eMarketingPapers
Home
About Us
List Your Papers
    
> Research Library > Technology > Business Technology

Add Research

Get your company's research in the hands of targeted business professionals.

Business Technology

Results 1 - 25 of 4281Sort Results By: Published Date | Title | Company Name
White Paper Published By: Dun & Bradstreet     Published Date: Apr 21, 2016
Is your well-worn playbook in need of a refresh? What worked best for B2B marketers last year may not help you optimize a moment with a customer or prospect today. All too often, baked in processes get in the way of delighting customers. If you’re a B2B marketer who wants to be a game changer, you have come to the right place. This reader is for marketers who crave to poke and pull apart the “tried and true”. Break the cycle of “best practice” rituals and ask yourself these questions: - When was the last time you made a truly bold move in your marketing? - Do you have any idea how bad your data problem really is? -How long will you continue to create sales content nobody uses? We answer these questions and more- download the free guide today!
Tags : 
marketing strategies, hoover's, b2b marketer, analytics, business technology
    
Dun & Bradstreet
White Paper Published By: Juniper Networks     Published Date: Feb 18, 2015
Learn how to improve your business agility in this Whitepaper on building a business case for network virtualization. Find out how your network can deliver new levels of performance and resiliency.
Tags : 
business agility, network architecture, virtualization, network, cloud computing
    
Juniper Networks
White Paper Published By: IBM     Published Date: Nov 20, 2015
Discover how proficient your organization is at using advanced analytics to transform the way you do business. Take the assessment.
Tags : 
ibm, energy, utilities, analytics, business technology
    
IBM
White Paper Published By: Veracode     Published Date: Oct 28, 2016
Web application attacks are the most frequent pattern in confirmed breaches. But many security budgets don’t line up with this risk. Getting the budget for AppSec won’t be easy, but now is the time to make the case. Download this e-book to find out the reasons why AppSec is the most productive security spend.
Tags : 
veracode, security, devops, appsec, enterprise applications
    
Veracode
White Paper Published By: International Business Systems (IBS)     Published Date: Aug 29, 2011
Powered by IBM i Solution Editions hardware, IBS's ERP applications enable improved efficiencies, scalability and cost savings.
Tags : 
ibs, distribution logistics, distribution management, wholesale distribution, distribution resource management
    
International Business Systems (IBS)
White Paper Published By: Adobe     Published Date: Feb 08, 2016
Today, customers make decisions about brands on a moment-by-moment basis. They expect personal and authentic experiences that build connections and deepen relationships with their favorite brands. New technology makes it possible to deliver on these expectations and succeed in today’s new era of marketing.
Tags : 
adobe, marketing, new era, crm, brands
    
Adobe
White Paper Published By: IBM     Published Date: Jan 07, 2016
In this study, we set to explore, with the help of ISMG, how enterprises view mobile security risks, what capabilities they are currently deploying vis-a`-vis the four pillars of the framework and what their short-to- medium-term plans are to extend these capabilities.
Tags : 
ibm, security, maturity, mobile, wireless
    
IBM
White Paper Published By: Adobe     Published Date: Feb 08, 2016
Today, brands that can deliver a unified customer experience across all of their online and offline channels will edge out the competition. But it takes a unified organization to meet the challenge.
Tags : 
adobe, marketing, customer experience, channels, unified
    
Adobe
White Paper Published By: iboss     Published Date: Jan 22, 2018
While no approach is going to guarantee security across networks and devices, taking a strategic approach to IT defense not unlike those taken in real-world combat is the best course to success.
Tags : 
iboss, device security, intrusion, network security, business technology
    
iboss
White Paper Published By: Interactive Intelligence     Published Date: Feb 28, 2013
Are your collectors FDCPA-compliant when they're on the phone with consumers? There are many options available to call centers and collection agencies. In this white paper, we get through the thoughts and opinions and various voices in the industry.
Tags : 
better hiring, better work environment, better quality management, fdcpa compliancy, better hiring
    
Interactive Intelligence
White Paper Published By: AMD     Published Date: Jul 20, 2012
Business agility be defined as a company's ability to respond to changes in business conditions quickly enough to benefit from them.
Tags : 
virtualization, it support, it management, data managemtn, cloud computing
    
AMD
White Paper Published By: IBM     Published Date: Oct 10, 2012
It is clear that we live in a land of the survival of the fittest. This same scenario is certainly not news to the CIO of any enterprise data center, especially in the data center with a mission-critical infrastructure.
Tags : 
it infrastructure, data, servers, unix, ibm
    
