Software  >   Systems Software  >   Network Management Software  >  

Business and Operational Support Systems

RSS Feed    Add to Google    Add to My Yahoo!
Business and Operational Support Systems Reports
 
Cyber defense: Understanding and combating the threat
sponsored by IBM
WHITE PAPER: The Global Defense Solutions Projects and Defense Exchange Conference (SPADE) is held annually to bring together organizations involved in network-centric operations, intelligence activities and other defense aspects. This resource explains some of the important topics.
Posted: 20 Jul 2012 | Published: 20 Jul 2012

IBM

BI: The Inconvenient Truth
sponsored by Kalido
WHITE PAPER: What’s the truth behind the failure of many BI projects? Read this paper to learn the main factors leading to disappointment. These pitfalls are not those of new entrants to BI but have been repeated by smart and well managed companies worldwide.
Posted: 04 Jun 2008 | Published: 01 Jan 2008

Kalido

2010 Asset Management Operations and Compensation Survey Findings
sponsored by Advent Software, Inc
WHITE PAPER: In this survey you will learn how asset management has changed over the years and the different challenges asset management professionals have been facing.
Posted: 18 May 2011 | Published: 17 May 2011

Advent Software, Inc

Spotlight on IT - Sustained Growth through Operational Excellence
sponsored by SAP America, Inc.
WHITE PAPER: This paper-one of four function-specific papers-is based on the IT responses and follow-up interviews with technology executives who participated in the 2008 Economist Intelligence Unit operational excellence survey sponsored by SAP.
Posted: 16 Sep 2008 | Published: 16 Sep 2008

SAP America, Inc.

Telstra Reaps Transformation Rewards
sponsored by Alcatel-Lucent
WHITE PAPER: The business benefits of the IP transformation are numerous. First of all, as you reduce the number of actual networks, you save on software licensing costs, air conditioning and power. Less people are also required because rather than operating many silo networks in standalone mode you now have a common network.
Posted: 19 Aug 2010 | Published: 16 Aug 2010

Alcatel-Lucent

Multiple Job Scheduling Environments
sponsored by RevSoft
WHITE PAPER: Most companies have separate Environments for their Enterprise Resource Planning. In this paper learn how Rev Scheduler comes shipped with multiple Environments so even at initial installation you have a multiple Environment Scheduler in place.
Posted: 10 Sep 2008 | Published: 09 Sep 2008

RevSoft

Case Study: Children’s Hospital of Philadelphia
sponsored by HP and Microsoft
CASE STUDY: A department of The Children’s Hospital of Philadelphia sought to improve its data analysis and operational management processes. They implemented a management solution based on Microsoft BI technologies and gained more insight into its data and has automated reporting processes, which reduced laboratory result turnaround times by 50 percent.
Posted: 25 May 2011 | Published: 25 May 2011

HP and Microsoft

Breaking the Business Intelligence Log Jam
sponsored by ParAccel
ANALYST REPORT: In an ongoing business intelligence project, the new required updates pile up at a steady or accelerating rate, while the effort to make each change grows as the system grows more complex. The inevitable result is a growing backlog of unmet business needs. That build-up is the BI Log Jam. Read this analyst report to learn how to break the cycle.
Posted: 26 Jun 2009 | Published: 01 May 2009

ParAccel

Help Desk vs. Service Desk: Which One is Right for You
sponsored by Numara Software
WHITE PAPER: This white paper is intended to help support center managers self-assess their center's primary functions and maturity level in order to choose an incident management system that best fits their needs without wasting money on features that will not be used.
Posted: 21 Apr 2009 | Published: 05 Mar 2009

Numara Software

Improving Tools and Techniques to Combat Malware Evolution
sponsored by Webroot
WHITE PAPER: Some researchers are working hard to create tools that strengthen malware analysis and improve security. Read this expert guide to learn more about what look look for in malware and the threat actors behind the scenes.
Posted: 09 Oct 2012 | Published: 09 Oct 2012

Webroot
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement