achieve

Results 1101 - 1125 of 1271Sort Results By: Published Date | Title | Company Name
Published By: Quocirca     Published Date: Sep 18, 2008
Businesses of all sizes have to manage an increasing diversity of remote users and devices. The task ranges from simply keeping systems running to ensuring security, compliance and the achievement of environmental goals. Under this sort of pressure, IT managers and managed service providers, to which the task is often outsourced, must have flexible access to powerful tools and an ability to share the data those tools rely on.
Tags : 
quocirca, remote, it management
    
Quocirca
Published By: KACE     Published Date: Nov 14, 2006
This Enterprise Management Associates (EMA) white paper takes a close look at automated IT management, especially for  medium-sized businesses.
Tags : 
it management, ema, enterprise management associates, automated it, it automation, smb, smbs, network management, manual it management, kace, security
    
KACE
Published By: SoftLanding Systems     Published Date: Nov 18, 2006
This no-nonsense primer covers the benefits and basic principles of good testing, offers practical advice for getting the most out of your testing efforts, and pinpoints several areas where automation will help you achieve the most cost-effective results.
Tags : 
software testing, quality assurance, application testing, test and measurement, database development, quality assurance, scripting, software testing, web services, web service security, softlanding, soft landing, software development
    
SoftLanding Systems
Published By: Lombardi Software     Published Date: Dec 07, 2006
For those individuals or organizations that are being asked to investigate process improvement, Business Process Management (BPM) is a term that frequently associated with the process improvement. This paper defines BPM and explains how it can be applied to help companies achieve process improvement goals.
Tags : 
bpm, business process management, process improvement, productivity, business management, work smarter, lombardi, lombardi software, enterprise applications
    
Lombardi Software
Published By: Siperian     Published Date: Jan 24, 2007
Discover the essential steps to delivering a solid business case for the right customer-centric MDM architecture and achieve maximum ROI.
Tags : 
roi, data management, return on investment, master data management, mdm, data integration, data quality, siperian, business intelligence, data mining
    
Siperian
Published By: Infor     Published Date: Feb 27, 2007
American Dairy Brands, a $300M division of Dairy Farmers of America (DFA) which is the largest U.S. dairy cooperative marketing over 45 billion pounds of milk per year, has achieved substantial supply chain savings through Infor's Supply Chain solutions. Infor has given Dairy Farmers of America the ability to successfully manage the supply chain to drive service levels to greater than 99% for their Borden-brand cheese products.
Tags : 
productivity, supply chain management, customer service, customer satisfaction, dairy, food, infor, scm, enterprise resource management, erp, american dairy brands, borden
    
Infor
Published By: Infor     Published Date: Feb 27, 2007
In today's process manufacturing environment, innovation is viewed as critical to sustainable growth and profitability. While open innovation is regarded as the answer, few companies can effectively measure the return on R&D investment, have acceptable product success rates, achieve acceptable promotional effectiveness, or have visibility into their compliance risks or operational readiness for new product launches.
Tags : 
collaboration, return on investment, holistic, process manufacturing, manufacturing, supply chain management, scm, product lifecycle management, plm, knowledge management, infor
    
Infor
Published By: Infor     Published Date: Apr 19, 2007
Budgeting is part of a larger, closed-loop process called "performance management." Performance management is a holistic approach to the way organizations direct and manage resources to achieve objectives. In the context of performance management, budgeting's central role is to support execution through the allocation of resources to the activities that drive value.
Tags : 
budget, budgeting, performance management, erp, enterprise resource management, strategy, business management, bpm, business process management, infor
    
Infor
Published By: Infor     Published Date: Jul 23, 2007
Make EAM part of your Green Strategy; This white paper includes recommendations for a Green-centric Organization. Find out how a comprehensive, green-oriented asset performance management solution will enable you to achieve compliance, efficiency, and consumer appeal.
Tags : 
environment, environmental, social responsibility, greenhouse, greenhouse effect, green, gas emissions, environmentalism, global warming, asset management, enterprise asset management, eam, infor, corporate governance
    
Infor
Published By: WorldTelemetry, Inc.     Published Date: Mar 26, 2007
Corporate managers responsible for multiple fuel tank locations need remote technology applications to maximize their information use and increase the reach of their resources. Success when planning new remote technology projects can be measured in terms of increased profitability or ROI if the planners adequately address the build vs. buy decisions required when choosing the necessary hardware, software, deployment and integration strategy.
Tags : 
fuel, gas, roi, return on investment, infrastructure, cost control, business intelligence, cost efficency, world telemetry, worldtelemetry
    
WorldTelemetry, Inc.
Published By: Vocalocity     Published Date: Apr 18, 2007
BLUESTREAK, Inc., a New Jersey-based promotional items manufacturer and distributor, needed to reduce telephone expenses to help maintain competitive advantage. Find out how VocalocityPBX, a hosted PBX voice communications solution helped them to achieve their goal and even exceed expectations.
Tags : 
networking, network management, pbx, phone, phone system, telecom, telecommunications, voice over ip, voip, vocalocity
    
Vocalocity
Published By: GFI     Published Date: Jun 08, 2007
This white paper examines the requirements to adhere to the Payment Card Industry Data Security Standard (PCI DSS), the implications of non-compliance and how effective event log management and network vulnerability management can help achieve compliance.
Tags : 
pci, credit card, payment card, compliance, mastercard, database security, privacy, consumer, customer, gfi, information management
    
GFI
Published By: GFI     Published Date: Jun 12, 2007
This white paper examines why having multiple anti-virus scanners at mail server level substantially reduces the chance of virus infection and explores ways in which this can be achieved.
Tags : 
anti virus, anti-virus, virus, norton, network security, email security, intrusion prevention, ips, gfi, virus engine, trojan, trojans
    
GFI
Published By: Ecora Software     Published Date: Aug 15, 2007
Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial, privacy, consumer data, data privacy, information management, customer data, consumer privacy, database security, ecora
    
Ecora Software
Published By: Ecora Software     Published Date: Aug 15, 2007
Achieve and Maintain Compliance with PCI Data Security Standard – Part 4. Deep dive into PCI DSS requirements 10-12. Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial, privacy, consumer data, data privacy, information management, customer data, consumer privacy, database security, ecora
    
Ecora Software
Published By: Ecora Software     Published Date: Aug 15, 2007
Deep dive into PCI DSS requirements 5-9. Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial, privacy, consumer data, data privacy, information management, customer data, consumer privacy, database security, ecora
    
Ecora Software
Published By: Ecora Software     Published Date: Aug 16, 2007
Deep dive into the first 4 PCI DSS requirements. Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial, privacy, consumer data, data privacy, information management, customer data, consumer privacy, database security, ecora
    
Ecora Software
Published By: Interactive Intelligence     Published Date: Feb 28, 2013
In an effort to help receivables management companies achieve compliance with federal and state laws and regulations, Interactive Intelligence queried a group of ten ARM industry professionals about the future trajectory of compliance issues in 2012.
Tags : 
debt collection, compliance, 2012, interactive intelligence, debt collection compliance, arm, interactive intelligence, knowledge management, enterprise applications, business technology
    
Interactive Intelligence
Published By: OneNeck IT Services     Published Date: Aug 24, 2007
This case study explores the IT challenges of Targus, a global supplier of mobile computing cases and accessories, and how OneNeck helped Targus achieve their IT goals.
Tags : 
oneneck, erp hosting, erp outsourcing, it outsourcing, it hosting, j.d. edwards, oracle, baan, infor, axapta, microsoft dynamics ax, fusion, outsourcing, governance, outsource, targus, case study, it management, corporate governance
    
OneNeck IT Services
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
CCU sought to encrypt its backup tapes for keeping customer data secure in transit and in storage at the offsite tape-vault vendor’s facility. As a financial institution, CCU was subject to stringent government regulations. With nearly 60 gigabytes of data to encrypt each night, CCU knew that a software solution was out of the question.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management, key management for enterprise, effective encryption key management, key management system, information security, protecting offsite tape storage, disaster recovery, data privacy regulations, backup tapes, security appliance, data security, secure key management, wire-speed encryption
    
Neoscale Systems, Inc.
Published By: Netwrix     Published Date: Oct 10, 2007
This white paper covers account lockout management process and introduces new cost-effective workflows of account lockout resolution, describing significant ROI enterprises can achieve through the use of automated management solutions.
Tags : 
authentication, account lockout, access control, network security, lockout, user lockout, user authentication, user validation, intrusion prevention, netwrix
    
Netwrix
Published By: Epsilica Consulting     Published Date: Dec 21, 2007
Every change program has to have deliver something – a new service, a new process, increased market share, and so on. But how do you know what the benefits are? How do you identify them, develop them and measure them to ensure your program has achieved its 'end-state'?
Tags : 
epsilica, epsilica consulting, it management
    
Epsilica Consulting
Published By: Tideway Systems     Published Date: Dec 11, 2007
A world class IT organization needs to be better than even the regulators require – and good IT governance doesn't have to tie the IT department up in red tape. Judicious application of IT best practices, frameworks and methodologies can help achieve this, based on an accurate picture of the IT environment, at which point regulatory compliance becomes a happy side effect. Find out how you can have an up-to-date true view of your infrastructure on a daily basis – not just at a point in time by reading this white paper.
Tags : 
compliance, regulation, regulations, regulator, regulators, governance, compliant, infrastructure, best practices, regulatory compliance, cmdb, tideway, tideway systems, it management
    
Tideway Systems
Published By: VMware Dell     Published Date: Jun 17, 2008
Faced with an aging set of servers within its IT infrastructure, United Bank and Trust decided to embrace virtualization as way to move forward. United deployed the VMware Infrastructure 3 solution together with an EqualLogic PS Series virtualized iSCSI SAN, which established an enterprise storage platform to achieve the high availability, data protection and performance required for United’s new generation, virtualized IT environment.
Tags : 
server, server virtualization, virtual machine, virtual server, vmware, equallogic, dell equallogic, virtualization, vmware, virtual infrastructure, x86
    
VMware Dell
Published By: VMware Dell     Published Date: Sep 30, 2008
This white paper describes a virtualized infrastructure that applies storage and server virtualization technologies to cost-effectively achieve a flexible, high performance, dynamic IT infrastructure that is simple to manage and scale.
Tags : 
vmware, dell, virtual server, virtual storage, equallogic, iscsi san, esx server, internet engineering task force (ietf)
    
VMware Dell
Start   Previous    37 38 39 40 41 42 43 44 45 46 47 48 49 50 51    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept