We use cookies and other similar technologies (Cookies) to enhance your experience and to provide you with relevant content and ads. By using our website, you are agreeing to the use of Cookies. You can change your settings at any time. Cookie Policy.
54 white_paper items found, showing 1-30 Sort by Relevance / Date
01/25/2010 Smarter State Government Processes in 2010 - Enabling Citizen-Centric Processes, Transforming Service Delivery and Reducing Costs with IBM WebSphere ILOG Business Rule Management System (BRMS) Technology Gold Club Protected
Today states and government agencies must be able to respond and adapt quickly to relentless change to improve citizen and business services, manage resources effectively and efficiently, strengthen national security and public safety and ensure a sustainable environment. Find out how technology can enable the delivery of better value for citizens and lower costs in this solutions brief.
01/14/2010 Implementing a “Business Process Culture” to Automate Core Process Gold Club Protected
This white paper documents the power of BPM to automate and enhance core processes — in this case, classification of information coming into and going out of a government security agency. Because of the sensitive nature of the application, the identity of the agency has been concealed. Despite this anonymity, other organizations can learn how to take advantage of a business process management approach to developing and deploying applications by learning about this agency’s success in implementing a “business process culture” to solve a major security challenge.
12/08/2009 Decide to Survive-Four Imperatives that Make Better Decision Management Essential in Uncertain Times Gold Club Protected

Entering a global recession, companies must respond to increasingly complex markets, changing threats, and fleeting opportunities. They must show compliance with a growing regulatory burden and more layers of regulation at national and international levels, while also reducing operating costs. Decision management answers four imperatives for businesses seeking to thrive in today’s difficult environment. This white paper shares FICO’s decades of experience helping enterprises compete more effectively using decision management technology.

11/23/2009 Protecting Your Network Against the Growing Danger of Web Attacks Gold Club Protected

Web sites containing malware are increasing exponentially. Combating the new threats posed by the Web can be a challenge for organizations. Learn about the negative impact these growing Web threats can have on your business and why proactively protecting your company through an enforced acceptable usage policy in combination with a hosted Web security and filtering service is important.

11/23/2009 Bullet-Proofing Instant Messaging Gold Club Protected

Consumer-grade instant messaging opens a door for malware and can compromise your regulatory compliance efforts and violate copyright protection. This white paper describes how a secure IM service works with standard IM packages to screen and filter traffic, enabling you to block malware and prevent transmission of unauthorized content.

11/17/2009 Customer Success Story – Financial Services: Sumitomo Mitsui Banking Corp. Gold Club Protected

Sumitomo Mitsui Banking Corporation (SMBC) looked to Metastorm BPM to automate new customer on-boarding and compliance related processes. Through the use of Business Process Management Software SMBC has created a single user interface, achieved Basel II and Patriot Act compliance, improved customer service, lowered risk and improved regulatory compliance.

10/14/2009 Smarter State Government Processes in 2010 Gold Club Protected
- Enabling Citizen-Centric Processes, Transforming Service Delivery and Reducing Costs with IBM WebSphere® ILOG Business Rule Management System (BRMS) Technology
Today states and government agencies must be able to respond and adapt quickly to relentless change to improve citizen and business services, manage resources effectively and efficiently, strengthen national security and public safety and ensure a sustainable environment. Find out how technology can enable the delivery of better value for citizens and lower costs in this solutions brief.
02/17/2009 Data privacy best practices: time to take action! Gold Club Protected
In the midst of unprecedented security breaches, the best way to ensure that confidential information remains protected is to develop and implement a comprehensive privacy and security strategy. This white paper explains the steps you need to consider when developing your privacy strategy and implementing your first data privacy project. Find out how you can help your organization implement best practices in privacy protection and make your privacy project successful from start to finish.
02/11/2009 Maximize Business Value with Right-Time Information Using Data Services Gold Club Protected
How agile is your business? It's a question you can't afford to ignore, especially since being agile is how businesses effectively thrive in today's competitive environment. Unfortunately, too many organizations lack timely access to accurate, reliable, and relevant information, that drives business agility.

