IT Services  >   IT Management Services  >   IT Outsourcing Services  >  

Business Process Outsourcing Services

RSS Feed    Add to Google    Add to My Yahoo!
Business Process Outsourcing ServicesReports
 
BPM Quarterly eZine: BPM in the cloud: Reaping rewards, avoiding pitfalls
sponsored by IBM
EZINE: Experts say that a growing number of organizations use cloud computing to support their business process management (BPM) initiatives—and with good reason, considering the potential benefits. But the cloud comes with challenges that smart companies can address using the expert advice in this issue of ebizQ.com's BPM Quarterly.
Posted: 08 Dec 2011 | Published: 08 Dec 2011

IBM

Your Business May Be Part of a Network - But Is It Truly Connected?
sponsored by Crossgate
WHITE PAPER: Business networks are key to competitive advantage. How businesses connect and communicate with partners in their business networks is important in this global economy. This article offers suggestions and examples of how to avoid getting bogged down in maintaining a business partner network and instead focuses on a business’s key differentiators.
Posted: 08 Apr 2010 | Published: 08 Apr 2010

Crossgate

Seven Steps for a Successful GroupWise Migration to Exchange 2010 and BPO
sponsored by Dell Software
WHITE PAPER: In this new white paper by Quest Software, learn seven steps for a seamless migration from GroupWise to Exchange 2010. Discover Exchange 2010’s key features, and read about the challenges you face when planning your migration.
Posted: 16 Sep 2010 | Published: 15 Sep 2010

Dell Software

Tips for Optimizing your B2B Trading Community
sponsored by IBM
WHITE PAPER: This paper illustrates how Sterling Commerce solutions drive greater efficiencies, and improve the return on your B2B infrastructure investment. It explores how to automate more transactions with your existing electronic partners, and how to simplify the assessment and onboarding of your remaining manual trading partners.
Posted: 24 Feb 2011 | Published: 24 Feb 2011

IBM

Five Steps to Secure Internet Single Sign-On (SSO)
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper describes why and how any organization can implement secure Internet single sign-on, which provides for the portability and interoperability of identity information across organizational boundaries. Read this white paper to learn the five steps to secure internet single sign-on.
Posted: 05 Jun 2009 | Published: 05 Jun 2009

Ping Identity Corporation

Growing Market Share in a Highly Competitive Financial Services Industry
sponsored by Keynote Systems
WHITE PAPER: Financial services organizations strive to retain existing customers and attract new ones, many are introducing new, enhanced services over the Web. Ensure you are providing the best possible experience by focusing your SLM processes on the end user.
Posted: 23 Jan 2005 | Published: 01 Jan 2004

Keynote Systems

Enhancing Business Process Management with Business Rules
sponsored by FICO
WHITE PAPER: While a business process management system can save time and cut costs by governing process, it can’t decide what to do, given a particular circumstance. A business rules management system enables the right decisions to be made quickly. This white paper uses case studies to illustrate the value of adding rules to BPM.
Posted: 25 May 2010 | Published: 25 May 2010

FICO

Enterprise Cloud Computing : The CIO perspective
sponsored by Salesforce.com
CASE STUDY: Discover how CIOs are adopting enterprise cloud computing solutions to quickly meet business needs.
Posted: 20 Jan 2010 | Published: 20 Jan 2010

Salesforce.com

The Five Critical SLA Questions
sponsored by IBM
WHITE PAPER: SLAs are critical tools that can help ensure appropriate performance. And the use of SLAs as part of the service delivery management process is on the rise. If you’re going to succeed, you’ll have to do your homework. This paper identifies the five critical steps you should take before you define your Service Level Agreements.
Posted: 24 Feb 2011 | Published: 24 Feb 2011

IBM

Presentation Transcript: Location Evaluation Factors for Offshore Outsourcing: The Promise and the Peril
sponsored by Accenture
PRESENTATION TRANSCRIPT: When it comes to offshore outsourcing, security and location decisions have become more important overtime. Read this presentation transcript from the webcast of the same name and discover best practices and security risks in offshore outsourcing.
Posted: 17 Mar 2009 | Published: 17 Mar 2009

Accenture
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement