data

Results 9651 - 9675 of 10675Sort Results By: Published Date | Title | Company Name
Published By: Cyon Research     Published Date: Jun 22, 2008
Can the JT data format solve the problem of interdisciplinary communications in the PLM industry? The white paper, "The Business Case for a Common Data Distribution Platform: A Look at UGS' JT," examines the case for its adoption as a standard for design, analysis and manufacturing in PLM and beyond.
Tags : 
plm, product lifecycle management, product design, scm, design, cyon, cyon research, cyon research, ugs teamcenter
    
Cyon Research
Published By: Exact Software     Published Date: Jun 22, 2008
Businesses, more than ever before, are relying on fact based decision-making and analytics to compete in this environment. This has given rise to "Business Intelligence," or simply BI, a broad category of applications and technologies for accessing, combining, computing and analyzing data to help enterprise users make better business decisions.
Tags : 
business intelligence, business analytics, analytical applications, make more money, exact america, exact software, exact, competitive
    
Exact Software
Published By: RedEye On Demand     Published Date: Apr 09, 2009
Direct digital manufacturing, otherwise known as rapid manufacturing, is a process that employs additive fabrication technology (aka rapid prototyping) to produce end-use items. Directly from CAD data, components are manufactured without molding, casting or machining. The impact of direct digital manufacturing is far-reaching, and the opportunities and advantages are extensive. This is why direct digital manufacturing is heralded as the next industrial revolution.
Tags : 
redeye on demand, cad, rapid manufacturing, jigs & fixtures, design for manufacturability, design for assembly, return on investment
    
RedEye On Demand
Published By: Bronto     Published Date: Jan 03, 2013
While most marketers would agree that the more data we have, the better; it's important we focus on collecting the "right" data and using it sensibly to execute effective email, mobile, and social marketing campaigns.
Tags : 
esp, email marketing, retail, automation, automated, marketing, digital marketing, software
    
Bronto
Published By: Platform Computing     Published Date: Dec 11, 2008
Studies show that data centers are doubling their total power consumption every 5 years.  But have most data centers optimized their energy consumption with the current available solutions? Platform Computing knows there is room in data centers to reduce energy costs by 10-30%. This paper describes strategies for dynamically managing the energy consumption to achieve similar results.
Tags : 
platform computing, high performance computing, power & cool servers, data centers, blade technology, system management, green strategies, storage, data management, data center design and management
    
Platform Computing
Published By: HighRoads     Published Date: Jul 29, 2008
How bad has the impact of the high costs of benefits become? For the past five years, the cost of healthcare rose at double-digit rates, greater than the growth of wages or inflation. The high cost of employee benefits is one of the primary reasons preventing leading companies from achieving their financial objectives.
Tags : 
workforce, highroads, benefits, employee, employees, human resources, hcm, human capital, human capital management, human resource technology
    
HighRoads
Published By: Entrust Datacard     Published Date: Jul 30, 2008
This white paper outlines issues with managing online identities across a diverse customer base when faced with increasing threats. It proposes a common sense approach that matches security to the assessed risk for users, actions and applications.
Tags : 
entrust identityguard, versatile authentication platform, entrust, authentication, password management, identity management, iam, internet security, online security
    
Entrust Datacard
Published By: KEMP Technologies     Published Date: Aug 04, 2008
Today’s web and application infrastructure continues to expand applications for e-commerce, and communications with customers, partners and internal employees. For those responsible for deploying, maintaining and supporting these networked applications, there is an increasing need to get the highest performance out of datacenter equipment, while simplifying the complexity that causes excess overhead and unnecessary costs.
Tags : 
load balancer, load balancing, application delivery, ssl acceleration, application optimization, windows terminal services, terminal services, content switching, server load balancing, application security, network security, kemp, kemp technologies, infrastructure, networking
    
KEMP Technologies
Published By: KEMP Technologies     Published Date: Aug 04, 2008
Kemp Technologies’ LoadMaster Application Delivery Controller (ADC) and Server Load Balancer (SLB) appliances are low energy consumers. Reducing energy use at the point of consumption, LoadMaster provides benefits to other areas by reducing load on power and cooling facilities, which in turn reduce their own energy use.
Tags : 
load balancer, load balancing, application delivery, ssl acceleration, application optimization, windows terminal services, terminal services, content switching, server load balancing, application security, network security, kemp, kemp technologies, energy, green
    
KEMP Technologies
Published By: KEMP Technologies     Published Date: Aug 04, 2008
Chances are, if you’re utilizing SSL, you’re not utilizing it to its full potential. SSL is a powerful technology that can help organizations protect their data as well as their users. While the technology behind SSL is solid, the most common best practices for its implementation do not take full advantage of the benefits that SSL brings. And this may be inadequate to provide proper security to the modern web application environment.
Tags : 
ssl, load balancer, load balancing, application delivery, ssl acceleration, application optimization, windows terminal services, terminal services, content switching, server load balancing, application security, network security, kemp, kemp technologies, web security, secure socket layer, security
    
KEMP Technologies
Published By: KEMP Technologies     Published Date: Aug 04, 2008
Websites have become critical components of most businesses’ core operations. They support the brand and ordering process, serve as data information resources and assist in overall customer care. Having poor website performance or poor reliability can destroy or severely damage a business and its reputation. The increasing importance of these websites leads to critical requirements of security, reliability and scalability. Delivering these, however, can leave an SMB stretched beyond its resources.
Tags : 
load balancer, load balancing, application delivery, ssl acceleration, application optimization, windows terminal services, terminal services, content switching, server load balancing, application security, network security, kemp, kemp technologies
    
KEMP Technologies
Published By: Marketo     Published Date: Nov 04, 2011
Knowing the right questions to ask makes a world of difference when making a purchase. To ensure you make the most out of your reference calls, use this list of valuable questions you should always ask. Topics range from CRM integration, support experience and implementing functions like lead scoring, lead nurturing and data quality.
Tags : 
marketo, reference call, crm integration, white paper, marketing, data quality
    
Marketo
Published By: CA ITAM     Published Date: Sep 09, 2008
This white paper discusses how to make the leap from basic asset tracking to a more robust asset management program that can improve decision-making and service levels, reduce costs and mitigate risks. The focus is the CA IT Asset Management solution's ability to accelerate your IT Asset Management program's maturity by providing asset ownership information (the complement to discovery information).
Tags : 
    
CA ITAM
Published By: LaGarde     Published Date: Sep 10, 2008
It's difficult to pick up a news report without reading about another data breach or case of identity theft. With so much personal and financial information stored and transmitted electronically, consumers are at greater risk than ever of becoming victims of fraud.
Tags : 
lagarde, pci, pci-dss, pci dss, compliance, credit card, payment card, data protection, identity theft
    
LaGarde
Published By: Tail-f Systems     Published Date: Sep 16, 2008
This whitepaper describes how NETCONF and YANG can help drastically simplify network configuration management. The IETF has recently standardized the NETCONF configuration management protocol and is currently in the process of standardizing a NETCONF-oriented data modeling language called YANG. These two new technologies promise to drastically simplify network configuration management.
Tags : 
configuration management, netconf, yang, next-generation network management, next-generation networks, netconf protocol, tail-f, tailf
    
Tail-f Systems
Published By: Tail-f Systems     Published Date: Oct 01, 2008
Network management systems must adapt to meet the requirements of next generation networks.  For example, a user interfaces may need to be refreshed with a state-of-the-art Web interface or support for the NETCONF protocol may be required to help customers deploy scalable networks. Adding functionality and integrating with existing applications and data stores has multiple trade-offs in terms of development time and system efficacy.
Tags : 
network management, next-generation networks, netconf, legacy networks, network management systems, tail f, tail-f, tailf, networking
    
Tail-f Systems
Published By: YouSendIt     Published Date: Sep 08, 2011
The solution to sending large content is YouSendIt and this helps to explain why.
Tags : 
yousendit, dortch, large content, file sending, marketing, technology, data management
    
YouSendIt
Published By: LogRhythm     Published Date: Sep 26, 2008
This whitepaper highlights some of the key areas in which LogRhythm, the leader in Log and Security Event Management Solutions, can help companies adequately meet the PCI Data Security Standards. The whitepaper also details the compliance requirements along with ways in which LogRhythm meets and exceeds those regulations.
Tags : 
pci, pci compliance, pci-dss compliance, payment card industry, payment card, comply, security, information technology, information security management, log management, log analysis, log collection, log analyzer, log tool, logrhythm, security event management, web logs, log collection, regulatory, regulations
    
