ris

Results 11776 - 11800 of 11941Sort Results By: Published Date | Title | Company Name
Published By: OneNeck IT Services     Published Date: Aug 24, 2007
When he joined SDBC in May of 2004, SunnyD's Chief Information Officer and Global Controller was faced with a classic build-or-buy decision, although the circumstances were less than typical. Despite the company just being carved out from Procter & Gamble with an experienced management team and a well-known brand name, it was missing a crucial operational element — an entire information technology infrastructure.
Tags : 
oneneck, erp hosting, erp outsourcing, it outsourcing, it hosting, microsoft dynamics ax, fusion, outsourcing, governance, outsource, erp, enterprise resource planning
    
OneNeck IT Services
Published By: Indicative Software     Published Date: Aug 24, 2007
Learn about agent-based versus agentless monitoring approaches to enterprise management, and how a combination of data collection technologies can realize the benefits of both.
Tags : 
enterprise management, enterprise monitoring, data collection, data collection engines, agent-based monitoring, agentless monitoring, performance monitoring, application performance, synthetic monitoring, passive monitoring, active monitoring, service level management, service management, systems management, indicative
    
Indicative Software
Published By: Taridium     Published Date: Aug 23, 2007
The Taridium managed VoIP offering (TMV) is a complete PBX replacement solution for small to medium enterprises. Taridium Managed VoIP combines the reliability of an on-premise open standards VoIP telephony system with the convenience of a simple monthly fee for equipment, services and support.
Tags : 
voip, sip, ip pbx, ip telephony, sip voip, voip pbx, microsoft pbx, microsoft integration, ip pbx voip, ippbx active, ip telephony solution, ip telephony system, ip telephony applications, ip telephony pbx, microsoft ip pbx, microsoft ip pbx integration, voip ip telephony, taridium, tmv
    
Taridium
Published By: Taridium     Published Date: Aug 22, 2007
By 2003, T4G was experiencing significant growth, adding offices, and increasing telecommunication expenses. This case study will show how Taridium's ipbx enterprise VoIP platform offered T4G all the advantages of an open standards solution with the reliability of non-stop hardware, 24x7 monitoring and software support.
Tags : 
voip, sip, ip pbx, ip telephony, sip voip, voip pbx, microsoft pbx, microsoft integration, ip pbx voip, ippbx active, ip telephony solution, windows pbx, ip telephony system, ip telephony applications, ip telephony pbx, microsoft ip pbx, microsoft ip pbx integration, voip ip telephony, taridium, t4g
    
Taridium
Published By: IAG Consulting     Published Date: Aug 17, 2007
Before your company launches its next package selection, implementation or upgrade, make sure you don’t cripple the project from the start by failing to identify your requirements – the number one reason that projects spin out of control. This white paper summarizes some of the key lessons we have learned through our industry-leading requirements definition practice.
Tags : 
systems development, system development, sdlc, business requirements, project planning, defining, definition, define the problem, erp, enterprise resource planning, project management, iag, iag consulting, digital mosaic
    
IAG Consulting
Published By: IAG Consulting     Published Date: Aug 17, 2007
The later in the system development life-cycle that major errors are discovered the more expensive it is to fix them. But the earliest stages of the systems development lifecycle (SDLC) are most often the least consistently executed. This paper describes a methodology that brings the early stages of the SDLC up to a high level of maturity: consistent, proven, and optimized for success. 
Tags : 
systems development, system development, sdlc, business requirements, project planning, erp, enterprise resource planning, project management, iag, iag consulting, digital mosaic
    
IAG Consulting
Published By: Ecora Software     Published Date: Aug 16, 2007
This paper offers the industry's only solution for automating detailed reporting that ensures Enterprise Configuration Visibility™ – reducing the time and cost associated with IT control, compliance, and security, and ensuring the highest levels of availability and performance for your organization.
Tags : 
configuration management, compliance, security management, audit, auditing, regulatory compliance, monitoring, itil, change management, ecora
    
Ecora Software
Published By: Ultimus     Published Date: Aug 16, 2007
By helping companies model, automate, manage, and optimize their business processes, BPM provides the framework for sustainable competitive advantage.
Tags : 
ultimus, bpm, business process management, automation, bpa, productivity, bpm basics, profitability, business process modeling, modeling, workflow, enterprise, enterprise applications
    
Ultimus
Published By: Ultimus     Published Date: Aug 16, 2007
The challenge for BPM today is not to simply “automate” processes, but to deliver the human-centric capabilities people need in order to fully embrace the new, more efficient work processes. When BPM systems deliver on these needs BPM close the gap between its high potential and its relatively modest adoption to-date.
Tags : 
ultimus, bpm, business process management, automation, bpa, productivity, bpm basics, profitability, business process modeling, modeling, workflow, enterprise, enterprise applications, hcc, human centric computing, trend, trends, future
    
Ultimus
Published By: Ultimus     Published Date: Aug 16, 2007
With the largest global installed base of pure-play BPM solutions, the Ultimus BPM Suite exemplifies the role of managing OSAP processes in the business process ecosystem. Customers worldwide use it to extend, maximize and complement their investments in SAP or other enterprise applications.
Tags : 
ultimus, bpm, business process management, automation, bpa, productivity, bpm basics, profitability, business process modeling, modeling, workflow, enterprise, enterprise applications, outside sap
    
Ultimus
Published By: Ultimus     Published Date: Aug 16, 2007
Ultimus has been build from the ground-up with scalability in mind. Ultimus’ component-based, database centric architecture position it perfectly as a solution that allows you to effortlessly scale your enterprise business processes.
Tags : 
ultimus, bpm, business process management, automation, bpa, productivity, bpm basics, profitability, business process modeling, modeling, workflow, enterprise, enterprise applications, scale, scalable, scalability
    
Ultimus
Published By: Ultimus     Published Date: Aug 16, 2007
Windows Workflow Foundation (WF) and the Ultimus BPM Suite compliment each other. WF can be used to extend the capabilities of Ultimus by performing specialized services. The Ultimus BPM Suite can be invoked by WF activities to perform workflows that are not simple and require extensive and robust human-centric capabilities.
Tags : 
ultimus, bpm, business process management, automation, bpa, productivity, bpm basics, profitability, business process modeling, modeling, workflow, enterprise, enterprise applications, microsoft, sharepoint
    
Ultimus
Published By: Ecora Software     Published Date: Aug 15, 2007
High-profile data losses are grabbing more and more headlines every week, threatening the reputation, customer base, and overall bottom line of organization whose systems have been exploited. In addition to this lurking threat, now organizations face potential fines for PCI non-compliance from VISA, beginning in September 2007. Ecora Software will provide you with the information you need to proactively address PCI compliance and, of equal importance, minimize your risk of a costly data breach.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial, privacy, consumer data, data privacy, information management, customer data, consumer privacy, database security, ecora
    
Ecora Software
Published By: InsideCRM.com     Published Date: Aug 13, 2007
Use this crisp and clean comparison chart to stack the top CRM vendors side-by-side on the following:  Features, Price per User, Services and Support, and Marketing Capabilities.
Tags : 
crm, crm tool, crm tools, crm software, customer relationship management, salesforce, right now, rightnow, netsuite, siebel, oracle, sales, marketing, inside crm, insidecrm, insidecrm.com, tippit
    
InsideCRM.com
Published By: Motorola     Published Date: Aug 09, 2007
Mobile devices represent a tremendous productivity advantage for today’s mobile worker. However, IT organizations must give consideration to the deployment of device security policies in order to provide the level of security that enterprises require.
Tags : 
mobile workers, mobile security, wireless security, mobile computing, mobility, enterprise security, network security, lost, stolen, disgruntled, data erase, authentication, compliance, wireless, encryption, motorola, good technology
    
Motorola
Published By: Motorola     Published Date: Aug 09, 2007
Wireless access to enterprise information is going mainstream. However, while the groundswell of enthusiasm for wireless access is coming from the bottom up, the management of wireless access needs to be driven from the top down. Learn how you can build a solid wireless strategy for your organization.
Tags : 
wireless, mobility, mobile computing, wireless security, remote access, fleet management, mobile workforce, mobile worker, productivity, roi, motorola, good technology, application optimization
    
