RecruitingBlogscom

Follow Us:

 

epo

Results 4576 - 4600 of 5148Sort Results By: Published Date | Title | Company Name
Published By: Business Intelligence Inc.     Published Date: Nov 18, 2006
Surprisingly low-cost technology MSSO/SD4E transforms Excel into an incredibly powerful and completely secure Business Intelligence tool capable of quickly and easily manipulating and analyzing live data directly from multiple, disparate data sources, generating even the most complex and sophisticated analytical reports with a simple keystroke.
Tags : 
business intelligence, business analytics, excel, business intelligence inc., analytical applications, analytics, enterprise applications
    
Business Intelligence Inc.
Published By: Cenzic     Published Date: Nov 21, 2006
Enterprises are responding to new threat on communication protocols by hardening Web applications, and they are increasingly turning to Web application security assessment tools to improve the security of their applications. This report examines why high accuracy is critical to the effectiveness of the tools, and it discusses how Cenzic Hailstorm addresses this problem.
Tags : 
application security, web application security, hacker detection, cenzic, cenzic hailstorm, security
    
Cenzic
Published By: Cenzic     Published Date: Nov 11, 2008
Cenzic’s ClickToSecure ARC product is a certified PCI Scanner Vendor by the PCI Security Standards Council (certificate number 4192-01-01). This Software as a Service (SaaS) offering requires no software to install and provides your company with thorough reports via the Web that reveals security and compliance issues, remediation recommendations, and methods for process improvement. By using Cenzic, PCI compliance now just becomes one reporting feature among many in your arsenal of tools for managing application vulnerability.
Tags : 
cenzic, pci compliance, security
    
Cenzic
Published By: Winshuttle     Published Date: Dec 04, 2006
This paper describes how to easily integrate Excel data with SAP solutions and the resulting benefits from such integration – reduction in financial closing time, reduction in data entry resources, and availability of timely data for reporting.
Tags : 
excel, sap, integration, spreadsheet, reporting, productivity, cost control, erp
    
Winshuttle
Published By: Winshuttle     Published Date: Dec 04, 2006
This white paper describes some easy-to-use data management tools that many companies are using to let business users do complex data updates and reporting tasks effortlessly. This technology is not only easing their Sarbanes-Oxley compliance, but is also saving these companies large amounts of time and money.
Tags : 
compliance, sox, sarbanes, sarbox, sarbanes-oxley, sarbanes oxley, data management, cost control
    
Winshuttle
Published By: SpringCM     Published Date: Dec 07, 2006
Learn how web services integration enabled Priority Solutions’ clients and vendors to access documents in the SpringCM repository via the company’s self-service Web portal.
Tags : 
content management, document management, content management system, collaboration, web portal, portals, internet portal, springcm
    
SpringCM
Published By: Siperian     Published Date: Jan 24, 2007
Master Data Management is a cohesive strategy for managing all master data domains.  Where is your organization most likely to derive business value from a Master Data Management solutions?  This report answers these questions and details the path forward:  Adaptive Master Data Management.
Tags : 
data management, master data management, mdm, business intelligence, data integration, data quality, siperian
    
Siperian
Published By: Siperian     Published Date: Jan 24, 2007
This comprehensive report addresses industry-specific issues for the Financial Services sector, Insurance, Pharmaceutical companies, Retailers, Manufacturing, and High-Tech.
Tags : 
master data management, data management, financial, return on investment, roi, it spending, data integration, mdm
    
Siperian
Published By: Avalere     Published Date: Apr 02, 2007
Sensitive documents, files and intellectual property are extracted from a central repository such as a database, records management system, or document management system to complete daily tasks, however, extracting this information can lead to a security breach.  Avalere provides the tools you need to control the proliferation of sensitive information throughout your organization.
Tags : 
security, security management, database admin, dba, records management, database management, document management, data security
    
Avalere
Published By: BusinessObjects     Published Date: Jan 30, 2007
Download this step by step guide to learning how mid-size companies can benefit from Business Intelligence. You'll learn the benefits of BI and why mid-size companies need it for effective decision-making and improved results.
Tags : 
performance management, data quality, msrs, microsoft reporting services, cognos 8, cognos, powerplay, cognos reportnet
    
BusinessObjects
Published By: Infor     Published Date: Feb 27, 2007
This white paper report describes an innovative, simple and effective approach to Lean Manufacturing. Simplified Market Pull (SMP) includes a 'pull' scheduling mechanism with appropriate controls and buffers that supports dramatic reductions in production lead-time and work-in-process inventory while freeing up available capacity and improving on-time performance and reliability.
Tags : 
productivity, supply chain management, scm, enterprise resource planning, erp, pull scheduling, smp, manufacturing
    
Infor
Published By: Infor     Published Date: Apr 19, 2007
Aberdeen's 2006 ERP in Manufacturing Benchmark Report explored how ERP strategies are evolving as enterprises strive to derive more and better business value from their implementations. That often means driving the use of ERP deeper into their organizations or broader across more of the enterprise.
Tags : 
buyers guide, buying guide, erp, enterprise resource planning, best practices, best of breed, best-of-breed, manufacturing
    
Infor
Published By: WorldTelemetry, Inc.     Published Date: Mar 26, 2007
Business Intelligence Software are applications that build on existing data warehouses and provide analytical processing tools that allow users to more effectively analyze such data. This, in turn, permits businesses to more rapidly develop existing and new analyses and reports for improved decision-making power and information dissemination capacity.
Tags : 
analytical applications, business analytics, business metrics, business intelligence, enterprise software, bi software, world telemetry, worldtelemetry
    
WorldTelemetry, Inc.
Published By: Trapeze Networks     Published Date: Apr 16, 2007
This analyst report written by Stan Schatt, VP & Research Director, Networking at ABI Research  helps you decipher the WLAN security alphabet soup, understand architectural approaches to WLAN security, upcoming standards for roaming, load balancing and management frame encryption, and key security requirements that you should consider for you next WLAN deployment.
Tags : 
wi-fi, wireless, wlan, remote technologies, roaming, encryption, access point, service set identification
    
Trapeze Networks
Published By: LogiXML     Published Date: May 04, 2007
The term Business Intelligence 2.0 (BI 2.0) is cropping up more and more in the industry, generally referring to the next generation of BI just as Web 2.0 has come to refer to the next generation of the Web.
Tags : 
business intelligence, olap, data analysis, xml, ajax, collaborative bi, dashboards, reporting
    
LogiXML
Published By: ForeSee Results     Published Date: Jul 20, 2007
This report analyzes satisfaction of the various methods of generating site traffic (email, search marketing, recommendations, shopping comparison sites, etc.) to see which result in the most satisfied customers -- who are also more likely to purchase in the future and recommend the site to others.
Tags : 
foresee, foresee results, online marketing, comparative, conversion, conversions, customer satisfaction, referrals
    
ForeSee Results
Published By: GFI     Published Date: Jun 13, 2008
Spam generates an enormous amount of traffic that is both time-consuming to handle and resource intensive. Apart from that, a large number of organizations have been victims of NDR spam that has an effect similar to a Distributed Denial of Service on the email system. In this paper we provide a technical explanation of NDR Spam and recommend solutions that can prevent or limit exposure to this kind of unsolicited email.
Tags : 
email security, ddos, denial of service, distributed denial of service, ndr, spam, non-delivery report, non delivery report
    
GFI
Published By: Concur     Published Date: Jan 07, 2013
Download this whitepaper and you will get an overview of how automated solutions simplify the process of logging and tracking T&E, virtually eliminating mistakes, and ensuring compliance.
Tags : 
expenses, automated solutions, eliminating mistakes, compliance, management, travel and entertainment
    
Concur
Published By: Ecora Software     Published Date: Aug 15, 2007
Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial
    
Ecora Software
Published By: Ecora Software     Published Date: Aug 15, 2007
Understand why FISMA is heating up, what's the impact on Agency IT departments, what role configuration reporting plays, how the right documentation can build a strong audit trail, and how automation fast tracks your compliance plan.
Tags : 
change management, configuration management, it management, fisma, fisma compliant, fisma compliance, project management, compliance
    
Ecora Software
Published By: Ecora Software     Published Date: Aug 15, 2007
Learn about the Sarbanes-Oxley regulatory background and its impact on IT departments. This document provides information pertaining to access issues, change documentation, disaster recovery planning and illustrations of key audit-ready reports.
Tags : 
sox, sarbox, sox compliance, sarbanes oxley, sarbanes-oxley, enron, compliance, information management
    
Ecora Software
Published By: Ecora Software     Published Date: Aug 15, 2007
Our guide shows you how automation can create a sustainable control and reporting system – a must-have with mandated quarterly and annual assessments. If you've already prepared for, and experienced, your first Sarbanes-Oxley audit, you'll want to read this guide on sustainability.
Tags : 
sox, sarbox, sox compliance, sarbanes oxley, sarbanes-oxley, enron, compliance, information management
    
Ecora Software
Published By: Ecora Software     Published Date: Aug 15, 2007
Achieve and Maintain Compliance with PCI Data Security Standard – Part 4. Deep dive into PCI DSS requirements 10-12. Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial
    
Ecora Software
Published By: Ecora Software     Published Date: Aug 15, 2007
Deep dive into PCI DSS requirements 5-9. Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial
    
Ecora Software
Published By: Ecora Software     Published Date: Aug 16, 2007
Deep dive into the first 4 PCI DSS requirements. Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial
    
Ecora Software
Start   Previous    177 178 179 180 181 182 183 184 185 186 187 188 189 190 191    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by RecruitingBlogs.   Powered by

Badges  |  Report an Issue  |  Terms of Service

scroll to the top