Therefore, organizations are forced to rethink how they access and integrate enterprise data across business unit silos and corporate firewalls. Application-centric integration approaches—SOA, BPM, EAI, and ESB—promise agility, but fail to deliver on that promise unless complemented by a sophisticated data integration platform that delivers holistic and accurate information as a service to consuming applications and business processes, exactly at the speed of the business.

Download this compelling Informatica White Paper to learn how your IT organization can leverage the power of a sophisticated data services solution to implement an agile enterprise information management (EIM) strategy. Discover how you can maximize business agility with right-time information to increase competitive advantage, improve compliance, and reduce cost, complexity, and risk.
12/15/2008 Magic Software's uniPaaS Provides Flexible Rich Internet Application and SaaS Platform for ISVs and Enterprises Gold Club Protected
Jeff Kaplan of THINKstrategies talks about uniPaaS, and the advantages of metadata-driven approach for RIA and SaaS development .

Jeff Kaplan recommends that ISVs and enterprise software developers consider SaaS platforms which permit the greatest flexibility in addition to their scalability and security considerations. 
Kaplan believes we are quickly approaching an era in which customers will demand a choice of acquiring SaaS solutions delivered in the ‘cloud’ or deploying the solution behind the firewall on-premise. In response, ISVs and enterprise software developers are recommended to start thinking about SaaS platforms which permit the greatest flexibility in addition to their scalability and security considerations.

In this context, Kaplan examines the merits of Magic Software’s uniPaaS application platform in offering a single development paradigm with multiple deployment modes. He thinks that uniPaaS represents an attractive platform for ISVs with existing single-tenant applications who want to migrate to a multi-tenant approach without ending up with two code bases and platforms to support. This can save ISVs significant monies and accelerate the time to market and ROI. 
Kaplan also thinks that Magic Software’s uniPaaS provides flexible Rich Internet Application and SaaS platform for ISVs and enterprises, by offering a metadata-driven alternative to typical code-centric software development solutions. uniPaaS provides ISVs and enterprises with the tools they need to cost-effectively develop RIA and SaaS solutions to cater to their varying requirements. It could help open up the SaaS market to more ISVs who otherwise would not attempt to carry on-premise and on-demand solutions, and could encourage additional market growth and innovation.
11/14/2008 Formalizing Operational Governance: Ensuring the well-managed enterprise Gold Club Protected

Governance is a straightforward concept and is practiced by all enterprises. It is the creation of policies regarding various aspects of the business and then making certain that the policies are followed. Creating the policies is not the main issue in having good governance; all successful enterprises do a good job creating policies. The hard part of governance, and where most enterprises fail, is in monitoring the policies and in knowing that the policies have been followed; in other words achieving control and compliance.

A new class of governance capability is available that will let you dynamically manage all governance efforts in a formal and efficient way, thereby delivering significant ROI to the business in terms of lower operating expenses and improved efficiency. In this paper, the concept of defining and formalizing Operational Governance is discussed, as well as the inherent benefits of implementing an Operational Governance solution.

07/29/2008 Transforming the Enterprise by Automating Document-Centric Processes Gold Club Protected
A plethora of companies are still employing completely ad hoc, document-centric processes, many of which are central to day-to-day operations. To improve business efficiency and agility and to address compliance and risk mitigation requirements, companies must automate these processes and provide an integrated enterprise platform for managing the underlying content. IBM’s Active Content capability provides the foundation for document-centric process automation, and this report describes its application and the benefits in context of IBM FileNet Content Manager and IBM FileNet Business Process Manager.
06/16/2008 Mitigate Risk with Security Assessments Gold Club Protected
Security requires a broad, organization-wide effort that extends to people, policies and actions. To mitigate risk and manage security, organizations must be able to measure the effectiveness of the people, policies, processes and products securing applications and data. Download this white paper to learn how.
03/27/2008 Dynamic BPM - A Comparison Between BPM and Email Gold Club Protected

BPM solutions are designed to support structured processes: workflows that follow formal (rigid, concrete) rules defining roles (who can do what, when), policies (laws, rules), and procedures (interactions, approvals). Structured BPM is perfectly suited for automating formal workflows (e.g., procurement, enrollment, compliance, expenses). However, structured BPM was not designed to support constantly changing workflows (e.g., tasking, action tracking, project management) that make up 80% of the average employee workday.

Today organizations use EMAIL to manage dynamic work. But email offers inadequate control, visibility, and accountability. One study actually found that 43% of people have fallen ill because of EMAIL-induced stress.

HandySoft provides BizFlow, a platform combing the structure of BPM with the flexibility of email. We call this mash-up Dynamic BPM.

02/20/2008 Compliance and Beyond: Toward a Consensus on Identity Management Best Practices Gold Club Protected

For more than a decade, government and industry bodies around the world have issued a growing number of regulations designed -- in whole or in part -- to ensure the security, integrity and confidentiality of personal and corporate data . Regulations are often mandatory and compliance must be verifiable.

Organizations have undertaken programs to ensure compliance with these regulations, a similar consensus has begun to emerge on how to achieve compliance. Forward-thinking companies are now exploring how to do this affordably while ensuring maximum user convenience and satisfaction. This white paper explores these compliance-driven best practices and how prioritizing their implementation makes good business sense beyond the fulfillment of compliance requirements.

01/28/2008 40-Page Book: Key Strategies for SOA Testing Gold Club Protected

When it comes to Web services and SOA testing, creating a plan is important to ensure success, trust and reuse for new services. If you're willing to take the risk, the return on your SOA investment is huge… that is, if it is a well-tested SOA. Untested SOA could cost you millions.

Mindreef worked with industry analyst and ebizQ contributor David Linthicum to create a comprehensive guide for SOA Testing. This new, complimentary 40-page handbook, Key Strategies for SOA Testing, provides a step-by-step guide for defining your own testing domain, understanding your unique needs, and testing all components to help ensure your SOA will be productive and useful from the first day of operation.

By creating an effective SOA testing plan and selecting the right Web services testing and quality tools, you can get every member of your project team -- architects, developers, testers, and support -- working together to improve service compliance, quality, performance and time to market.

Get your complimentary copy of this book to gain valuable insight into the steps you can take today to create and execute a SOA testing plan -- and drive SOA success.

12/21/2007 Avoiding Disastrous Insider Security Breaches Gold Club Protected
Eighty percent of publicized data breaches come from internal sources, and this suggests that organizations that have focused their IT security efforts only on protecting the perimeter are at high risk for potentially disastrous insider security breaches. This Imprivata white paper discusses effective best practices to help your organization counter the insider threat.
11/26/2007 IBM SOA Appliances: Redefining the Boundaries of Middleware Gold Club Protected
SOA appliances from IBM are game-changing solutions that are redefining the boundaries of middleware extending the SOA Foundation with specialized, consumable, dedicated SOA appliances that combine superior performance and hardened security for SOA implementations. This article describes how SOA Appliances offer an innovative, pragmatic approach to harness the power and potential of SOA while simultaneously enabling you to leverage the value of your existing application, security, and networking infrastructure investments.
11/26/2007 Patterns for REST Services with WebSphere DataPower SOA Appliances Gold Club Protected
Representational State Transfer (REST) is the predominant architectural style of such distributed hypermedia systems as the World Wide Web. This article describes service patterns using IBM WebSphere DataPower SOA Appliances for REST-style software systems. Leveraging SOA appliances, these patterns help architects build more flexible software systems, as well as improve the security and scalability of REST-style software services.
10/29/2007 State of the Portal Market 2007: Portals and the Power of Participation Gold Club Protected
Recently, BEA Systems released their annual report on the state of the enterprise portal market, which includes a synthesis of customer survey results and a summary of analyst research. The report reveals that portals remain a top priority for CIOs at large enterprises for the sixth consecutive year. It also substantiates industry consensus that portals remain ideal platforms for consolidating applications, helping enable the integration and reuse of existing systems and data, and helping companies introduce Web 2.0 capabilities to their increasingly tech-savvy user communities.
10/26/2007 The Case for Application Security - How Real is the Threat and What Are Your Options Gold Club Protected
This report compiles data and research from numerous sources and organizes them into a single, straight-to-the-point, data-driven overview of current threats, the true costs of a data breach and the most effective solutions for securing your applications.
10/24/2007 Web Services Security: What's Required To Secure A Service-Oriented Architecture Gold Club Protected
The service-oriented architecture (SOA) concept is now embraced by many companies worldwide. However, because of its nature (loosely-coupled connections) and its use of open access (HTTP), SOA adds a new set of requirements to the security landscape. Download this white paper to learn about more specific SOA security challenges and how to address them.
08/20/2007 The Value of SOA Governance Gold Club Protected

The definition of corporate governance is creating, communicating, and enforcing policies in a corporate environment. Governance is the key to balancing executive control with employee and customer empowerment across the enterprise. While many corporate governance activities don't directly involve the information technology (IT) department, the enterprise does call upon IT to provide tooling for automating policy creation and enforcement, when itÍs possible to represent policies in a machine-understandable format.

Service-Oriented Architecture (SOA) is an approach to organizing IT resources to meet the changing needs of the business in flexible ways. Governance is an essential part of any SOA implementation, because it ensures that the organization applies and enforces the policies that apply to the Services that the organization creates as part of its SOA initiative. But more importantly, organizations can leverage SOA best practices to represent policies broadly in such a way that the organization can achieve better policy management, flexibility, and visibility into policy compliance across the enterprise.

08/07/2007 Next-Generation SOA Infrastructure Gold Club Protected
As SOA becomes the mainstream for enterprise, application developers are faced with a bewildering array of technologies for developing the next generation of applications. This white paper discusses the most important industry standards that are becoming available for developers to build interoperable services and composite applications, including JAX-WS, BPEL, WS-ReliableMessaging, WS-Addressing, SOAP with Attachments, MTOM, WS-Policy, UDDI, WS-Security and Service Component Architecture.
07/10/2007 Web Applications Under Attack: Four Eye-Opening Findings Gold Club Protected
Although there are numerous reports covering viruses, network-based attacks, public vulnerability announcements, and Spam/Phishing schemes, there is little empirical data on the attacks that specifically target web applications. This report aims to shed light on how applications are being attacked.
06/04/2007 SOA Governance: Rule Your SOA Gold Club Protected
This whitepaper underscores the fact that SOA Governance is no side issue -- but rather the key factor to overall SOA and business success! Effective SOA Governance supports your IT oprganization, aligns business and IT, and provides the foundation for compliance management. Business benefits from your SOA initiative can be monitored and optimized, providing you with traceable business goals and the appropriate service implementations and operations. A well-founded and executed SOA Governance avoids the "chaotic growth" of an enterprise's SOA and allows an organization to supervise and manage the entire SOA lifecycle.
05/08/2007 Extending the business value of SOA through BPM Gold Club Protected
According to leading analyst firms, SOA and BPM are mutually beneficial initiatives. According to many CIO polls, organizations often approach SOA and BPM for many of the same benefits: improved visibility, productivity, and agility. SOA can greatly accelerate BPM initiatives, and BPM can yields measurable results from SOA initiatives. BEA has a comprehensive, integrated solution that extends the value of SOA through BPM.
01/02/2007 Application Servers - 2006 User Rankings Gold Club Protected
In Summer of 2006, Evans Data Corporation interviewed over 700 technology professionals worldwide and asked them to rate the top features of the application servers they had actually used. In this FREE report, discover how these fiercely competing products fared on performance, cost, support, scalability, compatibility and integration, security features, server infrastructure, change management, and much, much more. Bar graphs for each parameter, along with quick-glance charts summarizing the top three performers in each category, make it easy to judge the results. This statistics-rich report just may become your best application server purchasing tool -- download it now.
11/09/2006 Fostering People's Interaction and Collaboration Gold Club Protected
To encourage efficiency and innovation, companies are looking for new ways to empower people using technology such as SOA. People are an integral part of the services delivered through SOA, because they interact with those services to execute business results. Businesses can provide personalized, streamlined environments for employees to interact with other people and targeted information using SOA and encourage greater collaboration among employees, business partners and customers. This executive brief explores in greater detail the people entry point for an SOA that enables real time views of key business processes and organization of information to help people interact effectively, make better decisions and collaborate more freely.
09/11/2006 Data Mash-ups Trigger Innovation and Productivity Gold Club Protected
What are Data Mash-ups? It is certainly not a familiar term in enterprise software and might even send a shiver down the spine of a datablase administrator. Yet some large corporations and government agencies are using this concept to get closer to their customers, have a better pulse on their business, monitor and understand external threats and opportunities, or simply get access to information that cannot be obtained any other way. Download this white paper and learn more!
Start Next

Explore Our Topics

  • EDITOR'S BRIEFING
  • Virtual Conferences
  • Webinars
  • Roundtables

BPM in Action

March 10, 2011

The sixth annual BPM in Action 2011 Virtual Conference will explore cutting-edge market developments in BPM and describe how to leverage them for improved business operation and performance. More

View All Virtual Conferences

Smart Case Management: Why It's So Smart.

Date:Nov 05, 2009
Time:12:00 PM ET- (17:00 GMT)

REGISTER TODAY!

Date:Oct 29, 2009
Time:15:00 PM ET- (19:00 GMT)

REGISTER TODAY!
View All Roundtables
  • Research Library
  • Podcasts
  • News

Joe McKendrick: Part II of II: Designing Evolve-ability into SOA and IT Systems

In part two of Joe McKendrick's recent podcast with Miko Matsumura, chief strategist for Software AG, they talk about how SOA and IT systems need to change and grow and adapt with the organization around it.

Listen Now

Phil Wainewright: Helping Brands Engage with Social Media

Phil Wainewright interviews David Vap, VP of products at RightNow Technologies, and finds out how sharing best practices can help businesses understand how best to engage with online communities.

Listen Now

Peter Schooff: Making Every IT Dollar Result in a Desired Business Outcome: Scott Hebner of IBM Rati

Scott Hebner, Vice President of Marketing and Strategy for IBM Rational, discusses a topic on the top of every company's mind today: getting the most from IT investments.

Listen Now

Jessica Ann Mola: Where Will BI Fit In? Lyndsay Wise Explains

In BI, this tough economy and the increasing role of Web 2.0 and MDM are certainly topics on people's minds today. WiseAnalytics' Lyndsay Wise addresses each of them in this informative podcast.

Listen Now

Dennis Byron: Talking with...Deepak Singh of BPM Provider Adeptia

Deepak Singh, President and CTO of Adeptia, joins ebizQ's Dennis Byron in a podcast that gets its hand around the trend of industry-specific BPM.

Listen Now
More Podcasts
  • Most Popular
  • Quick Guide
  • Most Discussed

Quick Guide: What is BPM?

Learn More

Quick Guide: What is Event Processing?

Smart event processing can help your company run smarter and faster. This comprehensive guide helps you research the basics of complex event processing (CEP) and learn how to get started on the right foot with your CEP project using EDA, RFID, SOA, SCADA and other relevant technologies. Learn More

Quick Guide: What is Enterprise 2.0?

A lot of people are talking about Enterprise 2.0 as being the business application of Web 2.0 technology. However, there's still some debate on exactly what this technology entails, how it applies to today's business models, and which components bring true value. Some use the term Enterprise 2.0 exclusively to describe the use of social networking technologies in the enterprise, while others use it to describe a web economy platform, or the technological framework behind such a platform. Still others say that Enterprise 2.0 is all of these things. Learn More