it standard

Results 351 - 375 of 690Sort Results By: Published Date | Title | Company Name

Park West Landscape Gets ROI Fast with ViewWise

Published By: Computhink     Published Date: Dec 10, 2007
Park West’s successful landscape business had a paper problem. The 11 separate companies (including their headquarters) created paperwork havoc for their Accounts Payable (AP) Department. They required an electronic document management alternative that could meet their criteria to standardize the process for all 11 companies. They needed this at a price that would enable them to realize return on investment in a reasonable length of time.
Tags : 
roi, return on investment, document management, electronic document management, viewwise, viewise, computhink, landscape, landscaper, parkwest, paperless, best practices
    
Computhink

SiriusView: Marketing Automation Platforms 2017

Published By: Marketo     Published Date: Jun 08, 2017
Read this complimentary copy of the SiriusView: Marketing Automation Platforms 2017 and learn more about Marketo’s key differentiators including its native multi-channel experience, live event management, and content recommendation functionalities. Marketo's powerful marketing automation capabilities and seamless CRM integrations are complemented by our LaunchPoint ecosystem featuring over 500 technology and service providers that offer best-of-breed solutions for today’s marketers. The full report includes: Market evaluation and analysis of 9 marketing automation platform vendors Insights for selecting a vendor based on your organization's requirements Opportunities and challenges faced when deploying marketing automation platforms
Tags : 
automation, security process, virtualization, standardization, configuration management, it automation, circle it
    
Marketo

Getting Ready for Microsoft Windows Server 2008

Published By: Dell Windows Server     Published Date: Jan 16, 2009
The Windows Server 2008 OS promises to supercharge enterprise computing by providing a solid foundation to support critical workloads and deliver rich Web-based experiences—all in an exceptionally secure, industry-standard operating environment. Dell smoothes the way by providing business-ready platforms optimized for Windows Server 2008 together with Structured Solution Designs to make the migration flexible, simple, and green.
Tags : 
dell, microsoft windows server 2008, structured solution designs, windows migration, platforms, windows, windows server
    
Dell Windows Server

Achieving ROI from Your PCI DSS Investment

Published By: NetIQ     Published Date: Dec 23, 2010
The Payment Card Industry Data Security Standard (PCI DSS) establishes standard requirements protecting cardholder information. It applies to all entities that store, process, or transmit cardholder data, such as retail merchants, payment processors, and banks.
Tags : 
netiq, roi, pci dss, compliance, security management, return on investment, pci compliance
    
NetIQ

Reduce Your Breach Risk: File Integrity Monitoring for PCI Compliance and Data Security

Published By: NetIQ     Published Date: Apr 08, 2011
This white paper discusses the importance of file integrity monitoring (FIM), which facilitates the detection of malware as well as insider threats in identifying data breaches.
Tags : 
netiq, risk breach, file integrity monitoring, pci compliance, data security, fim, data breaches, malware detection, compliance, intrusion detection, data protection
    
NetIQ

Three Critical Steps to Improving Product Data Quality

Published By: DataFlux     Published Date: Jan 07, 2011
This white paper describes a general approach for planning your organization's efforts to improve data quality, providing a data-example-driven perspective of some of the unique challenges of product data quality, as well as discuss and demonstrate three critical steps to improving product data quality.
Tags : 
dataflux, product data quality, standardization, matching, database development, data quality
    
DataFlux

Defining a Framework for Cloud Adoption

Published By: Aberdeen Group     Published Date: Sep 11, 2012
The purpose of this paper is to introduce the cloud computing adoption framework from IBM and make it available for use by any organization looking for a standardized frame of reference for cloud computing discussions.
Tags : 
cloud, computing, aberdeen, technology, ibm, cloud, cloud adoption, application integration, business technology, data center, cloud computing
    
Aberdeen Group

The Secret Weapon to Driving Employee Success: Your Managers

Published By: Achievers     Published Date: Mar 27, 2014
Employees don’t leave companies. They leave bad managers. Bad managers are the number one reason employees quit. We’ve all experienced them at some point. They are the leading cause of employee disengagement. Today, 70 percent of North American employees feel indifferent or disengaged at work, costing the U.S. economy nearly $500 billion every year* in lost productivity, substandard performance, and employee turnover. Please download the white paper to learn more!
Tags : 
human resources, managers, employee turnover, bad managers, employee success, employee disengagement, human resource technology, business technology
    
Achievers

Defining a Framework for Cloud Adoption

Published By: Aberdeen-IBM     Published Date: Sep 12, 2012
The purpose of this paper is to introduce the cloud computing adoption framework from IBM and make it available for use by any organization looking for a standardized frame of reference for cloud computing discussions.
Tags : 
cloud, computing, aberdeen, technology, ibm, cloud, cloud adoption, application integration, business technology
    
Aberdeen-IBM

Securing Cloud Computing for Enterprise Collaboration

Published By: Intralinks     Published Date: Oct 03, 2013
As the business case for Software-as-a-Service (Saas) and other cloud computing models solidifies, more companies are incorporating cloud computing into their IT programs. However, the legal, regulatory, and ethical requirements of data security must be adhered to regardless of where the information is housed. The best SaaS providers offer strong authentication systems, user activity auditing tools, and real time usage reporting to maintain the highest level of control over sensitive and confidential data. In this 11-page white paper, Intralinks provides tips and questions to ask prospective providers about their security standards and practices, software reliability and uptime, and the availability of reporting and audit trails.
Tags : 
intellectual property, sensitive information, privacy, inter-enterprise collaboration, secure documents, security, knowledge management, enterprise applications, data management, business technology
    
Intralinks

IDC: The Business Case for Standardizing on Red Hat

Published By: Red Hat     Published Date: Mar 16, 2015
Industry analyst firm IDC recently conducted primary research, commissioned by Red Hat, to determine the total cost of ownership (TCO) benefits Red Hat Enterprise Linux provides in the long term versus running mixed environments or primarily non-paid Linux distributions. The results of this analysis are clear: Organizations that standardize on Red Hat Enterprise Linux recover their up-front subscription costs faster through more efficient operations, less downtime and a more productive IT staff. Key findings include: Organizations that standardize on Red Hat Enterprise Linux have more efficient IT staffs Red Hat Enterprise Linux customers experience about one-fifth the amount of downtime as organizations using primarily non-paid Linux distributions Organizations that heavily use non-paid Linux have almost double the total operational costs Time to market for new application deployments can be greatly reduced with Red Hat Enterprise Linux
Tags : 
total cost of ownership, up-front subscription costs, productive it staff, application deployments, it management
    
Red Hat

Red Hat Satellite: Management and Automation of your Red Hat Enterprise Linux Environment

Published By: Red Hat     Published Date: Mar 16, 2015
With Red Hat® Satellite, you can instantly see the status of your systems and if any are missing important patches or configuration changes.Not only does Red Hat Satellite improve security, it lets you easily measure and report on the patch level of systems in your company. Your security posture is improved through: • A single, centralized management tool. • Secure connection policies for remote administration. • Standardized machine configurations. • Digitally signed content.
Tags : 
centralized management took, security posture, configurations, remote administration, it management
    
Red Hat

5 Strategies For Converged Infrastructure Efficiency

Published By: Xangati     Published Date: Sep 14, 2015
Efficiency is not about maxing out utilization, nor is it about achieving the highest possible MIPS, IOPS or any other standard metric. Technically, efficiency is about the ratio of useful work performed to the energy expended in doing that work. You want the greatest amount of output from your IT infrastructure for the lowest possible cost. It’s a bit like long-distance driving and working to achieve the highest possible miles per gallon through constant observation of time, speed and gas consumption in the face of varying traffic and weather conditions. Flooring the gas pedal is not always the best option. What can you do to optimize your converged infrastructure efficiency? While there are no 10-second, quick-fix answers, here are five strategies you can start implementing right now to bring your organization much closer to optimal efficiency and long-term cost savings.
Tags : 
infrastructure efficiency, optimal efficiency, long-term cost savings, utilization
    
Xangati

Moneyball Method of Field Service Management

Published By: Oracle Service Cloud     Published Date: Mar 23, 2016
In the early 2000s, two vastly different businesses—baseball and field service management—began to use advanced statistical analysis to gain an advantage over their competitors. They both revolutionized their respective fields by using statistical knowledge to improve performance. The new approach replaced old models and methods and attained shockingly good results as both set new standards for their respective industries. In this white paper, you will learn the general concepts behind predictive analytics and how they can be applied to a field service organization. The paper will cover the basic metrics that should be tracked, the use of performance pattern profiles, and how these principles can predict future events.
Tags : 
oracle, service cloud, service management, customer interaction, best practices, business activity monitoring, business analytics, customer interaction service, customer relationship management
    
Oracle Service Cloud

How the Right Contact Center Solution Helps Drive Customer Satisfaction

Published By: 8x8 Inc.     Published Date: Feb 13, 2017
The right contact center solution should integrate tightly with your CRM solution and add value to it. Your contact center software should be able to capture all email, chat and standard telephone interactions and link them to the customer records database. Not only does this ensure continuity in all your customer communications, it gives the CRM database more information to use in constructing a better picture of your customers’ behavior. So how do you choose the right contact center for your organization? Following are three examples of forward-thinking businesses that found the right answer with cloud communication technology.
Tags : 
contact center, crm, telephone interactions, communications
    
8x8 Inc.

For Safety’s Sake: Avoid suspect electrical safety devices

Published By: Eaton     Published Date: Jul 12, 2019
The production of counterfeit products is an increasing problem that affects the entire electrical industry. Counterfeit protective devices, like circuit breakers, including GFCI and AFCI for personal protection, pose one of the most significant risks to facility and employee safety. Because counterfeit products are more difficult to detect than ever, we as an industry must do more to guard against their risks and liabilities. By purchasing products from authorized resellers and using available tools to authenticate products, buyers can ensure a safer supply chain that mitigates the risk sub-standard and counterfeit electrical safety devices pose.
Tags : 
    
Eaton

For Safety’s Sake: the importance of risk analysis

Published By: Eaton     Published Date: Jul 12, 2019
Working on energized equipment is one of the more dangerous scenarios technicians face in the field. As a result, there’s been a concerted industry effort to improve the understanding of electrical shock and arc flash hazards. I believe one of the most important standards in this safety push is the restructured language within the 2018 edition of the National Fire Protection Agency’s (NFPA’s) 70E “Standard for Electrical Safety in the Workplace.” In the past, the standard addressed electrical hazards and risks holistically when considering energized electrical work. But today’s latest guidelines now identify hazards and risks independently and include recommendations for a thorough risk analysis that considers the hazard, the planned work task and potential human error. Together, the changes result in a clearer understanding of energized work and help reduce electrical incidents.
Tags : 
    
Eaton

Data Quality for BASEL II

Published By: Trillium Software     Published Date: May 19, 2011
Today financial services institutions must meet the standards for data quality attestation by the FFEIC regulators of risk reporting. This paper discusses the platform and domain expertise needed to support the rigorous demands of commercial and retail risk reporting.
Tags : 
trillium software, data quality management, basel ii solution, data profiling, data monitoring, metadata, data supporting risk, grc, application integration, business intelligence, data quality, content management system, secure content management, data deduplication
    
Trillium Software

Information Quality Management (IQM): Assessing Your IQM Practice

Published By: Trillium Software     Published Date: May 19, 2011
By implementing the six pillars of data quality optimization, your organization can incrementally improve the quality of the data that drives all your operations.
Tags : 
trillium software, data quality management, iqm, information quality management, quality maturity model, enterprise data management, edm, data storage requirements, digital universe, data hygiene best practices, data standards, data monitoring, business intelligence, application integration, data quality, content management system, data warehousing
    
Trillium Software

Addressing the Payment Card Industry Data Security Standard (PCI DSS)

Published By: GFI Software     Published Date: Mar 21, 2011
This white paper examines the necessary requirements to adhere to PCI DSS, the implications of non-compliance as well as how effective event log management and network vulnerability management play a key role in achieving compliance.
Tags : 
gfi, pci dss, credit card, event log management, network vulnerability management, compliance, data protection, database security, pci compliance, vulnerability management
    
GFI Software

Profiting from PCI Compliance

Published By: IBM     Published Date: Mar 04, 2009
Working together, the major payment card providers have developed a set of data security standards and created a council for enforcing them. Although the Payment Card Industry Data Security Standard (PCI DSS) has become a global requirement, many organizations are lagging in compliance.
Tags : 
ibm, pci dss, compliance, security, software compliance, sarbanes oxley compliance
    
IBM

IBM WebSphere Portal for z/OS taps into System z, Web 2.0: Executive update

Published By: IBM     Published Date: Jun 24, 2009
WebSphere Portal remains IBM's strategic front end for SOA. It enables our clients to closely align their business objectives on standards-based platforms with role-based delivery of composite applications across and beyond their enterprise. At the end of June we delivered a new version of WebSphere Portal Version 6.1. This release significantly improves performance by tapping into the 64-bit capabilities of the IBM System z platform. Click here to learn more!
Tags : 
websphere, portal, version 6.1, web 2.0, web interfaces, intuitive applications, enhanced web 2.0, ibm, business applications, leveraging, ibm, system z, platform, mission critical applications, web facing, workloads, z/os, ibm racf, workload manager, soa
    
IBM

Put ITIL best practices to work for your business

Published By: IBM     Published Date: Sep 10, 2009
What do the new ITIL® standards mean for a small business? This view into ITIL best practices in service management shows how you can maximize the business value of your technology. With an adaptable approach, aligning IT operations with business goals to achieve desired results for customers.
Tags : 
itilv3, ibm, value, itil, best practice, cobit, coit, etom, soa, ccta, best practices, service oriented architecture, productivity
    
IBM

Do more with less thru Netcool?

Published By: IBM     Published Date: Sep 10, 2009
This white paper outlines methods to help service providers improve overall operational efficiency within the service assurance operational environment. Learn how IBM Tivoli® Netcool® solutions can help service providers streamline their operations, improve responsiveness and reduce costs.
Tags : 
netcool, ibm, idc, mobile service providers, fixed-line service providers, operational efficiencies, communications, media and entertainment, consolidate, operations management, automate, productivity, service delivery costs, standards-based, off-the-shelf, cost of ownership, service assurance, oss, ibm service management, business process automation
    
IBM

Webcast: Security convergence equals network security cost savings

Published By: IBM     Published Date: Sep 11, 2009
Listen to IBM Internet Security Systems' take on network security convergence. This presentation will be available to audience members until February 22, 2010 at 09:00 AM Pacific Standard Time.
Tags : 
ibm, webcast, network security convergence, web 2.0, web application and database threats, security solutions, convergence, network management, network security, application security, network security appliance
    
IBM
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.