bsp

Results 1 - 25 of 410Sort Results By: Published Date | Title | Company Name
Published By: Accelerance     Published Date: Feb 01, 2008
Despite the fact that Software Executives are pressured to do more with less and cut costs to the bone, many see offshoring as a "threat."  They know they need to go offshore - but where? And with who? What they want is an easier, better, more effective and safer way to use offshore programming resources.
Tags : 
it management, software development, development, developer, programmer, programming, developing, offshoring, offshore, outsource, outsourcing, india, accelerance
    
Accelerance
Published By: Adaptive Growth     Published Date: Mar 12, 2008
ERP system acquisition projects are rarely deemed to fail.  All the well-advertised failures come later, during implementation and afterward.  Nevertheless, the seeds of these failures are invariably planted in the earliest stages of ERP acquisition planning.
Tags : 
erp, adaptive growth, project management, enterprise applications, enterprise resource planning, adaptivegrowth
    
Adaptive Growth
Published By: Adaptive Growth     Published Date: Mar 12, 2008
ERP implementations fail – when they do – because implementation projects allow a few well-known risks to go unmanaged. These risks go unmanaged because the control of results slips from buyer to seller.  It doesn’t have to work that way.
Tags : 
erp, adaptive growth, project management, enterprise applications, enterprise resource planning, adaptivegrowth
    
Adaptive Growth
Published By: Adaptive Growth     Published Date: Mar 12, 2008
It is a truism that in any complex activity, the critical, defining decisions should be made as early in the process as possible.  In ERP implementation projects this principle is routinely undermined by the nearly universal practice of separating acquisition and implementation activities into separate projects, performed by separate teams operating under separate control.
Tags : 
erp, adaptive growth, project management, enterprise applications, enterprise resource planning, adaptivegrowth
    
Adaptive Growth
Published By: Adaptive Growth     Published Date: May 14, 2008
Projects to implement ERP tend to be difficult, expensive and drawn-out. They are often full of painful surprises and overrun budgets and schedules that were extravagant in the first place. They fail entirely in an alarming number of cases.  Why this should be so is not immediately apparent. If we list, at a fairly high level, the tasks required to implement an ERP system in a company that’s already familiar with ERP practices, what we see is a significant but not daunting amount of work.
Tags : 
erp, project management, adaptive growth
    
Adaptive Growth
Published By: Advantix Communications     Published Date: Oct 26, 2007
Today, most healthcare professionals carry mobile phones. These phones are capable of sending and receiving text messages; immediately, non-intrusively and cost effectively. Text messaging has opened up a revolutionary way for healthcare organizations to interact with their health care staff.  This document will help the reader to understand the costs associated with current staffing organizations' communications and identify a cost effective alternative.
Tags : 
nurse communications, sms for healthcare, sms for health care, text messaging communications, cell phone messaging, cellphone messaging, mobile phone messaging, health care text message, healthcare text message, health care professionals, healthcare professionals, health care communications, healthcare communications, health care messaging, healthcare messaging, healthcare technology, health care technology, wireless healthcare, wireless health care, nurse communication
    
Advantix Communications
Published By: Aomega     Published Date: Nov 06, 2006
Recent regulatory additions require that companies take proactive measures like penetration testing to enforce data privacy and integrity.  By deploying a distributed model companies can execute testing from different security levels which is important in challenging posture based on level of access.
Tags : 
regulatory compliance, compliance, data privacy, pci, data privacy, data protection, access control, security testing, security audit, glba, hipaa compliance, aomega
    
Aomega
Published By: Art Technology Group, Inc     Published Date: Jan 22, 2009
Forrester examined multiple Click to Call deployments in order to quantify ROI, determine conversion rates and understand the impact on customer experience across channels.  Read the analyst perspective and see how eStara Click to Call can change your business.
Tags : 
estara, click to call, financial services, retail industries, roi, voip
    
