"Tech Solutions - one byte at a time!"
DigiBytes.com is the digital library of solutions for business and technology professionals.

Login Register Login
For Admins

cto

Results 2051 - 2075 of 2156Sort Results By: Published Date | Title | Company Name
Published By: SyberWorks     Published Date: Oct 21, 2008
Claudia Innes, Corporate Marketing Director for Fairchild Semiconductor, Inc. discusses their use of the SyberWorks Hosted e-Learning Solution to create a marketing-information portal to provide marketing and performance support for their sales staff, sales engineers, partners, and distributors in the power-supply segment.
Tags : 
syberworks, e-learning, elearning, performance support, learning management systems, learning management system, e-learning, web based training, training management systems, training management system, online training software, web based training software, e-learning, sop automation, seminar logistics, classroom management, online survey tool, competency management, schedule simulation, fda 21 cfr part 11
    
SyberWorks
Published By: SyberWorks     Published Date: Oct 21, 2008
Kevin Lange, Director of Field Training at Service Master Clean, Inc., talks about his company's training program and the organizational drivers that led them to consider an e-learning program and to choose the SyberWorks Training Center Learning Management System to manage their training.
Tags : 
syberworks, e-learning, elearning, training program, drivers, learning management systems, learning management system, e-learning, web based training, training management systems, training management system, online training software, web based training software, e-learning, sop automation, seminar logistics, classroom management, online survey tool, competency management, schedule simulation
    
SyberWorks
Published By: Progress Software BTA Financial     Published Date: Oct 15, 2008
This Assessment Guide helps you to create a high-level overview for each business-critical application, detailing the context of the application, highlighting risk factors and overall effectiveness of each application. This assessment, in turn, will provide a foundation for further investigation and actions to optimize the outcomes of your business-critical transactions and mitigate risk.
Tags : 
soa risks, application risks, integration risks, actional, application assessment, progress software, soa infrastructure, soa security, it governance, soa, soa governance, business process automation, business process management, service oriented architecture, web service management, sla
    
Progress Software BTA Financial
Published By: Progress Software BTA Telecommunications     Published Date: Oct 15, 2008
This Assessment Guide helps you to create a high-level overview for each business-critical application, detailing the context of the application, highlighting risk factors and overall effectiveness of each application. This assessment, in turn, will provide a foundation for further investigation and actions to optimize the outcomes of your business-critical transactions and mitigate risk.
Tags : 
soa risks, application risks, integration risks, actional, application assessment, progress software, soa infrastructure, soa security, it governance, soa, soa governance, business process automation, business process management, service oriented architecture, web service management
    
Progress Software BTA Telecommunications
Published By: BlackBerry     Published Date: Oct 12, 2008
The healthcare industry has lagged behind other industry sectors in adopting wireless technologies. Is the problem one of functionality, reliability or suitability to the required tasks? Or, is it simply the conservative nature of healthcare, where a solution must be of proven value and unassail-able virtue before investments are made and policies are changed. This paper examines the characteristics of wireless mobility solutions and considers how effectively these solutions meet healthcare industry requirements.
Tags : 
blackberry, healthcare, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing, mobile computing, mobile data systems, pda, smart phones, wifi, wireless application software, wireless communications, wireless hardware
    
BlackBerry
Published By: Likewise Software     Published Date: Oct 07, 2008
This document describes how Likewise and Microsoft Active Directory can foster compliance with the Payment Card Industry Data Security Standard, a set of requirements for businesses that process payment card information. Developed by Visa, American Express, Discover Financial Services, and other members of the PCI Security Standards Council, the standard sets forth policies, procedures, and practices to protect customer account data. The standard includes specific requirements for strictly controlling access to customer data, authenticating business users, monitoring access, maintaining a secure network, and auditing system resources. Likewise integrates Linux, Unix, and Mac OS X workstations and servers into Active Directory, providing the basis to assign each user a unique ID for authentication, authorization, monitoring, and tracking. Likewise also provides group policies for non-Windows computers so that their security settings and other configurations can be centrally managed in the same way as Windows computers.
Tags : 
likewise, pci data security, linux, unix, mac os x, windows
    
Likewise Software
Published By: Likewise Software     Published Date: Oct 07, 2008
This document describes how Likewise improves the security of Linux and UNIX computers by allowing computers to authenticate and authorize users through Microsoft Active Directory.
Tags : 
likewise, linux, unix, microsoft active directory, microsoft windows, security, security policies
    
Likewise Software
Published By: Likewise Software     Published Date: Oct 07, 2008
This paper begins by exploring why SOX compliance continues to be so difficult when it is treated as an annual project rather than a continuous process. Then the paper discusses how Likewise Enterprise can help your company make the shift to continuous compliance for identity and access management in a mixed network. Likewise joins Linux, Unix, and Mac OS X computers to Active Directory, providing the basis to assign each user a unique ID for authentication, authorization, and monitoring. Likewise also includes group policies for non-Windows computers so that you can centrally manage their security settings in the same way as Windows computers.
Tags : 
likewise, risk, compliance, sox, security
    
Likewise Software
Published By: Amacai     Published Date: Oct 03, 2008
Data is at the core of your business. And yet, complete and accurate data is harder and harder to come by these days. Traditionally, the White Pages and Directory Assistance have been the main source of marketing data, whether it's direct marketing lists, base-file compilations or database verification and enhancement.
Tags : 
targusinfo, whitepapers, lead generation, whitepages, voip, wireless service
    
Amacai
Published By: DataMotion     Published Date: Oct 01, 2008
With HIPAA audits now randomized, you must be prepared for them every day. And with state regulations requiring compliance-breach reporting, you must become your own auditor. HIPAA is the Health Insurance Portability and Accountability Act, the 1996 federal regulation that mandated health-data privacy.This regulation requires compliance by all insurers and health care providers, including physician’s offices, hospitals, health plans, employers, public health authorities, life insurers, clearinghouses, billing agencies, information systems vendors, service organizations, and universities.But that’s not all.
Tags : 
certifiedmail technology, act's privacy rule, health insurance portability, accountability act, security, it management, data management
    
DataMotion
Published By: MessageLabs     Published Date: Sep 25, 2008
In order to better understand where spyware is going, or more importantly, where it’s evolved from, we actually need to wind the clock back a lot further than may be first imagined; in fact, over fifteen years. If we look at the embryonic stages of the anti-virus industry, around sixteen years ago there were the first boot-sector viruses. It has taken this time for viruses as we’ve traditionally known them to evolve towards the more commercially viable, or intellectual-property-theft status that we now associate with contemporary viruses, a fact not realized by many. This whitepaper goes in-depth to discuss the history of spyware and its evolving future.
Tags : 
messagelabs, spyware, viruses, botnets, microsof, browser helper object, web threats, malware, windows, security
    
MessageLabs
Published By: Marketo, INC.     Published Date: Sep 25, 2008
This free white paper reveals that more than half of all inside salespeople have less than 2 years of experience—with annual turnover close to 50%. You can’t change that, but you can back your team with superior planning. Learn 3 critical factors that can make or break your inside sales effort; the 6 building blocks of an effective sales team; and how formulating a strategic plan can help ensure your team’s success. Download now—and start building a world-class inside sales team.
Tags : 
sales, inside sales, marketing, sales reps, sales executives, sales team, sales motivation, prospects, sales training, sales tracking, sales coaching, crm, sales productivity, lead nurturing, lead scoring, lead qualification, lead fulfillment, act, salesforce.com, telemarketing
    
Marketo, INC.
Published By: YouSendIt     Published Date: Sep 17, 2008
In this FactPoint study, discover why companies are increasingly adopting managed file transfer to send large and important files. Learn key factors driving the migration away from e-mail and FTP; the top 8 features to look for; and tough questions to help you choose a solution. Find out why countless companies are making the move—download your copy now.
Tags : 
cost-effective file delivery, promo code: wp2, file transfer, attachment, email, ftp, security, powerpoint attachment, mp3 attachment, jpeg attachment, photoshop attachment, multimedia attachment, audio attachment, video attachment, large attachment, file size, digital content, digital content delivery, managed delivery service, large file delivery
    
YouSendIt
Published By: YouSendIt, Inc.     Published Date: Sep 17, 2008
In this FactPoint study, discover why companies are increasingly adopting managed file transfer to send large and important files. Learn key factors driving the migration away from e-mail and FTP; the top 8 features to look for; and tough questions to help you choose a solution. Also, find out how to maximize privacy, security, speed, and ease of use. Find out why countless companies are making the move—download your copy now.
Tags : 
cost-effective file delivery, promo code: wp2, file transfer, attachment, email, ftp, security, powerpoint attachment, mp3 attachment, jpeg attachment, photoshop attachment, multimedia attachment, audio attachment, video attachment, large attachment, file size, digital content, digital content delivery, managed delivery service, large file delivery
    
YouSendIt, Inc.
Published By: TARGUSinfo.     Published Date: Jul 31, 2008
Companies today are faced with consumers who they are less likely to know, but who are more knowledgeable about them than ever before. Consumers are more demanding, have access to masses of information and are more likely to shop around. This briefing discusses how the right knowledge at the right time is the critical factor in winning over new customers.
Tags : 
targus, targus info, targusinfo
    
TARGUSinfo.
Published By: HP     Published Date: Jul 29, 2008
This white paper looks at HP's approach to Data Center Transformation and how it can help enterprise data centers reduce costs, manage risks, and support business growth. Learn about the 4 key factors which should influence your data center transformation strategy. See first hand how HP embarked on a three-year transformation program for its own data centers. This ambitious program involved rationalizing 85 data centers into just six global ones- with tangible and measurable benefits.
Tags : 
network management, data center, datacenter, mission critical, network architecture, network performance, network performance management, power and cooling
    
HP
Published By: HP     Published Date: Jul 29, 2008
This white paper by IDC shows how an investment in training improves the likelihood of an IT project chances for success through enhancement of team skills. The white paper provides an analysis of a comprehensive survey with 144 senior IT managers examining the impact which training and skill level had on the success of 377 IT projects.
Tags : 
project success, project management, training, education, workforce, employee, mission critical, it management, employee performance
    
HP
Published By: BlueCat     Published Date: Jul 09, 2008
A number of factors are fueling the demand for a new, intelligent approach to IP Address Management (IPAM). This document describes these factors while highlighting deficiencies in the legacy IPAM solutions and manual management techniques commonly used today. It also introduces the 'Five Pillars of IPAM Intelligence', BlueCat's framework for articulating its revolutionary, holistic approach to IPAM, and the foundation for the design of Proteus, BlueCat's next generation, intelligent IPAM platform.
Tags : 
ipam, ip address management, address management, dns, dhcp, ip address, bluecat, blue cat, ip networks, network management, tcp/ip protocol
    
BlueCat
Published By: AT&T     Published Date: Jun 25, 2008
When evaluating the pros and cons of DSL and cable modem Internet access, enterprises should factor speed, cost, installation, consistency and security into the decision-making process. While the right access choice is a function of location, availability and service offerings, DSL is often the better option for remote workers, satellite offices and traveling employees.
Tags : 
dsl, cable, internet, internet connection, connection, connectivity, data line, at&t, att, connection speed, isp, networking, infrastructure, network management, network performance
    
AT&T
Published By: Aconex     Published Date: Jun 24, 2008
It's a common scenario in the mining and oil & gas industries: the project has been approved to proceed and the pressure is on to get multiple parties – partners, consultants, contractors and suppliers – working together efficiently to meet an aggressive schedule. This challenge is often exacerbated by globalization and by the vast volume of data that flows between the project team.
Tags : 
information management, construction, oil, mining, gas, commodities, energy, aconex, collaboration, project management
    
Aconex
Published By: Inductive Automation     Published Date: Jun 23, 2008
In this case study, Bronco Wine Company, Ceres, Calif., (the producer of “Two-buck Chuck”) uses FactoryPMI for enterprise-wide process monitoring, control and troubleshooting. It was a business decision to use this technology, and is paying off handsomely for the Franzia family-owned business.
Tags : 
bronco, manufacturing, plant management, winery, inductive automation, plm
    
Inductive Automation
Published By: Project Success, Inc.     Published Date: Jun 23, 2008
Most project resources perform work and include such entities as personnel, equipment and contractors. However, the concept of a resource (and the techniques of resource management presented in this paper) can also be applied to entities that do not perform work, but which must be available in order for work to be performed.
Tags : 
workforce, personnel, employee, project success, psi
    
Project Success, Inc.
Published By: Dynapar Corp.     Published Date: Jun 22, 2008
As if the selection of manufacturer weren't enough, many encoders offered in today's marketplace are highly configurable. Resolution, shaft size, seal options and connector variations all confront the design engineer with serious choices. Output type is equally important. In this paper, we'll cover some of the more typical applications and common output types.
Tags : 
dynapar, encoder, sensor, motion feedback, product design, engineer, engineering, encoder output, electronics, manufacturing
    
Dynapar Corp.
Published By: Aconex     Published Date: Jun 18, 2008
In the construction industry, as in business generally, risk management involves identifying risks, assessing them and then developing strategies to manage them. Organizations that manage risk well enjoy financial savings, greater productivity and service quality, improved success rates of new projects and better decision making. It is clear that, in today's complex business environment, risk factors are wide reaching, and are intrinsically linked to achieving organizational objectives.
Tags : 
risk management, collaboration, web collaboration, web-based collaboration, aconex
    
Aconex
Start   Previous    73 74 75 76 77 78 79 80 81 82 83 84 85 86 87    Next    End
Search      

Special Report

In this webinar Black Duck Software (www.blackducksoftware.com), together with representatives of SAP, will review the benefits open source offers to development organizations, the management challenges it presents, and approaches for addressing those challenges.

Add Research

Get your company's research in the hands of targeted business professionals.

Modern Analyst Media Modern Analyst Media
Modern Analyst Requirements Modern Analyst Media Modern Analyst DigiBytes
Copyright 2009-2014 by Modern Analyst Media LLC Home  |  Featured Bytes  |  Popular Bytes  |  All Topics  |  Vendor Directory