bsp

Results 326 - 350 of 409Sort Results By: Published Date | Title | Company Name
Published By: Quocirca     Published Date: Sep 07, 2007
Social Networking tools have proliferated in the recent past, and many individuals are now utilizing such tools as a core part of their day-to-day lives.  If these tools can be harnessed as a means of interaction by the public sector, constituency involvement will rise, while costs can be minimized.
Tags : 
social networking, blog, blogging, blog marketing, wiki, wikis, wiki marketing, emerging marketing, mashup, mashups, survey, online survey, online panel, quocirca, it management
    
Quocirca
Published By: Quocirca     Published Date: Oct 05, 2007
Knowledge of the location of customers, property, products or any other asset is invaluable intelligence for improving competitive advantage and operational efficiency.  However, despite the proliferation of data that businesses generate today, the potential value of this location dimension is often overlooked in the business intelligence process.
Tags : 
business intelligence, business analytics, historical data, data analysis, gis, geospacial, geographic information system, geocoding, geocode, location, quocirca
    
Quocirca
Published By: Quocirca     Published Date: Feb 05, 2008
The financial services industry deals with a commodity that is primarily electronic — money. Consequently it spends more per employee on IT than any other industry.  Despite this, there is a worrying tendency for information that should be confidential to end up in the public domain. Why is this and what can be done?
Tags : 
quocirca, bank, banks, financial services, finserve, finserv, network security, customer data, data protection, intrusion prevention, data security, database security
    
Quocirca
Published By: Quocirca     Published Date: May 14, 2008
Virtual private networks (VPNs) are the technologies most widely used by organizations today in the provision of remote access to their networks for employees, business partners and suppliers. Of the VPNs available, IPSec (Internet Protocol Security) VPNs provide the most complete remote access solution, although they have traditionally been seen as costly and difficult to deploy. 
Tags : 
vpn, ipsec, remote access quocirca
    
Quocirca
Published By: Quocirca     Published Date: Jul 03, 2008
Small and medium sized organizations have similar issues to large companies when it comes to the processing and storage of information and data, yet often have little capability to attract, retain and maintain the skills for managing their data assets compared to large organizations.  Blade systems offer an effective way to address the specific challenges faced by smaller organizations in managing their IT assets, and allows then to gain greater value from them.
Tags : 
storage, blade, blade systems, small business, smb, smbs, mid-sized business, quocirca
    
Quocirca
Published By: Quocirca     Published Date: Jul 03, 2008
Technology is no longer a nice to have, or a tool for the few. With many organizations now being completely dependent on their IT systems, the need for the IT department to be seen to be responding to the organization's requirements is of critical importance.  Business Service Management, or BSM, can help in providing underpinnings to the IT function. This paper looks at how the changing processes and market conditions within an organization can be augmented through the use of a Business Service Management (BSM) approach, creating a flexible and responsive technology infrastructure aimed at supporting a rapidly changing commercial landscape and enabling greater competitiveness in the markets.
Tags : 
quocirca, business service management, bsm, service management, business management
    
Quocirca
Published By: Quocirca     Published Date: Sep 18, 2008
Even when facing challenging economic times, businesses still need to communicate and rely on technology to connect with customers, partners, suppliers and their own employees. Cutting back on communications spending will have a negative effect in a long downturn.  It will leave any business that does so with fewer options when conditions improve and at a disadvantage compared to competitors that continue to invest.  However, there are 10 steps that can be taken to grow the value and use of communications, while controlling costs.
Tags : 
telecom, telecoms, quocirca, networking
    
Quocirca
Published By: Aomega     Published Date: Nov 06, 2006
Recent regulatory additions require that companies take proactive measures like penetration testing to enforce data privacy and integrity.  By deploying a distributed model companies can execute testing from different security levels which is important in challenging posture based on level of access.
Tags : 
regulatory compliance, compliance, data privacy, pci, data privacy, data protection, access control, security testing, security audit, glba, hipaa compliance, aomega
    
Aomega
Published By: Nixu     Published Date: Nov 06, 2006
This white paper is an overview of the Nixu Security System and the various security principles it encompasses.  Topics discussed include security design, application security, OS hardening, patch management, and more.
Tags : 
network security, patch management, firewall, intrusion prevention, application security, security management, nixu
    
Nixu
Published By: KACE     Published Date: Nov 14, 2006
How is HIPAA Security Rule compliance impacting your IT department?  This paper explores some solutions.
Tags : 
hipaa, compliance, hipaa compliance, healthcare, privacy, confidentiality, kace, it management
    
KACE
Published By: KACE     Published Date: Nov 14, 2006
This Enterprise Management Associates (EMA) white paper takes a close look at automated IT management, especially for  medium-sized businesses.
Tags : 
it management, ema, enterprise management associates, automated it, it automation, smb, smbs, network management, manual it management, kace
    
KACE
Published By: TriTuns Innovation     Published Date: Nov 14, 2006
This paper examines the nature, cause and impact of data quality problems in typical IT system implementations.  It argues that the extent and impact of poor data quality is largely misunderstood and often ignored.
Tags : 
data quality, data protection, data improvement, improve data, trituns, trituns innovation, data management
    
TriTuns Innovation
Published By: Customer Chemistry     Published Date: Nov 14, 2006
Predictive analytics can be utilized to uncover root causes so that problems can be eradicated.  Read this white paper to learn how companies can use predictive analytics treatment and prevention approaches to save time and resources, eliminate root causes of problems, and obtain the actionable insight required to improve marketing effectiveness.
Tags : 
analytics, predictive analytics, marketing strategy, customer research, market trends, marketing roi, customer chemistry
    
Customer Chemistry
Published By: Customer Chemistry     Published Date: Nov 14, 2006
Building a top-tier analytics practice is an evolution.  The best approach is to start small, then scale with each success.  Learn how to incrementally build your analytics practice with five customizable building blocks that create a strong foundation for analytical success.
Tags : 
analytics, predictive analytics, business analytics, business process, business strategy, customer chemistry
    
Customer Chemistry
Published By: Customer Chemistry     Published Date: Nov 14, 2006
Read this white paper to learn about the six keys to a structured approach to planning and implementation of a predictive analytics infrastructure.  Find out how you can turn customer intelligence data into actionable information for improving the accuracy, efficiency and success of your targeting efforts.
Tags : 
customer intelligence, business intelligence, marketing intelligence, customer research, predictive analytics, analytics, infrastructure, customer data, data mining, customer chemistry
    
Customer Chemistry
Published By: Customer Chemistry     Published Date: Nov 21, 2008
Many businesses believe they only have two choices when it comes to marketing -- establish an internal department or contract specific services with a full-service marketing agency. There is a third option worth exploring.  Strategic outsource marketing provides the commitment of an internal resource and the capabilities of a full-service agency without the operating costs of either.
Tags : 
clarity quest marketing, strategic outsource marketing, outsource marketing, outsourcing services
    
Customer Chemistry
Published By: NetIQ Corporation     Published Date: Nov 27, 2007
Learn how delegating administrative privileges can aid in improving administrative productivity, system availability and security, while satisfying the demands of auditors.  Read this new white paper from NetIQ today.
Tags : 
access control, security, audit, auditor, auditing, change management, net iq, netiq
    
NetIQ Corporation
Published By: Cenzic     Published Date: Nov 30, 2006
With web applications constantly evolving, finding vulnerabilities is a challenging, costly and time-consuming undertaking.  Find out how Cenzic's powerful security solutions help information security teams quickly identify problems, regularly assess web application security strength and ensure regulatory compliance.
Tags : 
application security, vulnerabilities, vulnerability management, security complinace, compliance, regulatory compliance, it spending, hacker detection, cenzic
    
Cenzic
Published By: Cenzic     Published Date: Nov 29, 2006
With web applications constantly evolving, finding vulnerabilities is a challenging, costly and time-consuming undertaking.  The solution is automated security assessment products that leverage stateful processing to comprehensively examine web applications and reveal vulnerabilities in hours rather than weeks.  Find out how Cenzic's ClickToSecure solution can help you secure your applications.
Tags : 
compiance, internet application security, it spending, application security, vulnerability management, identity management, security assessment, security audit, web security, cenzic, it management
    
Cenzic
Published By: Xiotech     Published Date: Apr 13, 2007
Data keeps growing with no signs of stopping. An effective storage solution seamlessly scales to meet an organization’s growing appetite for capacity, while ensuring availability and fast access.  SAN storage should be designed to deliver strong top-end performance so throughput does not degrade as storage needs scale higher.
Tags : 
storage area network, storage area networks, san, storage, storage performance, high availability, migration, storage migration, xiotech, storage management
    
Xiotech
Published By: Xiotech     Published Date: Apr 13, 2007
Data keeps growing with no signs of stopping. An effective storage solution seamlessly scales to meet an organization's growing appetite for capacity, while ensuring availability and fast access.  SAN storage should be designed to deliver strong top-end performance so throughput does not degrade as storage needs scale higher.
Tags : 
storage area networks, storage area network, san, san storage, storage, storage performance, storage management, offsite storage, off-site storage, xiotech
    
Xiotech
Published By: SpringCM     Published Date: Dec 06, 2006
You’ve made the decision: the overall ease and economics of implementing Software-as-a-Service (SaaS) appeal to you, and you have selected an application that delivers what you need for your business.  The last hurdle is the service component itself — making sure that critical factors like security, speed, and reliability that will affect your users’ experience meet your standards.
Tags : 
saas, on-demand, on demand, real time, real-time, appication selection, vendor selection, software selection, service provider, springcm, spring cm, it management
    
SpringCM
Published By: SpringCM     Published Date: Dec 06, 2006
A New York based psychiatric hospital maintains a record system to manage basic data entry and patient information. However, the organization did not have a central source for patient records, accompanying doctors’ notes, x-rays or other relevant information.  Download this case study and learn how they overcame this challenge.
Tags : 
hipaa, document management, health care, healthcare, health, records management, content management, content management system, cms, medical records, patient records, spring cm, springcm, knowledge management
    
SpringCM
Published By: Lombardi Software     Published Date: Dec 07, 2006
Ask 10 different vendors to define BPM or BPM suites, and you will likely get 10 variations of the definition, even though all vendors use the same basic terminology to explain it.  Learn more about BPM now.
Tags : 
workflow, bpm, define bpm, business process management, bpm suite, process improvement, lombardi, lombardi software
    
Lombardi Software
Published By: KM Sciences     Published Date: Dec 13, 2006
Microsoft Project has been the most popular project scheduling tool on earth.  But have you ever wanted to share your task and collaborate on task details, requirement specification, design discussions or track the functional progress?
Tags : 
collaboration, project management, knowledge management, collaborate, team management, project schedule, schedule, scheduling, productivity, ms project, microsoft, km science, km sciences
    
KM Sciences
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.