pr 2009

Results 1 - 25 of 28Sort Results By: Published Date | Title | Company Name
Published By: 123Together     Published Date: Mar 17, 2009
With the current state of the economy, IT executives are being asked to stretch their budgets in order to keep their businesses profitable. In 2008, Median IT spending per user fell to $6,667 from the previous year's $7,397, according to Computer Economics. This represents a 6.2% reduction, consistent with the fact that IT managers were supporting an increasing number of users without corresponding increases in IT spending. IT spend continued to decline in 2009 and uncertainty and caution is still prevalent in 2010.
Tags : 
123together, it strategies, economy, stability, collaboration, green it, outsourcing, microsoft exchange, hosted exchange, mobile services, data center design and management
    
123Together
Published By: Symantec     Published Date: Jun 27, 2013
Symantec Corporation and Ponemon Institute are pleased to present the 2013 Cost of Data Breach: Global Analysis, our eighth annual benchmark study concerning the cost of data breach incidents for companies located in nine countries. Since 2009, we have provided a consolidated report of the benchmark findings from all countries represented in the research. In this report, we present both the consolidated findings and country differences.
Tags : 
symantec, data breach, global analysis, benchmark findings, research, best practices, technology, security, knowledge management, data management, business technology, data center
    
Symantec
Published By: IBM     Published Date: May 02, 2017
There's an old saying in information security: "We want our network to be like an M&M, with a hard crunchy outside and a soft chewy center." For today's digital business, this perimeter-based security model is ineffective against malicious insiders and targeted attacks. Security and risk (S&R) pros must eliminate the soft chewy center and make security ubiquitous throughout the digital business ecosystem — not just at the perimeter. In 2009, we developed a new information security model, called the Zero Trust Model, which has gained widespread acceptance and adoption. This report explains the vision and key concepts of the model. This is an update of a previously published report; Forrester reviews and updates it periodically for continued relevance and accuracy.
Tags : 
resource management, product data, remote services, asset management, cloud management, web applications, application scheduling, internet of things
    
IBM
Published By: iPass     Published Date: Apr 08, 2009
Learn what Forrester has uncovered in their latest report on Enteprise Mobility trends. During the past two years, Forrester has seen the number of enterprise mobility inquiries increase nearly 55%, jumping to 550-plus inquiries in 2008. In the past year, we have seen a spike in the number of inquiries focused on mobile network architecture, new types of mobile devices, and deploying vertically focused mobile applications that address the needs of workers in certain industries (e.g., retail, transportation, and healthcare).
Tags : 
forrester, wireless, infrastructure, fmc, fixed mobile convergence, network architecture, healthcare, retail, transportation, wimax, roi, return on investment, wlan, wimax
    
iPass
Published By: MuleSoft     Published Date: Apr 13, 2016
Since it first emerged more than a decade ago, Service Oriented Architecture (SOA) has been both widely praised as a modern, agile approach to software development and infrastructure architecture as well as dismissed as a colossal waste of time and money. Missed expectations for many SOA projects led one analyst in 2009 to declare, “SOA is dead.” Far from being dead, however, service oriented architecture is in fact more relevant than ever.
Tags : 
service management, enterprise applications, best practices, business management, business strategy
    
MuleSoft
Published By: Epicor     Published Date: Oct 07, 2009
Pressures to reduce costs continue to outweigh all other business drivers impacting Enterprise Resource Planning (ERP) in 2009. ERP has become more than a necessary infrastructure; it is also a strategic weapon in streamlining and accelerating business processes - while providing visibility to those processes throughout the enterprise.
Tags : 
erp, enterprise resource planning, enterprise applications, integrated suite, roi, tco, inventory reduction, sap, oracle, manufacturing, crm, visibility
    
Epicor
Published By: SAP Inc.     Published Date: Jul 28, 2009
Companies can squeeze further business benefits from their existing SAP ERP and supply chain systems in order to save money at a time when it's desperately needed. This Report, which summarizes detailed data from a field study conducted exclusively for AMR Research SAP Peer Forum clients, was written to help business audiences looking for every opportunity to reduce the total business expenses of their huge, existing investments in SAP.
Tags : 
sap, fast payback, detailed data, business expense projects, sap erp, supply chain systems, amr, peer forum, business intelligence, field study, purchasing, order fulfillment, manufacturing, coe, cost of excellence
    
SAP Inc.
Published By: Proofpoint     Published Date: Apr 22, 2010
This report summarizes the findings of Proofpoint's sixth-annual email security and data loss prevention study, including surprising statistics about how large companies manage the risks associated with outbound email, blog postings, media sharing sites, social networking sites, mobile Internet-connected devices and other electronic communications streams.
Tags : 
proofpoint, outbound email, data loss prevention, email security, social networking, electronic messaging, mobile email
    
Proofpoint
Published By: Progress Software Corporation CEP     Published Date: Oct 23, 2009
IDC Report: Complex Event Processing Opportunity Analysis and Assessment of Key Products Read this excerpt of the 2009 IDC study by Maureen Fleming and Jeff Silverstein looking at complex event processing. The excerpt includes IDC opinion on the market for CEP, what defines CEP and independently profiles Progress Apama, which was ranked "Top CEP Innovator" in the report.
Tags : 
progress software, idc, complex event processing, business intelligence, cep, mom
    
Progress Software Corporation CEP
Published By: Progress Software Corporation CEP     Published Date: Aug 03, 2009
Forrester Research has named Apama as a standout leader in the complex event processing (CEP) platform market in The Forrester Wave: Complex Event Processing Platforms, Q3 2009 Report. The Report evaluated nine CEP platform vendors based on a comprehensive set of evaluation criteria.
Tags : 
progress software, idc, complex event processing, apama, business activity monitoring (bam), business process management, bpm, systems and operations management, active databases, business intelligence, cep, mom
    
Progress Software Corporation CEP
Published By: EMC Backup & Recovery Solutions     Published Date: Aug 04, 2009
Data deduplication is one of a few standout technologies where the CIO can make an investment which is easy to rationalize and brings a fast payback. This paper explains why data deduplication should be on every CIO's project short list in 2009.
Tags : 
emc, data domain, efficiency, disaster recovery, robo, backup, recovery, idc, roi, it costs, infrastructure, dedupe, deduplication
    
EMC Backup & Recovery Solutions
Published By: QuinStreet     Published Date: Feb 09, 2009
Between cost savings and the efficiency of a converged voice-data network, VoIP presents an attractive case for shoring up business communications expenses in a down economy.The VoIP value proposition is so strong that industry analysts are anticipating continued growth in IP telephony through 2009.
Tags : 
quinstreet, voip, voice-data network, business communications, recession, enterprise applications
    
QuinStreet
Published By: Webmarketing123     Published Date: Oct 06, 2010
There are many ways to increase revenue for your business. One of them is to evaluate and improve the success of your company's website in search results. SEO (Search Engine Optimization) is the practice of optimizing a website so that it achieves higher organic rankings on search engine sites like Google, Yahoo and Bing. In fact, according to the 2009 Forbes Ad Effectiveness survey, SEO is the most effective marketing channel today.
Tags : 
webmarketing123, seo, search engine optimization, google, yahoo, bing, search, keywords, analysis, traffic
    
Webmarketing123
Published By: K2     Published Date: Jan 07, 2016
The business context for process excellence and business process management (BPM) has changed dramatically since the 2009-to-2010 recession. During the recession, BPM software and services saw impressive double-digit growth as a result of enterprises slashing costs and boosting worker productivity. Now, executive agendas have shifted to focus on growing revenue, expanding the customer base, and delivering new digital products and services. Enterprise and process architects are reshaping their business cases for BPM around these new drivers. This is not an easy task. However, process excellence will play a critical role for forward-thinking enterprise architects that invest the time to link BPM to new front-office drivers to help the organization drive digital transformation. This report replaces “Building The Case For Your BPM Initiative” in the business process management playbook and provides guidance on developing revenue and customer-focused business cases.
Tags : 
bpm, business process management, process excellence, best practices, networking, security, software development, it management, wireless
    
K2
Published By: Citrix Online     Published Date: Jul 02, 2010
This white paper presents a summary of the survey results regarding their marketing plan and tactics, identifies top trends from this survey, and also discusses the increasingly important role of Webinars in small business marketing in 2009.
Tags : 
citrix online marketing, gotowebinar, webinar, small business, lead generation
    
Citrix Online
Published By: IBM     Published Date: Apr 20, 2017
There's an old saying in information security: "We want our network to be like an M&M, with a hard crunchy outside and a soft chewy center." For today's digital business, this perimeter-based security model is ineffective against malicious insiders and targeted attacks. Security and risk (S&R) pros must eliminate the soft chewy center and make security ubiquitous throughout the digital business ecosystem — not just at the perimeter. In 2009, we developed a new information security model, called the Zero Trust Model, which has gained widespread acceptance and adoption. This report explains the vision and key concepts of the model. This is an update of a previously published report; Forrester reviews and updates it periodically for continued relevance and accuracy.
Tags : 
resource management, product data, remote services, asset management, cloud management, web applications, application scheduling, internet of things
    
IBM
Published By: Vocus, Inc     Published Date: Dec 16, 2008
Evaluate your current PR program to help you develop a plan that will reach your goals and objectives, while delivering value to the business.  Learn the four keys you need to plan for strong, focused and successful PR in 2009.
Tags : 
vocus, pr program, public relations, successful pr, pr 2009
    
Vocus, Inc
Published By: 2ergo     Published Date: Apr 09, 2010
When Rightmove wanted to be the first to provide an innovative and engaging mobile app that would move millions of iPhone users to access extensive property search functionality, they turned to 2ergo. Learn about the challenges Rightmove faced, the solution 2ergo provided, and the unbelievable results that were achieved, including how the app ultimately ranked in the top 30 Apple "Best Apps of 2009" chart.
Tags : 
2ergo, iphone, mobile devices, apps, applications, mobile apps, smartphone, gps, property app
    
2ergo
Published By: Zycus     Published Date: Nov 30, 2009
If the go-go 1990s, with its fast money and flush credit seeking rapid and steep returns, created the demand for "renaissance" Chief Financial Officers ("CFO"), who could manage (and market) both the strategic and financial operations of the enterprise, the more sobering decade that followed led directly to the creation and subsequent rise of the Chief Procurement Officer ("CPO"), who could reduce costs, build internal relationships, and develop strategic suppliers efficiently and effectively.
Tags : 
zycus, cfo, chief financial officer, procurement, chief procurement officer, sourcing companies, sourcing services, sourcing, reverse auction, e sourcing, eprocurement, strategic planning, procurement and outsourcing, [sourcing companies], [sourcing services], procurement strategy, procurement services, reverse auctioning, procurement management, electronic procurement
    
Zycus
Published By: Business-Software     Published Date: Mar 30, 2009
If your company is looking to purchase an Enterprise Resource Planning (ERP) software solution, the 2009 Top 10 ERP Software Vendor Report from Business-Software.com can help you find the software that is right for your company.  Must read!
Tags : 
erp, manufacturing, erp software, enterprise resource planning, mrp, manufacturing software, enterprise applications
    
Business-Software
Published By: Symantec Corporation     Published Date: Oct 03, 2013
Advances in attacks on network security over the last few years have led to many high-profile compromises of enterprise networks and breaches of data security. A new attack is threatening to expand the potential for attackers to compromise enterprise servers and the critical data on them. Solutions are available, and they will require action by company officers and administrators. “SSLStrip” and related attacks were among the highlights of the July 2009 Black Hat show in Las Vegas. Researcher Moxie Marlinspike combined a number of discrete problems, not all related to SSL, to create a credible scenario in which users attempting to work with secure websites were instead sent to malicious fake sites.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: Microsoft Dynamics     Published Date: Nov 06, 2008
The Rodgers & Hammerstein Organization (R&H) manages and administers musical and theatrical licensing rights for the heirs of Richard Rodgers, Oscar Hammerstein II, and many other talented writers. The company implemented Microsoft Dynamics AX in 2006 to gain complete control and visibility over its licensing and business operations. More recently, the company wanted to give employees quick and easy access to the information they need to perform their jobs more efficiently. R&H enrolled in the Microsoft Technology Adoption Program and became one of the first companies in the world to implement Microsoft Dynamics AX 2009. Now, employees throughout the organization have almost instant access to company information tailored to their specific roles. Employees spend less time tracking tasks and more time efficiently serving customers.
Tags : 
microsoft dynamics, rodgers & hammerstein, enterprise applications
    
Microsoft Dynamics
Published By: Demand Metric     Published Date: Nov 06, 2008
Lead Generation is the top priority for marketing directors in 2009. More importantly, marketers are being charged with defending their budgets and demonstrating real ROI for their marketing programs. Use this How-To Guide to learn how other world-class companies are developing lead generation infrastructures that automate key processes, measure results, and provide a steady flow of qualified leads their sales organizations.
Tags : 
demand metric, lead generation
    
Demand Metric
Published By: Prodiance Corp.     Published Date: Dec 22, 2008
Since the National Association of Insurance Commissioners (NAIC) made revisions to the Financial Reporting Model Regulation (Model Audit Rule) in June 2006, the insurance industry’s attention to the risks associated with financial reporting has been on the rise. Structured similarly to Section 404 of the Sarbanes‐Oxley Act, the Model Audit rule places a significant burden on C‐level executives to ensure their oversight in the internal controls for financial reporting (ICFR) process. Executives within these insurance organizations, both public and private, will be required to evaluate their internal controls in preparation for the first reports due in 2010 for the 2009 reporting period.
Tags : 
prodiance, sarbanes‐oxley act, security and integrity of data, analytics, risk assessment, optimization, security, it management
    
Prodiance Corp.
Published By: SAP Inc.     Published Date: Jul 28, 2009
Companies can squeeze further business benefits from their existing SAP ERP and supply chain systems in order to save money at a time when it's desperately needed. This Report, which summarizes detailed data from a field study conducted exclusively for AMR Research SAP Peer Forum clients, was written to help business audiences looking for every opportunity to reduce the total business expenses of their huge, existing investments in SAP.
Tags : 
sap, fast payback, detailed data, business expense projects, sap erp, supply chain systems, amr, peer forum, business intelligence, field study, purchasing, order fulfillment, manufacturing, coe, cost of excellence
    
SAP Inc.
Previous   1 2    Next    
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com