solutions

Results 4651 - 4675 of 5228Sort Results By: Published Date | Title | Company Name
Published By: Microsoft Dynamics     Published Date: Nov 06, 2008
Microsoft® recently researched the experience of nearly 200 companies with more than 250 PCs that have deployed one or more of the applications in the Microsoft Dynamics line of business management solutions. Among these companies, whose attitudes to technology tended to be more forward looking than usual, the most common issue was the need for modern systems. The pain points most often cited were manual processes that cause mistakes and inefficiencies, integration problems with other systems (both internal and external), lack of operational insight, and legacy software support and customization issues. This white paper explores the experience of these companies in more detail to help you understand how you can use Microsoft Dynamics to modernize your business processes and drive business success.
Tags : 
microsoft dynamics, crm, compliance, enterprise applications
    
Microsoft Dynamics
Published By: Microsoft Dynamics     Published Date: Nov 06, 2008
Microsoft® recently researched the experience of nearly 200 companies with more than 250 PCs that have deployed one or more of the applications in the Microsoft Dynamics line of business management solutions. Among these companies, whose attitudes to technology tended to be more forward looking than usual, a common issue was growth via mergers and acquisitions (M&A). The pain points most often cited were non-integrated, overlapping systems, an inability to scale to support growth, the need for more functionality, and a lack of operational insight. This white paper explores the experience of these companies in more detail to help you understand how you can use Microsoft Dynamics to support your company’s growth via M&A and drive business success.
Tags : 
microsoft dynamics, crm, compliance, global functionality, enterprise applications
    
Microsoft Dynamics
Published By: Decru     Published Date: Apr 23, 2007
Company data is vulnerable to threats from - insiders, unauthorized access to data, data backup, off-site mirroring - just to name a few. Encrypting data at rest, on tape or disk, significantly mitigates these threats. This document provides guidance into some of the factors a company should consider when evaluating storage security technology and solutions.
Tags : 
storage, security, encryption, key management, protecting your data, security controls, networked storage environments, audit & logging, role based administration, secure access controls, enterprise security, data security, network security, storage management, authentication, standards compliance, security & privacy, security appliances, decru
    
Decru
Published By: eFax     Published Date: May 15, 2007
Fax servers promise easier administration and cheaper faxing but most deployments fail to meet their goals because of unexpected, ongoing costs and unpredictable capacity needs. This paper offers information on why outsourced fax services eliminate the time, effort and cost issues associated with fax servers, but retain all of the same functionality.
Tags : 
fax, faxing, ip faxing, fax server, fax servers, ip networking, ip networks, converged communications, integrated communications, communications convergence, convergence, communication, communications, protus, protus ip solutions
    
eFax
Published By: eFax     Published Date: May 15, 2007
Organization seeking to reduce expense while improve the reliability and capacity of their business faxing are adopting Internet fax service at a record rate. Find out how Internet-based fax solutions enable you to send and receive faxes using your existing e-mail infrastructure and the Web.
Tags : 
fax, faxing, ip faxing, ip telephony, fax over ip, efax, infrastructure, ip networking, ip networks, integrated communications, communications integration, communication, communications, convergence, protus, protus ip solutions
    
eFax
Published By: HP     Published Date: May 10, 2011
This paper outlines the potential savings on capital and operational expenditures with a converged infrastructure and explains the benefits of the leading integration solutions.
Tags : 
hp bladesystem matrix, converged infrastructure, tco, capex savings, opex savings, hp virtual connect, flex-10, data center design and management
    
HP
Published By: Ingate Systems     Published Date: Jun 21, 2007
A complete guide to SIP trunks, this whitepaper provides a comprehensive overview on the basics of SIP trunking, including a discussion of infrastructure needs and deployment issues and solutions. In-depth sections dedicated to interoperability, security as well as quality and reliability issues are also included.
Tags : 
pbx, phone, phone system, phone systems, best practices, sip, ip telephony, voip, voice over ip, infrastructure, ingate, ingate systems, communication, communications
    
Ingate Systems
Published By: GFI     Published Date: Jun 13, 2008
Spam generates an enormous amount of traffic that is both time-consuming to handle and resource intensive. Apart from that, a large number of organizations have been victims of NDR spam that has an effect similar to a Distributed Denial of Service on the email system. In this paper we provide a technical explanation of NDR Spam and recommend solutions that can prevent or limit exposure to this kind of unsolicited email.
Tags : 
email security, ddos, denial of service, distributed denial of service, ndr, spam, non-delivery report, non delivery report, anti spam, anti-spam, gfi, security
    
