Skip to main content
 

technology

Results 4926 - 4950 of 5609Sort Results By: Published Date | Title | Company Name
Published By: Microsoft Dynamics     Published Date: Nov 06, 2008
Microsoft® recently researched the experience of nearly 200 companies with more than 250 PCs that have deployed one or more of the applications in the Microsoft Dynamics line of business management solutions. Among these companies, whose attitudes to technology tended to be more forward looking than usual, a common issue was growth via mergers and acquisitions (M&A). The pain points most often cited were non-integrated, overlapping systems, an inability to scale to support growth, the need for more functionality, and a lack of operational insight. This white paper explores the experience of these companies in more detail to help you understand how you can use Microsoft Dynamics to support your company’s growth via M&A and drive business success.
Tags : 
microsoft dynamics, crm, compliance, global functionality
    
Microsoft Dynamics
Published By: Microsoft Dynamics     Published Date: Nov 06, 2008
The Rodgers & Hammerstein Organization (R&H) manages and administers musical and theatrical licensing rights for the heirs of Richard Rodgers, Oscar Hammerstein II, and many other talented writers. The company implemented Microsoft Dynamics AX in 2006 to gain complete control and visibility over its licensing and business operations. More recently, the company wanted to give employees quick and easy access to the information they need to perform their jobs more efficiently. R&H enrolled in the Microsoft Technology Adoption Program and became one of the first companies in the world to implement Microsoft Dynamics AX 2009. Now, employees throughout the organization have almost instant access to company information tailored to their specific roles. Employees spend less time tracking tasks and more time efficiently serving customers.
Tags : 
microsoft dynamics, rodgers & hammerstein
    
Microsoft Dynamics
Published By: Decru     Published Date: Apr 23, 2007
Company data is vulnerable to threats from - insiders, unauthorized access to data, data backup, off-site mirroring - just to name a few. Encrypting data at rest, on tape or disk, significantly mitigates these threats. This document provides guidance into some of the factors a company should consider when evaluating storage security technology and solutions.
Tags : 
storage, security, encryption, key management, protecting your data, security controls, networked storage environments, audit & logging, role based administration, secure access controls, enterprise security, data security, network security, storage management, authentication, standards compliance, security & privacy, security appliances, decru
    
Decru
Published By: HP     Published Date: May 10, 2011
This paper describes how a properly converged and shared IT infrastructure can improve the speed and reliability of service delivery while increasing IT efficiency and lowering associated costs.
Tags : 
hp bladesystem matrix, converged infrastructure strategy, server virtualization, capacity management, bc/dr
    
HP
Published By: HP     Published Date: May 10, 2011
This IDC white paper discusses the elements of power/cooling expenses, the management challenges of attaining new efficiencies, and HP's holistic approach to reducing energy consumption with Thermal Logic technology.
Tags : 
power and cooling efficiency, energy efficiency, datacenter, tco, jed scaramelia, energy consumption reduction, thermal logic technology
    
HP
Published By: Diskeeper Corporation     Published Date: Oct 30, 2008
Apacer, a global leader in memory modules, announced the introduction of SSD+ Optimizer, the world’s first Solid State Drive (SSD) optimization solution with HyperFast technology from performance and reliability innovator Diskeeper Corporation®.
Tags : 
diskeeper corporation, windows, apacer, nand, hyperfast
    
Diskeeper Corporation
Published By: GFI     Published Date: Jun 14, 2007
This white paper details how integrated network faxing remains a relevant technology that can give you a business edge in an ever competitive marketplace, providing higher productivity and helping you save thousands of dollars in labor costs alone.
Tags : 
ip networks, ip network, ip fax, ip faxing, faxing, fax, fax server, fax security, transmission security, productivity, it spending, cost control, roi, fax cost, gfi
    
GFI
Published By: GFI     Published Date: Jun 14, 2007
A fax server buyers' guide, this paper describes the features you need to look for in fax server software and why. It also discusses the type of fax server devices (fax cards) available and which to choose.
Tags : 
fax server, buyers guide, buyer's guide, buying guide, ip fax, ip faxing, ip network, network fax, network faxing, fax card, fax cards, gfi
    
GFI
Published By: ProofSpace     Published Date: Jul 31, 2007
This paper details the processes by which ProofMark tags electronic records with a self-validating cryptographic seal that acts as a "tamper indicator" based on a true and provable time-reference datum.  With this it is able to provide instantaneous and irrefutable proof of authenticity, no matter where the data resides or who has controlled it.
Tags : 
proofspace, proofmark, proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography, public key cryptography, time stamp, timestamp, time and data stamping, file authentication, x9.95, accredited standards committee x9, x9.95-compliant, transient key technology, timestamp
    
ProofSpace
Published By: ProofSpace     Published Date: Aug 08, 2007
Digital signatures aren't enough. This paper posits that data integrity needs to be redefined within the context of a time-sensitive mechanism.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, time stamp, timestamp, time and data stamping, file authentication, x9.95, timestamping, ediscovery, discovery, admissibility, email archiving, surety, authentidate, timecertain
    
ProofSpace
Published By: ProofSpace     Published Date: Sep 10, 2007
Read this paper and learn the principles that are prerequisites to enforceable electronic agreements as required by existing legal standards and electronic signature legislation.  This paper will also specify sixteen measurement criteria that can be used as metrics to assess whether the architecture of an electronic transaction will meet the requirements of admissibility.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography, public key cryptography, time stamp, timestamp, time and data stamping, file authentication, x9.95, accredited standards committee x9, x9.95-compliant, transient key technology, electronic signatures, fda 21 cfr part 11, u.s. e-sign act
    
ProofSpace
Published By: InsideCRM.com     Published Date: Dec 28, 2007
With any technology, the vendor's job is to try to sell you their product, and they may rely on promises, superlative language and sparkling product demos to try to sway you. And with the midmarket ERP landscape crowded with players vying for your business's dollar, the prospect of choosing the right solution can seem even more daunting. But armed with these 10 questions, you'll be able to see through the hype and narrow down a few vendors that can really deliver what you need.
Tags : 
erp, enterprise resource planning, erp solution, erp software, erp vendor, erp provider, vendor selection, erp vendor selection, provider selection, midsize, mid-size, mid-sized, mid-market, midmarket, insidecrm, tippit
    
InsideCRM.com
Published By: InsideCRM.com     Published Date: Dec 28, 2007
Until recently, ERP solutions were considered out of the question for all but the largest companies, due to the technology's complexity and large price tags. However, these days, midmarket companies have more choices than ever when it comes to ERP solutions, as competition between vendors has heated up. This Buyer's Guide can help you answer the big (and small) questions so you can make an informed buying decision.
Tags : 
erp, enterprise resource planning, erp solution, erp software, erp vendor, erp provider, vendor selection, erp vendor selection, provider selection, midsize, mid-size, mid-sized, mid-market, midmarket, insidecrm, tippit, buyers guide, buying guide
    
InsideCRM.com
Published By: Ecora Software     Published Date: Aug 15, 2007
This whitepaper will teach you the necessary steps any organization must take to comply with the Gramm-Leach-Bliley Act (GLBA). Based on the experienced insight of Alex Bakman, Founder, Chairman & Chief Technology Officer at Ecora Software and Khalid Kark, Senior Research Analyst at Forrester Research, this paper discusses how any organization can reduce compliance costs by automating the process of attaining and maintaining proper financial privacy and consumer data safeguard procedures.
Tags : 
gbla, glba, compliance, financial, privacy, consumer data, data privacy, information management, customer data, consumer privacy, database security, ecora
    
Ecora Software
Published By: Ultimus     Published Date: Aug 16, 2007
In the coming years, we believe that BPM will become the most important technology-driven business initiative for most companies. It leads you toward a focus on using technology to support your business processes, rather than adapting your business processes to support your technologies. It provides strong, sustainable ROI and competitive advantage.
Tags : 
ultimus, bpm, business process management, automation, process discovery, discovery, adaptive discovery, bpa, productivity, bpm 101, intro to bpm, bpm basics, profitability, business process modeling, modeling
    
Ultimus
Published By: Interactive Intelligence     Published Date: May 07, 2012
IT strategies in insurance have traditionally been driven by business objectives and business strategy. But with technology advancements for mobile solutions, social media, analytics, content management (ECM), and process automation, insurers can now take a conjoinment view to evaluate opportunities and drive differentiation. Read more in this paper from Mark Breading of Strategy Meets Action.
Tags : 
interactive, technology, ecm, process automation, social and mobile technology
    
Interactive Intelligence
Published By: Interactive Intelligence     Published Date: Feb 21, 2013
Comfort & Security in the Cloud - Read this white paper to learn how communications as a service delivers superior technology stability and resiliency. Learn about the world of the contact center and the technology today that offers richness and more
Tags : 
comfort and security in the cloud, white papers, learn communications, call centers, caas. communications as service, interactive intelligence
    
Interactive Intelligence
Published By: Interactive Intelligence     Published Date: Feb 21, 2013
The economic pressures of the last three years have forced businesses to focus on cost reduction, often ahead of everything else. At the onset, the belt-tightening in the customer contact organization was viewed as temporary. Read on for more.
Tags : 
home agent series, leveraging technologies, remote agents, interactive intelligence
    
Interactive Intelligence
Published By: Interactive Intelligence     Published Date: Feb 26, 2013
Traditional advice for developing IT strategies in insurance is to use business objectives and business strategy to drive the IT plan. In this white paper, learn about extending contact center capabilities across the insurance enterprise.
Tags : 
contact center capabilities, insurance enterprise, next generation technology, integration, it plan, it strategy, crm & customer care
    
Interactive Intelligence
Published By: Interactive Intelligence     Published Date: Feb 28, 2013
In this white paper series, on TCPA, from ARM.com, Latitude Software, and Interactive Intelligence, we asked collection industry attorneys David Kaminski and Anita Tolani to weight in on different aspects of technology for TCPA compliance.
Tags : 
tcpa compliance, telephone consumer protection act, compliance, interactive intelligence
    
Interactive Intelligence
Published By: Interactive Intelligence     Published Date: Feb 28, 2013
Why industry best call analysis matters -- Case studies highlighting the latest disruptive technology for the collections and telemarketing industries from Interactive Intelligence.
Tags : 
business as usual, how much is it costing you, telemarketing industries, interactive intelligence, case studies
    
Interactive Intelligence
Published By: OneNeck IT Services     Published Date: Aug 24, 2007
ERP Outsourcing for the Mid-Market discusses the nuances of outsourcing and critical success factors for mid-market companies.  Specifically, how companies can effectively select a compatible outsourcing partner who understands both parts of the equation - business and technology - and how to create a governance environment that fosters a successful outsourcing relationship.
Tags : 
oneneck, erp hosting, erp outsourcing, it outsourcing, it hosting, j.d. edwards, oracle, baan, infor, axapta, microsoft dynamics ax, fusion, outsourcing, governance, outsource
    
OneNeck IT Services
Published By: OneNeck IT Services     Published Date: Aug 24, 2007
When he joined SDBC in May of 2004, SunnyD's Chief Information Officer and Global Controller was faced with a classic build-or-buy decision, although the circumstances were less than typical. Despite the company just being carved out from Procter & Gamble with an experienced management team and a well-known brand name, it was missing a crucial operational element — an entire information technology infrastructure.
Tags : 
oneneck, erp hosting, erp outsourcing, it outsourcing, it hosting, microsoft dynamics ax, fusion, outsourcing, governance, outsource, erp, enterprise resource planning
    
OneNeck IT Services
Published By: AT&T     Published Date: Jun 25, 2008
To maximize investments in mobile technology, companies must be able to measure productivity gains from mobile working. Professor Marco Iansiti of the Harvard Business School and Jay Jamrog, Senior Vice President of Research with the Institute for Corporate Productivity, offer advice.
Tags : 
productivity, mobility, mobile technology, mobile technologies, pda, at&t
    
AT&T
Start   Previous    191 192 193 194 195 196 197 198 199 200 201 202 203 204 205    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.