Find White Papers
Home
About Us
List Your Papers
    

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

version

Results 351 - 375 of 664Sort Results By: Published Date | Title | Company Name
Published By: rPath     Published Date: Dec 10, 2010
Strong Version Control as a Foundation to System Management
Tags : 
rpath, strong version control, system management, software development, collaboration, automation, audit, access control, auditing, business process automation, system management software, database development
    
rPath
Published By: Silver-Peak     Published Date: Mar 21, 2012
Why do industry analysts agree Silver Peak is the WAN Optimization vendor of choice for offsite data replication? It starts with a unique, next generation architecture. Conceived from the ground up to optimize all IP applications, regardless of transport protocol or application version.
Tags : 
data center, data replication, disaster recovery, silver peak, technology, data integration, data protection, data quality, software compliance, service management
    
Silver-Peak
Published By: IBM     Published Date: Dec 11, 2012
Enterprise Ready Intelligent Capture (ERIC) — a coordinated approach to document input and processing that combines distributed and centralized scanning with fax and electronic conversion across numerous departments. Read on to learn more.
Tags : 
government agencies, critical improvements, paper bound functions, ibm, enterprise ready intelligent capture, efficiency, enterprise applications, data management
    
IBM
Published By: Lumension     Published Date: Oct 20, 2014
"Just over a decade ago, the outcry over Microsoft’s security problems reached such a deafening level that it finally got the attention of Bill Gates, who wrote the famous Trustworthy Computing memo. Today, many would say that Microsoft leads the industry in security and vulnerability handling. Now, it’s Java that’s causing the uproar. But has Oracle learned anything from Microsoft in handling these seemingly ceaseless problems? In this webinar, Randy Franklin Smith from Ultimate Windows Security will start by reviewing the wide-ranging Java security changes Oracle is promising to make. They sound so much like the improvements Microsoft made back with Trustworthy Computing that I’m amazed it hasn’t been done before! We’ll move on to discuss what you can do now to address Java security in your environment. One of the banes of security with Java is the presence of multiple versions of Java, often on the same computer. Sometimes you really need multiple versions of Java to support appli
Tags : 
java, insecurity, vulverabilities, computing, security
    
Lumension
Published By: Marketo     Published Date: Mar 13, 2014
Enterprise marketers have larger sends and bigger budgets, which increases their need to A/B test new techniques, layouts, and messaging for lead generation campaigns. Optimizing and improving conversion rates can make a big difference in marketing ROI, and lead to proven tactics and techniques organizations can adopt over time.
Tags : 
marketo, lead generation, marketing roi, metrics planning, first touch, multi touch, influences, a/b test, conversion rates, testing techniques, marketing automation, performance testing
    
Marketo
Published By: Marketo     Published Date: Oct 08, 2014
In this on-demand demo, learn how leading enterprise marketing teams are leveraging Marketo’s customer engagement platform to increase lead conversion, improve marketing ROI and integrate social campaigns.
Tags : 
marketo, enterprise marketing, lead conversion, marketing roi
    
Marketo
Published By: Marketo     Published Date: Dec 11, 2015
In this on-demand demo, learn how leading enterprise marketing teams are leveraging Marketo’s customer engagement platform to increase lead conversion, improve marketing ROI and integrate social campaigns.
Tags : 
webinar, marketo, demo, crm, lead conversion, marketing, roi
    
Marketo
Published By: Globalscape     Published Date: Jun 27, 2014
The PCI Security Standards Council issued version 3 of their PCI DSS guidelines for processing electronic payments. Our whitepaper details the newest additions to the guidelines as well as tools and resources to help organizations comply with the standards.
Tags : 
globalscape, file transfer, security, compliance, payment information, electronic payments, ecommerce, security, information management, electronic processing, messaging, secure content management
    
Globalscape
Published By: Ektron     Published Date: Jun 03, 2014
Understand why evaluating data is essential to your business success
Tags : 
ekton, inbound website, data evaluating, conversion rates
    
Ektron
Published By: Alert Logic and Rackspace     Published Date: Jun 20, 2014
A new version of the PCI DSS standard was released in January of this year, containing some new and updated requirements. This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the new standard.
Tags : 
alert logic, rackspace, pci, dss, compliance, security, it management
    
Alert Logic and Rackspace
Published By: Alert Logic and Sungard Availability Services     Published Date: Jun 20, 2014
A new version of the PCI DSS standard was released in January of this year, containing some new and updated requirements. This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the new standard.
Tags : 
alert logic, sungard, pci, dss, compliance, security, it management
    
Alert Logic and Sungard Availability Services
Published By: Mobify     Published Date: Jan 27, 2015
We at Mobify want to help you further deepen your understanding of the mobile shopping landscape and the expectations of mobile consumers. In this white paper, you’ll discover: - Why ‘omnichannel’ is not a buzzword, but the new retail reality - What the key differences are between smartphone and tablet users and what this means for your bottom line - Why Millennials are a market that you can’t afford to ignore - How your mobile presence can make or break a customer’s in- store experience
Tags : 
mobile website, responsive ecommerce website, mobile conversion optimization, mobile shopping, mobile retail, mobile e-commerce, omnichannel app, make responsive website, ecommerce mobile, e-commerce mobile, mobile retail website, mobile app development, mobile shopping platform, ecommerce mobile website, retail app development, mobile ecommerce solutions, ecommerce app development, ecommerce mobile site, mobile ecommerce site, mobile ecommerce website
    
Mobify
Published By: BubblewrApp     Published Date: Jan 20, 2015
"Agile companies push new application versions to production every few weeks, sometimes even faster. With super-fast Beta cycles being the norm, getting various user groups, such as remote QA teams, access to staging environments can slow down your delivery timelines. What if you could enable secure access for any number of users in 15 minutes? BubblewrApp’s Service Access Service (SAS) is a turnkey, cloud-based service that acts as the first line of defense for your applications. BubblewrApp’s SAS enables its customers to grant easy access to applications deployed ""behind the firewall"" (on premise) or ""inside the Virtual Private Cloud"" (in a public cloud) from any remote location. Customers can begin leveraging SAS within minutes without requiring any changes to pre-existing network and security policies. The result is a vastly superior secure application access model that enables a zero CapEx, low OpEx model for secure application access, both on premise and in the public cloud."
Tags : 
secure access, security policies, new applications, delivery timeline, cloud-based service, sas, application access model, software development, enterprise applications
    
BubblewrApp
Published By: Digital Bungalow     Published Date: Feb 09, 2015
Just because you have content doesn't mean you're a content marketer. Learn 7 steps that will help you start driving more qualified leads for sales!
Tags : 
content marketing, content plan, content share, sales conversion, customer targeting
    
Digital Bungalow
Published By: Acquia     Published Date: Feb 26, 2015
Storytelling has long been a staple of good brand marketing. But the concept has taken on more urgency in the digital space, where brands now have the power to engage directly with their customers through web and mobile channels. The mandate for more sophisticated brand content has introduced a new set of challenges for online retailers—namely, how to integrate traditionally separate marketing and commerce operations to deliver a unified experience to shoppers.
Tags : 
organizational restructuring, commerce, e-commerce, increasing conversions, content-driven commerce, brand marketing, mobile channels, online shopping, acquia
    
Acquia
Published By: Acquia     Published Date: Feb 26, 2015
With Lush’s in-store sales far outweighing those online, the Managing Director of Lush Digital, Jack Constantine, set out to bring the brick-and-mortar commerce experience to its UK website, powered by dynamic displays, interactive design, and an unforgettable look and feel. Lush wanted to create a digital experience that would weave its stories throughout every page of its website and result in a spike in online sales. Download this case study today to discover what Lush Cosmetics did to transform their online business.
Tags : 
commerce, content and commerce, integration, cosmetics, increasing conversions, site content, content integration, online sales, acquia
    
Acquia
Published By: Acquia     Published Date: Feb 26, 2015
The Issue: The Content and Commerce Divide Commerce and digital marketing teams tell a familiar story. The commerce team launches an online store on a commerce platform. Commerce and IT focus on the platform and evolve it as the online business grows—focusing on basics such as PCI compliance and product information and expand-ing to more complex integrations. Now they want to add content, such as reviews and engaging media, that will inform and guide shoppers. Meanwhile, the digital marketing team regards the online store as a missed branding and engagement opportunity and tries to jump in and contribute only to find that the system can’t meet their needs. So marketing goes outside to a digital agency, pays for a separate microsite, and takes their creative production needs elsewhere. And thus a classic divide is formed. Download the Forrester Report to learn the impact of integrated and personalized commerce experiences.
Tags : 
commerce, content and commerce, personalization, increasing conversions, digital marketing, commerce platform
    
Acquia
Published By: Intercom     Published Date: Apr 05, 2018
In advertising, a one size fits all strategy is too broad to be truly effective. One size ends up fitting none. If you drive all of your paid traffic to your homepage it’s likely you’re missing out on high intent conversion opportunities.
Tags : 
    
Intercom
Published By: Code42     Published Date: Jan 13, 2016
Today’s organizations face a ballooning data management and risk problem. The use of laptops, tablets, workstations, servers and smartphones in the enterprise to create and store critical data is growing at an alarming rate. Many companies still rely on a legacy, platform-specific data backup solution, even though it doesn’t provide consistent backup across the enterprise. This outdated approach becomes especially risky when IT faces a data migration initiative. Whether migrating to a new version or brand new hardware on the client or server—organizations risk immense data loss and an expensive, intensive disaster recovery undertaking if they launch a data migration effort without first properly securing their data. Continuous, real-time data backup is the only viable solution for protecting all enterprise data while providing for a seamless migration process. But how do you achieve it?
Tags : 
code42, best practices, platform-specific data, endpoint backup, data migration, real-time data backup, data solutions, security, it management, knowledge management, enterprise applications
    
Code42
Published By: Microsoft Office 365     Published Date: Mar 01, 2018
Help your employees achieve their best with integrated, secure technology Thrive in a fast-changing digital world by giving your people the freedom and flexibility to be productive and work together from anywhere, while maintaining security and compliance. Discover how an integrated solution can deliver: Familiar productivity and collaboration tools System and device management Intelligent security The latest version of Windows for the enterprise
Tags : 
    
Microsoft Office 365
Published By: Microsoft Office 365     Published Date: Mar 01, 2018
A lot can slow down your team. From version control and inefficiencies to separate workflows and inconsistent apps, working together isn’t always easy—but it can be. Solving these problems will enable a productive workforce and business efficiency. Download this free, interactive e-book for complete details.
Tags : 
    
Microsoft Office 365
Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search