BPM for Dummies
[ Source: IBM ]
August 2012- Unleash the power of technology as a competitive advantage! Learn how your entire enterprise can become far more agile, helping you meet your goals with Business Process Management (BPM).
Download Business Process Management For Dummies, IBM Limited Edition, now and learn how BPM creates value through growth, improved performance, better productivity, higher staff effectiveness, and better customer service.
You discover why changing to BPM now makes sense for your organization, how ...
How To Build a Mission-Critical Data Center
[ Source: HP ]
May 2012- Infrastructures must be able to quickly and cost-effectively adapt to evolving needs. Unfortunately, many companies cannot achieve this response with their current data center network architectures. The traditional three-tier model of access, aggregation, and core switching is an operational nightmare.
This white paper unveils a solution that streamlines the design of next-generation data centers to ensure the superior resiliency, performance, and agility that enterprise networks now require.
Avoiding the 8 Common Mistakes of Windows 7 Migration
[ Source: Dell/Microsoft ]
September 2011- The recession put important things on hold for many organizations, like upgrading to new client systems. Now organizations such as yours are ready to upgrade and gain from better performance and efficiency by purchasing new laptops and notebooks with Windows 7 factory-installed.
Before you move dozens - or hundreds - of important business applications into a new environment, find out how other organizations tackled this challenge.
Download "Avoiding the 8 common mistakes of ...
Accountable Care and the Cloud: The Future of Medical IT
[ Source: Siemens ]
July 2011- In this podcast, Dan Emig and David M. Hamilton of Siemens Medical explain how the cloud can help healthcare providers significantly improve business performance by shifting allocation of their limited budget and human resources away from lower-value back-office operations in favor of higher-value clinical and patient-facing services.
The cloud does this by 1) allowing healthcare IT organizations to leverage the economies of scale offered by shared, on-demand infrastructure and 2) providing turnkey access to state-of-the-art ...
Advanced Malware Exposed
[ Source: FireEye ]
May 2011- This handbook shines a light on the dark corners of advanced malware, both to educate as well as to spark renewed efforts against these stealthy and persistent threats. By understanding the tools being used by criminals, we can better defend our nations, our critical infrastructures and our citizens. The "Operation Aurora" incident represents an example of how the threats have escalated, revealing how advanced malware is being used in a systematic, coordinated fashion to achieve ...
Creating a Timeline for Deploying Windows 7 and Eliminating Windows XP
[ Source: Dell/Microsoft ]
February 2012- Windows XP support ends April 8, 2014. Therefore, organizations must decide when to begin their migration to Windows 7, set a target date to have Windows XP out and define the scope of the project.
This research paper reviews Gartner's key findings and recommendations for deploying Windows 7.
CISO Guide to Next Generation Threats
[ Source: FireEye ]
May 2011- Over 95% of businesses unknowingly host compromised endpoints, despite their use of firewalls, intrusion prevention systems (IPS), antivirus and web gateways. This situation-the new status quo-results from criminals leveraging multiple zero-day vulnerabilities, commercial-quality toolkits and social media to perpetrate next-generation threats. These threats move "low and slow" and use several stages and channels to duck traditional defenses and find vulnerable systems and sensitive data.
Read this paper and learn how to regain the upper ...
8 Things That Could Affect Your Business IT Security In The Next Two Hours
[ Source: NETGEAR ]
August 2011- Discover the secrets over-priced security consultants don't want you to know. Network security is not just about preventing a breach, it's about making every working day as productive as possible by preventing external threats.
Where should you start? Download this security brief and NETGEAR will show you the 8 things to do to improve your security posture right now.
Gartner Magic Quadrant for Enterprise LAN
[ Source: HP ]
May 2011- Major LAN purchases and upgrades should not take place without a full competitive review. This Gartner Magic Quadrant reviews the strengths and weaknesses of the major players; including, Alcatel-Lucent, Avaya, Cisco, Extreme Networks, HP and Juniper Networks.
Harnessing Your Tribal Knowledge
[ Source: Altus ]
November 2009- Corporations are modern tribes, with their own members, culture, and knowledge. Capturing, saving, and sharing the collective knowledge of the tribe can lead to a more informed and productive organization over the long haul. Most senior corporate leaders would readily agree that the wealth of their organization lies with the knowledge that is locked in the minds and desktops of their employees. The ability to capture and share that knowledge to maintain success and growth ...
