The latest vendor assets for business technology professionals show you how to follow online sales from cost control and supply chain management through to transaction processing and fullfilment.

  • White Papers // Mar 2010

    Email Continuity - Protecting Your Business Against Email Downtime

    Email has become deeply ingrained in business operations. Internal communications are often accomplished more by email than by phone or face-to-face meetings. Communications with external clients, vendors, partners, and other business contacts are perhaps even more dependent on email. Calls and meetings are scheduled by email; decisions are made based...

    Provided By GFI Software

  • White Papers // Dec 2009

    Social Networking and Security Risks

    Each social networking tool comes with its own set of security concerns which can put your information systems and/or personal data at risk. This white paper will look at some of these risks and identify possible solutions to help protect you, your personal information and your company data.

    Provided By GFI Software

  • White Papers // Dec 2012

    Webroot: BYOD - Delivering a Secure Mobile Future

    In two short years we have seen an explosion of Android powered devices. The mobile Internet has truly arrived and is starting to deliver on the anytime, anywhere and almost anyplace access that lets us take more control over our time and lives. However, BYOD does raise a lot of...

    Provided By Webroot Software

  • White Papers // Oct 2010

    Unifying electronic communications for enhanced security

    Through combined, integrated web and email protection, organisations will be in a better position to protect personal and sensitive corporate information from online and internal threats, which is especially important given the sophisticated nature of today's threats that are highly targeted and that use blended vectors of attack.

    Provided By Webroot Software

  • White Papers // Oct 2012

    To What Extent Would E-Mall Enable SMEs to Adopt E-Commerce?

    This paper presents findings from a study of e-commerce adoption by Small and Medium Enterprises (SMEs) in Saudi Arabia. Only tiny number of Saudi commercial organizations, mostly medium and large companies from the manufacturing sector, in involved in e-commerce implementation. The latest report released in 2010 by The Communications and...

    Provided By Griffith University

  • White Papers // Oct 2008

    Trust, Social Network and Electronic Commerce Adoption

    This paper uses an empirical case study methodology to examine the impact of trust within social networks on Thai SMEs' adoption of Electronic Commerce (EC). In particular, the paper examines the significance of dispositional and experiential trust between social network members on EC adoption. The findings suggest that dispositional trust...

    Provided By Griffith University

  • Case Studies // Dec 2009

    Adding Value to Kalmar's Value-Added Services

    Kalmar Services is a service contracts provider, which is an independent unit within Kalmar Industries. This services wing accounts for 23% of the group revenue. With service contracts increasing rapidly, client-serving companies require broad-based management expertise and dependable IT-support. The company therefore invested in a modular service management solution from...

    Provided By IFS

  • White Papers // Jul 2011

    Return On Investment: A Placebo For The Chief Financial Officer. And Other Paradoxes

    Return On Investment (ROI) is one of the most popular evaluation metrics. ROI analysis (when applied correctly) is a powerful tool of evaluating existing information systems and making informed decisions on the acquisitions. However, practical use of the ROI is complicated by a number of uncertainties and controversies. The paper...

    Provided By Ryerson University

  • White Papers // Nov 2013

    A Secure Shell Key Management

    This white paper analyzes how emerging key management and access control technologies will likely impact PCI compliance mandates and presents SSH’s Universal SSH Key Manager as a solution that can be implemented today to both increase security controls and meet the coming, common sense changes to compliance mandates.

    Provided By ssh

  • White Papers // Apr 2009

    Comparison Of Segmentation Approaches

    You've attended the alignment meeting with all key stakeholders during which business and research objectives have been thoroughly discussed. All have agreed that segmentation is the appropriate research approach to fulfill the goals. Qualitative research has been conducted to illuminate the end-user's experience with the product or service. Insightful questionnaire...

    Provided By Decision Analyst

  • White Papers // Mar 2009

    New Products For Tough Times

    Every change in the marketplace, every upheaval in the economy, every shift in technology, and every change in consumer attitudes and outlook creates opportunities for successful new products. Since these changes are amplified during tough times, new product opportunities are actually more numerous during economic turbulence. The companies that develop...

    Provided By Decision Analyst

  • White Papers // Sep 2010

    Concept Testing (And The 'Uniqueness' Paradox)

    A well-designed, new product concept testing system, overseen by experienced and knowledgeable researchers, can vastly improve a company's ability to develop successful new products or services. The great potential of concept testing is seldom achieved in actual practice, however. The purpose of this paper, then, is to suggest some guidelines...

    Provided By Decision Analyst

  • White Papers // Feb 2010

    Market Segmentation

    When the term "Market segmentation" is used, most of us immediately think of psychographics, lifestyles, values, behaviors, and multivariate cluster analysis routines. Market segmentation is a much broader concept, however, and pervades the practice of business throughout the world. The purpose of segmentation is the concentration of marketing energy and...

    Provided By Decision Analyst

  • Case Studies // Jun 2010

    MMG Insurance Case Study

    A premier property and casualty insurer in the Northeast, MMG Insurance serves customers in Maine, Vermont, New Hampshire and Pennsylvania. The company turned to DigitalPersona for a cost effective and convenient way to improve network security. MMG also wanted to eliminate a process that required its 160 employees to re-type...

    Provided By DigitalPersona

  • Case Studies // Mar 2010

    Bentley University Case Study

    Bentley University is widely recognized for its leadership in technology integration on campus and in the classroom. Faculty, staff and students at Bentley University required access to various databases, resources and other IT assets both on and off campus. Technology integration is a focus for the university, so an easy-to-use...

    Provided By DigitalPersona

  • Case Studies // Dec 2009

    Star Refrigeration Set for Continuing Growth

    Once Star Refrigeration had implemented the IFS Applications, Star Refrigeration witnessed that it was able to gain easy access to accurate management information. There was a clear Return on Investment (RoI) with the IFS Applications and it got easier to keep track of the costs being incurred. Today, the company...

    Provided By IFS

  • Case Studies // Dec 2009

    Worldmark Uses IFS Applications to Manage Global Standards

    Worldmark used IFS applications to replace their legacy architecture, which was very old. They replaced the old architecture with the use of an integrated solution from IFS that came a multi-site, multi-language solution. With the deployment of IFS, the company has been able to streamline key processes and obtain greater...

    Provided By IFS

  • White Papers // Jan 2007

    A Classification of E-Business Applications: Preliminary Results

    Predictions that SMEs would be the primary beneficiaries of e-business have not materialized. One of the main reasons is the failure to understand the value of e-business in the SME environment. Researchers have argued that a classification of the myriad of possible e-business applications is a necessary first step in...

    Provided By Grand Valley State University

  • White Papers // Jan 2012

    EETCO: A Tool to Estimate and Explore the Implications of Datacenter Design Choices on the TCO and the Environmental Impact

    In this paper, the authors present EETCO an estimation and exploration tool that provides qualitative trends of data center design decisions on Total-Cost-of-Ownership (TCO) and environmental impact. EETCO has the ability to capture the implications of many parameters including server performance, power, cost, and mean-time-to-failure. The tool includes a model...

    Provided By University of Cyprus

  • White Papers // Aug 2009

    Business Process Management with the User Requirements Notation

    A number of recent initiatives in both academia and industry have sought to achieve improvements in e-businesses through the utilization of Business Process Management (BPM) methodologies and tools. However there are still some inadequacies that need to be addressed when it comes to achieving alignment between business goals and business...

    Provided By University of Otago

  • White Papers // May 2010

    Transaction Management for Distributed Database using Petri Nets

    Large and medium sized organizations are functionally distributed in a structured or unstructured form over different locations like continents, countries, plants, divisions, departments, laboratories, work-groups and so on. As there is no single global clock available for synchronizing the transactions, some cost effective yet easily deployable generic framework for asynchronous...

    Provided By University of Calabria

  • White Papers // Mar 2012

    E-Readiness of Romanian SMEs

    It is undeniable the importance of SMEs in economic growth since they play their proper role in the emerging digital economy. But also have to consider the electronic preparation of these, their ability to absorb knowledge and to profit from their use, the e-accessibility and value added goods/services through ICT....

    Provided By Academy of Economic Studies

  • White Papers // Nov 2007

    Risk Management for e-Business

    In the new Internet economy, risk management plays a critical role to protect the organization and its ability to perform their business mission, not just its IT assets. Risk management is the process of identifying risk, assessing risk, and taking steps to reduce risk to an accept-able level. The risk...

    Provided By Academy of Economic Studies

  • White Papers // Nov 2011

    Integrating E-Payment Services with RIA Applications

    In the area of web technologies, RIA brings a new perspective regarding user experience. The authors have arrived at a point in which the initial visible distinctions between classical desktop applications and web applications can be overcome. The classic development approach for web applications has determined a lack of expressivity...

    Provided By Academy of Economic Studies

  • White Papers // Apr 2010

    A Supply Chain Perspective of RFID Systems

    Radio Frequency IDentification (RFID) initially introduced during WW-II, has revolutionized the world with its numerous benefits and plethora of implementations in diverse areas ranging from manufacturing to agriculture to healthcare to hotel management. This work reviews the current research in this area with emphasis on applications for supply chain management...

    Provided By California State University, Fresno

  • White Papers // Jun 2011

    Managing User Requirement Risks - An Exploratory Study of IS Projects From the Views of Outsourcing Teams

    Requirement risk is often identified as a reason contributing to Information Systems Development (ISD) project failure but has not been adequately explored in the IS literature. Requirement risk refers to the uncertainties caused by differences between the requirements perceived by system developers and user groups' expectation of the system. Requirement...

    Provided By University of Sheffield

  • White Papers // Sep 2010

    Product Recovery In Networks

    This paper deals with product recovery. Especially the paper sets out to scrutinize the organization of product recovery starting with firms who want to 'Get rid of' obsolete products, followed by the transformations of these products, so that they can be sold to new users. The paper provides two illustrations...

