January 2009- Today’s small-to-medium sized enterprises (SME) are undergoing the same IT evolution as their large enterprise counterparts, only on a smaller scale. For SMEs, WAN reliability, flexible scalability, performance, and ease of management are as essential to their WAN infrastructure as they are to a large enterprise. SMEs are able to achieve efficiencies and competitive advantages through the adoption of affordable, yet feature-rich WAN optimization technologies. On the other hand, without suitable technology, they will ...
March 2009- Ambergreen search guru Grant Whiteside looks at Google Insights for Search tool and how it can give you a pictorial breakdown of the social barometer.
April 2008- SANS Internet Storm Center uses the DShield distributed incident detection technology. ISC database receives over 10 million log lines daily from intrusion-detection systems run by volunteers worldwide. Thousands of system administrators send in additional observations and findings via e-mail and the Web. This service is free to the Internet community. SANS Internet Storm Center features this presentation.
August 2008- This paper outlines the top challenges preventing organizations from unlocking the value of their Web analytics data and recommends how to overcome them in order to begin utilizing Web analytics as a strategic corporate tool that can be used to optimize business performance and deliver additional return for dollars spent online.
The Web can be an incredible business tool, and a potential threat. The change that the Internet has and will continue to produce in the world marketplace - and in life in general - is certainly comparable to revolutionary innovations in the past, such as the introduction of automobiles or even the printing press.
This white paper, however, will not focus on Internet highlights, but on some of the considerable downsides-and how to ...
Anonymous proxies are an unseen threat - a student's or employee's backdoor to malicious or productivity-sapping sites on the Internet. If your URL filtering solution relies on the old-school URL database/keyword approach, your ship is leaking and you may not see the holes.
With hundreds of new proxy sites created each day, traditional URL filtering just can't keep up, even when supplemented by standard keyword analysis. What follows is a primer on ...
July 2008- Tips for Small Business Websites that will them you ahead of the competition. Every day I help dozens of small businesses optimize their websites to improve their visibility and rankings on search engines, and every day, I ask one client to make many of the same changes as the last. This guide is for the small business owner that has better things to worry about.
June 2008- There are six practical best practices that most enterprises can implement to reduce the impact of email by up to 80%, without changing the culture or operations of the business. These steps will significantly reduce storage and bandwidth costs and help reduce the information overload that is stifling employee productivity.
TRUSTe and TNS Global examined consumer attitudes about behavioral targeting, a hot button issue recently, as industry enthusiasm for delivering customized experiences and improved marketing metrics runs up against consumer privacy concerns and calls for greater transparency around emerging tracking and targeting techniques.
Participants answered questions regarding their overall knowledge, concerns and opinions regarding behavioral targeting benefits and activities. Survey results showed that:
• Consumer knowledge of behavioral targeting tactics remains limited.
• 40% of respondents ...
The increasing reliance on web-based applications has had significant unintended consequences. As direct customer interactions have shifted from business owners to IT, business managers now have limited visibility into the online experiences of their customers while IT teams find themselves directly responsible for the success of customer transactions. Now more than ever, it’s important that these teams work collaboratively to ensure customer satisfaction.
April 2008- During the last five years, online marketing has experienced explosive growth, moving beyond simple email blasts to pay-per-click, banner ads, online promotions, webinars and landing pages. To enhance their chances of cutting through the clutter, marketers need to hone each of their sales elements, including landing pages, to ensure they are as effective as possible. An optimized landing page can achieve conversion rates around 12 percent, compared to average conversion rates of 5 to 6 percent for the ...
January 2008- This paper shows that within a simple model of technology adoption, the explicit introduction of social network structure has lead to the emergence of more than one technology taking a hold in the market. Furthermore, there is empirical evidence that this scenario is occurring in the instant messenger market, despite expert predictions that it would turn out to be a winner-take-all market. It has demonstrated that this only occurs in markets where the connectivity between ...
View All Categories
Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Data Quality, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Performance Management
Hardware : Blades, Data centers, Desktops/PCs, Grid/Cluster Computing, Handhelds/PDAs, Macintosh, Peripherals, Processors, Supercomputers, Unix/Linux servers, Utility/On-demand Computing, Virtualization Hardware, Windows Servers
Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services
Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Internet Policy, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Web Development, Social Business
Management : Career Development, Executive Insights/Interviews, H-1B, Legal, Outsourcing, Personnel Management, Recruiting, Regulation/Compliance, ROI/TCO, Salary/Compensation, Small-Medium Business, Training, Workplace Trends
Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Global Positioning Systems, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Virtual worlds
Security : Antivirus, Application Security, Attacks/Breaches, Cyberterror, Encryption, End user/Client Security, Intrusion Prevention, NAC, Perimeter Security, Privacy, Security Administration, Storage Security, Vulnerabilities and Threats
Services : Business Process Outsourcing, Business Services, Disaster Recovery, Hosted Applications, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Systems Integration, Telecom/Voice Services
Software : Integration, Application Optimization, Business Systems Management, CRM, Database Applications, Databases, Development Tools, ERP, Hosted Software/Applications, Linux, Open Source, Operating Systems, Productivity Applications, Server Virtualization, Service Oriented Architecture, Web Services