business

Results 13826 - 13850 of 15375Sort Results By: Published Date | Title | Company Name
Published By: Godfrey     Published Date: Oct 24, 2008
B-to-B Strategic Search has been created by Godfrey to provide the customer-centric, content-driven approach needed for successful business-to-business search performance. It uses all available tools to help B-to-B marketers achieve a presence in the search results of users who are looking for their technology or product. It thus includes both search engine optimization (SEO), the practice of modifying your site to improve organic search results, and search engine marketing (SEM), or paid search.
Tags : 
godfrey, search, b-to-b search, b-to-b strategic search, business-to-business search, search engine optimization, seo, search engine marketing
    
Godfrey
Published By: Godfrey     Published Date: Oct 24, 2008
Godfrey’s Channel Strategy Audit is intended as a guide to assist you in providing the information we need to generate a distribution channel strategy analysis. This audit is organized into several parts, starting with a cursory survey of your business environment, and then concentrating on the key issues that can result in strengthening or reshaping your distribution channel strategy. Although our face-to-face meeting time may be limited, we hope this audit will allow you to provide more thoughtful and detailed information, so that our deliverable to you has significant value.
Tags : 
godfrey, channel strategy audit, b2b marcom, channel communications, distribution network, channel marketing, marketing to distributors, distribution channel
    
Godfrey
Published By: Godfrey     Published Date: Oct 24, 2008
Recently, however, the explosive growth of online media has changed the PR game, creating a deeper, richer two-way communication between a marketer and its target audiences. Now, marketers can use social media strategies and tactics to engage their audiences directly. Those tactics include press release optimization, online media monitoring and reporting, social media press releases, RSS feeds, blogs, podcasts, webcasts and a host of other emerging technologies.
Tags : 
godfrey, convergent, public relations, business-to-business, traditional pr, media relations, press kits, trade show support
    
Godfrey
Published By: Godfrey     Published Date: Oct 24, 2008
This document is intended to provide us with the information we need to generate an audit of your existing system for sales lead management. This audit is organized into several parts, starting with a cursory survey of your business environment, and then focusing on the key aspects and issues of sales lead management. Since our face-to-face meeting time may be limited, we hope this audit will allow you to provide more thoughtful and detailed information, so that our deliverable to you is of significant value.
Tags : 
godfrey, lead management system, lead-generating communications, lead processing, lead reporting
    
Godfrey
Published By: Godfrey     Published Date: Oct 24, 2008
With the constantly-changing media landscape and the growing demand for media communication via 2.0 channels, you need to reconsider both your news and the vendor partners on whom you rely to distribute it. It could mean the difference between a purposeful, engaging and long interactive life for even the "smallest" news item, and a costly yet low-impact news distribution program that saps valuable resources. This white paper tells you some key considerations to help guide your selection process.
Tags : 
godfrey, white paper, b to b, business to business, 2.0, vendor, analytics, brand management
    
Godfrey
Published By: Likewise Software     Published Date: Oct 07, 2008
This document describes how Likewise and Microsoft Active Directory can foster compliance with the Payment Card Industry Data Security Standard, a set of requirements for businesses that process payment card information. Developed by Visa, American Express, Discover Financial Services, and other members of the PCI Security Standards Council, the standard sets forth policies, procedures, and practices to protect customer account data. The standard includes specific requirements for strictly controlling access to customer data, authenticating business users, monitoring access, maintaining a secure network, and auditing system resources. Likewise integrates Linux, Unix, and Mac OS X workstations and servers into Active Directory, providing the basis to assign each user a unique ID for authentication, authorization, monitoring, and tracking. Likewise also provides group policies for non-Windows computers so that their security settings and other configurations can be centrally managed in the same way as Windows computers.
Tags : 
likewise, pci data security, linux, unix, mac os x, windows
    
Likewise Software
Published By: RisingMedia     Published Date: Oct 14, 2008
Defining specific metrics for measuring the success of a Web site is a daunting task. The inability to identify proper criteria and meaningful calculations is hampering the e-business world's capacity to determine the value of corporate Web sites and to set appropriate budgets for their development.
Tags : 
emetrics, risingmedia, netgenesis, e-business, roi metrics
    
RisingMedia
Published By: HP - Enterprise     Published Date: Jun 04, 2013
Did you know that over 64% of mobile phone time is spent on applications? Mobile apps represent a huge opportunity for your enterprise to grow your business, but in order to benefit from them you need effective methods for developing, testing, and supporting mobile apps. Take a look at this eye-opening infographic to learn more about the current state of enterprise mobility and get the information you need to equip your business for mobile app development success.
Tags : 
mobile phone, white paper, enterprise, growing your business, applications, mobile applications
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Jun 04, 2013
Mobility services are frequently being positioned as part of broader application transformation offerings, enabling enterprises to support the bring-your-own-device (BYOD) approach, with the development of enterprise app stores and the ability to leverage personal devices for business functions. This white paper describes software and services that accelerate and simplify the creation of internally developed or “in-house” enterprise mobile applications. It also describes how to deploy and manage these mobile apps on both company-provided and “bring-your-own” smartphones and tablet computers. Solving the complete mobile app lifecycle means transforming enterprise apps for multiscreen devices; facilitating design, testing, security, performance, management, and compliance to reach new customers and employee expectations.
Tags : 
mobile apps, lifecycle approach, mobility services, bring-your-own-device, software
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Jun 04, 2013
Many organizations are now moving parts of their IT infrastructure to the Cloud. However, managing these resources within a comprehensive management framework is still essential. And the management approach for these hybrid environments needs to take a step forward and start to focus on service level management, not the care and feeding of discrete components. This whitepaper provides the information needed on implementing Business Service Management (BSM) in hybrid environments.
Tags : 
it infrastructure, cloud, business service management, hybrid environments
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Jun 05, 2013
It wasn’t long ago that being on the cutting edge of business meant having a website where customers could purchase your products, but that quickly changed. Soon, it wasn’t enough just to have an e-commerce presence; you had to offer an interactive and engaging customer experience (see Web 2.0). Now the standard has shifted once again; in order to truly compete in the modern economy, your business needs to have a mobile storefront on smart phones and tablets. Without this mobile presence, you’ll lose business to competitors who have them. With this new challenge comes high risk as well as great reward. With mobility, the client side of your applications is more important than ever. Instead of accessing your website from the safe confines of work or home, your customers can now perform sensitive transactions anywhere. As a result, mobile applications, and the devices and data they interact with, can now be more easily attacked.
Tags : 
mobile applications, ecosystem, risk, defense, application, risk
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Jun 05, 2013
Mobile applications have swept across geographic boundaries, cultures, and enterprises faster than any previous technology innovation. Consumers around the world use them to find their way when they travel by car and verify flight details when they travel by air. They check bank balances and sports scores, reserve theater tickets and dining reservations, shop online, pay bills, download entertainment, and participate in dozens of other everyday activities—using convenient portable devices like smart phones and tablets. The demand for this kind of convenience has spilled over into the world of work as well, and employees today expect to use their mobile devices to check email, participate in meetings, access files—even use enterprise applications, like ERP and CRM, that drive business processes.
Tags : 
mobile application, mobile convenience, business opportunities, travel
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Jun 05, 2013
There is no question that mobile computing is growing at an exponential rate. This rapid transformation has seen security concerns outpaced by the ease of use, flexibility, and productivity of mobile devices. When vulnerabilities are exploited, the security of mission-critical data becomes a serious concern. Here we take a look at three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Tags : 
mobile apps, applications, security threats, mobile computing, security vulnerabilities
    
HP - Enterprise
Published By: Network Automation     Published Date: Oct 23, 2008
In good economic times, success simply means keeping pace. After all, the market is demanding your company’s products and services, and your responsibility is simple: keep up with the demand no matter what it takes. Most managers, whether they are business managers or technology managers respond to this situation the same way. They hire more people to shoulder the increased load. Sales managers seek out more sales reps. Foremen bring more assembly workers online. Customer service beefs up the call center. And IT managers hire more administrators to maintain the constant flux of demands from users, applications, systems, and networks.
Tags : 
network automation, business, process, automation, processes, tough economy, bad economy, workflow
    
Network Automation
Published By: Network Automation     Published Date: Dec 02, 2008
For years, an IT staffer at ITW Construction Products had to come to work early every morning to prepare the company's ERP system for the new day. At first, the process of incorporating the previous day's business activities into the ERP database took 30 minutes. As the company grew, the job ballooned to 2-1/2 hours.
Tags : 
network automation, automate, erp, networking, it management
    
Network Automation
Published By: Network Automation     Published Date: Dec 02, 2008
Businesses today are under constant pressure to lower costs while improving overall operational efficiency. Enterprises of all sizes can reduce costs and improve business agility if they can automate various operational aspects of their IT and business processes.
Tags : 
network automation, automation, systems integration, networking, it management
    
Network Automation
Published By: Network Automation     Published Date: Dec 02, 2008
The way the business now views the IT group at BJ's Restaurants is working to everyone's advantage. In most restaurants, IT is generally viewed as a function of finance, where the prevailing ethos is keeping costs down.
Tags : 
network automation, network automation bpa server, process automation, networking, it management
    
Network Automation
Published By: Network Automation     Published Date: Dec 02, 2008
The Vanderburgh County Highway Department encompasses the Highway, Local Roads, and Street and Cumulative Bridge departments within the Vanderburgh County Government. About 55 employees within these departments handle public works and general maintenance for 560 lane miles of Vanderburgh County roads, including general road repairs and resurfacing, right-of-way mowing, roadway ditch maintenance, tree maintenance and emergency response to weather conditions such as storm damage and snow removal.
Tags : 
network automation, business process automation, automatic vehicle location, it management
    
Network Automation
Published By: Network Automation     Published Date: Dec 02, 2008
Rapid development and deployment of automation to eliminate repetitive,labor intensive, and computer related tasks throughout the enterprise.
Tags : 
network automation, business process automation, automation deployment, networking, it management
    
Network Automation
Published By: Network Automation     Published Date: Dec 08, 2008
Before turning to AutoMate, nightly processes were performed by running a mish-mash of batch processes manually after work hours. Even though banks typically close at 4 or 5pm, there is a lot that happens at night to get ready for the next business day. A typical night consisted of 1 or 2 persons staying until 10 or 11pm to make sure all the nightly operations, backups, file transmissions, etc. were finished and validated.
Tags : 
network automation, automate, process automation, elimination of manual process, networking, it management
    
Network Automation
Published By: Network Automation     Published Date: Dec 08, 2008
In order to deliver quality patient care, Health First must exchange information with a large number of partners, customers, and vendors on a timely basis. Complicating this enormous task is the fact that Health First has over 15 business units using a variety of mission-critical applications.
Tags : 
network automation, mission critical applications, process automation, automate, it management
    
Network Automation
Published By: Oracle Corp.     Published Date: Sep 05, 2012
The Benefits of Running Oracle E-Business Suite on Exalogic and Exadata
Tags : 
oracle, e-business- exalogic, exadata, global business, business technology
    
Oracle Corp.
Published By: Oracle Corp.     Published Date: Sep 07, 2012
G. James uses Oracle SOA Suite to easily connect disparate systems including C, C++, and Delphi with Oracle E-Business Suite.
Tags : 
oracle, soa, software-oriented architecture, c++
    
Oracle Corp.
Published By: Oracle Corp.     Published Date: Sep 07, 2012
San Joaquin County in California modernized a critical, but difficult to maintain, information systems infrastructure by transforming to BPM on a SOA foundation. San Joaquin County gained efficiency and greater visibility of mission-critical citizen
Tags : 
oracle, business process management, bpm, soa, service-oriented architecture, case study
    
Oracle Corp.
Published By: Oracle Corp.     Published Date: Sep 07, 2012
As an Oracle Platinum Partner, ITC Infotech makes extensive use of Oracle technology and applications to deliver customer solutions. Most recently, the company used Oracle SOA Suite 11g to integrate the business systems of a major European airline.
Tags : 
case study, soa, service-oriented architecture, itc infotech, disparate systems
    
Oracle Corp.
Start   Previous    547 548 549 550 551 552 553 554 555 556 557 558 559 560 561    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.