Find White Papers
Home
About Us
List Your Papers
    

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

information technology

Results 151 - 175 of 456Sort Results By: Published Date | Title | Company Name
Published By: HP - Enterprise     Published Date: Oct 16, 2008
If your company stores or processes credit card information, you must be able to demonstrate compliance with the Payment Card Industry (PCI) Data Security Standards (DSS). These standards include requirements for security management, policies, procedures, network architecture, design, and other critical protective measures. They also include one very prescriptive requirement:  Section 6.6 mandates that organizations secure all Web applications by conducting a code review or installing an application layer firewall. Companies have had a very difficult time passing the other parts of Section 6 and they have experienced a rising number of data breaches. Unless companies take 6.6 seriously, PCI compliance failure rates, and data breaches, will continue to grow.  Read this whitepaper to gain an overview of best practices to pass Section 6.6 and an understanding of the technology available to you.
Tags : 
business risk, security, application security, audit, risk, vulnerabilities, fortify, fortify software, hackers, cyber threats, application security standards, threats, assessment, remediation, pci, compliance, payment card industry, data security standards, data management, firewalls
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Nov 19, 2008
While investments to secure the enterprise continue to rise, breaches into company systems and data are skyrocketing. These cyber crimes are consistently debilitating organizations operations, reputations and ultimately, viability. Today’s CEOs are demanding aggressive strategies to protect their business. CIOs and CSOs are working together to employ proven Business Software Assurance approaches across the enterprise to stay ahead of constant threats.
Tags : 
business risk, security, application security, audit, risk, vulnerabilities, fortify, fortify software, hackers, cyber threats, application security standards, threats, assessment, remediation, ciso, cyber crime, breaches, information technology, c-level, auditing
    
HP - Enterprise
Published By: SAP Inc.     Published Date: Jun 16, 2009
Innovation is no stranger to the information technology function. Armed with increasingly sophisticated applications, IT-led teams have consistently found new ways to streamline enterprise business processes, vastly improving operating efficiency and reducing costs. Corporate leaders, however, are raising the bar: they expect IT’s core mission to expand from cost-cutting to enabling revenue generation within a short period of time.
Tags : 
sap, new mandate for it, global technology forum, capgemini, cisco systems, deploying information technology, enterprise applications, business process automation, business process management, international computing
    
SAP Inc.
Published By: Intacct Corporation     Published Date: Oct 02, 2015
Like it or not, the accounting function is in the news distribution business. The demand for financial performance information is high and the pressure for more timely information is even higher. A fast close improves the timeliness of information, aids decision making and is a value-enhancing proposition for the business. To continue adding value, the CFO and controller must find ways to speed up their financial close processes and report financial results before they become old news. Download this white paper and learn the "7 Steps to a Faster, Better Close" including how to: • Identify the hidden traps and pitfalls bogging down your accounting processes • Drive process improvement and collaboration within your organization • Gain visibility and timely access to critical financial and operational information through application integration • Utilize modern accounting technology to accelerate your close with automation
Tags : 
    
Intacct Corporation
Published By: Pentaho     Published Date: Mar 08, 2016
If you’re evaluating big data integration platforms, you know that with the increasing number of tools and technologies out there, it can be difficult to separate meaningful information from the hype, and identify the right technology to solve your unique big data problem. This analyst research provides a concise overview of big data integration technologies, and reviews key things to consider when creating an integrated big data environment that blends new technologies with existing BI systems to meet your business goals. Read the Buyer’s Guide to Big Data Integration by CITO Research to learn: • What tools are most useful for working with Big Data, Hadoop, and existing transactional databases • How to create an effective “data supply chain” • How to succeed with complex data on-boarding using automation for more reliable data ingestion • The best ways to connect, transport, and transform data for data exploration, analytics and compliance
Tags : 
data, buyer guide, integration, technology, platform, research, enterprise applications
    
