essential

Results 251 - 275 of 1017Sort Results By: Published Date | Title | Company Name
Published By: Oracle     Published Date: Sep 06, 2016
Learn why Good supply chain management is essential to your operational efficiency, customer centricity, compliance, carbon footprint, and ultimately, your overall success.
Tags : 
supply chain, cloud computing, cloud, supply chain management, compliance, oracle
    
Oracle
Published By: Oracle     Published Date: Sep 06, 2016
Learn why Good supply chain management is essential to your operational efficiency, customer centricity, compliance, carbon footprint, and ultimately, your overall success.
Tags : 
supply chain, cloud computing, cloud, supply chain management, compliance, oracle
    
Oracle
Published By: Oracle     Published Date: Sep 06, 2016
Learn why Good supply chain management is essential to your operational efficiency, customer centricity, compliance, carbon footprint, and ultimately, your overall success.
Tags : 
supply chain, cloud computing, cloud, supply chain management, compliance, oracle
    
Oracle
Published By: Blue Coat Systems     Published Date: Jul 05, 2011
ERP and Business Intelligence are essential to your success. Read this and learn how to improve productivity and decision-making. You'll see how Blue Coat WAN Optimization leverages proven solutions to achieve dramatic reductions in latency and bandwidth consumption.
Tags : 
blue coat, wan optimization, resource management, sap, erp, secure web gateway, application performance monitoring, netweaver
    
Blue Coat Systems
Published By: Lyris, Inc.     Published Date: Jul 01, 2011
Maximize your email marketing campaigns and improve ROI- let the "25 Essentials for Exceptional Email Campaigns" be your guide to the essential rules of email engagement, with fundamental best practices that will help you get the most from your email marketing efforts.
Tags : 
lyris™, email marketing services, marketing software, email value proposition, evp, email marketing software, email campaigns, sender reputation
    
Lyris, Inc.
Published By: CDW     Published Date: Nov 12, 2012
Server virtualization is no longer a luxury but an essential part of the modern data center. By combining the workloads of several underused servers, you can get more out of your hardware when IT budgets stay flat, even as demand goes up.
Tags : 
server virtualization, power and cooling, data center, tco, total cost of ownership, cloud computing, business technology
    
CDW
Published By: Dell Software     Published Date: Oct 03, 2013
Industry analysts EMS interview three users of Foglight from Dell to underscore the appeal of UEM, its essential value to IT, as well as Foglight versatility in supporting UEM’s multiple facets. Download How Foglight Makes User Experience Management a Reality: Three Case Studies today.
Tags : 
web analytics, foglight, dell, user experience management, customer behavior tracking, customers, best practices, increase customer conversion
    
Dell Software
Published By: Polycom     Published Date: Oct 17, 2016
Video conferencing, like other technologies such as smartphones, has become an essential tool in your business toolbox. Finding the right system for your company is easy once you understand the basics of video conferencing. Take your time, plan, and soon you will find that video conferencing will make a positive difference in your bottom line. Download this white paper to learn more!
Tags : 
    
Polycom
Published By: McAfee     Published Date: Sep 15, 2014
URL filtering is a type of content filtering that allows or blocks users from accessing specific websites. The practice has become an essential one on enterprise networks, with the goal of blocking employees from accessing content that would be a detriment to their productivity or the company as a whole. Blocked sites may include those that threaten the security of the organization, have objectionable content, or are bandwidth-intensive enough to strain company resources.
Tags : 
best practices, url filtering, network security, blocked sites, security management
    
McAfee
Published By: McAfee     Published Date: Jan 20, 2015
The only way to be prepared is to be aware. Make sure you have the right tools for optimal situational awareness of your network security.
Tags : 
situation awarenss, network awareness, network security tools, essential network tools, next generation firewall, next generation firewall features, ngfw, networking
    
McAfee
Published By: Sage     Published Date: Aug 31, 2015
An Essential Guide to Protecting Your Sales, Profits and Brand.
Tags : 
sage, emv payments, credit card processing, processing terminals, data security standards, chargeback liability, security, it management
    
Sage
Published By: Mitel     Published Date: Dec 19, 2016
With this digital customer experience shifting from a "nice to have" offering to an essential service, any business that interacts with its customers must have the right technology to deliver a consistent experience across all media, as well as a concrete strategy for this broadened scope of service. Check out our new white paper for an overview of the digital expectations and habits of today's digital consumer, as well as practical next steps for transforming customer experience from dated to digital.
Tags : 
customer experience, sms, email, web chat, social media, mobile, networking
    
Mitel
Published By: Ping Identity     Published Date: Feb 12, 2016
A key technical underpinning of the cloud and the Internet of Things are Application Programming Interfaces (APIs). APIs provide consistent methods for outside entities such as web services, clients and desktop applications to interface with services in the cloud.
Tags : 
    
Ping Identity
Published By: Puppet     Published Date: May 20, 2016
This July 2015 Forrester Report explores: - Why consistent, automated DevOps processes are essential to closing vulnerabilities and limiting exposure. - Practices, such as infrastructure as code and automated provisioning, for closing holes as soon as patches are available. - How DevOps and security professionals can work together to adopt DevSecOps.
Tags : 
    
