com

Results 23051 - 23075 of 23482Sort Results By: Published Date | Title | Company Name
Published By: Computhink     Published Date: Nov 29, 2007
Transervice Logistics Inc. provides total transportation management. They have over 38 years of experience in the transportation industry and are driven by the needs of their customers. They understand the customers’ desires and deliver innovative services to meet those needs. Their goal is to provide the customer with professional service on the most cost-effective basis.
Tags : 
document management, transportation, fleet management, transportation management, electronic data, records, records management, image management, paperless, paperless office, content management, computhink, transervice, content management system, information management, secure content management
    
Computhink
Published By: NetSuite     Published Date: Nov 27, 2007
Sales Benchmark Index presents information in this NetSuite White Paper that helps sales management succeed in implementing a data-driven decision making process for sales success. Five steps for developing a sales benchmark are defined, with a list of key metrics you can use.
Tags : 
sales, improving sales, increasing sales, salesforce, sales benchmark, benchmark, benchmarking, funnel, pipeline, analytics, sales management, netsuite, best practices, business analytics, business management, business metrics, sales & marketing software, sales automation
    
NetSuite
Published By: NetSuite     Published Date: Nov 27, 2007
Where should mid-market companies invest valuable resource? Two out of three businesses are either buying or considering buying software via the subscription model.  This white paper will explain how Software-as-a-Service is revolutionizing the economics of growing businesses.
Tags : 
saas, software as a service, on demand, on-demand, software development, development, programming, web services, netsuite
    
NetSuite
Published By: NetSuite     Published Date: Nov 27, 2007
But what is "BI" and how do small/mid size business owners acquire it without too much cost?  This Executive White Paper will outline the issues and solutions for the "BI" requirements of growing companies.
Tags : 
analytics, business analytics, business intelligence, bi tools, business planning, erp data, netsuite, business metrics
    
NetSuite
Published By: SPAMfighter     Published Date: Nov 27, 2007
This paper will discuss the shortcomings of some established filtering methods and outline how SPAMfighter's community-based approach to filtering can result in it performing much better than competing products and delivering a far superior return on investment.
Tags : 
spam, anti spam, anti-spam, spamfighter, spam fighter, exchange, productivity, costs, spending, spend management, email security, exchange server, servers, microsoft exchange
    
SPAMfighter
Published By: Shunra     Published Date: Nov 27, 2007
"Best Practices for Selecting a WAN Optimization Solution: Benchmarking Performance ROI" includes best practices for defining requirements and comparing alternative solutions, and offers a metric that IT organizations can use to select the WAN optimization solution that delivers the greatest value.
Tags : 
wan, wide area network, wide area networks, best practices, network performance, wan performance, shunra, ppi, network performance management, return on investment
    
Shunra
Published By: Shunra     Published Date: Nov 27, 2007
How SAP uses Shunra VE to keep production problems at bay with pre-production testing on the virtual WAN.  These testing approaches and methodologies  reached far beyond conventional application testing and have become the preferred approach to ensure success. SAP does it, so should you!
Tags : 
soa, application testing, application testing software, sap, sap case study, soa applications, testing, virtual wan, wide area network, shunra, ppi, wide area networks, application performance management, server virtualization, software testing, service oriented architecture
    
Shunra
Published By: Aveksa     Published Date: Nov 26, 2007
Although roles-based access control (RBAC) has been the subject of much interest in the past, experience with it has been mostly disappointing. The challenge of discovering established roles, defining new roles according to business need, connecting roles properly to the IT infrastructure, ensuring that they meet all compliance requirements, and managing roles through their natural lifecycles has, until now, proved to be too complicated and cumbersome to be practical.
Tags : 
access control, rules, compliance, governance, risk management, rbac, iam, identity management, access management, identity & access management, identity and access management, aveksa
    
Aveksa
Published By: Blue Lane     Published Date: Nov 15, 2007
Virtualization has become all the rage for companies interested in optimizing their servers and storage systems. This shift in data center architecture allows IT organizations to reduce operational costs and increase flexibility and responsiveness to changing business demands.
Tags : 
data center security, datacenter security, data centre, network security, virtual server, virtual data center, server virtualization, blue lane, security, servers, security management
    
Blue Lane
Published By: Axeda Corporation     Published Date: Nov 14, 2007
How secure are the VPNs and modems that your vendors and partners use to access your data center? Can you confidently track all activity to meet SOX, PCI, and HIPAA compliance requirements? Learn how Axeda ServiceLink for Data Centers empowers you to provide your vendors and partners with secure and auditable access to your mission-critical data center.
Tags : 
remote, remote access, remote network, network management, network security, hipaa, hippa, sox, sarbox, sarbanes oxley, sarbanes-oxley, pci, pci-dss, pci dss, compliance, auditing, audit, security audit, axeda, security
    
Axeda Corporation
Published By: Deep Software     Published Date: Nov 14, 2007
With so much of today's commerce being conducted electronically, providing staff with internet access has become a business necessity. The improper use of e-mail and instant messengers can lead to extremely expensive lawsuits, and the proliferation of mobile devices has made it considerably easier for errant employees to steal sensitive information. This white paper will detail the risks to which organizations that do not monitor their employees are exposed and explain the right way for organizations to go about monitoring.
Tags : 
security, security management, access control, identity management, data protection, email security, iam, authentication, instant messaging, tracking, workforce, workforce management, employee management, deep software, network security, risk management, messaging, employee performance, productivity
    
Deep Software
Published By: NetSupport     Published Date: Nov 14, 2007
A majority of organizations do not have efficient ways of keeping track of their IT assets. That opens them up to dangers like system downtime from improperly implemented upgrades, potential licensing violations, poor customer service, overpaying on license fees and improper usage of software and the Internet by employees.
Tags : 
itam, asset management, spend management, cost savings, cost control, risk management, it management, software compliance, net support, netsupport, network management, it spending
    
NetSupport
Published By: Quocirca     Published Date: Nov 13, 2007
The evolution of Blade Computing has moved from mere server consolidation to a way of managing IT assets which brings significant business benefits. This paper aims to explain those benefits to the business and IT manager, and show how blade computing can be implemented to save money and improve the way IT serves the business needs.
Tags : 
infrastructure, infrastructure, soa, service oriented architecture, blade computing, blade, blade server, blade servers, servers, storage, utility computing, quocirca, spend management
    
Quocirca
Published By: Quocirca     Published Date: Nov 13, 2007
Businesses across Europe are becoming increasingly reliant on web-enabled applications that are accessed over the public internet. One of the key drivers for this is to open up communications with external organizations that are fundamental to core business processes.
Tags : 
bpm, business process, web application, customer service, customer satisfaction, business management, order, order management, quocirca, it management, enterprise applications, business integration, business process automation, business process management, customer interaction service, sales automation, web service management, productivity
    
Quocirca
Published By: Solarflare Communications Inc.     Published Date: Nov 08, 2007
This paper will highlight the improvements that SolarStorm's virtualization acceleration can provide, not only in networking I/O performance, but also in server efficiency.
Tags : 
data center, semiconductor, 10 gbe, copper cabling, solarflare, network performance, network performance management, ip networks, twisted pair, untwisted pair, networking, gigabit, ethernet networking, gigabit networking, network management, data center design and management
    
Solarflare Communications Inc.
Published By: CCSS     Published Date: Nov 07, 2007
Imagine you had a friend that turned up right before something bad was going to happen and told you how to avoid it. Like if you don't attend to that looping job silently going about its business, the system in India will fall over and the downtime will cost the company hundreds of thousands of dollars in idle work hours. Yes, a friendly forewarning wouldn't be bad. We would suggest employing a job monitor – it's your friend on the inside.
Tags : 
networking, job monitoring, monitoring, network management, network performance, network performance management, job dispatch, productivity, time saving, efficiency, ccss
    
CCSS
Published By: Borer Data Systems Ltd.     Published Date: Nov 07, 2007
At the Defcon security conference on August 2007, a hacker and Defcon staffer who goes by the name Zac Franken, showed how a small homemade device he calls "Gecko", which can perform a hack on the type of access card readers used on office doors throughout the country.
Tags : 
security, security management, access control, identity management, iam, authentication, wiegand, tracking, workforce, workforce management, employee management, borer, access control, wiegand, security, borer, borer data systems, hacker, defcon, zac franken
    
Borer Data Systems Ltd.
Published By: Borer Data Systems Ltd.     Published Date: Nov 07, 2007
Swiping a card to gain access to a company building is now a perfectly accepted feature of everyday corporate life. Over the years, we have all grown familiar with the routine and the advantages it brings to access control. But where cards were once used exclusively to open doors, controlling who went where and when in a building, now they can be used for a wide variety of extra functions.
Tags : 
security, security management, access control, identity management, iam, authentication, tracking, workforce, workforce management, employee management, borer, access control, ip world, borer, borer data systems, office security, building security, card technology, ip networks
    
Borer Data Systems Ltd.
Published By: Borer Data Systems Ltd.     Published Date: Nov 07, 2007
Clear Image was awarded a contract to supply and fit CCTV and Access control to NISA, one of the largest picking warehouses in Europe. The company runs 3 shifts per day and wanted to allocate lockers to employees. The simple solution would have been to give each employee a locker, but between Borer and Clear Image, a better solution was devised. Thanks to our technology, we can create one to many relationships between our devices. 
Tags : 
security, security management, access control, identity management, iam, authentication, nisa, physical security, tracking, workforce, workforce management, employee management, borer, nisa, clear image, borer, borer data systems, access control, muster, roll call
    
Borer Data Systems Ltd.
Published By: ITManagement     Published Date: Nov 06, 2007
Our handy comparison chart lines up the vendors in the market and compares the most important factors in a networking equipment decision.
Tags : 
networking, network management, switch, ethernet networking, gigabit networking, mbps, gigabit, ethernet, ethernet switch, network management, internetworking hardware, switches, stack, stacking, stackable, infrastructure, itmanagement, it management, tippit
    
ITManagement
Published By: InsideCRM.com     Published Date: Nov 05, 2007
Shopping for a contact-center solution can be confusing and frustrating, so let us do the leg work for you! This easy-to-use guide compares the major vendors offering contact-center solutions today, including Genesys, Oracle, Verizon and many others.
Tags : 
software, call center, call center software, contact center, contact center software, genesis, oracle, verizon, contactual, interactive intelligence, crm, customer relationship management, insidecrm, inside crm, call center management, sales & marketing software, contact management
    
InsideCRM.com
Published By: InsideCRM.com     Published Date: Nov 05, 2007
Considering adding a contact center to your business? Our analyst-written buyer's guide is a great place to start your search. We provide you with an in depth  market overview, a rundown of standard and advanced features and will point you in the direction that will be most beneficial and efficient for your organization.
Tags : 
software, call center, call center software, contact center, contact center software, crm, customer relationship management, insidecrm, inside crm, buying guide, buyers guide, call center management, sales & marketing software, contact management
    
InsideCRM.com
Published By: WiChorus     Published Date: Nov 05, 2007
Rising demand for multimedia applications and mobile usage requires new paradigm to shift voice-oriented cellular architecture into data-oriented networks in order to serve bandwidth hungry packet based applications which include but not limited to multimedia gaming, mobiTV, streaming media, P2P, etc. Data oriented network requires 20-fold fatter air link and backhaul as compared to typical voice communication.
Tags : 
wimax, access controller, asn-gw, gateway, base station, ofdma, edge router, farpoint group, controller, wichorus, wireless, wifi, wireless communications, wireless infrastructure, wireless service providers
    
WiChorus
Published By: Aventail     Published Date: Oct 26, 2007
The goal of pervasive BI applications is to take the data that produced the back office ROI of more than 400% and deliver it to front-line employees in a form appropriate to their job functions – with similar results. There are thousands of business process steps in a typical enterprise where pervasive BI insights can be added. What are leading companies doing with pervasive BI?
Tags : 
business intelligence, database, enterprise data warehouse, data mart, data warehouse, data mining, active data warehousing, active data warehouse, informatica
    
Aventail
Published By: Informatica     Published Date: Oct 26, 2007
The goal of pervasive BI applications is to take the data that produced the back office ROI of more than 400% and deliver it to front-line employees in a form appropriate to their job functions – with similar results. There are thousands of business process steps in a typical enterprise where pervasive BI insights can be added. What are leading companies doing with pervasive BI?
Tags : 
business intelligence, database, enterprise data warehouse, data mart, data warehouse, data mining, active data warehousing, active data warehouse, informatica, data management, data warehousing
    
Informatica
Start   Previous    916 917 918 919 920 921 922 923 924 925 926 927 928 929 930    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.