Monday, November 27, 2006

Use Customer Data In Ways Your Competion Can't

Forging A True Partnership With Customers

Watch this Webcast and hear how business intelligence solutions can help your organization integrate and use the data your already collect as part of your daily operations to help solve your customer challenges

NEW This Week

Trends and Directions in Business Intelligence

Business Intelligence is one of the fastest growing and most important segments of the IT market. Whether you are a business professional seeking new insights into profitability, a service provider seeking to better understand client problems, or an IT manager needing to deliver useful information to your organization the discipline of Business Intelligence is critical.

Information Availability: How to protect your people, processes & systems

There are no limits to when someone wants access to your company. Your information and systems need to be available 24-7 for people both inside and outside your company. Information availability is a crucial part of any organization’s success today. Protect your people, processes and systems.


Analyst Spotlight

Paul Proctor
Research VP
Gartner, Inc.


Mr. Proctor is a vice president in the security and risk practice of Gartner Research. His coverage includes Legal & Regulatory Compliance, Event Log Management, Security Monitoring (Host/Network IDS/IPS), Security Process Maturity Risk Management Programs, Forensics and Data Classification. Mr. Proctor is a recognized expert in the field of information security and associated regulatory compliance issues surrounding the Health Insurance Portability and Accountability Act (HIPAA), Sarbanes-Oxley, and the Gramm-Leach-Bliley Act (GLBA).

Watch Mr. Proctor here:

Protect Your Information—Assure Electronic Documents Are Secure

The move of more and more business processes from paper-based processes to electronic processes enables both organizational efficiencies and cost savings. Yet the need to assure your information is protected is more important than ever. You need to safeguard your intellectual property, protect confidentiality, maintain privacy, and conform to regulatory mandates.

Monday, November 13, 2006

Visibility into Next Generation OSS

Visibility into Next Gen OSS/BSS and Service Delivery Platforms

With convergence becoming a reality and service delivery platforms becoming much more sophisticated, the OSS/BSS functions no longer take the backseat. Learn from a discussion on the operational realities and the service delivery strategies that will allow service providers to streamline their business and technical processes.


Analyst Spotlight

Dave Russell
Research Director
Gartner Research

Mr. Russell's research specialty is storage management software with a focus on data recovery, including continuous data protection (CDP) and storage resource management (SRM). For the last few years he has traveled the world meeting with customers, business partners and speaking at storage conferences and to the press. He was responsible for defining and driving the technical strategy for the data recovery, SRM and SAN Management offerings at IBM.

Dave can be viewed here:

ILM: How Much Is Inactive Data Costing You?

Information Lifecycle Management (ILM) reaches right to the heart of what storage is all about. It’s about making sure you get the data you need when you need it, with no added burden on your IT staff or systems. Watch this new Webcast and hear trusted advisors discuss the challenges of ILM and more importantly, the solutions to overcome them.

Monday, November 06, 2006

What you should know about offshore outsourcing to China

China Outsourcing Strategies: Perceptions, Realities and Best Practices

With wage inflation and attrition rates rising to as high as 40% in global outsourcing locations, smart companies are looking to China to send offshore IT work. But outsourcing to China presents not only a unique set of advantages, but also its own set of challenges.

NEW This Week

Protecting Mission Critical Applications with Technology Escrow

Inherent to every technology license agreement is a level of risk. Companies that supply and demand technology must adjust to a fast-changing marketplace, and with such uncertainty, precautions are needed.


Analyst Spotlight

Jeffrey Roster
Research Vice President
Gartner Dataquest

Jeffrey Roster is part of the IT Services group. In this role, he communicates global IT trends in the retail and consumer product industries, analyzes end-user requirements and consults on strategies with IT vendor clients. Mr. Roster also conducts primary research interviews with vendors and end users, performs secondary research and writes market research reports.


See Jeff here:

Maximize your WAN: Direct Network Connections add Security, Speed and Quality of Service

Implementing a private wide area network that's right for your business comes with the typical challenges for implementing any enterprise-wide solution. These challenges include time-to-implementation pressures, cost control issues, scalability, reliability and performance.