eBusiness

Electronic Business, or "e-business", may be defined broadly as any business process that relies on an automated information system. Today, this is mostly done with Web-based technologies. Electronic business methods enable companies to link their internal and external data processing systems more efficiently and flexibly, to work more closely with suppliers and partners, and to better satisfy the needs and expectations of their customers.
Results 226 - 238 of 238Sort Results By: Published Date | Title | Company Name
By: Quocirca     Published Date: Jul 11, 2007
Operating and maintaining a complex IT infrastructure requires the necessary skills and investment but getting the right staff at an affordable price can be a problem. Finding ways around this can give SMBs a competitive edge leaving them free to focus on new business opportunities.
Tags : infrastructure, smb, small business, online business, high availability, ebusiness, productivity, outsourcing it management, it management, quocirca, small business networks, it spending
     Quocirca
By: GFI     Published Date: Jul 09, 2007
This white paper identifies the problems encountered in addressing network security risks through vulnerability management. It describes how automated vulnerability management contributes to compliance with industry standards such as the Payment Card Industry Data Security Standard (PCI DSS) and assists you in proactively identifying security weaknesses before these are exploited.
Tags : security software, pci, payment card, credit card, compliance, pci compliance, pci data security, vulnerability, vulnerability management, cardholder, data protection, database security, consumer data, consumer privacy, customer data, customer privacy, gfi, security, network security, patch management
     GFI
By: GFI     Published Date: Jul 09, 2007
This white paper highlights why organizations need to implement event log auditing as an integral part of their security policy to meet industry standards such as the Payment Card Industry Data Security Standard (PCI DSS).
Tags : security software, pci, payment card, credit card, compliance, pci compliance, pci data security, vulnerability, vulnerability management, cardholder, data protection, database security, consumer data, consumer privacy, customer data, customer privacy, gfi, security, network security, security management
     GFI
By: Infor     Published Date: Feb 27, 2007
Access this white paper to learn how by employing technology to surmount the challenges of globalization, manufacturers can expand their businesses profitably to incorporate new markets, new levels of innovation and new revenue streams.
Tags : supply chain management, customer service, ebusiness, customer satisfaction, enterprise resource planning, off-shoring, outsourcing, business management, business process management, infor, enterprise applications, manufacturing execution systems
     Infor
By: Campaigner     Published Date: Jan 08, 2007
This white paper is designed to educate you about the main obstacles that can prevent your email from reaching a recipient’s inbox; and the simple tactics that you can implement to avoid these obstacles.
Tags : email deliverability, email marketing, email, email filtering, customer reach, customer relationship management, got corp, got corporation, email security, customer interaction service, customer service, ebusiness, marketing automation, sales & marketing software, sales automation, content delivery, messaging
     Campaigner
By: Campaigner     Published Date: Jan 08, 2007
This informative white paper provides 10 great tactics to get you started trying to make that prediction come true. Read this white paper to learn more on how you can drive your email marketing ROI through email relevance.
Tags : email, roi, relevance, sales & marketing software, email marketing, marketing, ebusiness, customer interaction service, customer experience management, got corporation, got corp, customer relationship management, customer service, marketing automation, return on investment, sales automation, content delivery
     Campaigner
By: Campaigner     Published Date: Jan 08, 2007
Email marketing is by far the best way to attract interest in, build desire for, and generate sales of your products and services. Without a well-managed opt-in email list, you can say goodbye to your email marketing investment. This white paper provides powerful tactics to help you grow bigger, better and more relevant opt-in lists - and turn your Web browsers into buyers.
Tags : email marketing, opting in, opt in, opt-in, email lists, list rentals, ebusiness, return on investment, conversion rate, conversion, got corp, got corporation, customer interaction service, customer relationship management, customer satisfaction, customer service, marketing automation, sales & marketing software, content delivery, customer experience management
     Campaigner
By: Servoy     Published Date: Dec 11, 2006
This white paper on Software as a Service (SaaS) highlights the application development shifts that software vendors must go through to accommodate SaaS.
Tags : saas, java, application development, software-as-a-service, product development, software development, application development, servoy, enterprise applications, platforms, application integration, ebusiness, enterprise software, .net, database development, web development, web services, web service security, service oriented architecture, content delivery
     Servoy
By: SpringCM     Published Date: Dec 06, 2006
You’ve made the decision: the overall ease and economics of implementing Software-as-a-Service (SaaS) appeal to you, and you have selected an application that delivers what you need for your business.  The last hurdle is the service component itself — making sure that critical factors like security, speed, and reliability that will affect your users’ experience meet your standards.
Tags : saas, on-demand, on demand, real time, real-time, appication selection, vendor selection, software selection, service provider, springcm, spring cm, it management, enterprise applications, ebusiness, web services, web service security, service oriented architecture, web service management, content delivery, content integration
     SpringCM
By: Cenzic     Published Date: Nov 21, 2006
Enterprises need to utilize software testing that can automatically review applications for security problems. This document examines the market drivers and technology associated with software security code review products and discusses how Cenzic is addressing this urgent need.
Tags : web applications, application security, web application security, security code, cenzic, security, auditing, compliance, encryption, firewalls, hacker detection, identity management, internet security, intrusion detection, intrusion prevention, security management, security policies, single sign on, web service security, ebusiness
     Cenzic
By: Cenzic     Published Date: Nov 21, 2006
Enterprises are responding to new threat on communication protocols by hardening Web applications, and they are increasingly turning to Web application security assessment tools to improve the security of their applications. This report examines why high accuracy is critical to the effectiveness of the tools, and it discusses how Cenzic Hailstorm addresses this problem.
Tags : application security, web application security, hacker detection, cenzic, cenzic hailstorm, security, ip networks, network security, internet security, web service security, best practices, ebusiness, enterprise software, vulnerability management
     Cenzic
By: KACE     Published Date: Nov 14, 2006
This paper explores how Appliance-based Software Delivery (AbSD) provides a better alternative to both software and Software as a Service (SaaS).
Tags : appliance, network security, saas, absd, hosted model, on-demand model, software development, value-add, value-added, security appliance, kace, it management, enterprise applications, platforms, best practices, ebusiness, enterprise software, web services, content delivery, information management
     KACE
By: Castelle     Published Date: Nov 01, 2006
Easily implemented and integrated with electronic medical record systems, network fax servers can play a valuable role in supporting HIPAA objectives, offering a standardized, enterprise-wide faxing solution, and helping to maintain a high standard of security, efficiency and organization.
Tags : hipaa compliance, ip faxing, ip networks, records management, information management, data protection, privacy, security policies, fax server, server hardware, castelle, networking, it management, enterprise applications, ip telephony, servers, compliance, best practices, business management, call center management
     Castelle
Start   Previous    1 2 3 4 5 6 7 8 9 10     Next   End
Search White Papers      

Add White Papers

Get your company's white papers in the hands of targeted business professionals.