Discover Financial Services, and other members of the PCI Security Standards Council, the standard sets forth policies, procedures, and practices to protect customer account data. The standard includes specific requirements for strictly controlling access to customer data, authenticating business users, monitoring access, maintaining a secure network, and auditing system resources. Likewise integrates Linux, Unix, and Mac OS X workstations and servers into Active Directory, providing the basis to assign each user a unique ID for authentication, authorization, monitoring, and tracking. Likewise also provides group policies for non-Windows computers so that their security settings and other configurations can be centrally managed in the same way as Windows computers.
Tags : 
likewise, pci data security, linux, unix, mac os x, windows
    
Likewise Software
Published By: BMC ESM     Published Date: Mar 01, 2009
Free utility finds the fragmentation that's crippling your network! New Disk Performance Analyzer for Networks 2.0 takes the guesswork out of tracking networked system performance. This revolutionary utility scans networked systems' performance from one single access point. It equips administrators with an arsenal of performance data, so they can zero in on systems' fragmentation and slows. This second edition comes with a series of improvements which afford users more control and flexibility. Systems can be selected from the Active Directory or IP Address. And this cutting-edge tool supports custom grouping. So, repeated scans are easy to set up and run. Performance reports can also be scheduled for off-peak hours. Results will be automatically sent to your e-mail address. Performance reports are now exported to a MicrosoftT SQL database for easy sorting and querying. Don't let low-functioning systems go unnoticed. Get Disk Performance Analyzer for Networks 2.0 free now!
Tags : 
it management
    
BMC ESM
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.