RSS feed Get our RSS feed

News by Topic

control

Results 1976 - 2000 of 2260Sort Results By: Published Date | Title | Company Name
By: Infor     Published Date: Feb 27, 2007
Infor Discrete Manufacturing Essentials are built exclusively for discrete manufacturers, with specific functionality that addresses the industry's essential challenges. The result? For one typical Infor customer, a 50 percent reduction in data processing costs and fully automated management of more than 11,000 items and 200 suppliers.
Tags : supply chain management, enterprise resource planning, erp, scm, enterprise performance management, supplier relationship, customer relationship management, infor
     Infor
By: Infor     Published Date: Feb 27, 2007
This white paper report describes an innovative, simple and effective approach to Lean Manufacturing. Simplified Market Pull (SMP) includes a 'pull' scheduling mechanism with appropriate controls and buffers that supports dramatic reductions in production lead-time and work-in-process inventory while freeing up available capacity and improving on-time performance and reliability.
Tags : productivity, supply chain management, scm, enterprise resource planning, erp, pull scheduling, smp, manufacturing
     Infor
By: PEAK Technologies, Inc.     Published Date: Apr 19, 2007
Download this paper now and read why many businesses now recognize that comprehensive management of their wireless device infrastructure is a crucial component of a total IT enterprise management solution.
Tags : wireless, infrastructure, wireless infrastructure, wireless device, wireless networking, wlan, mobile computing, it management
     PEAK Technologies, Inc.
By: GAO RFID Inc.     Published Date: Feb 28, 2007
Barcodes, magnetic stripes, and proximity readers all rely on the user to either make contact or place the badge very close to the reader. In addition, bar codes can only be read one at a time and the respective embedded information cannot be updated. Find out how an RFID access control system can provide an easy and efficient solution.
Tags : rfid, rfid tags, mobile data systems, access control, identity management, gao, gao group, gao rfid
     GAO RFID Inc.
By: GAO RFID Inc.     Published Date: Feb 28, 2007
GAO RFID has launched an intelligent parking control management system, integrating RFID technology, automatic control technology and applications software. Learn how the implementation of RFID technology can improve conditions and potentially increase revenues for your parking facility.
Tags : rfid, wireless hardware, wireless infrastructure, rfid tags, parking, transportation, gao, gao group
     GAO RFID Inc.
By: Business Assyst     Published Date: Mar 26, 2007
This paper considers whether smart cards really do have a role to play in loyalty systems or whether they are simply being promoted by the suppliers of smart card technology into what they see as a fast growing, profitable marketplace.
Tags : customer satisfaction, customer relationship management, customer interaction service, customer experience management, smart card, smart cards, access control, business assyst
     Business Assyst
By: WorldTelemetry, Inc.     Published Date: Mar 26, 2007
Corporate managers responsible for multiple fuel tank locations need remote technology applications to maximize their information use and increase the reach of their resources. Success when planning new remote technology projects can be measured in terms of increased profitability or ROI if the planners adequately address the build vs. buy decisions required when choosing the necessary hardware, software, deployment and integration strategy.
Tags : fuel, gas, roi, return on investment, infrastructure, cost control, business intelligence, cost efficency
     WorldTelemetry, Inc.
By: Microsoft Dynamics     Published Date: Nov 06, 2008
The Rodgers & Hammerstein Organization (R&H) manages and administers musical and theatrical licensing rights for the heirs of Richard Rodgers, Oscar Hammerstein II, and many other talented writers. The company implemented Microsoft Dynamics AX in 2006 to gain complete control and visibility over its licensing and business operations. More recently, the company wanted to give employees quick and easy access to the information they need to perform their jobs more efficiently. R&H enrolled in the Microsoft Technology Adoption Program and became one of the first companies in the world to implement Microsoft Dynamics AX 2009. Now, employees throughout the organization have almost instant access to company information tailored to their specific roles. Employees spend less time tracking tasks and more time efficiently serving customers.
Tags : microsoft dynamics, rodgers & hammerstein
     Microsoft Dynamics
By: Trapeze Networks     Published Date: Apr 16, 2007
This paper identifies the requirements for next-generation WLANs, examines the limitations of existing approaches, and describes an innovative WLAN architecture from Trapeze Networks called Smart Mobile™, which overcomes those limitations.
Tags : 802.11n, wireless, wi-fi, wireless local area network, wlan, wireless network, mobile, voice over ip
     Trapeze Networks
By: Decru     Published Date: Apr 23, 2007
Company data is vulnerable to threats from - insiders, unauthorized access to data, data backup, off-site mirroring - just to name a few. Encrypting data at rest, on tape or disk, significantly mitigates these threats. This document provides guidance into some of the factors a company should consider when evaluating storage security technology and solutions.
Tags : storage, security, encryption, key management, protecting your data, security controls, networked storage environments, audit & logging
     Decru
By: HP     Published Date: May 11, 2011
Learn how HP Systems Insight Manager monitors and controls the server environment to enhance staff efficiency, improve uptime, and reduce the cost and complexity of managing the data center.
Tags : hp insight control management, business value, roi, tim grieser, randy perry, server life-cycle management, it management, infrastructure management
     HP
By: GFI     Published Date: Jun 14, 2007
This white paper details how integrated network faxing remains a relevant technology that can give you a business edge in an ever competitive marketplace, providing higher productivity and helping you save thousands of dollars in labor costs alone.
Tags : ip networks, ip network, ip fax, ip faxing, faxing, fax, fax server, fax security
     GFI
By: GFI     Published Date: Jun 14, 2007
In this white paper, we explore how the uncontrolled use of portable storage devices such as iPods, USB sticks, flash drives and PDAs, coupled with data theft techniques such as ‘pod slurping’, can lead to major security breaches.
Tags : endpointsecurity, end-point, endpoint security, insider, usb, mole, i-pod, ipod
     GFI
By: GFI     Published Date: Jun 14, 2007
This white paper examines the nature of the threat that devices such as iPods, USB sticks, flash drives and PDAs present and the counter-measures that organizations can adopt to eliminate them.
Tags : endpointsecurity, end-point, endpoint security, insider, usb, mole, i-pod, ipod
     GFI
By: GFI     Published Date: Jan 11, 2008
2008 brings with it new challenges and issues that network and systems administrators should be aware of, particularly vulnerabilities brought on by users. This white paper examines the top concerns which network security professionals should be prepared to face in 2008, and how they can be mitigated.
Tags : gfi, employees, employee vulnerability, vulnerability management, vulnerability, vulnerabilities, security concerns, internal threats
     GFI
By: Concur     Published Date: Jan 07, 2013
Download this whitepaper if you want a checklist to help your business save time and money.
Tags : essentials, expense management, business, save time, money, budget, ineffective, control costs
     Concur
By: Perimeter     Published Date: Jul 17, 2007
Before Microsoft released Microsoft XP Service Pack 2 (SP2), most attackers would compromise a computer system by simply attacking it with known vulnerabilities or "bugs" that could allow the attacker to gain some level of control over the system. Newer attack methods were starting to be seen where the attacker would take advantage of vulnerabilities within the Internet browser itself.
Tags : virus, anti-virus, anti virus, spyware, windows xp, xp sp2, intrusion detection, ids
     Perimeter
By: ProofSpace     Published Date: Jul 31, 2007
This paper details the processes by which ProofMark tags electronic records with a self-validating cryptographic seal that acts as a "tamper indicator" based on a true and provable time-reference datum.  With this it is able to provide instantaneous and irrefutable proof of authenticity, no matter where the data resides or who has controlled it.
Tags : proofspace, proofmark, proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data
     ProofSpace
By: Ecora Software     Published Date: Aug 15, 2007
Our guide shows you how automation can create a sustainable control and reporting system – a must-have with mandated quarterly and annual assessments. If you've already prepared for, and experienced, your first Sarbanes-Oxley audit, you'll want to read this guide on sustainability.
Tags : sox, sarbox, sox compliance, sarbanes oxley, sarbanes-oxley, enron, compliance, information management
     Ecora Software
By: Ecora Software     Published Date: Aug 16, 2007
This paper offers the industry's only solution for automating detailed reporting that ensures Enterprise Configuration Visibility™ – reducing the time and cost associated with IT control, compliance, and security, and ensuring the highest levels of availability and performance for your organization.
Tags : configuration management, compliance, security management, audit, auditing, regulatory compliance, monitoring, itil
     Ecora Software
By: OneNeck IT Services     Published Date: Aug 24, 2007
The nature of corporate accounting and financial controls has forever been changed by Sarbanes-Oxley legislation. This white paper discusses the ripple effect of the Act on the IT outsourcing community and the new responsibilities and ethics that rest on companies, both public and private, that entrust all or part of their IT environment to an external third party.
Tags : oneneck, erp hosting, erp outsourcing, it outsourcing, it hosting, j.d. edwards, oracle, baan
     OneNeck IT Services
By: OneNeck IT Services     Published Date: Aug 24, 2007
When he joined SDBC in May of 2004, SunnyD's Chief Information Officer and Global Controller was faced with a classic build-or-buy decision, although the circumstances were less than typical. Despite the company just being carved out from Procter & Gamble with an experienced management team and a well-known brand name, it was missing a crucial operational element — an entire information technology infrastructure.
Tags : oneneck, erp hosting, erp outsourcing, it outsourcing, it hosting, microsoft dynamics ax, fusion, outsourcing
     OneNeck IT Services
By: Asentria Corporation     Published Date: Sep 04, 2007
Today’s service providers face more pressure than ever to keep remote equipment up and running as customers continue to demand higher levels of reliable service while keeping costs competitive. Thus, there is a growing need for remote site management solutions that can help service providers monitor, access and control telecom equipment located at customer sites.
Tags : telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures
     Asentria Corporation
By: Nevis Networks     Published Date: Sep 04, 2007
While 802.1X has a growing presence, it's still immature and may not provide all the policy enforcement features commonly required in most organizations. This white paper focuses on the 802.1X standard for authentication and access control and how it compares to the Nevis approach for LAN security.
Tags : security policies, policy management, authentication, access control, lan, lan security, 802.1x, nevis
     Nevis Networks
By: Nevis Networks     Published Date: Sep 04, 2007
The ability to monitor, track and report usage based on actual user identity and applications provides for quicker reaction time, easier reporting for compliance, as well as more visibility into the network. Learn about a complete line of solutions for effective identity-based policy enforcement.
Tags : lan, lan security, network security, security policies, security policy, policy management, best practices, nevis
     Nevis Networks
Start   Previous    73 74 75 76 77 78 79 80 81 82 83 84 85 86 87    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics