Companies UsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Companies Us returned the following results.
RSS What is RSS?
Related Categories

 •   Mobile Device Management
 •   Data Mining
 •   Wireless Technologies and Mobile Computing
 •   Social Networks and Community Management
 •   Storage Security
 •   Disk-based Backup & Storage/ RAID
 •   Virtualization
 •   Customer Data Integration
 •   Storage Management
 •   Laptops/ Notebooks/ Tablet PCs

Related Searches
 •   Companies Statements
 •   Companies Us Hardware
 •   Companies Us Profile
 •   Companies Us Rhode Island
 •   Computers Companies Us
 •   Export Companies
 •   List Companies Us
 •   Net Companies
 •   Sample Companies Us
 •   Sql Companies Us
Advertisement

ALL RESULTS
1 - 25 of 492 | Next Page

The Flawed Vision of Customer Data Integration – How to Get it Right the First Time by Siperian, Inc.

September 16, 2009 - (Free Research)
The initial goal of Customer Data Integration (CDI) was to create the most reliable customer data for the entire company. We now know that the golden opportunity for CDI lies within Master Data Management and the ability to uncover interactions and understand the relationships that companies have with their customers. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 12 February 2013: Can BlackBerry 10 bridge the business-consumer smartphone divide? by ComputerWeekly.com

February 12, 2013 - (Free Research)
In this week's Computer Weekly, we look at the new smartphone from BlackBerry – it's designed to please both business and consumer users, but is it enough to save the company? We examine the options for using cloud services for disaster recovery. And IT leaders tell us what they think about the future of the data centre. Read the issue now. 
(EZINE) READ ABSTRACT |

Data Security Laws in the US by Quantum Corporation

July 01, 2009 - (Free Research)
This list features a selection of Data Security laws in the US. As Quantum is a computer storage company, we cannot be held responsible for the accuracy of this list. Please check with your local government or legal advisors on the laws in your own location. Thank you. 
(ASSESSMENT TOOL) READ ABSTRACT |

Trends in Enterprise Mobility by ComputerWeekly.com

April 22, 2013 - (Free Research)
This research report from Comptia offers advice to organisations on provisioning mobile devices, assesses the benefits of mobile and identifies the challenges of remote working. 
(WHITE PAPER) READ ABSTRACT |

Overcoming the insight deficit by ComputerWeekly.com

September 05, 2011 - (Free Research)
Learn how you can empower your employees to make the most of big data and data analytics in this executive guide from the Corporate Executive Board. 
(ESSENTIAL GUIDE) READ ABSTRACT |

IT industry outlook 2014 by ComputerWeekly.com

April 17, 2014 - (Free Research)
This report from CompTIA provides an overview of the size, shape and growth factors of the information technology (IT) industry. 
(ESSENTIAL GUIDE) READ ABSTRACT |

DDoS Attacks: 5 Steps to Prepare by Verisign, Inc.

December 31, 2013 - (Free Research)
This helpful guide provides a number of considerations for your company to look over prior to a distributed denial of service (DDoS) attack in order to get your site back up and running as quickly as possible. 
(WHITE PAPER) READ ABSTRACT |

Leveraging Security Intelligence for Energy and Utilities Companies by IBM

July 31, 2013 - (Free Research)
Learn how an integrated security intelligence platform provides the necessary components to help energy and utilities companies automate compliance and risk management, detect and manage threats, and protect the smart grid from both security breaches and cyber-attacks. 
(WHITE PAPER) READ ABSTRACT |

Transform the Customer Experience with Pega CRM by Pegasystems

May 11, 2011 - (Free Research)
For years, companies have tried to serve customers in a way that would lead to brand loyalty.  While traditional CRM systems have failed to deliver, a new approach might be just what companies need. 
(WHITE PAPER) READ ABSTRACT |

Closing the Customer Feedback Loop - Improving Customer Loyalty with Action Management by MarketTools, Inc.

January 26, 2011 - (Free Research)
Listening to customers today is a given. This Webinar will explain how companies can improve the customer experience, build loyalty, and deliver real business impact by acting on customer feedback. Attendees will also learn why it’s imperative to take action on the voice of the customer, the benefits of doing so, and the mechanisms that support it. 
(WEBCAST) READ ABSTRACT |

Game, set and perfect match. Wimbledon and IBM by IBM

September 12, 2013 - (Free Research)
See how Wimbledon and IBM work together and learn what you can do with today's advanced analytics technologies. 
(WHITE PAPER) READ ABSTRACT |

Six reasons to move from Oracle to IBM: Learn how companies around the worldare boosting performance, cutting costsand managing growth by IBM

June 06, 2011 - (Free Research)
In six case studies, you’ll learn to tackle important challenges about moving to IBM. Learn how companies around the world are boosting performance, cutting costs and managing growth. 
(WHITE PAPER) READ ABSTRACT |

Making the Case for BPM: A Benefits Checklist by IBM

December 15, 2010 - (Free Research)
BPM is the best investment a company can make in establishing a platform for continuous improvement. The challenge for many companies is justifying the BPM investment instead of traditional paths for solving process problems – like buying an application or building a custom application. This paper provides a virtual checklist for the benefits. 
(WHITE PAPER) READ ABSTRACT |

Service Management Virtual Simulation (tool) by IBM

December 07, 2009 - (Free Research)
Check out this virtual forum to access papers and podcasts pertaining to dynamic infrastructure solutions from IBM. 
(RESOURCE CENTER)

Big Data Analytics, Business Processes and Application Performance Management: A Business Manager's Perspective by CA Technologies.