GFI
Published By: Torry Harris Business Solutions     Published Date: Jul 05, 2007
The information overload on SOA is largely on describing its merits, its principles and the vast variety of products intended to address its needs. This document is written to identify the factors to be considered, and articulate the principles and questions to be asked that will drive the decisions within each enterprise towards creating a road map for implementation.
Tags : 
service oriented, service-oriented, soa, network architecture, soa roi, change management, it spending, governance, bpm, eda, bam, infrastructure, service management, thbs, torry harris
    
Torry Harris Business Solutions
Published By: Torry Harris Business Solutions     Published Date: Jul 05, 2007
This whitepaper is written as a guide to an alternative mechanism for project implementation for business owners holding responsibility to deliver IT solutions in the SOA space. It could also be of interest to those who would like to know more about how the phenomenon of offshore/onsite coordination, that emerged in the nineties, can be effectively applied towards realizing the promise of SOA.
Tags : 
service oriented, service-oriented, governance, service management, outsource, outsourcing, offshoring, offshore, architecture, software architecture, it spending, xml, torry harris, thbs
    
Torry Harris Business Solutions
Published By: Torry Harris Business Solutions     Published Date: Jul 18, 2007
Service-Oriented Architecture (SOA) promises significant benefits to today's organizations. Successfully delivering SOA benefits, especially Business Agility and Component Reuse, will be dependant on the Test Approach that your organization adopts to implement your SOA.
Tags : 
soa, service oriented architecture, middleware, service level, performance testing, business agility, quality of service, qos, quality assurance, governance testing, testing, soa governance, torry harris, thbs
    
Torry Harris Business Solutions
Published By: Gold Lasso     Published Date: Jul 13, 2007
Since the introduction of e-mail as a viable marketing and communications vehicle, the focus has shifted from a "one size fits all" model to content that is relevant and specific to the intended recipient. This paper reviews general concepts behind personalization, further investigates its advantages, discusses the challenges to personalizing campaigns and provides solutions to overcome the challenges.
Tags : 
personalization, newsletter design, content personalization, return on investment, email marketing, ebusiness, ecommerce, e-commerce, customer relationship, crm, gold lasso
    
Gold Lasso
Published By: Gold Lasso     Published Date: Oct 02, 2007
Many email marketers look for the lowest price point and equate that to the best value, but the lowest cost may not be the best value. Understanding how Email Service Providers determine price and what features you're paying for is an important part of being a successful email marketer.
Tags : 
marketing, email marketing, vendors, esp, esps, marketing solutions, vendor selection, gold lasso
    
Gold Lasso
Published By: Concur     Published Date: Jan 07, 2013
Download this whitepaper and you will get an overview of how automated solutions simplify the process of logging and tracking T&E, virtually eliminating mistakes, and ensuring compliance.
Tags : 
expenses, automated solutions, eliminating mistakes, compliance, management, travel and entertainment
    
Concur
Published By: Perimeter     Published Date: Jul 17, 2007
What is the difference between a risk, a threat, a vulnerability and an exploit? Which product or solution can be employed to address my institution’s information security and compliance needs? This paper provides some clarity on the first question, and in the process, it should help to offer an answer to the second question, one of aligning concerns with solutions with vulnerability management.
Tags : 
risk management, vulnerability assessment, ips, intrusion prevention, ids, intrusion detection, firewall, exploit, infrastructure, patch management, email defense, email security, perimeter, perimeter esecurity, security
    
Perimeter
Published By: InsideCRM.com     Published Date: Nov 05, 2007
Shopping for a contact-center solution can be confusing and frustrating, so let us do the leg work for you! This easy-to-use guide compares the major vendors offering contact-center solutions today, including Genesys, Oracle, Verizon and many others.
Tags : 
software, call center, call center software, contact center, contact center software, genesis, oracle, verizon, contactual, interactive intelligence, crm, customer relationship management, insidecrm, inside crm
    
InsideCRM.com
Published By: InsideCRM.com     Published Date: Dec 28, 2007
Until recently, ERP solutions were considered out of the question for all but the largest companies, due to the technology's complexity and large price tags. However, these days, midmarket companies have more choices than ever when it comes to ERP solutions, as competition between vendors has heated up. This Buyer's Guide can help you answer the big (and small) questions so you can make an informed buying decision.
Tags : 
erp, enterprise resource planning, erp solution, erp software, erp vendor, erp provider, vendor selection, erp vendor selection, provider selection, midsize, mid-size, mid-sized, mid-market, midmarket, insidecrm, tippit, buyers guide, buying guide, enterprise applications
    