Pentaho
Published By: BMC     Published Date: Jan 05, 2012
Find out what the future of cloud means for IT organizations, tech businesses and for the CIOs who have to make information technology work.
Tags : 
bmc, cloud, cio, cto, hardware, operations, business operations, productivity, monitoring, network management, desktop management, cloud computing, infrastructure
    
BMC
Published By: Oracle     Published Date: Apr 03, 2012
Download this white paper, Top Reasons to Implement an SOA Governance Strategy: A List for IT Executives, for a guide to governance that will set you on the right path.
Tags : 
soa, service oriented architecture, networking, middleware, weblogic, oracle, information technology, web services, application server, server, sla, maturity model, 10g, jvm, java, data management
    
Oracle
Published By: GE Healthcare     Published Date: Jun 04, 2014
A recent KLAS publication reported more than a third of ambulatory practices (ranging from small to large) will replace their current EMR system. Why? Poor functionality, sun-setting products, and concerns about the corporate viability drive replacement needs. KLAS notes that while providers are still evaluating niche EMR products, many organizations are seeking the stability of established vendors. With Health Information Technology, especially EMR, moving from “nice to have to need to have,” selecting the right EMR has become a mission critical business driver.
Tags : 
ge healthcare, emr, emr replacement, electronic medical records, emr adoption, meaningful use, productivity, vendor, change management, healthcare it
    
GE Healthcare
Published By: Adobe     Published Date: Sep 20, 2016
With a world of information and accessibility in their pockets, customers can engage with a brand whenever and wherever they want. This flexibility has made mobile technology an essential part of the way both customers and businesses interact. And to deliver experiences that feel personal and intimate, your plan needs to account for a critical building block to any relationship: trust. Read Circles of Trust: Use Mobile to Engage Better, to understand how you can leverage trust to deliver a better customer experience. Read the white paper to learn: • The four major circles of trust as a fresh approach to successful customer experience • The seven steps to effective optimization • The 3 C’s of mobile marketing • The steps for developing a mobile optimization plan across your organization
Tags : 
adobe, mobile, data driven marketing, marketing, marketer
    
Adobe
Published By: Sage     Published Date: Oct 29, 2014
If you have recently been to a seminar, attended a conference or webcast, or read a white paper or blog, you have most likely heard about cloud technology as it relates to the accounting profession. Cloud technology is an enabler that allows a business to shift computing power from local networks and desktop environments to a remote off-premises computing environment. Ef?ciency of operations is enhanced by removing the burden of managing networks, upgrades, and information technology operational issues.
Tags : 
cloud technology, service offerings, efficiency, managing networks, operational issues
    
Sage
Published By: Ciena     Published Date: Nov 15, 2016
"In healthcare, as the trends supporting eHealth accelerate, the need for scalable, reliable, and secure network infrastructures will only grow. This white paper describes the key factors and technologies to consider when building a private network for healthcare sector enterprises, including: Transport Network Equipment Outside Fiber Plant Converged Platforms Reliability, Redundancy, and Protection Reconfigurable Networks Management Software Security Services, Operation, Program Management, and Maintenance Download our white paper to learn more."
Tags : 
packet networking, packet networking portfolio, packet optical hie network, packet-optical transport, patient data security, private and hybrid cloud, private optical network for healthcare, private optical network for hospitals, rapidly growing bandwidth, real-time telesurgery video and data, remote imaging and diagnosis, simplify healthcare network operations, telehealth and telemedicine, telesurgery and video diagnosis, transfer massive imaging files, transmitting full-body mri images, transmitting genome data, transport network equipment, value-based care models, wan and lan convergence reduces
    