LogRhythm
Published By: LogRhythm     Published Date: Sep 26, 2008
Get the facts you need to know about how the collection, management and analysis of log data are integral to meeting many GCSx requirements. Read this whitepaper to learn more…
Tags : 
uk gcsx, uk compliance, gcsx, government connect secure extranet, compliance, comply, security, information technology, information security management, log management, log analysis, log collection, log analyzer, log tool, logrhythm, security event management, web logs, log collection, regulatory, regulations
    
LogRhythm
Published By: ValueClick Media     Published Date: Sep 24, 2008
Based on a study conducted by ValueClick Media and interactive agency Goodway 2.0, this white paper evaluates networks as an alternative to advertising on automotive information sites. The study, which includes campaign data from Chevrolet, Dodge, Honda, Hyundai and Lincoln Mercury, concludes that running ads on a large number of sites and allowing optimization technology to determine those which are most effective will lead to better results than presupposing what sites or channels will perform.
Tags : 
automotive, chevrolet, dodge, honda, hyundai, lincoln mercury, advertising alternative, optimization technology, valueclick media, goodway 2.0
    
ValueClick Media
Published By: ZSL Inc.     Published Date: Nov 18, 2008
This paper explains the constraints in using the legacy systems and the essential of modernizing the legacy systems and strategic alignment of IT with business. We have discussed different approaches towards modernizing the legacy systems and the ways to make your legacy modernization a success.
Tags : 
zsl inc, roi, legacy modernization, soa, data management, enterprise applications
    
ZSL Inc.
Published By: ZSL Inc.     Published Date: Dec 16, 2008
This paper explains the constraints in using the legacy systems and the essential of modernizing the legacy systems and strategic alignment of IT with business. We have discussed different approaches towards modernizing the legacy systems and the ways to make your legacy modernization a success. Along the way, we have explained the benefits and possibilities of maximizing ROI and lowering TCOs by effectively modernizing your legacy applications and aligning IT and business practices.
Tags : 
zsl, legacy modernization, roi, soa, data management, enterprise applications
    
ZSL Inc.
Published By: ZSL Inc.     Published Date: Jul 20, 2009
One of the vital needs of business is to connect processes, people and information both within across the organizational boundaries. Microsoft Dynamics CRM 4.0, a Customer Relationship Management application, provides solution to the sales managers in accessing the lead/prospect data and promoting their business successfully.
Tags : 
ms office, crm, customer relationship management, lead data, prospect, zsl, office, outlook, excel, dynamics, microsoft, customer data, enterprise applications
    
ZSL Inc.
Published By: ZSL Inc.     Published Date: Jul 20, 2009
Organizations have implemented enterprise applications such as ERP and CRM for business process execution but have failed to address the key enterprise asset: data. In the current economic environment, enterprises that fail to capitalize on their data assets jeopardize their cost structures and their earnings potential. It is vital for organizations to leverage their data assets to measure their business performance, identify the weak poles and strategic improvement spots to scale their business to new heights. Business Intelligence (BI), the recent innovation in IT, has emerged to be a potential hope for the organizations to build a strong business milieu without any new asset investments and utilizing the existing key assets of the organizations.
Tags : 
business intelligence, zsl, erp, crm, enterprise application, enterprises, investments, business transformation, olap, dashboards, metrics, business monitoring, enterprise applications
    
ZSL Inc.
Published By: NeighborhoodAmerica     Published Date: Oct 01, 2008
Virtually all organizations are realizing the importance of customer engagement. But in order to benefit, we must subscribe to the idea that consumers really can add value to our organization. And sometimes, that means removing the notion that we are the experts in exchange for the belief that we can learn a thing or two from our customers. The collective intelligence of the communities we serve is largely an untapped asset - a stream of valuable input that can help improve the decisions we make and shape the products we sell. This book explores the value of many - and the role that customer engagement will play in shaping the future of our businesses, our government, and our economy.
Tags : 
neighborhood america, social network, web 2.0, data integration
    
NeighborhoodAmerica
Start   Previous    380 381 382 383 384 385 386 387 388 389 390 391 392 393 394    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com