Software  >   Systems Software  >   Network Management Software  >  

Business & Operational Support Systems

RSS Feed    Add to Google    Add to My Yahoo!
Business & Operational Support Systems White Papers (View All Report Types)
 
How a Top 10 Bank Uses A Data Analytics Tool to Manage Operational Risk
sponsored by Infogix
WHITE PAPER: In this case study, learn about the analytics tool a top 10 U.S. Commercial Bank ultimately adopted to gain visibility and operational controls for compliance. Discover the benefits they achieved, including reduced costs while increasing productivity, processed full audit in real time, and more.
Posted: 11 Jul 2016 | Published: 31 Dec 2014

Infogix

Transforming IT Culture to Assure Business Service Quality and Improve IT Operational Efficiency
sponsored by CA Technologies.
WHITE PAPER: It is necessary to Integrate IT silos for a holistic approach to service operations management. Read this paper to learn how fostering predictive and proactive business service analytics can transform IT culture can assure business service quality and improve IT operational efficiency.
Posted: 09 Jun 2011 | Published: 09 Jun 2011

CA Technologies.

Multiple Job Scheduling Environments
sponsored by RevSoft
WHITE PAPER: Most companies have separate Environments for their Enterprise Resource Planning. In this paper learn how Rev Scheduler comes shipped with multiple Environments so even at initial installation you have a multiple Environment Scheduler in place.
Posted: 10 Sep 2008 | Published: 09 Sep 2008

RevSoft

Emerging Best Practices for Carrier IP Transformation
sponsored by Alcatel-Lucent
WHITE PAPER: This whitepaper identifies emerging best practices for planning, implementation, migration and operations based on hands-on experience with IP Transformation initiatives across the globe.
Posted: 20 Aug 2008 | Published: 20 Aug 2008

Alcatel-Lucent

Improving Tools and Techniques to Combat Malware Evolution
sponsored by Webroot
WHITE PAPER: Some researchers are working hard to create tools that strengthen malware analysis and improve security. Read this expert guide to learn more about what look look for in malware and the threat actors behind the scenes.
Posted: 09 Oct 2012 | Published: 09 Oct 2012

Webroot

A BI Agenda for Midsize Organizations: Six Strategies for Success
sponsored by IBM
WHITE PAPER: Make informed decisions at a lower cost with the right BI strategy.
Posted: 14 Jun 2010 | Published: 15 Jan 2009

IBM

Collaboration Without Boundaries: IBM Lotus Domino 8 and Open Collaboration Client Solution Powered by Red Hat Enterprise Linux
sponsored by Red Hat and JBoss
WHITE PAPER: The cost of downtime can be enormous, even catastrophic. IBM and Red Hat have a single, security-rich collaboration and messaging platform that makes it simple, easy, and affordable to improve organizational productivity and effectiveness.
Posted: 18 May 2009 | Published: 15 May 2009

Red Hat and JBoss

BPM and SOA Require Robust and Scalable Information Systems
sponsored by IBM
WHITE PAPER: Read this white paper for a discussion of the principles for the convergence of BPM and SOA from an information system perspective. The primary audiences are IT leaders and architects that need to understand how to effectively combine BPM and SOA in support of business integrity and operational excellence.
Posted: 03 Aug 2010 | Published: 02 Nov 2010

IBM

Hedge Funds: Why Comply? - A Practical Guide to Developing a Culture of Compliance
sponsored by Advent Software, Inc
WHITE PAPER: This white paper written by Advent Software outlines how hedge funds can create a "culture of compliance" with best practice ideas for accurate record keeping and reporting, transparency in operations and, putting the interests of investors first.
Posted: 10 Jul 2008 | Published: 01 Jan 2006

Advent Software, Inc

Integrating Vulnerability Assessment and Remediation
sponsored by Lumension
WHITE PAPER: An outline for successfully integrating vulnerability scanning and remediation capabilities is presented in this whitepaper. This will ensure that organizations maintain a secure environment while complying with internal and external security policies.
Posted: 10 Jul 2008 | Published: 01 Oct 2007

Lumension
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement