• Nmap Technical Guide

    By now, most infosec pros have heard of Nmap, and most would agree that even though the popular freeware tool is invaluable, installing, configuring and running it in the enterprise is no easy task. With that in mind,, in ...  Continue Reading

  • Systems management checklist: Software upgrades

    Software upgrades are an inevitable part of using technology, and it is likely that even the smallest upgrade will alter your system in some way. Although these changes are simply the price, for example, of security patches or better compatibility, ...  Continue Reading

  • Privacy and your offshore operations

    Most companies are used to considering the implications of Sarbanes-Oxley and Gramm-Leach-Bliley on their domestic operations, but thinking about security and privacy offshore is just as important. Contributor Joel Dubin explains how to ensure ...  Continue Reading

  • MySAP CRM: The official guidebook to SAP CRM 4.0

    It is imperative to establish effective sales processes. Working together with marketing, sales order processing, and service, the goal of sales business processes is to establish and enhance business relationships with customers. Learn about sales ...  Continue Reading

  • CRM ROI series: Building a business case for SaaS CRM

    If you're considering hosted CRM, take the time to make sure it will yield quantifiable business improvements. In this business case for Software as a Service (SaaS) CRM, contributor Dan Merriman outlines the questions an organization should ask ...  Continue Reading

  • Why NetWeaver matters as a composition platform, part two

    Start practicing the BPX role. Have a look at a methodology used in NetWeaver to successfully transition business process requirements into business process models ready to be specified and implemented into composite processes within your domain ...  Continue Reading