bsp

Results 51 - 75 of 412Sort Results By: Published Date | Title | Company Name
Published By: Adaptive Growth     Published Date: Mar 12, 2008
ERP system acquisition projects are rarely deemed to fail.  All the well-advertised failures come later, during implementation and afterward.  Nevertheless, the seeds of these failures are invariably planted in the earliest stages of ERP acquisition planning.
Tags : 
erp, adaptive growth, project management, enterprise applications, enterprise resource planning, adaptivegrowth
    
Adaptive Growth
Published By: Adaptive Growth     Published Date: Mar 12, 2008
ERP implementations fail – when they do – because implementation projects allow a few well-known risks to go unmanaged. These risks go unmanaged because the control of results slips from buyer to seller.  It doesn’t have to work that way.
Tags : 
erp, adaptive growth, project management, enterprise applications, enterprise resource planning, adaptivegrowth
    
Adaptive Growth
Published By: Adaptive Growth     Published Date: Mar 12, 2008
It is a truism that in any complex activity, the critical, defining decisions should be made as early in the process as possible.  In ERP implementation projects this principle is routinely undermined by the nearly universal practice of separating acquisition and implementation activities into separate projects, performed by separate teams operating under separate control.
Tags : 
erp, adaptive growth, project management, enterprise applications, enterprise resource planning, adaptivegrowth
    
Adaptive Growth
Published By: Adaptive Growth     Published Date: May 14, 2008
Projects to implement ERP tend to be difficult, expensive and drawn-out. They are often full of painful surprises and overrun budgets and schedules that were extravagant in the first place. They fail entirely in an alarming number of cases.  Why this should be so is not immediately apparent. If we list, at a fairly high level, the tasks required to implement an ERP system in a company that’s already familiar with ERP practices, what we see is a significant but not daunting amount of work.
Tags : 
erp, project management, adaptive growth, enterprise applications
    
Adaptive Growth
Published By: Dell     Published Date: Oct 21, 2008
Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4   This business-value discussion tool is designed to help quantify costs and benefits with Windows Vista.
Tags : 
dell, deployment, calculator, knowledge management, enterprise applications, data management
    
Dell
Published By: Infoblox     Published Date: Feb 03, 2009
Today’s networks support more applications, traffic, users, and devices than ever before – a trend that only increases on a daily basis. At the heart of all IP networks live core network services, like DNS, DHCP, and  RADIUS that are crucial for keeping traffic flowing, users connected, and applications available.
Tags : 
infoblox, core network services, dhcp, ip networks, radius, ip address assignment, ipam, ip telephony, networking
    
Infoblox
Published By: F5 Networks Inc     Published Date: Jan 22, 2009
Hundreds of organizations around the world use Microsoft® SharePoint® with  over 80 million implementations, allowing them to develop intelligent portals that seamlessly connect users, teams, and knowledge. With the release of Microsoft Offi ce SharePoint Server 2007, F5 has specifi cally developed and tested a comprehensive Application Ready infrastructure that enhances the security, availability and performance of SharePoint deployments, whether it’s over the LAN or across a global WAN.
Tags : 
application ready network guide, microsoft office sharepoint 2007, sharepoint deployments. wan, tcp, roi, sharepoint, portal, microsoft, big-ip, application, networking, it management
    
F5 Networks Inc
Published By: HP Data Center     Published Date: Mar 25, 2009
The need for reliable data centers is growing, especially in the small to medium sized business market.  So too is the price of data centers -- both in terms of initial cost and Total Cost of Ownership (TCO) -- as equipment, service and utility costs continue to escalate.  How is a data center manager going to support an IT-based business strategy that hinges on high availability, at a reasonable business cost?  Insource? Outsource? Build? Lease? This presentation looks at the factors driving data centers costs, their impact, how they can be controlled, and how to justify the data center you need.
Tags : 
data center costs, hp data center, tco, total cost of ownership, price of data centers, it spending, it architecture, insource, outsource, build, lease, networking, it management
    
HP Data Center
Published By: HP Data Center     Published Date: Mar 25, 2009
When considering server virtualization, planning and design are critical.  How do you optimize your environment through virtualization?  How do you keep your server sprawl from becoming virtual server sprawl?  How will a virtualized environment help your business?  Will your existing data center meet current, and future, business requirements? Answer your Questions today!
Tags : 
hp data center, virtualization, server planning, server design, server sprawl, tco, roi, server consolidation, decentralized environments, centralized environments, it assets, data center design, eos
    
HP Data Center
Published By: VMware     Published Date: Feb 26, 2009
In this flash demo, see how CA ARCserve Backup r12 can help your business protect your most vital information — business data. Take this opportunity to quickly view a few powerful features and benefits of the backup virtualization technology available in CA ARCserve Backup. 
Tags : 
vmware, virtualization support, ca arcserve, ca xosoft solutions, business data, backup virtualization, security, data management
    
VMware
Published By: Computhink     Published Date: Dec 10, 2007
In the arena of corporate governance and compliance, the Sarbanes-Oxley Act (SOX) has commanded considerable attention; in the healthcare industry, it's  HIPAA; similar regulations target the financial services and energy sectors. Organizations can use technology to meet compliance demands in a cost-effective way.
Tags : 
compliance, computhink, hipaa, sox, sarbox, sarbanes oxley, content management
    
Computhink
Published By: Everest Software     Published Date: Jan 11, 2008
This white paper examines how small and medium sized business can grow their businesses by streamlining their processes, creating employee empowerment, reducing IT costs, increasing productivity and improving their customers experience by implementing an integrated, real-time software solution. 
Tags : 
business management, small business, mid-sized business, smb, smbs, soho, productivity, erp, software integration, integration, business integration, cost control, growth, everest, everest software
    
Everest Software
Published By: Panda Security     Published Date: Jan 16, 2008
A new white paper from Panda Security discusses the new breed of silent online threats that can bypass traditional antivirus programs and penetrate even the most highly 'protected' networks.  Additionally, the sheer volume of malware has overwhelmed the antivirus industry as a whole. Collective Intelligence is a new global security model specifically designed to combat the next evolution of malicious code.
Tags : 
malware, virus, anti-virus, spyware, anti-spyware, anti-malware, bot, botnet, trojan, dos, denial of service, hacker, phish, phishing, panda, panda security, security
    
Panda Security
Published By: Panda Security     Published Date: Feb 27, 2008
E-mail is the primary communication tool upon which every business and corporation depends.  This communication source is also the battleground where cybercriminals use sophisticated email infiltration-techniques to propagate malware and attack corporate networks.
Tags : 
malware, hacker, hacking, hackers, email security, e-mail security, panda, panda security, denial of service, dos, phishing, spyware
    
Panda Security
Published By: Panda Security     Published Date: Feb 27, 2008
With thousands of new malware threats being created and unleashed into the Internet daily, the End Point security model is failing.  Without additional layers of security, infiltration may be virtually impossible to stop.  This important white paper explores alternatives that eliminate dangerous traffic prior to reaching the network or server.
Tags : 
email security, e-mail security, security appliance, desktop, endpoint security, end point security, anti-spam, spam, anti spam, panda, panda security
    
Panda Security
Published By: Accelerance     Published Date: Feb 01, 2008
Despite the fact that Software Executives are pressured to do more with less and cut costs to the bone, many see offshoring as a "threat."  They know they need to go offshore - but where? And with who? What they want is an easier, better, more effective and safer way to use offshore programming resources.
Tags : 
it management, software development, development, developer, programmer, programming, developing, offshoring, offshore, outsource, outsourcing, india, accelerance
    
Accelerance
Published By: Oce Business Services     Published Date: Mar 24, 2008
A new survey of legal professionals reveals that 90% of in-house counsel believes their companies are largely unprepared for legal discovery.  Get full survey results and best-practice recommendations to uncover where potential gaps exist. Identify the biggest opportunities to proactively prepare for discovery requests and improve outcomes by utilizing an outsourcing strategy.
Tags : 
ediscovery, law, oce
    