Motorola
Published By: Motorola     Published Date: Aug 09, 2007
In this paper, two case studies illustrate different approaches to unlocking the value of existing investments through mobilization. Each case study provides an overview of an application we mobilized, identifies the characteristics that made the application a good candidate and explains the value realized by enabling access to these applications from mobile devices.
Tags : 
applications, mobile applications, mobility, mobilization, pda application, optimizing applications, mobile computing, mobile workers, productivity, treo, smartphone, smart phone, blackberry, motorola, good technology, application optimization
    
Motorola
Published By: COMDOM Software     Published Date: Aug 09, 2007
This paper provides an overview of costs of spam facing large organizations, such as multinational enterprises, universities, and governments, as well as small and medium sized businesses that own or operate networks used by employees and other end users.
Tags : 
spam, bayesian, filter, filtering, block, blocking, spamming, phishing, total cost of ownership, tco, messaging, email, email security, mail server, mail servers, comdom, comdom software
    
COMDOM Software
Published By: ProofSpace     Published Date: Aug 08, 2007
Digital signatures aren't enough. This paper posits that data integrity needs to be redefined within the context of a time-sensitive mechanism.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, time stamp, timestamp, time and data stamping, file authentication, x9.95, timestamping, ediscovery, discovery, admissibility, email archiving, surety, authentidate, timecertain
    
ProofSpace
Published By: ProofSpace     Published Date: Aug 07, 2007
This white paper presents a solution framework for Life Science Organizations that want to implement enterprise digital trust management to protect their electronic value chain.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, time stamp, timestamp, time and data stamping, file authentication, x9.95, timestamping, ediscovery, discovery, admissibility, email archiving, surety, authentidate, timecertain
    
ProofSpace
Published By: Inovis     Published Date: Aug 06, 2007
No enterprise is an island. Goods and services flow in from suppliers. When you include suppliers of wares for raw material extractors, along with recyclers that turn consumer and commercial waste into new raw materials and finished goods, it is a supply chain with no beginning and no end.
Tags : 
supply chain management, scm, supply chain, supplier, vendor management, vendor selection, communication, collaboration, manufacturing, business process management, business process automation, business process, bpm, bpa, van, vans, edi, electronic data, roi, inovis
    
Inovis
Published By: ProofSpace     Published Date: Jul 31, 2007
This paper details the processes by which ProofMark tags electronic records with a self-validating cryptographic seal that acts as a "tamper indicator" based on a true and provable time-reference datum.  With this it is able to provide instantaneous and irrefutable proof of authenticity, no matter where the data resides or who has controlled it.
Tags : 
proofspace, proofmark, proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography, public key cryptography, time stamp, timestamp, time and data stamping, file authentication, x9.95, accredited standards committee x9, x9.95-compliant, transient key technology, timestamp
    
ProofSpace
Published By: TRIRIGA     Published Date: Jul 27, 2007
In this white paper, we discuss industry standards, the range of disciplines IWMS spans, external systems (e.g., CAD, ERP, human resources) that interact with a solid IWMS, and the costs avoided when innovators enforce data templates and processes throughout the enterprise.
Tags : 
facilities management, iwms, real estate management, facilities, iwms, integrated workplace management, maintenance and operations, project management, workplace management, tririga, triraga, lease administration, retail, capital assets, corporate real estate, store openings, user moves, on-boarding, off-boarding
    
TRIRIGA
Published By: Infor     Published Date: Jul 23, 2007
Make EAM part of your Green Strategy; This white paper includes recommendations for a Green-centric Organization. Find out how a comprehensive, green-oriented asset performance management solution will enable you to achieve compliance, efficiency, and consumer appeal.
Tags : 
environment, environmental, social responsibility, greenhouse, greenhouse effect, green, gas emissions, environmentalism, global warming, asset management, enterprise asset management, eam, infor
    
Infor
Start   Previous    464 465 466 467 468 469 470 471 472 473 474 475 476 477 478    Next    End
Search Resource Library