Art Technology Group, Inc
Published By: Art Technology Group, Inc     Published Date: Jan 22, 2009
Forrester Research identified click to call technology as one of the "Twelve Technologies That Will Transform Online Retail". Online buyers seek to move between phone and Internet channels in a single unbroken session, merging the best of both worlds: the immediacy and human touch of the phone, with the ease and convenience of the Internet.  Read More.
Tags : 
estara, click to call, online retail, online transactions, e-commerce
    
Art Technology Group, Inc
Published By: Art Technology Group, Inc     Published Date: Feb 02, 2009
Written by: Forrester Research and Sponsored by:  Art Technology Group, Inc. In this economic climate, no one can afford to lose a customer. Rather than halting spending, smart customer service executives will use this economic downturn as an opportunity to regroup and reprioritize. What should they focus on?
Tags : 
art technology group, importance of customer service, necessity of customer service, customer retention, proactive chat, agent-customer co-browsing, online customer communities, unified communications, multichannel knowledge management, repurchase probability, long-term loyalty, empower sales, roi of self-service
    
Art Technology Group, Inc
Published By: Art Technology Group, Inc     Published Date: Feb 02, 2009
Written by: Forrester Research and Sponsored by:  Art Technology Group, Inc. In 2008, contextual, task-related help means more than a toll-free number on a booking page or a FAQ section on your Web site. It means being more relevant and personal and helping travelers in the channel they prefer immediately so they aren't driven to other channels - or worse, a competitor's site.
Tags : 
art technology group, travel ebusiness, interactive support, call center help, customer support, online chat, gen x, gen y, interactive chat agent, @aquila’s miq interactive, atg, nextit
    
Art Technology Group, Inc
Published By: Asentria Corporation     Published Date: Sep 04, 2007
Telecom operations typically have sophisticated network and systems management (NSM) software in place to monitor their servers, workstations and routers. Such systems often utilize Simple Network Management Protocol (SNMP) as a means of transmitting and receiving network monitoring information. Great - if you run only modern equipment. 
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures, fault management, network management, remote site monitoring, remote site alarms, environmental monitoring, network alarm monitoring, network alarm management, remote telemetry units, alarm management system, network management systems, network monitoring, protocol mediation
    
Asentria Corporation
Published By: ASG Software Solutions     Published Date: Aug 10, 2008
Over the past ten years, IT personnel costs have risen faster than hardware and software investments. IT services have not improved process-wise and still require as much manpower, if not more, to operate now as they did in the past. As firms spend 76% of their IT budget on maintenance and support, they will naturally invest in BSM solutions that will reduce costs, enable ITIL, and provide an optimal ROI.
Tags : 
asg, cmdb, bsm, metadata, metacmdb, lob, ecommerce, bpm, workflow, itil, cmdmdb, service optimization
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Jun 05, 2009
ASG's Business Service PortfolioT (BSPT) Virtualization Management provides comprehensive oversight, inspections, discoveries, warnings, diagnostics, and reporting for the critical technology and administrative disciplines involved in virtual workload management. This is all done in parallel with physical systems management.
Tags : 
asg, sla, cmdb, bsm, metadata, metacmdb, lob, ecommerce, bpm, workflow, itil, cmdmdb, service optimization
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Jun 02, 2009
End-user expectations and high levels of performance against Service Level Agreements (SLAs) must be achieved or organizations risk the loss of business. This paper details key capabilities needed for successful end-user monitoring and provides critical considerations for delivering a successful end-user experience.
Tags : 
asg, cmdb, bsm, itil, bsm, bsp, metacmdb, user experience, lan, wan, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Jul 28, 2008
Targeted at IT executives responsible for both the financial and ultimate project oversight of an enterprise CMDB initiative, this white paper sets expectations for ROI calculations for CMDB initiatives, provides basic ROI best practices, and gives readers sufficient insight to move forward with their CMDB project.
Tags : 
asg, cmdb, bsm, itil, bsm, bsp, metacmdb, roi, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Sep 28, 2009
Virtualization is now mainstream. Enterprises continue to heavily invest in virtualization projects and while short term hardware and cost saving benefits are being achieved, few enterprises achieve anywhere close to the full potential of virtualization as they struggle with new problems like assuring performance and availability, preventing VM sprawl, and maximizing resource utilization
Tags : 
asg, cmdb, bsm, itil, bsm, bsp, metacmdb, virtualization, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Apr 02, 2008
Business Service Management (BSM) is of growing importance in the IT world. By managing IT systems according to the business services they support - like order entry, online sales, shipping, or customer service - IT is able to deliver on real business goals like providing competitive advantage, improving customer satisfaction, driving revenue growth, and increasing shareholder value.
Tags : 
asg, cmdb, bsm, itil, bsm, bsp, metacmdb, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, bsm, ecommerce, bpm, workflow, itsm, critical application, cms
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Mar 10, 2010
Configuration Management is at the heart of the IT Infrastructure Library (ITIL) and forms the foundation for Business Service Management (BSM). In fact, it is safe to say that neither the ITIL IT Service Management (ITSM) processes nor the BSM functions that leverage ITSM can be efficiently carried out without accurate configuration and dependency information.
Tags : 
asg, cmdb, bsm, itil, ema, configuration management, itsm, bsm, itil, asg, ddm, cms, bsm, bsp, metacmdb, configuration management, metadata, metacmdb, lob, sdm
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Jun 15, 2009
ASG's Business Service Portfolio (BSP) Virtualization Management provides comprehensive oversight, inspections, discoveries, warnings, diagnostics, and reporting for the critical technology and administrative disciplines involved in virtual workload management. This is all done in parallel with physical systems management.
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, archiving, sap, ilm, mobius, workload automation, wla, visibility, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce
    