IBM
White Paper Published By: IBM     Published Date: Feb 19, 2013
Read the Clipper Group white paper and see how POWER7’s faster processors accelerate the delivery of applications and services, and improve the utilization of resources.
Tags : 
power7 systems, accelerate, delivery, applications, services
    
IBM
White Paper Published By: IBM     Published Date: Jan 09, 2014
As vendors abandon the UNIX market, IBM continues its commitment to AIX and POWER7 components on Power Systems. And with its recent architectural upgrades, it’s even redefining performance. Read the Clipper Group white paper and see how POWER7’s faster processors accelerate the delivery of applications and services, and improve the utilization of resources.
Tags : 
power7 system, ibm, power7 servers, mission-critical, data center
    
IBM
Webinar Published By: IBM     Published Date: Nov 13, 2014
This webcast examines a large government agency struggling to provide stable test environments to support their partner landscape. Learn how service virtualization was used to simulate their department's core systems for a lower risk, less expensive, and stable testing environment.
Tags : 
service virutalization, core systems, testing environments, it management, knowledge management
    
IBM
White Paper Published By: Endace     Published Date: Nov 02, 2012
Having 100% accurate network visibility is a looming requirement for avoiding substantial financial losses. Why? And how can you get it?
Tags : 
endace, network, monitoring, tools, saving
    
Endace
White Paper Published By: Thawte     Published Date: Aug 09, 2013
SharePoint is a valuable collaboration tool. But your organization could be vulnerable if you don’t take the right steps. There’s no silver bullet for securing SharePoint because each deployment is unique. However, here are 10 best practices that everyone should follow when using this collaboration tool.
Tags : 
thawte, ssl certificate, application, web server, data collection
    
Thawte
Case Study Published By: Cleversafe     Published Date: Dec 07, 2012
Shutterfly and Cleversafe Partner for Big Data Performance, Availability and Reliability to Meet Growing Customer Needs
Tags : 
shutterfly, images, growing, reliability, performance
    
Cleversafe
White Paper Published By: Adobe     Published Date: Feb 08, 2016
Download our guide, 10 New Year’s Resolutions for Email Marketers, to learn how you can transform your email campaigns in 2016.
Tags : 
adobe, marketers, email, customer relationships, mobile email
    
Adobe
White Paper Published By: VMware     Published Date: Dec 18, 2012
To keep up with these changing and evolving needs, IT departments need a solution that meets the needs of both the employees and IT— something not possible with a traditional PC model.
Tags : 
it infrastructure, cloud, applications, end user, consumerization
    
VMware
White Paper Published By: Brightpearl     Published Date: Nov 19, 2012
If you're a small business selling inventory then you are sure to have come across some of the pitfalls it entails, but getting it right could be more important than you think. Read on to learn the 10 reasons why accurate inventory is important.
Tags : 
brightpearl, accurate inventory, sales stock, low inventory, economic order quantity
    
Brightpearl
White Paper Published By: CDW     Published Date: Dec 23, 2014
Learn the 10 reasons why the server you choose matters and how to take advantage of a decade’s worth of technology advances in order to keep up with today’s most successful businesses.
Tags : 
cdw, data, windows, server, infrastructure
    
CDW
White Paper Published By: Riverbed     Published Date: Jan 28, 2014
Riverbed Cascade provides enterprise-wide network and application visibility with a full set of application-centric, site-centric, and business-centric views. While Cascade can coexist or integrate with a variety of other IT management solutions, it will likely become your first line of defense against application performance problems.
Tags : 
application performance management, application performance monitoring, big data apm, network performance management, network performance monitoring
    
Riverbed
Free Offer Published By: Idera     Published Date: Oct 18, 2012
Download this paper to learn how implementing basic performance enhancements can provide tremendous improvements to the operation and performance of SharePoint within the enterprise.
Tags : 
sql, servers, database traffic, data connectivity, microsoft sharepoint
    
Idera
White Paper Published By: Tripwire     Published Date: Nov 07, 2012
Many professionals in information security espouse the belief-and commitment to-"risk based" security management. In fact, according to the latest Ponemon Report on Risk Management, 77% of those surveyed claimed a commitment to it. Ironically, the analysis of the responses collected by the survey indicated that despite their stated intentions, most of the respondents and their organizations were not acting in ways that reflected this commitment.
Tags : 
security, tripwire, security management, security based management, data management
    
Tripwire
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library