Puppet
Published By: Epicor Software Corporation     Published Date: Jan 09, 2019
To Keep Pace With Your Customers and Competitors, It’s Time to Leave Your Legacy Software Behind. Legacy enterprise resource planning (ERP) systems struggle to keep up with the modern pace of business, and they fail to meet the changing needs of your workforce. Can your leaders quickly find and analyze vital data? Are your employees’ tasks and processes straightforward and efficient? Does your ERP software make it easier to support growth? See how manufacturers upgrading to the latest ERP software from Epicor transform their business by delivering the visibility, efficiency, and productivity essential for sustained growth.
Tags : 
    
Epicor Software Corporation
Published By: Lookout     Published Date: Dec 09, 2016
Get all of your questions about enterprise mobile security, threats, and solutions answered in this essential guide.
Tags : 
    
Lookout
Published By: Carbonite     Published Date: Apr 11, 2018
There are five essential steps to protecting data and applications from the most common causes of data loss and downtime. IT pros who follow these steps can feel confident in their long-term organizational plan. Read this expert guide from Ben Maas, an independent consultant and system architect who has guided many companies through backup and disaster recovery (BDR) deployments.
Tags : 
    
Carbonite
Published By: Carbonite     Published Date: Oct 10, 2018
There are five essential steps to protecting data and applications from the most common causes of data loss and downtime. IT pros who follow these steps can feel confident in their long-term organizational plan. Read this expert guide from Ben Maas, an independent consultant and system architect who has guided many companies through backup and disaster recovery (BDR) deployments.
Tags : 
    
Carbonite
Published By: Carbonite     Published Date: Oct 10, 2018
Backup and high availability are both essential forms of protection that fulfill different roles within a data protection strategy. So which type of protection is right for different systems? According to recent analyst reports, experts recommend a blended approach that aligns data protection with type of data.1 By aligning data protection with data urgency, businesses can ensure higher levels of resiliency and reduce demands on internal resources.
Tags : 
    
Carbonite
Published By: Carbonite     Published Date: Oct 10, 2018
Businesses virtualize to consolidate resources, reduce costs and increase workforce mobility. But failing to protect VMs with purpose-built protection could erase some of those gains. Here are five essential requirements IT managers should look for when deploying data protection for virtual environments.
Tags : 
    
Carbonite
Published By: Carbonite     Published Date: Oct 10, 2018
With more and more employees spread around the globe, IT teams face a conundrum: how to secure an increasing amount of data traveling outside the network while preserving workforce productivity in an increasingly interconnected and global market. It’s up to IT decision-makers to protect and secure company data in a way that promotes user access without imposing overly restrictive or cumbersome device policies. When it comes to protecting data on laptops and mobile devices, several key factors are essential for today’s businesses:
Tags : 
    
Carbonite
Published By: Applause     Published Date: Jul 14, 2017
Learn tips, techiques and trends for launching great digital experiences that delight your users in our free guide.
Tags : 
mobile app testing, mobile applications, mobile application testing, software testing, functional testing, usability testing, usability studies, security testing
    
Applause
Published By: CA Technologies EMEA     Published Date: Aug 07, 2017
A big part of GDPR compliance will focus on how data is collected going forward. But a substantial emphasis will fall on the data businesses already hold. With many mainframes containing generations-old data, a manual data audit is completely unrealistic. That’s where CA comes in. CA Data Content Discovery enables organizations to find, classify and protect mission essential mainframe data—three valuable steps toward achieving GDPR compliance.
Tags : 
gdpr, personal data, social information, ip addresses, ca technologies, mainframe security, anonymize data, privacy projects
    
CA Technologies EMEA
Published By: Fiserv     Published Date: Sep 14, 2017
Global anti-money laundering (AML) standards have long required that understanding beneficial ownership be a part of a financial institution’s AML program. Beneficial ownership outlines the identity of individuals with a controlling interest in a privately held company, enabling a financial institution to understand the ultimate beneficiary of a financial transaction. Identifying beneficial ownership can be a complex process, but it’s one that institutions must conquer if they are to remain in compliance with industry rules and legislation.
Tags : 
anti-money laundering, aml, aml software, anti-money laundering software, beneficial ownership, risk management, aml requirements, complex ownership structures
    
Fiserv
Published By: DocuSign UK     Published Date: Nov 16, 2017
"Industry experts predict that successful businesses will soon become 100% digital for all transactions. Sales teams that leverage digital technology close more deals faster, improve the customer experience, and gain clear competitive advantages. Sales professionals are most effective when they’re equipped with the best tools. A mobile-enabled electronic workflow is becoming essential to optimise efficiency and provide teams with true flexibility. This best practices paper outlines eight important ways that sales teams can make meaningful progress in their digital transformations." ake meaningful progress in their digital transformations.
Tags : 
sales, professionals, marketing, customer, digital, docusign, esignature
    
DocuSign UK
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com