Small Business

Results 151 - 175 of 404Sort Results By: Published Date | Title | Company Name
White Paper Published By: Neustar     Published Date: Aug 20, 2012
Lead Scoring remains a hot topic in the lead generation industry. Now, online marketers can gain even more insight into their lead scores with Lead Optimization. What's the difference between Scoring and Optimizing?
Tags : 
lead scoring, lead optimization, marketing analytics, lead qualification, lead routing
    
Neustar
White Paper Published By: Sponsored by HP and Intel®     Published Date: Aug 16, 2012
Server virtualization has transformed corporate IT -- companies have enjoyed major cost savings and have gained flexibility and efficiency. But this has also led to a proliferation of virtual machines and servers that threaten to overwhelm data movement and storage technologies. In this IDG Tech Dossier, learn how utility storage makes for massive consolidation, flexibility and scalability, so IT departments can reduce storage infrastructure and lower costs while improving their ability to respond to fast-changing needs of business units.
Tags : 
utility storage, cloud computing, virtualization, data storage, data center
    
Sponsored by HP and Intel®
White Paper Published By: ForeScout     Published Date: Aug 14, 2012
Business wants more fluid access to data while IT organizations must maintain security. As the variety of access and multitude of threats to network resources and sensitive information have grown, so has the need for more flexible and automated ways to effectuate security policies, controls and enforcement. Rarely is this need more keenly felt than at the network endpoint, where people, technology, information assets and requirements for security and compliance meet most directly.
Tags : 
pragmatic, path, achieving nac results, essential implementation, process
    
ForeScout
White Paper Published By: ForeScout     Published Date: Aug 14, 2012
The What, Why and How to Employ NAC to Apply Guest Networking, BYOD (Bring Your Own Device) and Endpoint Security Policies. Many of today's endpoints are neither known nor protected. According to Gartner, enterprises are only aware of 80 percent of the devices on their network. Those 20 percent of unknown devices are inside the perimeter of the network, are unmanaged and provide users with access. They are small, varied and highly mobile, and they are loaded with their own applications, can act as WAPs, and often contain outdated firmware or are jailbroken. Even as the devices are accessing personal applications on the web, they are also accessing corporate resources such as e-mail-all from the very same unmanaged devices, which have not been vetted by the security organization. Smartphones, notebooks, netbooks, iPads, e-readers, gaming consoles and more-the list of personal devices attempting access to employer networks seems to grow every day in what's come to be known as the BYOD (Bring Your Own Device) era in networking.
Tags : 
pad, mine, enabling, secure, personal
    
ForeScout
White Paper Published By: ForeScout     Published Date: Aug 14, 2012
In a BYOD world, companies can choose to secure and manage the entire mobile device user pool or secure portions of that community. Either way, steps must be taken to prevent unauthorized access to network resources and data loss. Enterprises should consider solutions that allow policies to be applied based on user, device, network, application, and data leakage risks.
Tags : 
archetecting, flexible, strategy, for securing, enterprise
    
ForeScout
White Paper Published By: ForeScout     Published Date: Aug 14, 2012
Information security has undergone a sea change in the past 10 years. Compliance mandates in the form of industry standards and Federal rules like NERC, FFIEC, HIPAA/HITECH and PCI-DSS are the new norm. To stay in compliance, IT teams need to be able to keep up with updatesand changes to existing mandates while also being prepared for new ones. To maximize efficiency, manage risk and reduce potential violations due to compliance failure, organizations need to implement security tools whose features support multiple specifications within and across different compliance frameworks.
Tags : 
forescout, counteract, compliance, independent, assesment
    
ForeScout
White Paper Published By: SunGard     Published Date: Aug 14, 2012
When considering business continuity and disaster recovery (BC/DR), a failed recovery means discontinued business. having systems inoperable and people unavailable for a matter of days or even hours can be disastrous in terms of lost revenue, customer dissatisfaction, and negative press. it is therefore critical to understand the root-causes behind why recoveries fail the first place.
Tags : 
sungard, failed, recoveries, business, disaster
    
SunGard
White Paper Published By: SunGard     Published Date: Aug 14, 2012
CHALLENGE: Florida Hospital performs recovery tests twice a year, recovering more than 100 applications. The healthcare organization needed a recovery strategy that improved communication and efficiency, managed a complex change control process, and that would keep staff at home during a disaster. SunGard Solution: With the Managed Recovery Program, SunGard is Florida Hospital's recovery team, ensuring recovery configurations keep pace with production changes, managing recovery test execution, and providing a single point of contact for the complete recovery program.
Tags : 
sungard, expertise, management, florida, hospital
    
SunGard
White Paper Published By: HP and Intel     Published Date: Aug 13, 2012
Forrester Consulting provides an analysis of four HP 3PAR Storage customer implementations to quantify the efficiency and cost savings achieved over legacy storage platforms. On average, HP 3PAR Storage customers achieved a 10.4 month payback period with a 55% ROI over a 3-year evaluation period and a significant reduction in CapEx and OpEx over that same period as a result of thin provisioning, maintenance costs avoided and labor productivity gains
Tags : 
hp 3par storage, storage management, maximizing roi, total economic impact, security
    
HP and Intel
White Paper Published By: HP and Intel     Published Date: Aug 13, 2012
This Enterprise Strategy Group whitepaper reviews HP 3PAR Storage Adaptive Optimization software -- granular, automated, and policy-based service-level optimization -- and support of solid-state drives (SSDs). Learn how this combination is a thoughtful approach that can deliver significant value.
Tags : 
enterprise strategy group, hp 3par storage, optimizing i/o service levels, adaptive software, ssds
    
HP and Intel
White Paper Published By: HP and Intel     Published Date: Aug 13, 2012
This DCIG report details how HP 3PAR F-class midrange arrays provide enhanced levels of VMware integration and optimized virtual machine density so users experience levels of VMware efficiency, performance and visibility well beyond what other midrange arrays natively provide.
Tags : 
hp 3par storage, vsphere integration, virtualization, virtualized environments, data storage
    
HP and Intel
White Paper Published By: SunGard     Published Date: Aug 13, 2012
A leader in performance management, marketing, and training, Frontline Focus required a new data solution to keep information flowing and secure. Any solution had to be resilient, highly available,completely scalable, and cost-effective.
Tags : 
cloud, scalable, cost-effective, sunguard, virtual
    
SunGard
White Paper Published By: SunGard     Published Date: Aug 13, 2012
Recovery-as-a-Service (RaaS) has been available for some time, and has leveraged a number of infrastructure options and recovery platforms. Many of these options have provided a recovery solution that is flexible, scalable, and secure. And in some cases, service providers offer fully managed solutions with the expertise to support heterogeneous IT environments.
Tags : 
cloud, recovery-as-a-service, raas, infrastructure, platforms
    
SunGard
White Paper Published By: SunGard     Published Date: Aug 13, 2012
Today's IT organizations are faced with the daunting task of optimizing all aspects of their departments, including people, processes and technology. Optimizing and streamlining server utilization through virtualization represents one particularly exciting example. We found that one of the most popular usage models for virtualization is to drive down server procurements in development, test and production environments. When this model is followed, future server purchases are avoided; instead, new workloads are established on existing systems.
Tags : 
leveraging, visualization, optimizing, processes, technology
    
SunGard
White Paper Published By: SunGard     Published Date: Aug 13, 2012
Whether your business is involved with it yet or not, cloud computing will play a significant role in the future of IT: it has already been enthusiastically embraced by small and medium sized businesses and its potential is also being accepted and exploited by larger enterprises.
Tags : 
services, cloud, infrastructure, cloud computing, significant
    
SunGard
White Paper Published By: SunGard     Published Date: Aug 13, 2012
Unicous marketing improves reliability and flexibility, reduces costs, and increases performance with SunGard Enterprise Cloud Services.
Tags : 
unicous marketing, sungrad, cloud, services, improve performance
    
SunGard
White Paper Published By: SunGard     Published Date: Aug 13, 2012
Most organizations today understand that a disaster recovery (DR) plan is essential to their continued survival should a natural disaster occur. But implementing a DR plan entails substantial time, effort and cost - not to mention significant investment in developing new areas of technical expertise within the organization. As a result, many organizations are turning to disaster recovery service providers (DRSPs) to offload their disaster recovery operations.
Tags : 
sungard, recovery, service, organizations, disaster
    