The Greening of Training: How Sustainability Is Reshaping Organizational Learning
[ Source: SkillSoft ]
February 2009- More and more companies are making sustainability a highly visible part of their corporate strategy. There are many factors driving companies to go green, from the desire to improve corporate image to competitive differentiation in the market. But whatever the reason, the training department can be a key part of a green strategy. This dovetails nicely with the overall trend in training to align learning with corporate initiatives. If your company is championing a green ...
How to Use the Six Laws of Persuasion during a Negotiation
[ Source: Global Knowledge ]
August 2006- In order to be successful, you must master the persuasion process, which will enable you to deliberately create the attitude change and subsequent actions necessary for persuading others to your way of thinking. In other words, you have to be able to "sell" your ideas in order to make changes in your favor and, in a win-win situation, provide the other side with a fair deal. This entails a process that can appeal to the ...
Skills Gaps in the World’s IT Workforce: A CompTIA International Research Study
[ Source: CompTIA ]
September 2008- This ground-breaking research identifies trends and gaps in IT skills, explores issues surrounding recruiting and hiring, investigates the current and potential IT market growth and demand for IT professionals, and discovers which factors most influence, and are expected to influence, the IT industry.
The IT industry has experienced many changes and much growth in the past decade with the fast pace of technological change and the ever-increasing globalization of business. We believe that ...
10 Hot Skills for 2009
[ Source: Global Knowledge ]
May 2009- Whether we are in a down economy, seeing jobs go offshore, or witnessing jobs being cut altogether, there are certain IT skills that will never go out of style. With spending on cost-saving technologies such as virtualization rising, and the maintenance of networking and enterprise Microsoft software keeping IT professionals constantly in demand, here's our top 10 hot skills that will take us from a down economy and beyond.
ICDL Exam Cram: Using the Computer and Managing Files
[ Source: Pearson Education ]
January 2008- A user interface consists of the graphical components one uses to view and interact with the computer. To help one prepare for the ICDL exam, this paper published by Pearson Education, Exam Cram teaches the way around the systems file structure. Specifically, the paper covers the computer environment, the desktop, how to manage files, viruses, and print management.
10 Dying IT Skills
[ Source: Global Knowledge ]
June 2009- There are some things in life, like good manners, which never go out of style, and there are other things, like clothing styles that fall in and out of fashion, but when an IT skill falls out of favor it rarely ever comes back. Here's our list of 10 dying IT skills. If any of these skills are your main expertise, perhaps it's time to update your skill set
Minimizing Technology Project Delays with Digital Libraries: The Critical Path to Delivering On Time and Under Budget
[ Source: Safari Books Online ]
August 2008- As the number of new technologies has increased in recent years, so have the complexities of technology projects and the potential for delays in each stage of the project lifecycle. This white paper details how technology project management professionals (PMPs), software architects and developers, product managers, and others, can keep projects on track and under budget by using on-demand libraries that simplify access to published materials such as books and videos.
MCSA/MCSE Exam 70-290 Training Guide: Managing Users, Computers, and Groups
[ Source: Pearson Education ]
January 2008- This paper Pearson Education, Exam Cram covers the Microsoft-specified objectives for the ""Managing Users, Computers, and Groups"" section of the Managing and Maintaining a Microsoft Windows Server 2003 Environment exam. The paper discusses creating and managing user accounts, group accounts, and computer accounts, and setting up roaming profiles. Troubleshooting is a big part of the job, too. Troubleshooting entails helping users understand why they cannot connect to the network - whether its because of locked-out ...
ERP System Fundamentals
[ Source: www.open-source-erp-site.com ]
January 2008- This paper focuses on the fundamentals of Enterprise Resource Planning. Usually ERP systems will have many components, including hardware and software, in order to achieve integration. Most ERP systems use a unified database to store data for various functions found throughout the organization. ERP systems are used in almost any type of organization, large-, medium- or small-scale enterprises.
Enhance Your Bottom Line through your Customer Service Process
[ Source: Salesforce.com ]
July 2013- Download this free guide from John Goodman, Vice Chairman of Customer Care Measurement and Consulting, to learn how to create a customer service process that will grow your business.
Defending Against Today's Targeted Phishing Attacks
[ Source: Websense ]
May 2013- “Is this email a phish or is it legitimate” That’s the question that employees — and executives in particular — are asking with greater frequency. They’ve heard about how high profile organizations and even government agencies have fallen prey to attacks that stemmed from seemingly harmless emails. Has the door been left wide open?
Read this whitepaper to learn guidance on how to recognize advanced threats and protect yourself from them.
The value of training the IT organization
[ Source: HP ]
October 2012- CIOs and IT managers routinely monitor and justify every investment they make. And they must make every effort to ensure each project succeeds and produces business benefits no matter how complex the deployment. During challenging economic periods when pressure increases to produce more with less, IT managers may see training programs as a place to cut costs. But cutting training will backfire.
IDC research shows an undeniably tight link between training, team skill, ...
Microsoft® Windows® MultiPoint Server 2011 Reference Architecture
[ Source: Dell ]
September 2012- Become familiar with key considerations and reference architectures for Microsoft Windows MultiPoint Server 2011. Review configurations targeted to classrooms and training facilities and learn relevant hardware requirements and best practices.
Enterprise 2.0 People & Culture: HR Management Challenges & Opportunities
[ Source: Enterprise 2.0 Conference ]
October 2010- This paper examines how social media applications are influencing the workforce and how these technologies can be implemented to achieve core organization performance goals and improving business processes.
Understanding how to gain greater value and flexibility from the new highly-engaged workforce in conjunction with ‘Enterprise 2.0’ processes and technologies to effectively support critical business functions is a major challenge for organizations.
We examine the changing workforce and what they expect from a ...
SIP Phone Set-Up And Features
[ Source: IPexpert Inc ]
September 2010- This is a video presentation that focuses on Session Initiation Protocol (SIP) phone set-up and various features. Provided by IPexpert, the lecture offers detailed instructions and information on SIP.
CSM in SEPA: Changes Abound
[ Source: Polaris Software Lab ]
August 2010- Clearing and settlement is an important mechanism in the post-SEPA European payments environment. Prior to SEPA, each country in European Union had a separate local clearing and settlement mechanism. The cross-border payments were time consuming and had to be compliant with the payment laws and regulations of countries of both the originator and beneficiary. After the advent of SEPA, CSM framework has seen lot of revolutionary changes. In the post-SEPA scenario, cross-border fund transfer is ...
Video for the Web: What's In It For You?
[ Source: Blue Chew Digital ]
July 2010- With video advertising for the Web becoming more popular, this white paper from Blue Chew Digital will provide an insight into its positioning, value, formats, delivery, and thought processes, as well as discuss how it is now becoming the essential tool for the B2B marketer.
Simply and Improve Data Center Operations Management
[ Source: Verismart Software ]
January 2010- If your IT organization is like most, you must achieve what may seem to be contradictory objectives: deliver higher levels of service and reduce costs. Many IT executives are discovering they can get the service results they desire at a lower cost if they focus on improving operational efficiency through an approach known as service optimization. Service optimization helps IT organizations increase availability, performance, and productivity while reducing costs.
10 Steps for a Successful CRM Implementation
[ Source: Touch Ahead Software ]
June 2010- Nancy Keddy, co-founder and CEO of Touch Ahead Software, has "seen and heard about many CRM implementations that have gone poorly, but [has] also had the pleasure of being involved with many successful implementations." In this white paper, "10 Steps for a Successful CRM Implementation," Nancy makes critical points on key elements that organizations must consider when considering a CRM implementation. Without considering these key elements, a company's CRM initiative could fail.
View All Categories
Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Data Quality, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Performance Management
Hardware : Blades, Data centers, Desktops/PCs, Grid/Cluster Computing, Handhelds/PDAs, Macintosh, Peripherals, Processors, Supercomputers, Unix/Linux servers, Utility/On-demand Computing, Virtualization Hardware, Windows Servers
Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services
Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Internet Policy, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Web Development, Social Business
Management : Career Development, Executive Insights/Interviews, H-1B, Legal, Outsourcing, Personnel Management, Recruiting, Regulation/Compliance, ROI/TCO, Salary/Compensation, Small-Medium Business, Training, Workplace Trends
Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Global Positioning Systems, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Virtual worlds
Security : Antivirus, Application Security, Attacks/Breaches, Cyberterror, Encryption, End user/Client Security, Intrusion Prevention, NAC, Perimeter Security, Privacy, Security Administration, Storage Security, Vulnerabilities and Threats
Services : Business Process Outsourcing, Business Services, Disaster Recovery, Hosted Applications, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Systems Integration, Telecom/Voice Services
Software : Integration, Application Optimization, Business Systems Management, CRM, Database Applications, Databases, Development Tools, ERP, Hosted Software/Applications, Linux, Open Source, Operating Systems, Productivity Applications, Server Virtualization, Service Oriented Architecture, Web Services