Oce Business Services
Published By: SECNAP Network Security Corporation     Published Date: Oct 07, 2008
Politics, Religion and Economics exert enormous influence on decision-making and the integrity of IT programs—and often result in sub-par decisions that open the door to malicious intrusion or attack.  Michael Scheidell and his talented technical team know how difficult it can be to create positive change in an organization, even when obvious vulnerabilities exist.  When it comes to navigating the executive suite and undocumented layers of the OSI model, the staff at SECNAP® Network Security have the experience to assist IT management in developing effective strategies to successfully drive security improvements.   Download This Paper Now…
Tags : 
secnap, network security, data security, compliance, osi, malware, antispam, anti-spam, cybercrime, security
    
SECNAP Network Security Corporation
Published By: HP SAS     Published Date: Sep 24, 2008
Designed for CIOs, IT managers, data center managers and grid computing architects seeking to improve performance, SAS Grid Computing on the HP BladeSystem. C-Class helps accelerate growth and mitigate risks with a simplified, consolidated infrastructure that’s agile enough to efficiently handle change. SAS Grid Manager on HP BladeSystem can lower costs through automation, virtualization and improved IT efficiency.   Download  HP's "Quick Sizing Guide for SAS Grid running on HP BladeSystem and EVA Storage" to learn more about the equipment needs to deploy SAS Grid Manager on HP BladeSystem.
Tags : 
hewlett packard, bladesystems, grid manager, grid computing, polyserve matrix, eva storage, data management
    
HP SAS
Published By: Genesys     Published Date: Aug 13, 2009
Your company likely has a contact center that efficiently and effectively handles customer interactions via telephone calls as well as through channels such as text chat, SMS, and e-mail. Yet are you aware that the contact center handles just a fraction of the activities that impact the customer experience throughout your business?
Tags : 
genesys, conferencing, text chat, sms, e-mail, email, customer experience, contact center, voip, service delivery optimization, lob, line-of-business, sla, service level agreement, backlog, websphere, backlog, workload distribution, iwd, customer interaction management
    
Genesys
Published By: SafeData, LLC     Published Date: May 05, 2009
Surprisingly, 50% of small to medium sized businesses that have invested in a data availability and recovery solution may still be vulnerable to downtime. Download this free white paper to learn what you can do to avoid the same risk.  You'll also learn what your options are for reliable IBM iSeries data protection and recovery that make sense for your size business.
Tags : 
virtualization, safedata, safe, data, ibm iseries recovery, rto, recovery time objectives, economy, hot site, low cost, high-availability deployment, electronic vaulting, recovery, backup, data recovery, downtime, business data, smbs, small and midsized businesses, recoverability
    
SafeData, LLC
Published By: Hubspot     Published Date: Apr 23, 2013
What appears to be the fastest-growing social media site ever has become a huge traffic referral for all businesses. An increasing number of companies are leveraging the platform to reach a new audience, increase visits to their websites, and generate leads or retail sales. And guess what? It's working.
Tags : 
pinterest, social media, hubspot, driving traffic, inbound marketing, social media marketing
    
Hubspot
Published By: Hubspot     Published Date: Apr 23, 2013
For any company, it's homepage is its virtual front door. If a new visitor doesn't like what they see, their knee-jerk reaction is to hit the "back" button. Don't let that happen. Flip through these 54 examples of brilliant homepage design to inspire your own homepage design strategy.
Tags : 
web design, hubspot, homepage design, design best practices, branding, web experiences
    
Hubspot
Published By: Hubspot     Published Date: Apr 23, 2013
Effective marketing starts with understanding the buyer, but also understanding your competitors. It's important to see where your competitors are succeeding, and where they're failing. Download this guide to help you stay up to speed with what your competitors are doing while staying on track for your own business strategy.
Tags : 
marketing software, competitive intelligence, competitive marketing, marketing audit, marketing strategy, monitoring and benchmarking, tracking competitors, hubspot
    
Hubspot
Published By: Hubspot     Published Date: Apr 23, 2013
Whether you're just getting started with internet marketing or you want to brush up on the basics, this ebook can serve as your essential guide to setting up and implementing a successful internet marketing strategy, step by step.
Tags : 
online marketing, keyword strategy, website optimization, seo, search engine optimization, blogging, lead generation, social media, increase web traffic
    
Hubspot
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.