inform

Results 3951 - 3975 of 4010Sort Results By: Published Date | Title | Company Name
Published By: Cognos     Published Date: Jun 19, 2007
The Performance Manager, Proven Strategies for Turning Information into Higher Business Performance, strengthens the partnership between decision-makers and the people who provide the information that drives better decisions. It suggests 42 decisions areas, or information sweet spots, to help you understand your data, plan, and monitor your performance.
Tags : 
performance, business analytics, business metrics, evaluation, analyze, analytical applications, cognos, business intelligence, bi software
    
Cognos
Published By: Cognos     Published Date: Jun 19, 2007
This paper looks at research into the link between visual perception and understanding, and translates the findings into practical techniques that you can use to communicate more clearly with your data.
Tags : 
visual communication, visual perception, graph, graphical representation, graphs, presentations, evaluation, presentation, cognos
    
Cognos
Published By: GFI     Published Date: Jun 14, 2007
This white paper details how integrated network faxing remains a relevant technology that can give you a business edge in an ever competitive marketplace, providing higher productivity and helping you save thousands of dollars in labor costs alone.
Tags : 
ip networks, ip network, ip fax, ip faxing, faxing, fax, fax server, fax security, transmission security, productivity, it spending, cost control, roi, fax cost, gfi
    
GFI
Published By: GFI     Published Date: Jun 14, 2007
This white paper shows where GFI EventsManager fits in this picture and how it is an invaluable asset in the corporate toolbox.
Tags : 
event management, performance management, employee performance, roi, return on investment, information management, records management, network management, compliance, records, gfi
    
GFI
Published By: GFI     Published Date: Jun 14, 2007
In this white paper, we explore how the uncontrolled use of portable storage devices such as iPods, USB sticks, flash drives and PDAs, coupled with data theft techniques such as ‘pod slurping’, can lead to major security breaches.
Tags : 
endpointsecurity, end-point, endpoint security, insider, usb, mole, i-pod, ipod, access control, authentication, stealing data, information theft, gfi
    
GFI
Published By: GFI     Published Date: Jun 14, 2007
This white paper examines the nature of the threat that devices such as iPods, USB sticks, flash drives and PDAs present and the counter-measures that organizations can adopt to eliminate them.
Tags : 
endpointsecurity, end-point, endpoint security, insider, usb, mole, i-pod, ipod, access control, authentication, stealing data, information theft, gfi
    
GFI
Published By: GFI     Published Date: Jun 12, 2007
Examining the different kinds of email threats and email attack methods, this paper describes the need for a solid server-based content-checking gateway to safeguard your business against email viruses and attacks as well as information leaks.
Tags : 
network security, virus, anti virus, anti-virus, content checking, mailsecurity, gfi, anti trojan, trojan, trojans
    
GFI
Published By: Taridium     Published Date: May 22, 2007
Take advantage of this free information by Taridium and see how comms platform allows service providers to offer instant retail VoIP service and host virtual PBX’s with all of today’s most advanced features.
Tags : 
voice over ip, voip, ipbx, ippbx, ip pbx, ip telephony, pbx, phone, ip networks, taridium
    
Taridium
Published By: eFax     Published Date: May 15, 2007
Fax servers promise easier administration and cheaper faxing but most deployments fail to meet their goals because of unexpected, ongoing costs and unpredictable capacity needs. This paper offers information on why outsourced fax services eliminate the time, effort and cost issues associated with fax servers, but retain all of the same functionality.
Tags : 
fax, faxing, ip faxing, fax server, fax servers, ip networking, ip networks, converged communications, integrated communications, communications convergence, convergence, communication, communications, protus, protus ip solutions
    
eFax
Published By: AirDefense     Published Date: Apr 24, 2007
This document outlines how hackers are exploiting vulnerabilities in 802.11 wireless LANs and describes the widely available hacking tools. As a collection of already published risks to wireless LANs, this white paper is written to inform IT security managers of what they are up against.
Tags : 
hackers, hacker, hacker detection, intrusion prevention, wireless security, wlan, wlans, 802.11, wireless lan, monitoring, airdefense
    
AirDefense
Published By: Quocirca     Published Date: Apr 23, 2007
Information management, which includes both data and content management, is an essential building block for Service-Oriented Architecture (SOA).  By taking a service oriented approach to information, you can achieve much greater value from your information assets.
Tags : 
information management, service oriented architecture, service-oriented architecture, soa, data management, mdm, master data management, content management, content management system, information integration, quocirca
    
Quocirca
Published By: Infor     Published Date: Apr 19, 2007
Key Performance Indicators and To-Do Lists provide the opportunity for a company to more fully utilize information already available within the organization to promote greater efficiency, stronger performance, and continuous improvement – all directed toward accomplishing company-wide business objectives for greater stronger asset performance.
Tags : 
kpi, key performance indicators, kpis, key performance indicator, business management, erp, enterprise resource planning, infor
    
Infor
Published By: Informatica     Published Date: Apr 16, 2007
Don Tirsell, Senior Director of Product Marketing at Informatica, discusses "complex data," their recent acquisition of Itemfield, and how Itemfield's technology fits into Informatica's overall data integration platform.
Tags : 
data integration, crm, crm tool, crm tools, customer relationship management, podcast, informatica, data management/analytics
    
