E-Commerce

We provide the tips and best practices for maintaining the E-Commerce platform of your choice.

  • White Papers // Mar 2011

    Empower your call center with IP-based communications

    The agents in your contact center need easy-to-use tools to provide them all of the customer and product information possible to help maximize the value of each contact. If your e-mail, web and fax systems aren't integrated, agents may not have the latest information and that can lead to customer...

    Provided By IBM

  • White Papers // Mar 2011

    Network and communications solutions for virtualization and consolidation

    Many organizations are turning to virtualization and consolidation of server and storage resources to help improve efficiency and performance in the data center. These solutions can help you support more cost-effective operations, can speed services deployment and promote a tighter alignment between business and IT. But to support this dynamic...

    Provided By IBM

  • White Papers // Mar 2011

    Site and facilities services from IBM

    Ideally, data center deployment should optimize availability, scalability, recoverability and agility?while also reducing risks. Site and facilities services from IBM provides a cost-effective and time-efficient approach. Our portfolio of services is designed to assist you through each stage of the development and renovation process, from strategy and planning through the...

    Provided By IBM

  • Downloads // Mar 2011

    Efficient metrics: Be careful what you measure

    Accurate, relevant metrics are essential for determining how your department and organization are performing -- but are you measuring the right things in the right way? Alan Norton explains why metrics can present bad or ambiguous information and what you can do to minimize this problem.

    Provided By Alan Norton

  • White Papers // Mar 2011

    Executive Brief: How can Identity and Access Management Help Improve My Compliance Programs?

    With the right technology in place, companies can provide evidence that their controls are effective, and compliance audits may thus be a less painful and expensive process. Organizations hoping to achieve this can begin by: Understanding the compliance lifestyle Implementing Content-aware IAM solution Leveraging compliance to improve business efficiency...

    Provided By CA

  • White Papers // Mar 2011

    CA Technology Brief: Content-aware IAM

    There are several key drivers for most IT organizations today. First, they must reduce risk, and maintain privacy of corporate and customer information. Second, they must comply with regulatory and industry mandates. Third, they must improve operational efficiencies. And, finally, they must enable the business for growth. A key...

    Provided By CA

  • White Papers // Mar 2011

    CA Solution Brief: Content Aware Identity and Access Management

    CA Content-Aware Identity and Access Management (IAM) solutions enable you to control user identities, access, and information use. You can achieve more effective compliance, reduce IT risk, and expand your customer and partner relationships to help grow your business. Managing the identities and access rights of those inside and...

    Provided By CA

  • White Papers // Mar 2011

    Success Story: ING Australia IAM

    Business: ING is one of Australia's leading providers of fund management, life insurance and superannuation accounts. It has more than $45 billion in assets under management. Its services are provided via a network of financial advisers and institutions. Challenge: ING is increasingly using the Internet to deliver customer services....

    Provided By CA

  • White Papers // Mar 2011

    Computer World Executive Report: The Best of Both Worlds: The Hybrid Cloud

    To handle the demands of modern business, CIOs must manage their internal data centers more effectively and learn how to leverage public cloud resources. The solution: a hybrid cloud strategy facilitated by a dynamic data center. Who knew that a video marketing campaign featuring a donkey, a baby and a...

    Provided By CA

  • White Papers // Mar 2011

    Forrester Paper: The Total Economic Impact of CA Identity Manager

    In January 2010, CA commissioned Forrester Consulting to examine the total economic impact and potential return on investment (ROI) enterprises may realize by deploying CA Identity Manager (CA IM). CA IM is used by organizations to provide automated user provisioning, user self-service for password resets, workflows for submitting and...

    Provided By CA

  • Webcasts // Mar 2011

    Business Answers: Most Effective Marketing & Going Global

    Alfred Edmond, multimedia editor-at-large for Black Enterprise, and Cameron Johnson, a serial entrepreneur and author, answer viewer questions about the most effective forms of marketing and getting funding to take your business global.

    Provided By American Express Company

  • Case Studies // Mar 2011

    CyberShift: Workforce Solutions Firm Anticipates Rapid ROI Using Cloud-Based PC Management

    A leading provider of strategic workforce and expense management solutions, CyberShift is committed to helping its customers - who represent a vast range of industries - enhance their ability to proactively plan, manage, and control employee-related expenses. New Jersey - based CyberShift sought ways to better protect and manage PCs...

    Provided By Microsoft

  • White Papers // Mar 2011

    Oracle Optimized Solution for e-Business Suite

    Whether deploying new application services, modernizing existing business-critical services, or increasing solution availability, selecting and implementing a hardware architecture that will perform optimally and meet service level agreements is a complex feat. There is an almost endless combination of hardware components, and new technologies are continually being introduced. Planning to...

    Provided By Oracle

  • White Papers // Mar 2011

    Converged Hardware Management

    Increasingly complex IT infrastructures require new tools and strategies to streamline operations and reduce the management complexity. While virtualization and cloud-based technologies have helped consolidate the datacenter and improve overall system utilization, many IT professionals are still challenged by the need for multiple tools for managing physical and virtual environments....

    Provided By Oracle

  • White Papers // Mar 2011

    Oracle WebLogic: The World's #1 Application Server

    A definitive prerequisite for cloud computing is a comprehensive, state-of-the-art, and rock solid application infrastructure platform. Add to this vision, the practical mandate for data center consolidation which requires bringing together countless mission-critical and performance-sensitive workloads, and the classic requirements of scalability, availability, and efficiency. With so many, and sometimes...

    Provided By Oracle

  • White Papers // Mar 2011

    Lower Costs with Oracle Database 11g

    Organizations are driving to more closely align their business and IT priorities in an effort to manage more information, improve quality of service and maximize their return on data center investments. Emerging technologies such as cloud computing compound the benefits of database consolidation for OLTP applications and also improve the...

    Provided By Oracle

  • White Papers // Mar 2011

    Why Hyper-V for VDI?

    The business value of a VDI implementation cannot be expressed with a simple deployment cost calculation. The full picture includes ongoing capital and operational costs as well as impacts on other pillars of value, such as operational agility, service quality and risk mitigation. The best hypervisor for VDI is therefore...

    Provided By Microsoft

  • White Papers // Mar 2011

    A Method of Risk Assessment for Multi-Factor Authentication

    User authentication refers to user identification based on something a user knows, something a user has, something a user is or something the user does; it can also take place based on a combination of two or more of such factors. With the increasingly diverse risks in online environments, user...

    Provided By KIPS

  • White Papers // Mar 2011

    Net Neutrality QoS: Win More Subscribers With Smarter QoS in ISP Environment

    Bandwidth management for a service provider is different from a normal businesses requirement because it directly effects profitability and can be a primary service differentiator for marketing and sales purposes. To stay competitive, service providers must be able to support customer satisfaction, cost reductions and cross-sell/up-sell efforts. To do that,...

    Provided By PacketController

  • White Papers // Mar 2011

    The Benefits of an Outsourced IT Infrastructure

    Access to company applications and the critical data stored within them has become the heart and soul of a successful, strategic business. Companies are making tactical decisions to utilize technologies such as cloud computing and virtualization to become competitive in the marketplace by reducing operating costs, improving internal efficiency and...

    Provided By SACA Technologies

  • White Papers // Mar 2011

    Emergency Telecommuting

    This comprehensive emergency telecommuting guide provides critical information and just-in-time solutions for those who find themselves unexpectedly working from a distance.

    Provided By Citrix Online

  • White Papers // Mar 2011

    Economic Information Systems for Small and Medium Businesses and Evaluation of Return

    From manager's viewpoint, the most fundamental requirement in the process of information gathering is simple and quick information obtaining process. That implies technically stated requirement - information system has to be technically capable of providing information in optimal rate, in the fastest and the safest possible manner. Next criterion stems...

    Provided By University of Pannonia

  • White Papers // Mar 2011

    IDC Executive Brief: Improving Small Business Profitability by Optimizing IT Management

    This IDC Executive Brief gives an overview of IT Infrastructure and resource costs for small business and helps you understand what is needed as your business grows. You will discover the major obstacles for IT in a growing company and how you can leverage new technologies to reduce costs and...

    Provided By Symantec

  • White Papers // Feb 2011

    IT Value Transformation Roadmap - Cloud Strategy Brief

    IT organizations are perceived by the business in one of two ways - either as a cost center or a center of strategic value. Research has identified a common pattern of activity across organizations that have successfully shifted from a cost focus to delivering strategic value for the business. This...

    Provided By VMware

  • Case Studies // Feb 2011

    The American University of Puerto Rico Consolidates and Virtualizes IT With Solution From Mainline

    The American University of Puerto Rico is a private non-profit institution of higher education was challenged by outdated servers, which resulted in slow response times and network server failures. Rivera wanted to improve students' service-level satisfaction, an important factor in serving the tech-savvy student population, by making the IT environment...

    Provided By Mainline Information Systems

  • White Papers // Feb 2011

    Life-cycle Consumption: Can Single Agent Models Get It Right?

    In this paper, the authors study differences between consumption predictions from a single agent model and "Adult equivalent" consumption predictions from a model where household size evolves deterministically over the life-cycle and affects individual preferences for consumption. Using a theoretical model they prove that, under mild conditions, these predictions are...

    Provided By Munich Personal Repec Archive

  • White Papers // Feb 2011

    Minimizing Digital Media Downtime

    Digital signage represents a significant investment with the potential for a significant return on investment. Downtime can severely impact that return and turn promising projects into cost disasters. Remote management and recovery is imperative to minimize downtime and reduce costly service calls. Remote power control is the least costly and...

    Provided By Dataprobe

  • White Papers // Feb 2011

    IT Adoption for Supply Chain Integration in Retail Sector

    Application of Information Technology (IT) in Supply Chain Integration (SCI) has enabled Organizations to meet everchanging dynamic global markets. The present paper tries to investigate important determinants for IT adoption and tests the value of Supply Chain co-ordination and Organization strategies in enhancing performance. The Indian Retail Sector due to...

