Executive IT White Papers & Case Studies
   Web version
   January 19, 2012        Vol. 5, No. 8 
  Protecting Users from Firesheep and Other Sidejacking Attacks with SSL
Verisign
The recent release of the Firesheep Wi-Fi attack tool has increased awareness among both users and attackers of the inherent insecurity of unprotected HTTP connections. Firesheep allows an attacker connected to the local network to monitor the Web sessions of other users on that network. According to experts, the best solution is to use TLS/SSL for all connections to Web sites. Download this white paper to learn how to avoid these attacks.
Read more



Balanced PLM Programs Drive Profitable Growth
Plex Systems
For manufacturers that lack a well-structured product lifecycle management (PLM) program, the instantaneous flow of information only speeds up confusion, duplication of effort, and poor decision making. Find out how a SaaS-based ERP solution is essential for creating an effective, comprehensive integrated PLM program that improves productivity, accuracy, and decision making-and ultimately increases company profitability.
Read more



Why Cloud Computing Matters to Finance
NetSuite
This Institute of Management Accountants (IMA) paper explores the benefits of transitioning from an on-premise financials system to the cloud. The paper reviews research conducted among 800 IMA members regarding their perceived benefits and risks related to moving financials to the cloud, including drivers around total cost of ownership (TCO); anytime, anywhere access; easy upgrades; and business process improvement.
Read more



How Background Screening Can Protect Small Health Care Providers and the Patients They Serve
HireRight, Inc.
With the recent economic recession, small business owners who providing health care services have undertaken steps to reduce unnecessary overhead and expenses. But health care providers recognize the importance of carefully vetting their employees before trusting them with the welfare of their patients. This industry brief outlines the risks that arise from bad hires and how careful background screening can mitigate those risks.
Read more



An ERP Guide to Driving Efficiency
Sage
Improving business efficiency is a perennial concern for any company. While many companies employ siloed applications and manual business processes to improve efficiency, "best-in-class" companies are more likely to exploit enterprise resource planning (ERP) technology to improve their operational efficiency to reduce costs and enhance profitability, and make more resources available for strategic planning. Find out how.
Read more



Enterprise Mobility for Dummies
SAP
In the unwired enterprise, mobile devices connect the boardroom to the shop floor to the consumer across the supply chain. They empower people and companies that employ them. This friendly guide looks at how your enterprise can manage and leverage this technology to ensure your organization is productive and secure. Understand the key aspects of enterprise mobility and know how you can boost your bottom line through mobility.
Read more



MOST POPULAR
  Seven Ways to Help Avoid Lawsuits: Best Practices for Fortifying Your Background Screening Program
HireRight, Inc.

10 Warning Signs that Your ERP System Is Killing Your Business
Plex Systems

Get Greener with SaaS-based ERP
Plex Systems

more ...  

Our Directory of White Papers & Case Studies

 

 
Accounting and Financial ManagementAsset ManagementConsulting and ServicesCustomer Relationship Management (CRM) Data Management and AnalysisDevelopmentE-commerceElectronic Distribution and StorageEnterprise Resource Planning (ERP)Government and LegalHealth InformaticsHuman ResourcesIT InfrastructureIT Monitoring and ManagementKnowledge Management and CollaborationLearning and EducationOffice Application and AutomationProduct Lifecycle Management (PLM)Project and Process ManagementSupply Chain Management (SCM)
 

Our Knowledge Bases

 

 
Accounting Systems • Business Intelligence (BI) and Business Performance Management (BPM) • Business Process Management (BPM) • Content Management • Customer Relationship Management (CRM)  • Enterprise Asset Management (CMMS/EAM) • Enterprise Financial Systems  • Enterprise Resource Planning (ERP) • Human Resources Management Systems (HRMS) • Information Security  • Learning Management • Linux, Open Source, and IT Services • Outsourcing • Product Lifecycle Management (PLM) • Project Portfolio Management (PPM) • Radio Frequency Identification (RFID) • Retail Systems  • Software Testing • Supply Chain Management (SCM)



This Newsletter (#!*REMOTE_ID*!) has reached you at !*EMAIL*!
Thank you for reading www.technologyevaluation.com's Newsletter ISSN#1715-3263.
© 2012 Technology Evaluation Centers, Inc.
You have registered to www.technologyevaluation.com and requested access to our newsletter.

How to cancel my subscription?