Informatica
Published By: Informatica     Published Date: Apr 16, 2007
On-demand computing is apparently in demand, at least in the eyes of data integration specialist Informatica Corp. The Switzerland of data integration, as some have called it, just announced availability of its first on-demand offering, which is specifically designed to handle data from Software-as-a-Service (SaaS) stalwart, Salesforce.com.
Tags : 
salesforce, crm tools, crm, customer relationship management, salesforce.com, crm tool, on-demand, ondemand, on demand, podcast, informatica
    
Informatica
Published By: Informatica     Published Date: Apr 16, 2007
David Loshin, consultant and author talked to Karen Hsu about Informatica's data quality, unstructured data and data governance solutions. Karen highlighted customers like Navteq and Humberside Police's innovative use of Informatica.
Tags : 
b-eye, business intelligence, data integration, karen hsu, interview, informatica, crm, customer relationship management, crm tools, crm tool, data governance, data quality
    
Informatica
Published By: Informatica     Published Date: Apr 16, 2007
In Informatica's data migration podcast, Arvind Parthasarathi spoke with editorial director, James E. Powell.  He explores "the seven steps", what IT does wrong, what keeps IT from getting started and what one can do to improve the odds of data migration success.
Tags : 
data migration, podcast, crm, customer relationship management, informatica
    
Informatica
Published By: Xiotech     Published Date: Apr 13, 2007
Disruption to your production environment is costly, and any loss of information can be disastrous. Consequences may include loss of revenue and company reputation, lower shareholder confidence, potential exposure to business continuity risk, or sanctions and fines for noncompliance with regulatory requirements. Organizations need an effective and reliable way to safeguard corporate information in the wake of an unforeseen downtime event.
Tags : 
data protection, data recovery, information management, regulatory compliance, compliance, storage compliance, high availability, storage, data replication, xiotech
    
Xiotech
Published By: Avalere     Published Date: Apr 02, 2007
Sensitive documents, files and intellectual property are extracted from a central repository such as a database, records management system, or document management system to complete daily tasks, however, extracting this information can lead to a security breach.  Avalere provides the tools you need to control the proliferation of sensitive information throughout your organization.
Tags : 
security, security management, database admin, dba, records management, database management, document management, data security, document security, avalere
    
Avalere
Published By: Avalere     Published Date: Apr 02, 2007
Laptops, USB devices, and other endpoint devices foster a flexible and more productive work environment, yet also increase a company's exposure to the loss or theft of critical information. Avalere inventories, protects, and controls your company’s laptop, desktop or removable storage device information to mitigate risks of lost or stolen equipment.
Tags : 
mobile computing, lost laptop, lost equipment, mobile data systems, computer loss, equipment loss, risk management, avalere
    
Avalere
Published By: Avalere     Published Date: Apr 02, 2007
Companies struggle with cleanly separating an employee, contractor or consultant with their company and critical information.  Avalere enables companies to review how information has been used prior to an employee’s departure in order to protect the company and the employee.
Tags : 
data protection, employee performance, fired, employee departure, employee quit, employee resigned, access control, avalere
    
Avalere
Published By: Business Assyst     Published Date: Mar 26, 2007
The last ten years has been devoted to developing ways of gaining knowledge of and understanding customers, the next ten years will be devoted to developing ways of using the information. Those that do this effectively will win and those that don't bother will surely fail.
Tags : 
business analytics, business metrics, customer relationship management, crm, loyalty, affinity, retention, business assyst
    
Business Assyst
Published By: WorldTelemetry, Inc.     Published Date: Mar 26, 2007
Corporate managers responsible for multiple fuel tank locations need remote technology applications to maximize their information use and increase the reach of their resources. Success when planning new remote technology projects can be measured in terms of increased profitability or ROI if the planners adequately address the build vs. buy decisions required when choosing the necessary hardware, software, deployment and integration strategy.
Tags : 
fuel, gas, roi, return on investment, infrastructure, cost control, business intelligence, cost efficency, world telemetry, worldtelemetry
    
WorldTelemetry, Inc.
Published By: WorldTelemetry, Inc.     Published Date: Mar 26, 2007
Business Intelligence Software are applications that build on existing data warehouses and provide analytical processing tools that allow users to more effectively analyze such data. This, in turn, permits businesses to more rapidly develop existing and new analyses and reports for improved decision-making power and information dissemination capacity.
Tags : 
analytical applications, business analytics, business metrics, business intelligence, enterprise software, bi software, world telemetry, worldtelemetry
    
WorldTelemetry, Inc.
Published By: WorldTelemetry, Inc.     Published Date: Mar 26, 2007
Companies that purchase fuels, chemicals, solvents and other products often have to make a choice: either reduce costs by keeping inventory levels low, risking run-outs and lost sales, or keep enough surplus inventories on hand to be prepared for unforeseen spikes in product demand, which tends to drive up inventory costs and market price risks.
Tags : 
inventory, fuels, chemicals, world telemetry, worldtelemetry, vmi, vendor-managed inventory, business intelligence, business metrics, analytical applications, business analytics
    
WorldTelemetry, Inc.
Start   Previous    147 148 149 150 151 152 153 154 155 156 157 158 159 160 161    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.