act

Results 14551 - 14575 of 14751Sort Results By: Published Date | Title | Company Name
Published By: Ecora Software     Published Date: Aug 15, 2007
Learn about the Sarbanes-Oxley regulatory background and its impact on IT departments. This document provides information pertaining to access issues, change documentation, disaster recovery planning and illustrations of key audit-ready reports.
Tags : 
sox, sarbox, sox compliance, sarbanes oxley, sarbanes-oxley, enron, compliance, information management
    
Ecora Software
Published By: Ecora Software     Published Date: Aug 15, 2007
This whitepaper will teach you the necessary steps any organization must take to comply with the Gramm-Leach-Bliley Act (GLBA). Based on the experienced insight of Alex Bakman, Founder, Chairman & Chief Technology Officer at Ecora Software and Khalid Kark, Senior Research Analyst at Forrester Research, this paper discusses how any organization can reduce compliance costs by automating the process of attaining and maintaining proper financial privacy and consumer data safeguard procedures.
Tags : 
gbla, glba, compliance, financial, privacy, consumer data, data privacy, information management
    
Ecora Software
Published By: Ecora Software     Published Date: Aug 15, 2007
A summary of the background of GLBA, the precedents it sets for securing nonpublic consumer information, and the responsibilities it places on senior management and IT departments to ensure customer data is safeguarded.
Tags : 
gbla, glba, compliance, financial, privacy, consumer data, data privacy, information management
    
Ecora Software
Published By: Ecora Software     Published Date: Aug 15, 2007
Achieve and Maintain Compliance with PCI Data Security Standard – Part 4. Deep dive into PCI DSS requirements 10-12. Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial
    
Ecora Software
Published By: Ecora Software     Published Date: Aug 15, 2007
Deep dive into PCI DSS requirements 5-9. Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial
    
Ecora Software
Published By: InsideCRM.com     Published Date: Aug 13, 2007
In the market for a CRM? This white paper outlines the general benefits and drawbacks of hosted vs. on-premise CRMs and lists the basic features to look for in your hosted solution. With an up-to-date overview of the CRM market and a rundown of the general costs of various CRMs today, you'll be prepared to start looking for your new solution immediately.
Tags : 
crm, customer relationship managment, crm tool, crm tools, buying guide, collaboration, customer management, contact management
    
InsideCRM.com
Published By: Motorola     Published Date: Aug 09, 2007
In this paper, two case studies illustrate different approaches to unlocking the value of existing investments through mobilization. Each case study provides an overview of an application we mobilized, identifies the characteristics that made the application a good candidate and explains the value realized by enabling access to these applications from mobile devices.
Tags : 
applications, mobile applications, mobility, mobilization, pda application, optimizing applications, mobile computing, mobile workers
    
Motorola
Published By: SWsoft     Published Date: Aug 08, 2007
As virtualization becomes more pervasive in the datacenter, organizations are deploying complementary types of virtualization technologies. Read this white paper to learn how blending application and OS virtualization using Citrix and Virtuozzo will provide stronger and more robust virtualization solution.
Tags : 
os virtualization, virtualization, citrix, best practices, swsoft, sw soft, application virtualization, server virtualization
    
SWsoft
Published By: ProofSpace     Published Date: Aug 08, 2007
Digital signatures aren't enough. This paper posits that data integrity needs to be redefined within the context of a time-sensitive mechanism.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, time stamp
    
ProofSpace
Published By: Inovis     Published Date: Aug 06, 2007
When companies adopted Just-In-Time (JIT) tactics, they did so primarily to reduce inventory costs. For the most part, this strategy worked. Reducing stocks of raw materials, parts, assemblies and finished goods reduces carrying costs, allowing companies to invest the freed-up funds in more productive assets and projects.
Tags : 
supply chain, scm, supply chain management, inovis, spend management, cost control, inventory, inventories
    
Inovis
Published By: Inovis     Published Date: Aug 06, 2007
This white paper provides an overview of the growing opportunities for EDI managers and coordinators. It highlights how their role can change from being responsible for implementation of technologies for operational activities to being infrastructure leaders. It shows how they can deliver increased efficiencies and velocity for value chain automation, which increases visibility, control and agility for a business.
Tags : 
edi, electronic data interchange, electronic data, inovis, supply chain, manufacturing, productivity, infrastructure
    
Inovis
Published By: Inovis     Published Date: Aug 06, 2007
The challenges presented by multiple Value-Added Networks (VANs) and managing diverse trading partners create barriers to the efficiencies promised by EDI. Multiple providers mean multiple points of failure with no one entity to hold accountable. Also, as trading communities grow, end-to-end supply chain visibility becomes an essential operational requirement.
Tags : 
van, vans, value added, value-added, value added, edi, electronic data interchange, scm
    
Inovis
Published By: Inovis     Published Date: Aug 06, 2007
No enterprise is an island. Goods and services flow in from suppliers. When you include suppliers of wares for raw material extractors, along with recyclers that turn consumer and commercial waste into new raw materials and finished goods, it is a supply chain with no beginning and no end.
Tags : 
supply chain management, scm, supply chain, supplier, vendor management, vendor selection, communication, collaboration
    
Inovis
Published By: ProofSpace     Published Date: Jul 31, 2007
This paper details the processes by which ProofMark tags electronic records with a self-validating cryptographic seal that acts as a "tamper indicator" based on a true and provable time-reference datum.  With this it is able to provide instantaneous and irrefutable proof of authenticity, no matter where the data resides or who has controlled it.
Tags : 
proofspace, proofmark, proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data
    
ProofSpace
Published By: TRIRIGA     Published Date: Jul 27, 2007
In this white paper, we discuss industry standards, the range of disciplines IWMS spans, external systems (e.g., CAD, ERP, human resources) that interact with a solid IWMS, and the costs avoided when innovators enforce data templates and processes throughout the enterprise.
Tags : 
facilities management, iwms, real estate management, facilities, iwms, integrated workplace management, maintenance and operations, project management
    
TRIRIGA
Published By: TRIRIGA     Published Date: Jul 27, 2007
Leaders in every industry perform sale-leaseback transactions to unlock the value of real estate, improve the balance sheet and realize tax benefits. The paper discusses how sale-leasebacks enhance financial ratios, elevate operations and re-focus real estate strategies on profitability rather than logistics.
Tags : 
sales-leaseback, sale-leaseback, sales leaseback, sale leaseback, real estate, balance sheet, tax benefits, leased properties
    
TRIRIGA
Published By: GFI     Published Date: Jul 24, 2007
This white paper explains what makes spam such an unbearable problem and how spamming tactics are evolving daily to beat anti-spam software. The latest tactic is to use the common PDF file format to send image spam. By using PDF attachments to send images instead of embedding them in the body of the email message, spammers have taken the cat-and-mouse game with anti-spam software developers to a new level.
Tags : 
adobe, adobe acrobat, acrobat, gfi, spam, image spam, pdf spam, anti-spam
    
GFI
Published By: Microsoft Dynamics     Published Date: Jul 23, 2007
In this white paper, we measure how end users of Enterprise Resource Planning (ERP) applications describe the impact of Microsoft and SAP applications on their business productivity. This research found that Microsoft Dynamics end users on average rated their experience with Microsoft applications more favorably than SAP users rated their experience with SAP.
Tags : 
sap, microsoft, erp, enterprise resource planning, keystone, microsoft dynamics, productivity, business activity
    
Microsoft Dynamics
Published By: ForeSee Results     Published Date: Jul 20, 2007
This report analyzes satisfaction of the various methods of generating site traffic (email, search marketing, recommendations, shopping comparison sites, etc.) to see which result in the most satisfied customers -- who are also more likely to purchase in the future and recommend the site to others.
Tags : 
foresee, foresee results, online marketing, comparative, conversion, conversions, customer satisfaction, referrals
    
ForeSee Results
Published By: ForeSee Results     Published Date: Jul 20, 2007
Online retailers are always on the lookout for ways to improve the online shopping experience and stay ahead of the competition. Adding consumer product reviews is one such way. As part of the analysis of the Spring 2007 edition of the Top 100 Online Retail Satisfaction Index, we delved into the data specific to consumer product reviews to answer pertinent questions.
Tags : 
customer reviews, reviews, purchase decision, referral, recommendation, customer satisfaction, online retail, e-commerce
    
ForeSee Results
Published By: ForeSee Results     Published Date: Jul 20, 2007
Online retailers are always on the lookout for ways to improve the online shopping experience and stay ahead of the competition. Adding consumer product reviews is one such way. As part of the analysis of the Spring 2007 edition of the Top 100 Online Retail Satisfaction Index, we delved into the data specific to consumer product reviews to answer pertinent questions.
Tags : 
customer reviews, reviews, purchase decision, referral, recommendation, customer satisfaction, online retail, e-commerce
    
ForeSee Results
Published By: ForeSee Results     Published Date: Jul 20, 2007
This report analyzes satisfaction of the various methods of generating site traffic (email, search marketing, recommendations, shopping comparison sites, etc.) to see which result in the most satisfied customers -- who are also more likely to purchase in the future and recommend the site to others.
Tags : 
foresee, foresee results, online marketing, comparative, conversion, conversions, customer satisfaction, referrals
    
ForeSee Results
Published By: MASERGY     Published Date: Jul 20, 2007
This paper will explore the problems inherent in an overlay management approach and describe a new approach that allows for the management of the wide-area network to be not only offered as a service, but actually embedded in the network itself, resulting in several incremental benefits to the enterprise.
Tags : 
ip services, ip networks, network management, voip, it management, system management software, smb network, smb networks
    
MASERGY
Published By: Perimeter     Published Date: Jul 17, 2007
Read this interesting comparison about designing an intrusion defense strategy that identifies the value of business processes, and implements appropriate strategies to protect these systems using a layered defense approach is not only a good security practice, but also a regulation in many cases.
Tags : 
ids, intrusion defense, intrusion prevention, firewall, security, compliance, layered security, ips
    
Perimeter
Published By: Knoa     Published Date: Jul 17, 2007
What is often overlooked is that application performance is just one of three key drivers of return on investment (ROI) from your Siebel application. An efficient infrastructure is critical. It's important to optimize the Siebel application for your own unique business environment, user needs and usage patterns. But, it's all for naught if you do not build and sustain adoption and efficient and effective use of the Siebel application by your end users.
Tags : 
epm, performance management, experience management, knoa, siebel, crm, customer relationship, end user
    
Knoa
Start   Previous    571 572 573 574 575 576 577 578 579 580 581 582 583 584 585    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.