Search News by Date

Sunday, March 23, 2008

=?ISO-8859-1?B?U2xhc2ggU2hpcG1lbnQgVHJhY2tpbmcgQ29zdHMgd2l0aCBTdXBwbHkgQ2hhaW4gRXZlbnQgTWFu YWdlbWVudA==?=

If you have trouble reading this, please click
http://www.technologyevaluation.com/news/wp/20080324.html

Technology White Papers & Case Studies for the Enterprise Market
 Executive White Papers & Case Studies Newsletter March 24, 2008    Vol. 1, No. 355  
TOP WHITE PAPERS & CASE STUDIES THIS WEEK
  Supply Chain Event Management: Proactive Supply Chain Visibility
Inovis
Supply chain event management (SCEM) offers a number of key organizational benefits. Notably, you can increase supply chain visibility for early detection of potential problems, and you'll boost your percentage of on-time deliveries. But the biggest benefit may be that it enables companies to slash their order tracking costs—in the case of one name-brand clothing manufacturer, by a staggering 98 percent.
Read more



Microsoft SharePoint and Citrix Application Optimization Deployment Best Practices and Performance Validation
Citrix
If you're moving toward outsourcing and a dispersed workforce, deploying a centralized knowledge and document repository is going to be one of your biggest challenges. All users, regardless of their location, expect reasonable application response times to actively participate in the knowledge exchange process within your organization. Find out what you can do to overcome this challenge—before it hits your bottom line.
Read more



Convergence 101 Tutorial Series: Telephony
Nortel Networks (Links to vendor site)
Telephony is a key element of convergence—and the primary reason for the hype surrounding it. But why is telephony so important to convergence? Voice or telephony traffic is very sensitive to latency on the network. The fact that converged networks must provide timely and reliable delivery of voice traffic makes it a key component to a successful converged solution implementation. Learn more about how it all works.
Read more



The 2007 Application Security Trends Report
Cenzic
The Internet continues to be a powerful force for driving business activity, and is increasingly being used by organizations to manage internal corporate data and operational activities. Indeed, the online presence of a business or organization depends on the use of Web applications to store, transmit, and manage confidential information. So do you know where your top Web application vulnerabilities are?
Read more



Dealing with Chaos: 4 Steps to Manufacturing Success
Infor
Manufacturing today is fraught with uncertainties in the supply chain due to a variety of global issues, including weather and exchange rates. You can counter supply problems with "safety stock." But this extra inventory goes against the rules of an efficient lean environment. How can you stay demand driven, without a supply snafu? Find out how an information management system can help forecast your supply chain needs.
Read more



How to Make Virtualized iSCSI SANs Work for You
EqualLogic
Enterprises of all sizes are building flexible storage infrastructures by using iSCSI and virtualization technologies that let them allocate and shift storage area network (SAN) resources dynamically in response to the demands of their virtualized server environments. Find out how a virtualized infrastructure with virtualization technologies can help you achieve an IT infrastructure that is simple to manage and scale.
Read more



MOST POPULAR
  Executive Guide to Business and Software Requirements
IAG Consulting

The Alignment-focused Organization: Bridging the Gap between Strategy and Execution
SAP

Ten Keys for Project Success
RPE

more...  

Our Directory of White Papers & Case Studies

 

 
Accounting and Financial ManagementAsset ManagementConsulting and ServicesCustomer Relationship Management (CRM) Data Management and AnalysisDevelopmentE-commerceElectronic Distribution and StorageEnterprise Resource Planning (ERP)Government and LegalHealth InformaticsHuman ResourcesIT InfrastructureIT Monitoring and ManagementKnowledge Management and CollaborationLearning and EducationOffice Application and AutomationProduct Lifecycle Management (PLM)Project and Process ManagementSupply Chain Management (SCM)
 

Our Knowledge Bases

 

 
Accounting Systems • Business Intelligence (BI) and Business Performance Management (BPM) • Business Process Management (BPM) • Content Management • Customer Relationship Management (CRM)  • Enterprise Asset Management (CMMS/EAM) • Enterprise Financial Systems  • Enterprise Resource Planning (ERP) • Human Resources Management Systems (HRMS) • Information Security  • Learning Management • Linux, Open Source, and IT Services • Outsourcing • Product Lifecycle Management (PLM) • Project Portfolio Management (PPM) • Radio Frequency Identification (RFID) • Retail Systems  • Software Testing • Supply Chain Management (SCM)


This Newsletter (#1155924) has reached you at khari.amit.news@blogger.com
Thank you for reading www.technologyevaluation.com's Newsletter ISSN#1715-3263.
Copyright ©2008 Technology Evaluation Centers, Inc.
You have registered to www.technologyevaluation.com and requested access to the our newsletter.

How to cancel my subscription?


No comments:

Subscribe now

Add to Google Reader or Homepage Add to My AOL Subscribe in NewsGator Online Subscribe in Bloglines