ASG Software Solutions
Published By: Avalere     Published Date: Apr 02, 2007
Sensitive documents, files and intellectual property are extracted from a central repository such as a database, records management system, or document management system to complete daily tasks, however, extracting this information can lead to a security breach.  Avalere provides the tools you need to control the proliferation of sensitive information throughout your organization.
Tags : 
security, security management, database admin, dba, records management, database management, document management, data security, document security, avalere
    
Avalere
Published By: Avalere     Published Date: Apr 02, 2007
Companies struggle with cleanly separating an employee, contractor or consultant with their company and critical information.  Avalere enables companies to review how information has been used prior to an employee’s departure in order to protect the company and the employee.
Tags : 
data protection, employee performance, fired, employee departure, employee quit, employee resigned, access control, avalere
    
Avalere
Published By: Aveksa     Published Date: Feb 04, 2008
User access-related business risk comprises a broad array of potentially damaging events that may be caused or made possible by inadequate governance of access to an enterprise’s information assets. Such events range from relatively minor policy and compliance violations to disastrous business losses.  The stakes involved in access-related risk have risen dramatically in recent years as organizations have become thoroughly operationalized by technology.
Tags : 
access control, user access, access, permissions, risk, risk management, compliance, governance, aveksa
    
Aveksa
Published By: Aventail     Published Date: Aug 21, 2009
To thrive in an increasingly competitive world, forward-thinking organizations are encouraging workforce mobility.  Read this white paper by security expert Dave Piscatello, for an assessment of key attributes in a secure remote access solution and how you can benefit from replacing your IPSec VPN.
Tags : 
ssl, vpn, ssl vpn, ipsec, ipsec vpn, secure remote access, remote access, vpn upgrade, upgrade vpn, analyst report, aventail, networking
    
Aventail
Published By: BMC Control M     Published Date: Jul 16, 2009
Die Stapelverarbeitung ist in den meisten Unternehmen ein zentraler, geschäftskritischer Prozess. Sie dient als Grundlage  für eine Vielzahl von Anwendungen – E-Commerce, Buchhaltung, Lagerverwaltung, ERP, Kundenservice und viele andere mehr. Jeder Ausfall eines solchen geschäftskritischen Batchprozesses kann drastische Auswirkungen auf den Geschäftsbetrieb haben. Betriebsausfälle, entgangene Gewinne oder sogar Vertragsstrafen können die Folge sein.
Tags : 
itil, change, management, hardware, dmdb, bmc, ema, process
    
BMC Control M
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.