    Provided By Chalmers University of Technology

  • Webcasts // Nov 2012

    Automating Infrastructure and Operations Management with VMware vCenter Operations Management Suite

    IT management must change. Traditional tools and processes designed for siloed, static physical infrastructures don't provide the automation and control needed for inherently dynamic virtualized and cloud infrastructures. By building management directly into the VMware vSphere® platform, we've already transformed the way you manage your infrastructure. The next step is...

    Provided By VMware

  • White Papers // Oct 2012

    Seven Corners

    Seven Corners went beyond the typical efficiency and cost-conservation benefits of cloud to build innovative business services that generate whole new revenues. "If you're in a privately held SMB, your goal is to identify a problem or an opportunity, categorize what it would cost to resolve it or achieve...

    Provided By VMware

  • Webcasts // Oct 2012

    Virtualization Made Easy Webcast

    Growing businesses face unique challenges managing an IT environment to deliver services that are secure, reliable and scalable. Virtualization can help these organizations not only save money but also simplify IT management and improve the services that they deliver to their employees and customers. Attend this webcast to learn...

    Provided By VMware

  • Webcasts // Mar 2013

    Tackling Workplace Mobility and Bring Your Own Device Initiatives with the VMware View Mobile Secure Desktop

    Desktop virtualization provides IT with a way to address these concerns while supporting worker mobility and BYOD. Now VMware is advancing these goals with VMware View™ Mobile Secure Desktop, a fully validated architectural design that provides end users with quick and easy access to applications and data across devices, locations...

    Provided By VMware

  • eBooks // Oct 2012

    eBook - Real-World Virtualization for Your Business

    Small and midsize firms virtualize IT infrastructure to meet real-world challenges: simplifying operations to focus on business issues, speeding up application rollouts to get more done, safeguarding data and operations to stay open and productive, and saving money for the bottom line. It's a new way to think about IT--and...

    Provided By VMware

  • White Papers // Sep 2013

    People and Processes: Keys to IT as a Service Success

    IT as a service (ITaaS) provides a unique opportunity for IT and line-of-business leaders to realign to transform business. Over the past decade, IT organizations have worked hard to reduce delivery time and costs through automation and commoditization. At the same time, line-of-business owners have demanded more and unique offerings...

    Provided By VMware

  • White Papers // Sep 2013

    VMware Whitepaper - Performance Analytics: How Normal is Your Data

    This VMware paper takes a technical look at a variety of IT performance data (operating system metrics, quality-of-service metrics, business performance metrics, etc.) to determine how well these metrics can be modeled as “normally distributed.” This concept is at the heart of VMware vCenter Operations' performance analytics capability, and provides...

    Provided By VMware

  • Webcasts // Sep 2013

    What’s New in VMware vCloud Director 5.1

    VMware vCloud® Director™ orchestrates the provisioning of software-defined datacenter services as complete virtual datacenters (VDCs) that are ready for consumption in a matter of minutes. While a virtual machine provides only virtualized compute, the virtual datacenter provides virtualized compute, networking, storage, security and availability. With vCloud Director, an administrator can...

    Provided By VMware

  • White Papers // Sep 2013

    Journey to Your Cloud Taking Your Organization From Reactive to Innovative

    This Whitepaper talks about why make the journey to the Cloud. It talks about empowering your IT Organization with Cloud Computing, the Path to Innovate, Essential Cloud Capabilities to Advance a Cloud Operating Model. It also talks about three approaches: Reactive: Managing the Growing Demands of the Business and moving...

    Provided By VMware

  • White Papers // Sep 2013

    Organizing for the Cloud

    Cloud computing represents a major opportunity for IT. At the same time it presents challenges. Lines of Business are already by-passing IT and going directly to external cloud providers. Running workloads on external cloud provider infrastructure isn’t necessarily a bad thing but to regain control, IT must begin to think...

    Provided By VMware

  • Videos // Apr 2014

    Whiteboard: Delivering Desktops and Applications as a Service

    VMware® Horizon View™ makes it easy to deliver desktops and applications as a service to your end users on top of your existing vSphere™ platform. Watch this whiteboard video from VMware reference architect, Tristan Todd, for a brief lesson on how to successfully deploy View for a flexible and secure...

    Provided By VMware

  • White Papers // Jun 2014

    Desktop Virtualization for Wealth Management and Insurance

    The computer desktop has been in existence for a little over 30 years, but in the last 10 years it has moved to notebooks and increasingly towards smart mobile devices. Now with advancements in technology, the desktop is increasingly found in the cloud thanks to virtual desktop infrastructure.

    Provided By VMware

  • White Papers // Oct 2013

    IDC Technology Spotlight: Virtualize Desktops for Better Management and Operations Across Devices

    Centralized virtual desktop (CVD) technology is an innovation receiving closer attention today as itspotential impact on IT departments and users becomes clearer. The push for client virtualization technologies originated with organizations that successfully implemented server virtualization. Now, customers are intrigued by the possibility of a better desktop management model. They're...

    Provided By VMware