Channels - Online Papers
These papers have been filed against the Channels - Online domain. Would you like to view all papers we currently hold?
1. Getting to Know You
The need to effectively engage with outsiders has turned identity and access management (IAM) into a business priority, which means, when the case is well made, funds are available. Those transacting direct with consumers online are leading the way.
2. Uses and benefits of SaaS-based Enterprise Social Networking
This survey looked at the business arguments for using an enterprise social networking (ESN) system based on software as a service (SaaS). We also investigated decision makers' views on the comparative qualities of SaaS based systems and those
3. The Interactive Medica Life Sciences Application Suite
Interactive Medica's Life Sciences Application Suite offers a range of cloud-based sales and marketing applications that address the key commercial challenges faced by Life Sciences companies today. The Suite combines the cost, flexibility, and...
4. Single Customer View in Financial Services
In the UK it is now mandatory for deposit takers (banks, building societies and other institutions) to be able to provide the authorities with a single customer view of all deposits held by the organisation for individual depositors. It is likely...
5. Netezza Data Virtualizer
It is often the case in large enterprises that multiple data marts are deployed, along with a central enterprise data warehouse acting as a system of record. While these data marts serve the requirements of the departments or divisions that...
6. Master Data Management
This document provides a snapshot of the current state of the Master Data Management (MDM) market. Master data is data that is shared between computer systems: data domains such as "customer", "product",...
7. Netfira - a B2B software solution
For many companies, all their trading of goods or services is with other companies. This is referred to business to business, or B2B for short. This sort of transaction is typified by the transactions that take place between a manufacturer and...
8. Identity Management as a Service
Identity Management (IdM) solutions have been evolving since their establishment in the late 90's with the purpose of simplifying the management of user identities and access rights across an organisation's enterprise. Typically, IdM...
9. 10 Rules: Embedding a Database for High Performance Reporting and Analytics
Historically, the OEM and ISV market for database products has largely been focused around transactional environments and the supply of applications for particular horizontal or vertical sectors. As time has gone by, these solutions have been...
10. Log and Event Management
In this paper we will discuss what events and logs are, when you should care about them, why you should care about them, and the sort of features...
11. Finsbury Solutions Spreadsheet Workbench V3.6
Spreadsheet Workbench offers consistently strong capabilities across all required capabilities. We particularly like its concept of a living...
12. Customers in the real world
As more and more human activity moves online, it is easy to think that geography no longer matters-surely the internet is without borders? Whilst in some cases this is true, more often than not online activity spills over into the real world.
13. Privileged user management
IT Managers tend to overlook one particular area of IT security, which is the privileged access that they grant to themselves and/or their colleagues in order to do their jobs.
14. Turning customer interaction into profitable relationships
Quocirca's report examines how a CCM strategy can transform the impact of customer communications at every customer touch point, controlling cost, driving operational efficiencies and building customer loyalty.
15. The evolution of strong authentication
New authentication methods such as software, SMS and BlackBerry tokens are further taking the costs out of the use of strong authentication and opening up its use to a whole new range of possibilities.