Ciena
    
Ciena
    
Ciena
Published By: F5 Networks Inc     Published Date: Jan 21, 2014
Information technology is at a crucial turning point. Enterprise IT departments are under constant pressure to meet user and application demands, aware that cloud deployments offer an easier and faster alternative but often pinned down by legacy deployment models. The problem stems from the inability of those legacy models to adapt to meet expectations for rapid provisioning, continuous delivery, and consistent performance across multiple environments. Read this whitepaper to learn more about the evolution of application delivery and the services your enterprise can utilize to successfully manage the increased pressure on network and application infrastructure.
Tags : 
f5 networks, f5 software, software defined application services, application services, application layer, application delivery, cloud, deployment, network infrastructure, software development, infrastructure, application performance management, service oriented architecture, cloud computing, data center
    
F5 Networks Inc
Published By: Cisco     Published Date: Nov 17, 2015
With 50 to 100 billion things expected to be connected to the Internet by 2020, we are now experiencing a major paradigm shift that is revolutionizing business. More and more of the objects we use every day—including those in our factories, utilities, and railroads—are used to capture and distribute information that is helping us know more and do more. The TechWiseTV team and guest experts take an in-depth look at how industries like these are utilizing the data they are gathering from the factory floor all the way out to the field. This exploration into how the Internet of Things actually works in the real world and what your organization must do to take full advantage of it is a great opportunity to understand the practical challenges and specific technology involved in bringing all this potential to life.
Tags : 
cisco, connected factory, internet of things, iot solutions, data management, convergence, business process management, data integration, data analytics, networking, it management
    
Cisco
Published By: UL     Published Date: Oct 22, 2018
CERTIFICATION IMPACT ANALYSIS: IEC 62368-1, EDITION No. 3 Audio/Video, Information and Communication Technology Equipment – Part 1: Safety Requirements.
Tags : 
audio, video, communication, technology, safety requirements, iec 62368-1, 62368-1 edition 3
    
UL
Published By: Epicor     Published Date: Aug 03, 2012
Distribution executives can no longer afford to view their IT department as merely a cost center. In today's competitive landscape, information technology represents a strategic, cost-saving, revenue-generating differentiator.
Tags : 
saas, software as a service, service-oriented architecture, soa, web 2.0, virtualization, report cards, balanced scorecards, native language, accurate information, up-to-date information, consistent information, around the world, epicor, it management, data management, data center
    
Epicor
Published By: HP     Published Date: Oct 09, 2008
In an effort to stay ahead of the competition, companies have poured capital resources into information technology. In many cases, this has been done on a group-by-group basis, with each line of business creating its own infrastructure silo. Each silo had its own systems, servers, storage, licenses, and support teams—and each shouldered the total cost of owning and operating a standalone infrastructure.Learn more by downloading this paper.
Tags : 
mission critical, it virtualization, storage, data management, storage virtualization, data integration
    
HP
Published By: Vendor Guru     Published Date: Dec 21, 2007
Managing customer relationships profitably is a challenge many businesses face. Increasingly available information and customer choices translate into a decrease in automatic loyalty. New distribution and communication channels create more complex customer interactions. Implementing powerful technology enablers may be prohibitively expensive for many firms.
Tags : 
crm, customer relationship management, crm solution, crm software, loyalty, customer loyalty, customer satisfaction, customer interaction, profitability, vendorguru, vendor guru, quinstreet, vendor guru general campaign, best practices, customer interaction service, enterprise software, sales & marketing software, customer experience management
    
Vendor Guru
Published By: Entrust Datacard     Published Date: May 15, 2014
The immense popularity of mobile devices has introduced major changes to information technology in all industries, but one clear constant is the need to preserve security. This infographic provides a quick glance at the importance of device certificates in a mobile-powered world.
Tags : 
entrust, certificates, mobile devices, security, device certificates, it management
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jul 21, 2014
The immense popularity of mobile devices has introduced major changes to information technology in all industries, but one clear constant is the need to preserve security. This infographic provides a quick glance at the importance of device certificates in a mobile-powered world.
Tags : 
device certificates, identity, authentication, mobile world, information technology, security
    
Entrust Datacard
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search