The latest vendor assets for business technology professionals show you how to follow online sales from cost control and supply chain management through to transaction processing and fullfilment.

  • White Papers // Jun 2009

    Five Key Considerations for Selecting a Data Loss Prevention Solution

    Data loss prevention is about more than just preventing sensitive data from being lost or mishandled. If that were the case, organizations would block every single transmission and prevent every sensitive file from being accessed or handled. If every file were blocked or encrypted, it would impede immensely on employee...

    Provided By RSA Security

  • White Papers // May 2009

    ROI and SIEM: How the RSA enVision Platform Delivers an Industry-Leading ROI

    This paper examines the Return on Investment (ROI) that a quality Security Information & Event Management (SIEM) solution can deliver to an organization. "SIEM ROI" depends on several factors, including a user's compliance and security obligations, the size and complexity of the IT environment and any current log management processes.

    Provided By RSA Security

  • White Papers // Sep 2009

    Business Success in a Dark Market: An Inside Look at How the Fraud Underground Operates

    The business of online fraud has developed into a sophisticated underground criminal operation that continues to evolve everyday. Much like a real-world business, fraud "Entrepreneurs" offer products and services for a profit, they fight to gain competitive advantage and market share, are continually innovating to improve their offerings and meet...

    Provided By RSA Security

  • White Papers // Apr 2009

    6 Best Practices for Preventing Enterprise Data Loss

    Protecting a company from enterprise data loss is a strategic necessity. The risks, including potential monetary losses and damage to customer confidence and brand value, are far too great to ignore. But laying out a data security strategy and then implementing it is no easy feat. RSA, the leader in...

    Provided By RSA Security

  • White Papers // Sep 2010

    Breaking the Disk Barrier: In-Memory DBMS Technology

    Over the course of the past 10 years, in-memory database technology has emerged as a key means of boosting performance and scalability and containing storage costs. This white paper discusses the growing need for high-performance database management, without disrupting applications and the operations of the datacenter. It considers the ways...

    Provided By Sybase

  • Webcasts // Sep 2010

    Webcast: Breaking the Disk Barrier: In-Memory DBMS Technology

    Over the course of the past 10 years, in-memory database technology has emerged as a key means of boosting performance and scalability and containing storage costs. This white paper discusses the growing need for high-performance database management, without disrupting applications and the operations of the datacenter. It considers the ways...

    Provided By Sybase

  • White Papers // Apr 2010

    Advance Beyond the Barriers of Your Legacy Computing Infrastructure: Standards-Based HP Platforms Turn Legacy Sun SPARC Environments Into Stable, Reliable Solutions for Sybase ASE Users

    New standards-based servers not only generate tremendous savings in maintenance and support costs, they save money through lower software licensing costs, server consolidation, virtualization, and integrated, simplified management. SPARC migration reduces cost of operations, improves IT efficiency, and cuts risk. Moving to HP brings immediate payback through lower support costs...

    Provided By Sybase

  • White Papers // Feb 2010

    Paving The Way To Product Lifecycle Management In The Communications Industry

    In all honesty, the product data situation at most service providers is a mess, and getting worse. Multiple databases strewn around the company wreak havoc with the goal of efficient product lifecycle management (PLM). The lack of consistent, integrated data slows down product development, increases operating expenses and multiplies mistakes...

    Provided By Amdocs

  • Webcasts // Sep 2009

    Veritas Storage Foundation for Sybase ASE Cluster Edition

    Sybase and Symantec are working together to optimize Sybase's Virtualized Resource Management? technology framework found in ASE Cluster Edition for Veritas Storage Foundation HA. The new solution delivers a truly integrated database and storage clustering solution providing administrative efficiency, higher availability and improved performance. Learn more in an on demand...

    Provided By Sybase

  • White Papers // Nov 2009

    Strategic Secret Weapon for Tightening Business & IT Alignment: Modeling!

    Achieving alignment between an organization's core goals and the IT infrastructure that supports an enterprise's strategic direction is an ongoing challenge. Learn how aligning business processes with data from information systems enables the development of a model-driven approach that will ultimately lead to heightened agility and greater productivity across the...

    Provided By Sybase

  • Podcasts // Jan 2012

    Sybase ASE TCO: A Comparison to Oracle 11g

    In this podcast, the speakers discuss about the ASE Total Cost Ownership. The speakers will also discuss about the compelling data indicative of Sybase TCO position against Oracle and the unique cost savings realized by ASE customers.

    Provided By Sybase

  • White Papers // Mar 2010

    Email Continuity - Protecting Your Business Against Email Downtime

    Email has become deeply ingrained in business operations. Internal communications are often accomplished more by email than by phone or face-to-face meetings. Communications with external clients, vendors, partners, and other business contacts are perhaps even more dependent on email. Calls and meetings are scheduled by email; decisions are made based...

    Provided By GFI Software

  • White Papers // Dec 2009

    Social Networking and Security Risks

    Each social networking tool comes with its own set of security concerns which can put your information systems and/or personal data at risk. This white paper will look at some of these risks and identify possible solutions to help protect you, your personal information and your company data.

    Provided By GFI Software

  • White Papers // Dec 2012

    Webroot: BYOD - Delivering a Secure Mobile Future

    In two short years we have seen an explosion of Android powered devices. The mobile Internet has truly arrived and is starting to deliver on the anytime, anywhere and almost anyplace access that lets us take more control over our time and lives. However, BYOD does raise a lot of...

    Provided By Webroot Software

  • White Papers // Oct 2010

    Unifying electronic communications for enhanced security

    Through combined, integrated web and email protection, organisations will be in a better position to protect personal and sensitive corporate information from online and internal threats, which is especially important given the sophisticated nature of today's threats that are highly targeted and that use blended vectors of attack.

    Provided By Webroot Software

  • White Papers // Oct 2012

    To What Extent Would E-Mall Enable SMEs to Adopt E-Commerce?

    This paper presents findings from a study of e-commerce adoption by Small and Medium Enterprises (SMEs) in Saudi Arabia. Only tiny number of Saudi commercial organizations, mostly medium and large companies from the manufacturing sector, in involved in e-commerce implementation. The latest report released in 2010 by The Communications and...

    Provided By Griffith University

  • White Papers // Oct 2008

    Trust, Social Network and Electronic Commerce Adoption

    This paper uses an empirical case study methodology to examine the impact of trust within social networks on Thai SMEs' adoption of Electronic Commerce (EC). In particular, the paper examines the significance of dispositional and experiential trust between social network members on EC adoption. The findings suggest that dispositional trust...

    Provided By Griffith University

  • Case Studies // Dec 2009

    Adding Value to Kalmar's Value-Added Services

    Kalmar Services is a service contracts provider, which is an independent unit within Kalmar Industries. This services wing accounts for 23% of the group revenue. With service contracts increasing rapidly, client-serving companies require broad-based management expertise and dependable IT-support. The company therefore invested in a modular service management solution from...

    Provided By IFS

  • White Papers // Jul 2011

    Return On Investment: A Placebo For The Chief Financial Officer. And Other Paradoxes

    Return On Investment (ROI) is one of the most popular evaluation metrics. ROI analysis (when applied correctly) is a powerful tool of evaluating existing information systems and making informed decisions on the acquisitions. However, practical use of the ROI is complicated by a number of uncertainties and controversies. The paper...

    Provided By Ryerson University

  • White Papers // Nov 2013

    A Secure Shell Key Management

    This white paper analyzes how emerging key management and access control technologies will likely impact PCI compliance mandates and presents SSH’s Universal SSH Key Manager as a solution that can be implemented today to both increase security controls and meet the coming, common sense changes to compliance mandates.

    Provided By ssh

  • White Papers // Apr 2009

    Comparison Of Segmentation Approaches

    You've attended the alignment meeting with all key stakeholders during which business and research objectives have been thoroughly discussed. All have agreed that segmentation is the appropriate research approach to fulfill the goals. Qualitative research has been conducted to illuminate the end-user's experience with the product or service. Insightful questionnaire...

    Provided By Decision Analyst

  • White Papers // Mar 2009

    New Products For Tough Times

    Every change in the marketplace, every upheaval in the economy, every shift in technology, and every change in consumer attitudes and outlook creates opportunities for successful new products. Since these changes are amplified during tough times, new product opportunities are actually more numerous during economic turbulence. The companies that develop...

    Provided By Decision Analyst

  • White Papers // Sep 2010

    Concept Testing (And The 'Uniqueness' Paradox)

    A well-designed, new product concept testing system, overseen by experienced and knowledgeable researchers, can vastly improve a company's ability to develop successful new products or services. The great potential of concept testing is seldom achieved in actual practice, however. The purpose of this paper, then, is to suggest some guidelines...

    Provided By Decision Analyst

  • White Papers // Feb 2010

    Market Segmentation

    When the term "Market segmentation" is used, most of us immediately think of psychographics, lifestyles, values, behaviors, and multivariate cluster analysis routines. Market segmentation is a much broader concept, however, and pervades the practice of business throughout the world. The purpose of segmentation is the concentration of marketing energy and...

    Provided By Decision Analyst

  • Case Studies // Jun 2010

    MMG Insurance Case Study

    A premier property and casualty insurer in the Northeast, MMG Insurance serves customers in Maine, Vermont, New Hampshire and Pennsylvania. The company turned to DigitalPersona for a cost effective and convenient way to improve network security. MMG also wanted to eliminate a process that required its 160 employees to re-type...

    Provided By DigitalPersona

  • Case Studies // Mar 2010

    Bentley University Case Study

    Bentley University is widely recognized for its leadership in technology integration on campus and in the classroom. Faculty, staff and students at Bentley University required access to various databases, resources and other IT assets both on and off campus. Technology integration is a focus for the university, so an easy-to-use...

    Provided By DigitalPersona

  • Case Studies // Dec 2009

    Star Refrigeration Set for Continuing Growth

    Once Star Refrigeration had implemented the IFS Applications, Star Refrigeration witnessed that it was able to gain easy access to accurate management information. There was a clear Return on Investment (RoI) with the IFS Applications and it got easier to keep track of the costs being incurred. Today, the company...