November 21, 2013 - (Free Research)
This webcast addresses the need for IT organizations to adopt a business manager's approach to Big Data analytics to manage the ocean of data from business transactions and badly performing apps. 
(WEBCAST) READ ABSTRACT |

Success Factors of a Best-Run Marketing Organisation - How Does Your Team Stack Up? by SAP AG

December 01, 2007 - (Free Research)
How are leading marketing organisations getting the job done? Walk through their best practices, and you'll see what role software solutions - and customers - can play in helping marketing teams demonstrate favorable business outcomes. 
(JOURNAL ARTICLE) READ ABSTRACT |

Private Cloud Computing E-Zine Volume 1: Private cloud computing as a business strategy by SearchDataCenter.com

February 16, 2011 - (Free Research)
While many enterprises have moved to the private cloud model, have they adopted it entirely, and what are the roadblocks to getting there? In this inaugural edition of our Cloud Computing e-zine, we explore company strategies for private cloud adoption, some of the benefits of this model, and the challenges of a true private cloud infrastructure. 
(EZINE) READ ABSTRACT |

Level the Customer Service Playing Field with the Cloud by Genesys

March 31, 2013 - (Free Research)
In this paper by Ovum research, discover how mid-market companies can leverage the cloud to improve customer service, and, as a result, get on a more level playing field with bigger competitors. Explore the challenges that mid-size companies face with customer service, and get recommendations for cloud adoption tailored to service organizations. 
(WHITE PAPER) READ ABSTRACT |

Cold Aisle Containment Reduces Power Consumption and Boosts Company Morale by Chatsworth Products, Inc. (E-mail this company)

December 31, 2013 - (Free Research)
Explore this informative case study to learn how a web hosting and colocation provider was able to cut costs and increase data center efficiency by implementing cold aisle containment measures. 
(CASE STUDY) READ ABSTRACT |

Closing the Circle: How to Get Manageable Endpoint, Mobile Device and Web Security Together by IBM

March 20, 2013 - (Free Research)
This whitepaper discusses why it is necessary to implement security solutions that protect endpoints and mobile devices together, and to discover one company's suggestions for ameliorating this area of vulnerability within your organisation. 
(WHITE PAPER) READ ABSTRACT |

Gaming Company Uses Cloud Infrastructure for Top Performance by IBM

December 31, 2013 - (Free Research)
In this brief case study, learn how KUULUU -- an interactive gaming company -- leveraged an Infrastructure-as-a-Service (IaaS) platform that could adjust to their dynamic infrastructure needs, so they didn't have to worry about downtime or security, enabling them to focus on their core mission. 
(WHITE PAPER) READ ABSTRACT |

How Cloud Changes the Game for Line of Business Managers in Midsized Companies by IBM

April 30, 2012 - (Free Research)
Cloud portfolios offer extensive adaptability that will help maximize the value of business applications. This white paper dives into the depth of cloud portfolios and the breadth of options to better assist your midsized business. 
(WHITE PAPER) READ ABSTRACT |

Sports Broadcasting Company Scores Big With Vblock by VCE (E-mail this company)

April 17, 2014 - (Free Research)
This exclusive case study examines how a sports broadcasting company was able to utilize a converged infrastructure solution to handle their explosive increase in data, resulting in reduced support calls and decreased system implementation time, all while cutting costs. 
(WHITE PAPER) READ ABSTRACT |

The various ways to fight new and emerging cybercrime by SearchSecurity.com

November 29, 2011 - (Free Research)
Cybercrime is a constant battle companies face on a daily basis. Criminal tactics in this field of crime are always changing and advancing in style. This expert E-Guide will provide new approaches to defeating the risks of cybercrime, along with keeping you updated on the various forms that can threaten your company. 
(EGUIDE) READ ABSTRACT |

E-Guide: Balancing compliance with information security threat assessment by SearchSecurity.com

November 21, 2011 - (Free Research)
Implementing the rules and regulations of a specific industry can be difficult, making it hard for companies to accomplish the task at hand: being successful. In this expert E-Guide, you will learn that the hassle of compliance is worth it in the long run for your company and can be worked into your everyday culture. 
(EGUIDE) READ ABSTRACT |

1 - 25 of 492 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts