document

Results 876 - 900 of 991Sort Results By: Published Date | Title | Company Name

How Organizations Implement Document Management Strategies To Help Drive Business in a Tough Economy

Published By: Oce Business Services     Published Date: Jun 24, 2009
In an economic climate that daily seems to underscore nature's law that only the fittest survive, what are some of the actions companies are taking to stay competitive? The majority of survey respondents indicate that the top two moves they are making include reducing operating expenses (51%) and improving cash flow (20%). More effectively controlling and managing document processes, can help meet these objectives.  This survey report investigates how respondents and their organizations are leveraging five document management activities - internal and outsourced - to reduce costs and reach financial goals.
Tags : 
dpm, oce, document process management, lifecycle, document risks, cash flow, survey, internal
    
Oce Business Services

Cut Costs, Meet Strategic Goals and Manage Document Processes with Confidence

Published By: Oce Business Services     Published Date: Jun 24, 2009
Download this free report to explore the potential of applying business performance management principles to advance document performance management to reduce costs; better manage documents as vital strategic, financial and information assets; and secure positive returns on investments from outsourcing. Learn more today!
Tags : 
oce, kpi, ekg, document processes, mail center, print/copy operations, records, operations
    
Oce Business Services

Managing Security in Organizations

Published By: ALL ICT Ltd     Published Date: Mar 26, 2008
The aim of this document is to assist organizations protecting their assets – tangible and intangible – through a Security Management Program. This program provides a holistic, hands-on, and consistent approach for securing the organization against serious security breaches, such as data leakage, while providing the organization with the required flexibility to adapt itself to the business needs and to remain competitive in the market.
Tags : 
allict, all ict, security management, security, network security, intrusion prevention, data protection
    
ALL ICT Ltd

Guidelines for the Evaluation of Enterprise De-Duplication Solutions

Published By: Diligent Technologies     Published Date: Apr 11, 2008
This document is intended for the use of Enterprise1 Storage Professionals, focused on Data Protection — Backup, Restore,DR and Archive operations — who are interested in evaluating the potential impact of de-duplication technologies to their business. There is much hyperbole associated with de-duplication. The purpose of this document is to help readers distill the essence from the hype, as the basis for sound decision-making.
Tags : 
diligent, diligent technologies, deduplication, de-duplication, data center, datacenter, data protection, storage
    
Diligent Technologies

Using RenderX for TransPromo in a High Volume Statement Print Application

Published By: RenderX     Published Date: May 27, 2008
If you're producing transactional customer communications such as statements, invoices, policy notifications, or shipping documents, you probably already have some of the basic elements you need to start using TransPromo to take your marketing campaigns to the next level. TransPromo advertising in a PDF, PostScript and AFP electronic and print format can easily be injected into your application with RenderX.
Tags : 
transpromo, xml, xsl fo, pdf, postscript, afp, xep, direct advertising
    
RenderX

Managing Metadata for Oil & Gas Companies: Reducing Total Installed Cost for Capital Projects

Published By: SchemaLogic     Published Date: Jun 11, 2008
Oil & Gas companies operate in an increasingly complex environment. SchemaLogic's enterprise solution for managing content and document metadata enables Oil & Gas companies to model, update and synchronize content across project document repositories or collections for greater reliability and reduced total installed cost.
Tags : 
mdm, metadata management, oil, gas, petroleum, energy, content management, document management
    
SchemaLogic

Designed for Quality Assurance

Published By: IFS     Published Date: Aug 15, 2011
Learn to use IFS Applications to achieve ISO/TS 16949, the global standard for quality control in the automotive industry.
Tags : 
ifs applications, iso/ts 16949, event management, quality control, automotive industry, quality assurance, document management, tqm
    
IFS

LogRhythm Compliance Support for FISMA

Published By: LogRhythm     Published Date: Sep 26, 2008
Find out more about how LogRhythm can help organizations fulfill The Federal Information Security Management Act (FISMA) requirements in documentation and implementation of controls for IT systems that support operations and assets.
Tags : 
fisma, nist compliance, comply, security, information technology, information security management, log management, log analysis
    
LogRhythm

A methodology for evaluating the effectiveness of your current lead management system

Published By: Godfrey     Published Date: Oct 24, 2008
This document is intended to provide us with the information we need to generate an audit of your existing system for sales lead management. This audit is organized into several parts, starting with a cursory survey of your business environment, and then focusing on the key aspects and issues of sales lead management. Since our face-to-face meeting time may be limited, we hope this audit will allow you to provide more thoughtful and detailed information, so that our deliverable to you is of significant value.
Tags : 
godfrey, lead management system, lead-generating communications, lead processing, lead reporting
    
Godfrey

Using Likewise to Comply with the PCI Data Security Standard

Published By: Likewise Software     Published Date: Oct 07, 2008
This document describes how Likewise and Microsoft Active Directory can foster compliance with the Payment Card Industry Data Security Standard, a set of requirements for businesses that process payment card information. Developed by Visa, American Express, Discover Financial Services, and other members of the PCI Security Standards Council, the standard sets forth policies, procedures, and practices to protect customer account data. The standard includes specific requirements for strictly controlling access to customer data, authenticating business users, monitoring access, maintaining a secure network, and auditing system resources. Likewise integrates Linux, Unix, and Mac OS X workstations and servers into Active Directory, providing the basis to assign each user a unique ID for authentication, authorization, monitoring, and tracking. Likewise also provides group policies for non-Windows computers so that their security settings and other configurations can be centrally managed in the same way as Windows computers.
Tags : 
likewise, pci data security, linux, unix, mac os x, windows, data protection
    
Likewise Software

Likewise Security Benefits

Published By: Likewise Software     Published Date: Oct 07, 2008
This document describes how Likewise improves the security of Linux and UNIX computers by allowing computers to authenticate and authorize users through Microsoft Active Directory.
Tags : 
likewise, linux, unix, microsoft active directory, microsoft windows, security, password management, security policies
    
Likewise Software

Single Sign-On for Kerberized Linux and UNIX Applications

Published By: Likewise Software     Published Date: Oct 07, 2008
This document describes how Likewise facilitates the implementation of enterprise single sign-on (SSO). It explains how Kerberos-aware applications can be configured to exploit the authentication infrastructure provided by Likewise. It explains the concepts as well as outlining the specific steps that must be taken to enable single sign-on support in applications.
Tags : 
likewise, linux, unix, (sso), kerberos, open ssh, security, internet security
    
Likewise Software

Stryker Finds Rx for Multi-Office Reporting with AutoMate

Published By: Network Automation     Published Date: Dec 02, 2008
Every night for several years, the five Latin America offices of Michigan-based medical technology products manufacturer Stryker Corporation were forced to burn the midnight oil to turn their daily financials into a single consolidated report. Each office has its own independent ERP system, so the process required three hours to compile the data for each territory plus another 90 minutes for a financial analyst at division headquarters to merge the five spreadsheets into one document.
Tags : 
network automation, automate professional, erp, networking, it management, network management, network performance management
    
Network Automation

Virtualization 2.0: Opportunities and Challenges for Next-Generation Datacenter Networks

Published By: BLADE Network Technologies     Published Date: Nov 18, 2008
This document describes enterprise virtualization today and the anticipated uses of this technology, particularly leveraging the capabilities provided by widespread adoption of 10 Gigabit Ethernet (10GbE) as a single, converged network fabric.
Tags : 
blade network technologies, next-generation datacenter networks, virtualization today, 10gbe, network virtualization, networking, network performance, network performance management
    
BLADE Network Technologies

More than a Financial Requirement

Published By: Aprimo, Inc.     Published Date: Dec 23, 2008
Aprimo manages the financial aspects of your marketing process and captures information about each marketing project, which facilitates Sarbanes-Oxley compliance. It puts into place detailed procedures to manage access rights, to create and document business rules that apply to marketing projects and to ensure appropriate review and approval.
Tags : 
aprimo, marketing process, financial control, digital asset management, data management, knowledge management, marketing automation, system management software
    
Aprimo, Inc.

Fraud Prevention & Detection for Mission Critical Spreadsheets

Published By: Prodiance Corp.     Published Date: Dec 22, 2008
According to Baseline Consulting, approximately 32% of corporate data is contained in enduser computing (EUC) applications and approximately 68% is stored in IT controlled applications. These EUCs – primarily spreadsheets, PC databases (e.g. Access databases), BI reports, and word documents – are often stored on employee desktops and corporate file shares, and for the most part, are uncontrolled. They lack the proper safeguards and controls one would expect with IT controlled applications, including documentation, version control, back-up and archival, change control, testing, security and access control, and more.
Tags : 
prodiance, end-user computing (euc), risk assessment, automation, monitoring, spreadsheet, link migration, networking
    
Prodiance Corp.

Messaging, Compliance, and Archiving

Published By: Mimosa Systems     Published Date: Jan 16, 2009
Since the rise of archiving systems in business more than a decade ago, the technology has made great strides forward. Recently, stringent regulations and highly demanding litigation procedures have amplified the need for a strong archive system. Messaging systems such as Microsoft® Exchange Server 2007—Microsoft’s latest version of Exchange Server—have also seen their share of changes and improvements in archiving and compliance. This document is intended as a guide and a blueprint for organizations looking at deploying Microsoft Exchange Server 2007 and Mimosa™ NearPoint™ in their environment.
Tags : 
mimosa systems, compliance, archiving systems, messaging systems, microsoft exchange server 2007, it management, storage, service oriented architecture
    
Mimosa Systems

Seven Reasons Why SIP Will Improve Your Customer Care Strategy

Published By: Genesys     Published Date: Jan 27, 2009
In this document, Opus Research offers seven ways SIP (Session Initiation Protocol) can revolutionize customer care in your enterprise. More specifically, we evaluate deployments that involve SIP and provide case studies that integrate Genesys SIP the Customer Interaction Manager (CIM), Genesys Voice Platform (GVP), and Business Process Routing from Genesys Telecommunications Laboratories.
Tags : 
genesys, sip, session initiation protocol, customer integration manager, genesys voice platform, voip, crm, enterprise applications
    
Genesys

IT Automation: Evaluate Job Scheduling and Run Book Automation Solutions

Published By: Cisco     Published Date: Mar 15, 2011
This document explores the environmental uses of job scheduling (batch processing) and RBA (IT process automation) and defines the conditions for choosing one solution over another. This document also notes when it is appropriate to run a combination of both to gain immediate benefits for business operations and continuity.
Tags : 
cisco, it automation, job scheduling, run book automation, batch processing, process automation, continuity, business continuity
    
Cisco

Automated Document Marking & Printing for Paper-Based and PDF Workflows

Published By: Enhancement Software     Published Date: Jan 30, 2009
This white paper is intended to explore the process of secure and efficient paperā€based document marking and printing using Microsoft® Word. At the same time it will explore the savings that can be realized by implementing an automated practice that reduces risk of unintended use.
Tags : 
enhancement software, stampit, automated document marking, document integrity, corporate accountability, compliance, risk management, roi
    
Enhancement Software

Green IT Service Management: An Overview of How a Service Management Framework Can Contribute to You

Published By: OwlPoint, LLC     Published Date: Feb 11, 2009
IT Service Management (ITSM) is a proven, mature framework that can be utilized to support Green IT programs. Green IT and ITSM share common goals, such as operational efficiencies and metrics based improvements. Existing processes and supporting ITSM tools can easily be adapted to support Green IT initiatives. ITSM provides the structure to be successful as well as for documenting and sharing the achievements. This white paper explains how a service management framework can contribute to you.
Tags : 
owlpoint, itsm, green it, it service management, service management framework, it management, itil, service management
    
OwlPoint, LLC

The Top Ten Most Forgotten Things When Building a Disaster Recovery Plan

Published By: VMware     Published Date: Feb 20, 2009
Hopefully your business will never have to experience a major disaster. But having an effective disaster recovery plan with sufficient documentation, adequate testing, and well trained staff will increase your chances of survival when faced with a minor or major catastrophe.
Tags : 
vmware, disaster recovery plan, threats, viruses, worms, trojans, smb, security
    
VMware

Managing Your Contacts: The Business of Personal Relationships

Published By: BatchBlue Software     Published Date: Mar 27, 2009
Every small business has some system for organizing and documenting its relationships. If that system is no longer working, or could be improved upon, a new contact management system is in order. This Blue Paper will help small business owners research, select and implement the system that will work effectively for them.
Tags : 
batchbook, matternow, blue paper, contact management, small business, document management, relationships, manage leads
    
BatchBlue Software

How Ruggedness Reduces TCO for Mobile Computers

Published By: Intermec     Published Date: Sep 07, 2011
This white paper will help you get TCO as low as possible, by documenting the relationship between ruggedness and TCO. Read more now!
Tags : 
intermec, rfid projects, professional services, business goals, rfideploy services, rfid, analytical applications, data integration
    
Intermec

Imaging Moves into the Mainstream

Published By: Intermec     Published Date: Sep 07, 2011
This is a guide to 2D bar code imaging technology, including an overview of capabilities and performance in traditional applications.
Tags : 
intermec, 2d imagers, laser scanners, bar code, qr code, digital imagining, document processing, application integration
    
Intermec
Start   Previous    26 27 28 29 30 31 32 33 34 35 36 37 38 39 40    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.