business technology

Results 1251 - 1275 of 1300Sort Results By: Published Date | Title | Company Name
By: Godfrey     Published Date: Oct 24, 2008
B-to-B Strategic Search has been created by Godfrey to provide the customer-centric, content-driven approach needed for successful business-to-business search performance. It uses all available tools to help B-to-B marketers achieve a presence in the search results of users who are looking for their technology or product. It thus includes both search engine optimization (SEO), the practice of modifying your site to improve organic search results, and search engine marketing (SEM), or paid search.
Tags : godfrey, search, b-to-b search, b-to-b strategic search, business-to-business search, search engine optimization, seo, search engine marketing
     Godfrey
By: Network Automation     Published Date: Oct 23, 2008
In good economic times, success simply means keeping pace. After all, the market is demanding your company’s products and services, and your responsibility is simple: keep up with the demand no matter what it takes. Most managers, whether they are business managers or technology managers respond to this situation the same way. They hire more people to shoulder the increased load. Sales managers seek out more sales reps. Foremen bring more assembly workers online. Customer service beefs up the call center. And IT managers hire more administrators to maintain the constant flux of demands from users, applications, systems, and networks.
Tags : network automation, business, process, automation, processes, tough economy, bad economy, workflow
     Network Automation
By: HP - Enterprise     Published Date: Oct 16, 2008
Is open source secure? How much business risk is introduced with it?  Fortify surveyed the open source community for an answer and revealed that open source projects lack the three essential elements of security:  people, process and technology.  Read this research to discover what actions can reduce these risks within your organization.
Tags : fortify, open source, business risk, security, application security, audit, risk, vulnerabilities
     HP - Enterprise
By: ASG Software Solutions     Published Date: Oct 16, 2008
Limited visibility has tethered CIOs' success in both IT and business. However, using federated CMDB technology, CIOs can view the complete IT infrastructure and the entire lifecycle of a business service.
Tags : asg, sla, cmdb, bsm, metadata, metacmdb, lob, automation
     ASG Software Solutions
By: Microsoft Office     Published Date: Oct 09, 2008
Living in a connected world, many of the economic and intellectual barriers that once separated the world’s businesses no longer exist. Free trade, growing labor markets, increased capital, and business and technology standards contribute to a worldwide information-based economy. People and businesses work together in ways never before possible. As local economies adapt to this new world of work, certain worldwide trends emerge. These trends define how your company conducts business and how you work with information and other people.Learn more by downloading this paper.
Tags : microsoft, office, content management, enterprise applications, data management
     Microsoft Office
By: Godfrey     Published Date: Oct 02, 2008
It’s not unusual for business-to-business companies to cut communications budgets when faced with uncertain times like economic downturns, mergers/acquisitions, reorganization, significant competitive threats, technology changes and the like.And yet, it is precisely these situations in which communications that support the brand are most helpful. If there’s ever a time when you need the strength, continuity, and support of a healthy brand, it’s when there’s uncertainty.
Tags : b-to-b branding, business-to-business branding, b-to-b branding in web 2.0, b-to-b interactive media, brand guardians, brand ambassadors, media proliferation, brand fragmentation
     Godfrey
By: CA WA 2     Published Date: Oct 01, 2008
Virtualization and clustering can bring many benefits to your business—better IT asset utilization, improved business continuity and improved operational efficiency. At the same time, virtualization can create a new level of complexity for IT. This white paper describes some of the technical challenges inherent in managing these complex environments and recommends strategies for successful deployment that will maximize the value of virtualization technology in your organization.
Tags : virtual, virtual machine, virtual storage, virtual server, virtualization, ca wa, ca wa 2
     CA WA 2
By: MessageLabs     Published Date: Sep 25, 2008
In the underground digital economy, thousands of criminals conduct business in excess of $100 billion. In this whitepaper you’ll learn more about this highly specialized marketplace, and how it generates powerful tools to steal victims’ identities. You’ll also see why MessageLabs unique proprietary technology helps to disrupt this activity.
Tags : messagelabs, malware, trojans, spyware, viruses, dot.com, fraud, botnet
     MessageLabs
By: SAS     Published Date: Sep 25, 2008
This white paper provides a blueprint for action for senior marketers and decision makers across the enterprise. It provides straightforward advice on how to build a more durable and profitable customer base by building a more competitive business model, enabling customer-centric business strategies in a product-centric organization, turning expanding volumes of customer data into actionable insight for smarter decision making, and providing a roadmap for integrating technology to achieve competitive advantage.
Tags : competitive advantage, customer data, data collection, business intelligence, customer intelligence, sas
     SAS
By: IBM     Published Date: Sep 23, 2008
See why IBM BladeCenter S chassis is the right choice for independent businesses that need a powerful, yet simple IT. The white papers inside this informative eKit will show you how this system is easy to deploy, easy to use, and easy to manage; and how its modular technology helps avoid a cable mess in your office space.
Tags : ibm, ibm mmdg, bladecenter, small office, soho, ekit, networking
     IBM
By: 123Together     Published Date: Sep 19, 2008
Today's economy is especially hard on small businesses. How does your small business keep revenue coming in when your customers are spending less? How do you attract new customers in a cost efficient manner? How do you protect your businesses' valuable information assets without making a huge technology investment?
Tags : 123together, it strategies, contact management, email, economy, stability, collaboration, green it
     123Together
By: Quocirca     Published Date: Sep 18, 2008
Even when facing challenging economic times, businesses still need to communicate and rely on technology to connect with customers, partners, suppliers and their own employees. Cutting back on communications spending will have a negative effect in a long downturn.  It will leave any business that does so with fewer options when conditions improve and at a disadvantage compared to competitors that continue to invest.  However, there are 10 steps that can be taken to grow the value and use of communications, while controlling costs.
Tags : telecom, telecoms, quocirca, networking
     Quocirca
By: CA ITAM     Published Date: Sep 09, 2008
Robin Bloor addresses the business value to be derived by evaluating key client management processes such as asset management, service management, change management, security and integration/automation against four maturity levels. Read this white paper to learn how to align your people, processes and technology to elevate the maturity of your client management.
Tags : 
     CA ITAM
By: HP Service Management     Published Date: Sep 03, 2008
In this first chapter of "The Shortcut Guide to IT Service Management and Automation," you will be led through a step by step analysis of your company's IT and business relationships, providing you with a basis for a strategic plan to turn service lifecycle management into a valuable business asset. Author and compliance expert Rebecca Herold demonstrates how technology acts as a strategic differentiator by enabling business growth, driving operational efficiencies to lower maintenance costs, optimizing outcomes, and reducing IT risks.
Tags : itil, itil v3, bsm, bsa, dca, itsm, it service management, operations
     HP Service Management
By: IBM     Published Date: Aug 21, 2008
Today’s operations teams are faced with more pressure than ever to ensure high service availability and performance. They must keep pace with the growing array of service demands, soaring costs, the rapid evolution of technology and an increasingly competitive marketplace. However, many organizations suffer from an obscured view into key business services and supporting technology, because they lack the closed-loop, cross-domain management that’s needed.
Tags : ibm, ibm mi, ibm grm, service management, desktop management, it management
     IBM
By: IBM     Published Date: Aug 21, 2008
For a growing business, it’s increasingly difficult to integrate technological solutions and services to improve service management. So various frameworks have been created to help today’s IT professionals optimize their use of technology in managing IT processes. The third version of the Information Technology Infrastructure Library (ITIL) provides the latest set of process best practices for any service management improvement effort.
Tags : ibm, ibm mi, ibm grm, itil, service management, it management
     IBM
By: CA WA     Published Date: Aug 15, 2008
Infrastructure Performance Management (IPM) applies to operations quality. Implemented well, IPM frees you from constant firefighting and can transform your role from tactical first responder to strategic business enabler. Applying good IPM technology and processes can deliver a number of benefits to your career as well as to your organization. This report introduces IPM, offers tips for successful IPM implementation, and explores how IPM can benefit your enterprise as well as your career.
Tags : ca wa, computer associates, infrastructure, itil, infrastructure management, performance management
     CA WA
By: Managed Systems, Inc.     Published Date: Aug 14, 2008
No matter the size of the business, technology plays a critical role in its financial success. At the most basic level, companies have to deal with desktop and laptop computers for all their employees, e-mail, access to the Internet, Blackberries, and other kinds of on-site and remote devices. Add networking issues like viruses, spam and bandwidth utilization, and suddenly, this effort becomes a major challenge to anyone operating a small or mid-sized business (SMBs) with limited resources and a limited budget.
Tags : network management, smb, small business, medium business, mid-sized business, smb networks, managed systems, it services
     Managed Systems, Inc.
By: HP     Published Date: Jul 25, 2008
Countless companies want to take advantage of Microsoft SQL Server 2005 and its notable business and technology benefits. However, with the prevalence of large, complex and sprawling information technology (IT) infrastructures, many organizations are wary of - or avoid altogether - the time, expense and effort required for a mass overhaul of their database environment.
Tags : sql, sql server, migration, infrastructure, server migration, polyserve, data management
     HP
By: Quocirca     Published Date: Jul 03, 2008
Businesses of all sizes adopt technology to make them more productive, cost effective or flexible and help them compete. Over the years the adoption of tools such as mobile phones, wireless laptops, the internet and email have all been driven by such expectations. Small and mid-sized businesses (SMBs) are often at the forefront as these technologies can give them a lead on their larger competitors. What starts as a useful extra tool or 'competitive edge' soon becomes the accepted norm and a search for improved quality and utility then ensues.
Tags : convergence, mobile, wireless, communications, unified communications, quocirca
     Quocirca
By: Quocirca     Published Date: Jul 03, 2008
Technology is no longer a nice to have, or a tool for the few. With many organizations now being completely dependent on their IT systems, the need for the IT department to be seen to be responding to the organization's requirements is of critical importance.  Business Service Management, or BSM, can help in providing underpinnings to the IT function. This paper looks at how the changing processes and market conditions within an organization can be augmented through the use of a Business Service Management (BSM) approach, creating a flexible and responsive technology infrastructure aimed at supporting a rapidly changing commercial landscape and enabling greater competitiveness in the markets.
Tags : quocirca, business service management, bsm, service management, business management
     Quocirca
By: Microsoft Dynamics     Published Date: Jul 03, 2008
Get this webcast to discover a customer relationship management (CRM) solution that works the way you do, the way your business does, and the way technology should. We explore how Microsoft Dynamics CRM delivers a familiar Microsoft Office Outlook interface to create a productive work environment. We also illustrate the powerful workflow and integrated reporting capabilities in Microsoft CRM that help you drive business processes and results.
Tags : bpm, crm, microsoft crm, microsoft dynamics, microsoft
     Microsoft Dynamics
By: Microsoft Dynamics     Published Date: Jul 03, 2008
The business landscape is evolving; the traditional way people work together-in the office or in the field-looks very different today than it did just a couple of years ago. Download this webcast to learn how Microsoft Dynamics CRM empowers you to take advantage of your existing technology investments to extend the reach of your business and enable your mobile workforce to drive better business results.
Tags : microsoft, microsoft dynamics, crm, software, crm software, contact management, business management
     Microsoft Dynamics
By: AT&T     Published Date: Jun 25, 2008
Quantum Cryptography is an emerging technology that may offer new forms of security protection. Relying on the laws of quantum mechanics, transmission is carried by a single particle that can only be measured one time, making encryption and decryption difficult to compromise. Businesses are evaluating architectural solutions using Quantum Cryptography to understand its potential benefits. Future implementations of the technology may soon make it more available for enterprise business.
Tags : att, at&t, encryption, decryption, quantum, quantum cryptography, cryptography, qkd
     AT&T
By: Inductive Automation     Published Date: Jun 23, 2008
In this case study, Bronco Wine Company, Ceres, Calif., (the producer of “Two-buck Chuck”) uses FactoryPMI for enterprise-wide process monitoring, control and troubleshooting. It was a business decision to use this technology, and is paying off handsomely for the Franzia family-owned business.
Tags : bronco, manufacturing, plant management, winery, inductive automation, plm
     Inductive Automation
Start   Previous    38 39 40 41 42 43 44 45 46 47 48 49 50 51 52    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com