InsideCRM.com
Published By: InsideCRM.com     Published Date: Dec 28, 2007
So your midmarket company has done its research and has settled on what you feel is the perfect ERP (Enterprise Resource Planning) solution? Not so fast. Before you sign on the dotted line, consider these 12 key points to ensure you're making the best possible decision.
Tags : 
erp, enterprise resource planning, erp solution, erp software, erp vendor, erp provider, vendor selection, erp vendor selection, provider selection, midsize, mid-size, mid-sized, mid-market, midmarket, insidecrm, tippit, checklist, enterprise applications
    
InsideCRM.com
Published By: Ultimus     Published Date: Aug 16, 2007
With the largest global installed base of pure-play BPM solutions, the Ultimus BPM Suite exemplifies the role of managing OSAP processes in the business process ecosystem. Customers worldwide use it to extend, maximize and complement their investments in SAP or other enterprise applications.
Tags : 
ultimus, bpm, business process management, automation, bpa, productivity, bpm basics, profitability, business process modeling, modeling, workflow, enterprise, enterprise applications, outside sap
    
Ultimus
Published By: Interactive Intelligence     Published Date: May 07, 2012
IT strategies in insurance have traditionally been driven by business objectives and business strategy. But with technology advancements for mobile solutions, social media, analytics, content management (ECM), and process automation, insurers can now take a conjoinment view to evaluate opportunities and drive differentiation. Read more in this paper from Mark Breading of Strategy Meets Action.
Tags : 
interactive, technology, ecm, process automation, social and mobile technology, business technology
    
Interactive Intelligence
Published By: Interactive Intelligence     Published Date: Feb 21, 2013
This two part paper is a review of a remote agent case study. This first part looks at the issues faced and the benefits received from the people side of the project: How the agents and management of a remote solution can positively affect customers.
Tags : 
case study review, customer service metrics, interactive intelligence, remote solutions, knowledge management, enterprise applications, data management, business technology
    
Interactive Intelligence
Published By: Interactive Intelligence     Published Date: Sep 11, 2013
Cloud communications provide myriad benefits for organizations, including speed of deployment, the ability to future-proof infrastructure and applications, business continuity, predictable monthly payments, and many more. Most organizations turn to the cloud in order to cost-effectively access enhanced capabilities while eliminating the complexity of deploying and managing premises-based solutions. Cloud-based contact center solutions offer additional benefits, notably the ease of adding or removing agents as needed based on fluctuating or seasonal traffic, ease of deploying remote or at-home agents, and ease of adding multi-channel services.
Tags : 
interactive intelligence, contact centers, organizations, deployment, cloud, solutions, seasonal traffic, infrastructure
    
Interactive Intelligence
Published By: AT&T     Published Date: Jun 25, 2008
Quantum Cryptography is an emerging technology that may offer new forms of security protection. Relying on the laws of quantum mechanics, transmission is carried by a single particle that can only be measured one time, making encryption and decryption difficult to compromise. Businesses are evaluating architectural solutions using Quantum Cryptography to understand its potential benefits. Future implementations of the technology may soon make it more available for enterprise business.
Tags : 
att, at&t, encryption, decryption, quantum, quantum cryptography, cryptography, qkd, quantum key distribution, security
    
AT&T
Published By: Asentria Corporation     Published Date: Sep 04, 2007
One of the greatest challenges to any advanced wireless operation is the maintenance of continuous and economical service. Today’s networks have evolved into business-critical services that organizations rely upon every day. However, unplanned remote site downtime due to equipment and power failure, and adverse environmental conditions can severely impair network service.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures, fault management, network management, remote site monitoring, remote site alarms, environmental monitoring, network alarm monitoring, network alarm management, remote telemetry units, alarm management system, network management systems, network monitoring, protocol mediation
    
Asentria Corporation
Published By: Asentria Corporation     Published Date: Sep 04, 2007
Today’s service providers face more pressure than ever to keep remote equipment up and running as customers continue to demand higher levels of reliable service while keeping costs competitive. Thus, there is a growing need for remote site management solutions that can help service providers monitor, access and control telecom equipment located at customer sites.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures, fault management, network management, remote site monitoring, remote site alarms, environmental monitoring, network alarm monitoring, network alarm management, remote telemetry units, alarm management system, network management systems, network monitoring, protocol mediation
    
Asentria Corporation
Start   Previous    180 181 182 183 184 185 186 187 188 189 190 191 192 193 194    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com