    Provided By IFS

  • Case Studies // Dec 2009

    Worldmark Uses IFS Applications to Manage Global Standards

    Worldmark used IFS applications to replace their legacy architecture, which was very old. They replaced the old architecture with the use of an integrated solution from IFS that came a multi-site, multi-language solution. With the deployment of IFS, the company has been able to streamline key processes and obtain greater...

    Provided By IFS

  • White Papers // Jan 2007

    A Classification of E-Business Applications: Preliminary Results

    Predictions that SMEs would be the primary beneficiaries of e-business have not materialized. One of the main reasons is the failure to understand the value of e-business in the SME environment. Researchers have argued that a classification of the myriad of possible e-business applications is a necessary first step in...

    Provided By Grand Valley State University

  • White Papers // Jan 2012

    EETCO: A Tool to Estimate and Explore the Implications of Datacenter Design Choices on the TCO and the Environmental Impact

    In this paper, the authors present EETCO an estimation and exploration tool that provides qualitative trends of data center design decisions on Total-Cost-of-Ownership (TCO) and environmental impact. EETCO has the ability to capture the implications of many parameters including server performance, power, cost, and mean-time-to-failure. The tool includes a model...

    Provided By University of Cyprus

  • White Papers // Aug 2009

    Business Process Management with the User Requirements Notation

    A number of recent initiatives in both academia and industry have sought to achieve improvements in e-businesses through the utilization of Business Process Management (BPM) methodologies and tools. However there are still some inadequacies that need to be addressed when it comes to achieving alignment between business goals and business...

    Provided By University of Otago

  • White Papers // May 2010

    Transaction Management for Distributed Database using Petri Nets

    Large and medium sized organizations are functionally distributed in a structured or unstructured form over different locations like continents, countries, plants, divisions, departments, laboratories, work-groups and so on. As there is no single global clock available for synchronizing the transactions, some cost effective yet easily deployable generic framework for asynchronous...

    Provided By University of Calabria

  • White Papers // Mar 2012

    E-Readiness of Romanian SMEs

    It is undeniable the importance of SMEs in economic growth since they play their proper role in the emerging digital economy. But also have to consider the electronic preparation of these, their ability to absorb knowledge and to profit from their use, the e-accessibility and value added goods/services through ICT....

    Provided By Academy of Economic Studies

  • White Papers // Nov 2007

    Risk Management for e-Business

    In the new Internet economy, risk management plays a critical role to protect the organization and its ability to perform their business mission, not just its IT assets. Risk management is the process of identifying risk, assessing risk, and taking steps to reduce risk to an accept-able level. The risk...

    Provided By Academy of Economic Studies

  • White Papers // Nov 2011

    Integrating E-Payment Services with RIA Applications

    In the area of web technologies, RIA brings a new perspective regarding user experience. The authors have arrived at a point in which the initial visible distinctions between classical desktop applications and web applications can be overcome. The classic development approach for web applications has determined a lack of expressivity...

    Provided By Academy of Economic Studies

  • White Papers // Apr 2010

    A Supply Chain Perspective of RFID Systems

    Radio Frequency IDentification (RFID) initially introduced during WW-II, has revolutionized the world with its numerous benefits and plethora of implementations in diverse areas ranging from manufacturing to agriculture to healthcare to hotel management. This work reviews the current research in this area with emphasis on applications for supply chain management...

    Provided By California State University, Fresno

  • White Papers // Jun 2011

    Managing User Requirement Risks - An Exploratory Study of IS Projects From the Views of Outsourcing Teams

    Requirement risk is often identified as a reason contributing to Information Systems Development (ISD) project failure but has not been adequately explored in the IS literature. Requirement risk refers to the uncertainties caused by differences between the requirements perceived by system developers and user groups' expectation of the system. Requirement...

    Provided By University of Sheffield

  • White Papers // Sep 2010

    Product Recovery In Networks

    This paper deals with product recovery. Especially the paper sets out to scrutinize the organization of product recovery starting with firms who want to 'Get rid of' obsolete products, followed by the transformations of these products, so that they can be sold to new users. The paper provides two illustrations...

    Provided By Chalmers University of Technology

  • Webcasts // Nov 2012

    Automating Infrastructure and Operations Management with VMware vCenter Operations Management Suite

    IT management must change. Traditional tools and processes designed for siloed, static physical infrastructures don't provide the automation and control needed for inherently dynamic virtualized and cloud infrastructures. By building management directly into the VMware vSphere® platform, we've already transformed the way you manage your infrastructure. The next step is...

    Provided By VMware

  • White Papers // Oct 2012

    Seven Corners

    Seven Corners went beyond the typical efficiency and cost-conservation benefits of cloud to build innovative business services that generate whole new revenues. "If you're in a privately held SMB, your goal is to identify a problem or an opportunity, categorize what it would cost to resolve it or achieve...

    Provided By VMware