bsp

Results 276 - 300 of 410Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Mar 28, 2008
The purpose of this Redbook is to provide guidance for the preparation of business process models, developed with the WebSphere® Business Modeler, which will ultimately be monitored by the WebSphere Business Monitor.
Tags : 
    
IBM
Published By: Oce Business Services     Published Date: Mar 24, 2008
A new survey of legal professionals reveals that 90% of in-house counsel believes their companies are largely unprepared for legal discovery.  Get full survey results and best-practice recommendations to uncover where potential gaps exist. Identify the biggest opportunities to proactively prepare for discovery requests and improve outcomes by utilizing an outsourcing strategy.
Tags : 
ediscovery, law, oce
    
Oce Business Services
Published By: Adaptive Growth     Published Date: Mar 12, 2008
ERP system acquisition projects are rarely deemed to fail.  All the well-advertised failures come later, during implementation and afterward.  Nevertheless, the seeds of these failures are invariably planted in the earliest stages of ERP acquisition planning.
Tags : 
erp, adaptive growth, project management, enterprise applications, enterprise resource planning, adaptivegrowth
    
Adaptive Growth
Published By: Adaptive Growth     Published Date: Mar 12, 2008
ERP implementations fail – when they do – because implementation projects allow a few well-known risks to go unmanaged. These risks go unmanaged because the control of results slips from buyer to seller.  It doesn’t have to work that way.
Tags : 
erp, adaptive growth, project management, enterprise applications, enterprise resource planning, adaptivegrowth
    
Adaptive Growth
Published By: Adaptive Growth     Published Date: Mar 12, 2008
It is a truism that in any complex activity, the critical, defining decisions should be made as early in the process as possible.  In ERP implementation projects this principle is routinely undermined by the nearly universal practice of separating acquisition and implementation activities into separate projects, performed by separate teams operating under separate control.
Tags : 
erp, adaptive growth, project management, enterprise applications, enterprise resource planning, adaptivegrowth
    
Adaptive Growth
Published By: IBM     Published Date: Mar 11, 2008
This document introduces the reader to the concept of Enterprise Portals as a means of conducting business on the Internet. We continue on to a discussion of the value of using Enterprise Portals, combined with Service Oriented Architecture (SOA) methods, to tie existing processes and applications together to support the Enterprise.
Tags : 
ibm, corporate portal, portal, portals, soa, ebusiness, ep campaign
    
IBM
Published By: IBM     Published Date: Mar 11, 2008
Self-service Web portals enable governments to help citizens obtain information, apply for services and complete transactions more quickly than ever before.  Download this paper to find out how, through the power of Web portals, IBM can help your government agency make information more accessible, and processes more efficient for citizens, businesses and government employees.
Tags : 
ibm, corporate portal, portal, portals, knowledge management
    
IBM
Published By: SEPATON     Published Date: Mar 11, 2008
Is backup and recovery unnecessarily draining your budget and resources? This report measures the TCO of an enterprise environment using various data protection models, including tape, virtual tape library, and data deduplication solutions.  Learn how each stacks up in this comparative report.
Tags : 
backup, data deduplication, deduplication, sepaton, tco, data management
    
SEPATON
Published By: SEPATON     Published Date: Mar 11, 2008
Forrester evaluates 12 virtual tape library (VTL) vendors across 58 criteria to determine a relative ranking that centers on strength of current offering as well as market strategy.  This report is a must-read for companies considering revising their data protection strategies to include VTL.
Tags : 
vtl, virtual tape library, backup, recovery, storage, storage virtualization, sepaton
    
SEPATON
Published By: Bomgar     Published Date: Feb 28, 2008
Support virtualization enables your support reps to be at multiple locations at once, solving support issues with unbelievable speed and effectiveness.  Over 3,500+ organizations have virtualized their support reps and have decreased IT costs while increasing support rep productivity.
Tags : 
virtual support, customer service, customer support, remote support, remote workers, bomgar
    
Bomgar
Published By: Panda Security     Published Date: Feb 27, 2008
E-mail is the primary communication tool upon which every business and corporation depends.  This communication source is also the battleground where cybercriminals use sophisticated email infiltration-techniques to propagate malware and attack corporate networks.
Tags : 
malware, hacker, hacking, hackers, email security, e-mail security, panda, panda security, denial of service, dos, phishing, spyware
    
Panda Security
Published By: Panda Security     Published Date: Feb 27, 2008
With thousands of new malware threats being created and unleashed into the Internet daily, the End Point security model is failing.  Without additional layers of security, infiltration may be virtually impossible to stop.  This important white paper explores alternatives that eliminate dangerous traffic prior to reaching the network or server.
Tags : 
email security, e-mail security, security appliance, desktop, endpoint security, end point security, anti-spam, spam, anti spam, panda, panda security
    
Panda Security
Published By: Secure Computing     Published Date: Feb 20, 2008
Reputation systems add a critical first line of advanced protection to help organizations accurately detect and block all types of threats to their messaging, web, and network environments.  In simplest terms, deploying a reputation service at the network edge is analogous to having a peephole in the front door of your house.  You let in people you know and trust, question the ones you don’t know and shun the ones who look suspicious.  Just by taking these simple measures you reduce your risk.
Tags : 
it spending, whitelist, whitelisting, email security, spam, antispam, cast iron, castiron, roi, storage
    
Secure Computing
Published By: OnForce     Published Date: Feb 19, 2008
Learn how VARs, solution providers and IT staffing firms are finding the contract IT service professionals they need to drive service revenue without adding overhead.  Get the free Ziff Davis white paper, “Strategies For Growing IT Service Revenues.”
Tags : 
crn, reseller, retailer, service, vendor selection, onforce, on force, var, var business, varbusiness, it management
    
OnForce
Published By: ICC Decision Services     Published Date: Feb 18, 2008
To paraphrase an old saying, “When the going gets tough, retailers start slashing operational costs.”  Ironically, cost slashing usually exposes a retailer to even greater risks instead of fortifying it against economic uncertainties.  All businesses have felt the impact of today’s volatile economy.  Retail has been hit especially hard, with sales in 2007 rising by only 2.4% - the smallest year-to-year increase since 2002. Despite such dour statistics, there are plenty of opportunities to gain share in today’s market.
Tags : 
icc, decision services, increase sales, market, down market, economy, operation, operations, operational costs, profitability
    
ICC Decision Services
Published By: ICC/Decision Services     Published Date: Feb 18, 2008
To paraphrase an old saying, “When the going gets tough, retailers start slashing operational costs.”  Ironically, cost slashing usually exposes a retailer to even greater risks instead of fortifying it against economic uncertainties.  All businesses have felt the impact of today’s volatile economy.  Retail has been hit especially hard, with sales in 2007 rising by only 2.4% - the smallest year-to-year increase since 2002. Despite such dour statistics, there are plenty of opportunities to gain share in today’s market.
Tags : 
icc, decision services, increase sales, market, down market, economy, operation, operations, operational costs, profitability
    
ICC/Decision Services
Published By: Cast Iron Systems     Published Date: Feb 14, 2008
Discover how to complete more application integration projects by delivering in days what used to take months of custom programming.  Find out how an appliance-based approach to application integration uses “configuration, not coding” to dramatically simplify and accelerate integration projects, while cutting costs by up to 80%.
Tags : 
erp, crm, integration, data integration, application integration, castiron, cast iron, scm, supply chain, customer relationship management
    
Cast Iron Systems
Published By: Cast Iron Systems     Published Date: Feb 14, 2008
Midsized companies face the challenge of integrating key applications while keeping risks low, costs down, and schedules short.  Explore three approaches to application integration and discover a quick and cost-effective way to get your critical applications to work together without custom code or burdening specialist resources, ensuring rapid ROI for your application investment.
Tags : 
application integration, data integration, crm, erp, customer relationship, castiron, cast iron, eai
    
Cast Iron Systems
Published By: IBM     Published Date: Feb 08, 2008
Marketing executives, face a constant stream of business pressure. At the same time, customer expectations are increasing and customer satisfaction is becoming increasingly difficult  This report provides a blueprint of what best-in-class CMO's (Chief Marketing Officers) do differently to improve marketing effectiveness through marketing automation.
Tags : 
marketing roi, customer satisfaction, return on marketing investment (romi), chief marketing officer or cmo, customer centricity, customer behavior, multi-channel marketing, marketing strategy, marketing analytics, ibm
    
IBM
Published By: Secure Computing     Published Date: Feb 06, 2008
The Payment Card Industry Data Security Standard requires merchants and transaction processors to protect customer data, and firewalls play a major role in the process.  This paper was written by Matt Sarrello, CISSP, contributing editor at Ziff Davis Enterprise and Michael Steinhart, senior editor at Ziff Davis Enterprise.
Tags : 
cardholder data, data security, database security, data protection, pci, pci dss, pci-dss, compliance, credit card, payment card, secure computing, securecomputing, tjx
    
Secure Computing
Published By: Quocirca     Published Date: Feb 05, 2008
The financial services industry deals with a commodity that is primarily electronic — money. Consequently it spends more per employee on IT than any other industry.  Despite this, there is a worrying tendency for information that should be confidential to end up in the public domain. Why is this and what can be done?
Tags : 
quocirca, bank, banks, financial services, finserve, finserv, network security, customer data, data protection, intrusion prevention, data security, database security
    
Quocirca
Published By: Aveksa     Published Date: Feb 04, 2008
User access-related business risk comprises a broad array of potentially damaging events that may be caused or made possible by inadequate governance of access to an enterprise’s information assets. Such events range from relatively minor policy and compliance violations to disastrous business losses.  The stakes involved in access-related risk have risen dramatically in recent years as organizations have become thoroughly operationalized by technology.
Tags : 
access control, user access, access, permissions, risk, risk management, compliance, governance, aveksa
    
Aveksa
Published By: ESET     Published Date: Feb 01, 2008
With the ever evolving threat landscape, what will 2008 hold for IT Managers?  This podcast provides a high level overview of a few trends to watch for this year.
Tags : 
2008 predications, it security predictions, it security, mobile devices, laptops, endpoint, operating systems, antivirus, spam, viruses, trojans, rootkits, malware, threats, eset, nod32, trends, security, networks, spyware
    
ESET
Published By: ESET     Published Date: Feb 01, 2008
It is important for businesses to have a plan in place that addresses the changing threat landscape.  This podcast discusses various items for businesses to consider when developing an IT threat model.
Tags : 
threat planning, testing, penetration testing, defense in depth, multilayered, firewall, filtering, white listing, it strategy, eset, nod32, antivirus, malware, internet threats, web based threats, web 2.0, smb, small business, medium business, eset
    
ESET
Published By: Accelerance     Published Date: Feb 01, 2008
Despite the fact that Software Executives are pressured to do more with less and cut costs to the bone, many see offshoring as a "threat."  They know they need to go offshore - but where? And with who? What they want is an easier, better, more effective and safer way to use offshore programming resources.
Tags : 
it management, software development, development, developer, programmer, programming, developing, offshoring, offshore, outsource, outsourcing, india, accelerance
    
Accelerance
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.