bsp

Results 351 - 375 of 410Sort Results By: Published Date | Title | Company Name
Published By: KM Sciences     Published Date: Dec 13, 2006
Microsoft Project has been the most popular project scheduling tool on earth.  But have you ever wanted to share your task and collaborate on task details, requirement specification, design discussions or track the functional progress?
Tags : 
collaboration, project management, knowledge management, collaborate, team management, project schedule, schedule, scheduling, productivity, ms project, microsoft, km science, km sciences
    
KM Sciences
Published By: KM Sciences     Published Date: Dec 13, 2006
Project knowledge and collaboration is the sharing of organized information within a team. A new approach that enables project managers to manage project schedules as well as knowledge without additional effort.  Learn more with this informative paper.
Tags : 
collaboration, project management, knowledge management, collaborate, team management, project schedule, schedule, scheduling, productivity, km science, km sciences
    
KM Sciences
Published By: Siperian     Published Date: Jan 24, 2007
Master Data Management is a cohesive strategy for managing all master data domains.  Where is your organization most likely to derive business value from a Master Data Management solutions?  This report answers these questions and details the path forward:  Adaptive Master Data Management.
Tags : 
data management, master data management, mdm, business intelligence, data integration, data quality, siperian
    
Siperian
Published By: Siperian     Published Date: Mar 29, 2007
Master Data Management (MDM) has made the CIO's technology short-list.  This paper addresses issues related to data governance, the business master, building on proven success, and ROI.  
Tags : 
mdm, master data management, it management, return on investment, roi, rdi, reference data management, governance, siperian, data management
    
Siperian
Published By: Envisional     Published Date: Dec 21, 2006
Now that millions of ordinary, non-geeky families are routinely downloading TV shows and movies without a second thought, digital piracy has clearly gone mainstream.  Download this paper to learn methods for preventing video piracy.
Tags : 
piracy, copyright, copyright infringement, digital piracy, fcc, envisional
    
Envisional
Published By: Avalere     Published Date: Apr 02, 2007
Sensitive documents, files and intellectual property are extracted from a central repository such as a database, records management system, or document management system to complete daily tasks, however, extracting this information can lead to a security breach.  Avalere provides the tools you need to control the proliferation of sensitive information throughout your organization.
Tags : 
security, security management, database admin, dba, records management, database management, document management, data security, document security, avalere
    
Avalere
Published By: Avalere     Published Date: Apr 02, 2007
Companies struggle with cleanly separating an employee, contractor or consultant with their company and critical information.  Avalere enables companies to review how information has been used prior to an employee’s departure in order to protect the company and the employee.
Tags : 
data protection, employee performance, fired, employee departure, employee quit, employee resigned, access control, avalere
    
Avalere
Published By: Campaigner     Published Date: Jun 05, 2007
Targeted and personal, no medium today is as effective at empowering marketers with the ability to reach out and connect with their customers on a real 1-to-1 level more than Email Marketing. This insightful White Paper provides 5 simple but powerful email tactics that will keep your customers coming back for more. 
Tags : 
email marketing, crm, customer relationship management, customer experience management, customer satisfaction, email, got, got corp, gotcorp, got corporation
    
Campaigner
Published By: RiskWatch     Published Date: Jan 17, 2007
Risk assessment is the cornerstone of security.  The risk assessment process includes gathering information about the assets of the organizations, including all information assets, and all physical assets.
Tags : 
risk assessment, compliance assessment, risk management, security, it management, security management, infrastructure, vulnerability, intrusion detection, ids, risk, riskwatch
    
RiskWatch
Published By: BusinessObjects     Published Date: Mar 05, 2007
On-Demand CRM provides faster implementation, lower costs, and more rapid ROI when compared to On-Premise.  Make sure you're making the right decisions for your CRM.
Tags : 
customer reelationship management, customer service, sales & marketing software, sales automation, return on investment, sales tools, crm, businessobjects, business objects
    
BusinessObjects
Published By: Xactis     Published Date: Feb 02, 2007
Learn the 'bottom-up' approach to start Business Rules Extracting, Migrating and Auto Re-architecting your current mission-critical legacy system and their data, into an SOA.  This is a "how-to" presentation addressing how to get started and eventually establish an internal L2S Center of Excellence.
Tags : 
soa, service oriented architecture, service-oriented architecture, business rules extracting, legacy system, erp, enterprise resource planning, mainframe, citrix, xactis
    
Xactis
Published By: DataViz     Published Date: Feb 06, 2007
Push email is in high demand for today's mobile workforce. If you have Documents To Go with InTact Technology, you can edit your files from anywhere without compromise.  Check out this white paper to find out how.
Tags : 
mobile computing, mobile workers, wireless application software, microsoft office, mobility, dataviz, document management, dataviz intact, intact technology, documents to go
    
DataViz
Published By: Indigo Rose Corporation     Published Date: Feb 14, 2007
An introductory view of TrueUpdate 2.0 from the ground up. Learn all about TrueUpdate 2.0 and see everything it can do. Integrate automated update capabilities into software products easily. 
Tags : 
software development, it management, indigo rose
    
Indigo Rose Corporation
Published By: Infor     Published Date: Feb 27, 2007
Countless surveys have confirmed that most lean initiatives are abandoned outright or fail to deliver expected and needed results.  One well-known lean business consultant estimates that the failure rate is 98%. What is it the 2% of companies know that the others do not? Download this white paper to learn more.
Tags : 
supply chain management, best practices, workforce management, productivity, employee performance, lean methods, lean, six sigma, infor
    
Infor
Published By: Trapeze Networks     Published Date: Apr 16, 2007
This analyst report written by Stan Schatt, VP & Research Director, Networking at ABI Research  helps you decipher the WLAN security alphabet soup, understand architectural approaches to WLAN security, upcoming standards for roaming, load balancing and management frame encryption, and key security requirements that you should consider for you next WLAN deployment.
Tags : 
wi-fi, wireless, wlan, remote technologies, roaming, encryption, access point, service set identification, ssid, authentication, virtual local area network, vlan, switches, wids, wips, wireless security, wlan security, trapeze networks, cisco, aruba
    
Trapeze Networks
Published By: CCSS     Published Date: Sep 04, 2007
Many IT Managers will be familiar with the ‘disk or die’ ultimatums that a disgruntled system can issue. If the system demands feeding and threatens to shut down if it doesn’t get more disk to chew, it’s time to address the issue of disk once and for all.  The expense of using disk to accommodate problems in the hope of buying extra investigation time is a quick fix that few organizations can sustain.
Tags : 
systems management, monitoring, disk management, disk monitoring, ccss, network performance, network performance management, disk, remote management
    
CCSS
Published By: TRIRIGA     Published Date: Mar 31, 2008
Investments in green building strategies consistently result in significant benefits for organizations today.  Green buildings not only reduce the environmental impacts of natural resource consumption and green house gas emissions, but they also provide economical benefits such as reduced costs, improved bottom-line performance and higher shareholder value.
Tags : 
green building, tririga, environmental sustainability, dr. romm, tririga, environmental impact, green house gas emissions, emissions, bottom-line performance, social responsibility, triple bottom line, trees, tririga, tririga, energy, green, environment, environmental
    
TRIRIGA
Published By: TRIRIGA     Published Date: Apr 15, 2008
Workplace Performance Management: A strategic framework and system to align, measure and deliver greater shareholder value from workplace assets and operations. Corporations need to align workplace operations and assets to business strategies.  Workplace assets and operations must be measured and linked directly to stakeholder expectations to expose the true contributions of real estate to the organization.
Tags : 
workplace, performance, real estate, facility management, wpm, tririga, performance metrics, workplace strategy, tririga, human resource technology
    
TRIRIGA
Published By: ProofSpace     Published Date: Jul 31, 2007
This paper details the processes by which ProofMark tags electronic records with a self-validating cryptographic seal that acts as a "tamper indicator" based on a true and provable time-reference datum.  With this it is able to provide instantaneous and irrefutable proof of authenticity, no matter where the data resides or who has controlled it.
Tags : 
proofspace, proofmark, proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography, public key cryptography, time stamp, timestamp, time and data stamping, file authentication, x9.95, accredited standards committee x9, x9.95-compliant, transient key technology, timestamp
    
ProofSpace
Published By: ProofSpace     Published Date: Sep 10, 2007
Read this paper and learn the principles that are prerequisites to enforceable electronic agreements as required by existing legal standards and electronic signature legislation.  This paper will also specify sixteen measurement criteria that can be used as metrics to assess whether the architecture of an electronic transaction will meet the requirements of admissibility.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography, public key cryptography, time stamp, timestamp, time and data stamping, file authentication, x9.95, accredited standards committee x9, x9.95-compliant, transient key technology, electronic signatures, fda 21 cfr part 11, u.s. e-sign act
    
ProofSpace
Published By: InsideCRM.com     Published Date: Aug 13, 2007
Use this crisp and clean comparison chart to stack the top CRM vendors side-by-side on the following:  Features, Price per User, Services and Support, and Marketing Capabilities.
Tags : 
crm, crm tool, crm tools, crm software, customer relationship management, salesforce, right now, rightnow, netsuite, siebel, oracle, sales, marketing, inside crm, insidecrm, insidecrm.com, tippit
    
InsideCRM.com
Published By: InsideCRM.com     Published Date: Nov 05, 2007
Considering adding a contact center to your business? Our analyst-written buyer's guide is a great place to start your search. We provide you with an in depth  market overview, a rundown of standard and advanced features and will point you in the direction that will be most beneficial and efficient for your organization.
Tags : 
software, call center, call center software, contact center, contact center software, crm, customer relationship management, insidecrm, inside crm, buying guide, buyers guide
    
InsideCRM.com
Published By: XaSystems     Published Date: Aug 16, 2007
This quick reference guide provides an easy to use snap shot of key ITIL version 3 practices and concepts.  In addition, it provides a visual map between ITIL Version Service Delivery and Support books to the new ITIL Version 3.
Tags : 
itil, it infrastructure library, xa systems, xasystems, best practices, infrastructure, itil v3, itil v2, itil v.3, itil v.2, education, learning, reference, guide
    
XaSystems
Published By: OneNeck IT Services     Published Date: Aug 24, 2007
ERP Outsourcing for the Mid-Market discusses the nuances of outsourcing and critical success factors for mid-market companies.  Specifically, how companies can effectively select a compatible outsourcing partner who understands both parts of the equation - business and technology - and how to create a governance environment that fosters a successful outsourcing relationship.
Tags : 
oneneck, erp hosting, erp outsourcing, it outsourcing, it hosting, j.d. edwards, oracle, baan, infor, axapta, microsoft dynamics ax, fusion, outsourcing, governance, outsource
    
OneNeck IT Services
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.