SunGard
White Paper Published By: Intel Corp.     Published Date: Aug 08, 2012
This report covers the challenges of first generation deduplication technology and the advantages of next-gen deduplication products. Next generation Dedupe 2.0 systems use a common deduplication algorithm across all storage systems-whether they're smaller systems in branch offices or large data center storage facilities. That means no more reconstituting data as it traverses different storage systems, which saves bandwidth and improves performance.
Tags : 
advances, deduplication, help, tame, big
    
Intel Corp.
White Paper Published By: Intel Corp.     Published Date: Aug 08, 2012
This document provides a high level overview of how to build a high performance, highly available IP SAN with deduplicated disk protection and long-term tape archive. This document will also put that solution into context with the rest of a typical IT environment.
Tags : 
designing, data, protection, strategy, p4000
    
Intel Corp.
White Paper Published By: Intel Corp.     Published Date: Aug 08, 2012
In this competitive whitepaper, Edison Group provides an independent, third-party perspective and evaluation of HP's new B6200 StoreOnce Backup System versus EMC Data Domain. Criteria considered included scalability (including capacity and performance), high availability, architectural approach, pricing, and licensing.
Tags : 
storeonce, extends, edison, group, b6200
    
Intel Corp.
White Paper Published By: Intel Corp.     Published Date: Aug 08, 2012
Virtualization reduces the number of physical servers IT needs to provision and maintain, but it also transforms the data protection paradigm. Now businesses can recover from failures in minutes, not hours, with unprecedented affordability. The key to achieving the best business uptime and cost savings is the effective design of storage management and data protection. This white paper outlines an end-to-end storage and data protection architecture optimized for VMware vSphere and Microsoft® Hyper-V environments.
Tags : 
complete, storage, data, protection, architecture
    
Intel Corp.
White Paper Published By: Intel Corp.     Published Date: Aug 08, 2012
Enterprise Strategy Group shares why client-side deduplication is the best. Dedupe 2.0 leverages intelligence and awareness at the source, backup server, and storage device. In these scenarios, the awareness of what data is already in the deduplicated storage and the discernment to send new data or not is performed within the production server instead of the backup server or deduplicated storage. Hence, network savings begin at the production server and backups are significantly faster since only changed data is transmitted from the production server to the storage solution.
Tags : 
dedupe, 2.0, store, once, enterprise
    
Intel Corp.
White Paper Published By: Intel Corp.     Published Date: Aug 08, 2012
This report describes how improving the efficiency of data storage, deduplication solutions has enabled organizations to cost-justify the increased use of disk for backup and recovery. However, the changing demands on IT storage infrastructures have begun to strain the capabilities of initial deduplication products. To meet these demands, a new generation of deduplication solutions is emerging which scale easily, offer improved performance and availability and simplify management and integration within the IT storage infrastructure. HP refers to this new generation as "Deduplication 2.0.
Tags : 
assessing, deduplication, 2.0, second, generation
    
Intel Corp.
White Paper Published By: IBM     Published Date: Aug 07, 2012
Leading companies applying? Predictive intelligence? To proactively mitigate and manage complexity-fraught risks, while bringing value to their bottom line and their brand.
Tags : 
combating, combat, risk, predictive, intelligence
    
IBM
Case Study Published By: Kenshoo     Published Date: Aug 06, 2012
TicketsNow, a leading online resale marketplace for sports, concert, and theater tickets, has created a strong paid search program to drive visitors and conversions to its site, TicketsNow.com. In 2010, TicketsNow began using Kenshoo Enterprise to manage its robust paid search campaigns. Using Kenshoo's algorithmic rules and model-based bid policies, TicketsNow has been able to effectively optimize millions of keywords and double overall contribution from its search engine marketing. To build on its success with the Kenshoo Universal Platform, TicketsNow sought to expand its efforts into social marketing with Facebook ads.
Tags : 
kenshoo, ticketsnow, cost-per-fan, kenshoo social, marketing
    
Kenshoo
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End


Sub-Categories: Benefits, Capital, Marketing, Taxes, Technology

Search      

Add Research

Get your company's research in the hands of targeted business professionals.