    Provided By University of Asia Pacific

  • Podcasts // Feb 2011

    Achievable Savings and ROI From Forefront Identity Manager

    The Microsoft identity stack can help clients solve critical business problems and drive significant Return on Investment (ROI). The speakers of this podcast explore the benefits and efficiencies that Microsoft Forefront Identity Manager features can facilitate, and see what the cost savings and ROI could be with effective identity management.

    Provided By Microsoft

  • White Papers // Feb 2011

    Shield Your Applications from Catastrophe

    Whether they reside on the company’s internal servers or are accessible via the Web from desktop PCs or mobile devices, the applications a business uses to run its operations are ever-growing. The number and complexity of enterprise applications, particularly those based on Java and other Web technologies, are changing the...

    Provided By Oracle

  • Case Studies // Feb 2011

    DnB NOR: DnB NOR Automates Processes With a Business Process Management Platform

    DnB NOR invests in Business Process Management (BPM) to accomplish business goals connected to cost reduction, process improvement, and customer satisfaction across the group. The digitalization program is a major contributor to the group's BPM effort: its main objective is to automate processes for credit handling and daily banking. DnB...

    Provided By Microsoft

  • White Papers // Feb 2011

    Tracker: Security and Privacy for RFID-Based Supply Chains

    The counterfeiting of pharmaceutics or luxury objects is a major threat to supply chains today. As different facilities of a supply chain are distributed and difficult to monitor, malicious adversaries can inject fake objects into the supply chain. This paper presents TRACKER, a protocol for object genuineness verification in RFID...

    Provided By Institut Eurecom

  • Downloads // Feb 2011

    Bending the failed expectations curve: 10 questions with NetIQ's Jay Gardner

    NetIQ president and GM, Jay Gardner, discusses the challenges of helping technology end users avoid diminishing benefits and gain incremental value from their IT investments. This download is also available as an entry in our 10 Things blog.

    Provided By Jeff Cerny

  • White Papers // Feb 2011

    Database Consolidation onto Private Clouds

    Consolidating databases onto a private cloud is a new model for the delivery of database services. Private clouds consolidate servers, storage, operating systems, databases, and mixed workloads onto a shared hardware and software infrastructure. Deploying databases on a consolidated private cloud enables IT departments to improve quality of service levels...

    Provided By Oracle

  • White Papers // Feb 2011

    Product Design Response To Industrial Policy: Evaluating Fuel Economy Standards Using An Engineering Model Of Endogenous Product Design

    Policies designed to improve industrial environmental performance are increasing in scope and stringency. These policies can significantly influence engineering design decisions as firms re-optimize their products and processes to meet compliance requirements at minimum cost. This paper demonstrates the importance of accounting for these design responses in the analysis of...

    Provided By Haas School Of Business, University of California, Berkeley

  • White Papers // Feb 2011

    Automated Mechanism Design for B2B e-Commerce Models

    Business-to-business electronic marketplaces (B2B e-Marketplaces) have been in the limelight since 1999 with the commercialization of the Internet and subsequent \"Dot.com\" boom. Literature is indicative of the growth of the B2B sectors in all industries, and B2B e-Marketplace is one of the sectors that have witnessed a rapid increase. Consequently,...

    Provided By International Journal of Trade, Economics, and Finance (IJTEF)

  • White Papers // Jan 2011

    Cloud Computing and Sustainability:The Environmental Benefits of Movingto the Cloud

    The cloud's unprecedented economies of scale reduce overall cost and increase efficiencies, especially when replacing an organization's locally operated on-premise servers. But does this advantage also translate to environmental benefits?

    Provided By Microsoft

  • White Papers // Jan 2011

    Windows AzureCustomer Solution Case StudySoftware Services Provider Delivers Cost-Effective E-Government Solution

    Persistent Systems needed a way to deliver its solution without requiring local governments to invest in new IT infrastructure and personnel. The company used the Windows Azure? platform to deliver its e-governance applications on the Internet through a Microsoft? data center. Now Persistent Systems can offer its e-government solution in...

    Provided By Microsoft

  • White Papers // Jan 2011

    Competitive Comparison Between Microsoft® and VMware Cloud Computing Solutions.

    As organizations evaluate how cloud computing can help them improve business agility, reduce management complexity and control costs, they are faced with numerous choices. However, simply moving towards a service-oriented cloud computing model will not automatically deliver benefits. When compared to the VMware cloud solution, the Microsoft solution is seen...

    Provided By Microsoft

  • White Papers // Jan 2011

    Securing Microsoft's Cloud Infrastructure.

    This paper introduces the reader to the Online Services Security and Compliance team, a part of the Global Foundation Services division who manages security for the Microsoft cloud infrastructure. Readers will gain an understanding of what cloud computing at Microsoft means today and how the company delivers a trustworthy cloud...

    Provided By Microsoft