Small Medium Businesses White Papers

(View All Report Types)
HP X5000 G2 Network Storage System Evaluation
sponsored by HPE and Intel®
WHITE PAPER: Read this Tolly Test Report and how the HP X5000 G2 Network Storage System powered by Intel® Xeon® processors not only integrates with existing Microsoft, Unix, and Linux applications using CIFS and/or NFS, but also enables high-speed connectivity to a host of virtualization platforms, database applications, backup applications and more.
Posted: 16 Feb 2012 | Published: 15 Feb 2012

HPE and Intel®

SMBs Need Enterprise-quality Data Protection, Right-sized for Them
sponsored by HPE and Intel®
WHITE PAPER: This white paper highlights the need for SMBs to find data protection tools that are right-sized for their specific needs. It also cautions against organizations underestimating their data protection needs.
Posted: 25 Jun 2014 | Published: 25 Jun 2014

HPE and Intel®

Top 6 "Must-Have" Technologies for Small and Midsize Manufacturers
sponsored by Epicor Software Corporation
WHITE PAPER: This valuable resource counts down six critical manufacturing technologies that every small and midsize organization should have.
Posted: 14 Mar 2014 | Published: 30 Jun 2013

Epicor Software Corporation

Tightening the Chain - Supply Chain Cost-Cutting Strategies
sponsored by SAP America, Inc.
WHITE PAPER: Maintain operational efficiency while cutting supply chain costs with new approaches, technologies, and methodologies. Third party logistics providers, radio frequency identification rentals, and attribute-based demand planning can help you reduce supply chain costs and boost customer satisfaction.
Posted: 07 Aug 2009 | Published: 07 Aug 2009

SAP America, Inc.

Five Challenges for Managers of Mid-Sized Manufacturing Companies
sponsored by Syspro
WHITE PAPER: This resource counts down five challenges that today's midsized manufacturers face, and lays out possible actions you can take to resolve these difficulties and find success.
Posted: 07 Apr 2014 | Published: 31 Dec 2012

Syspro

Security considerations for small and medium-sized enterprises (SMEs)
sponsored by GFI Software
WHITE PAPER: SMEs are just as vulnerable to security breaches as any other enterprise, but often times they consider security only as an afterthought. View this paper to explore key security challenges for SMEs and the necessary tools and policies for effective protection.
Posted: 20 Feb 2012 | Published: 20 Feb 2012

GFI Software

Supporting workplace mobility with ERP
sponsored by Sage (UK) Limited
WHITE PAPER: This white paper examines the business impact of mobile enterprise resource planning (ERP) and why mid-size organizations are flocking to this technology. Also inside, uncover key benefits and potential challenges of mobile ERP.
Posted: 20 Dec 2013 | Published: 31 Oct 2013

Sage (UK) Limited

ForwardView: Four Areas of Security Vital to Business Health
sponsored by IBM
WHITE PAPER: Identifying areas of vulnerability can be increasingly challenging for small to mid-size businesses, but there are four areas – privacy, compliance, risk management and overall security capabilities – where information security is vital to business and profitability.
Posted: 15 Jun 2010 | Published: 08 Nov 2008

IBM

SAP Outsourcing for Mid-Market Companies: A Comparison of Three Leading Providers
sponsored by itelligence, Inc.
WHITE PAPER: Running a business on SAP requires that the application be available 7x24, data be secure, and that the application can grow with an organization. The decision to select an outsourcer goes far beyond finding a data center. Read this paper and learn what questions to ask in order to select an outstanding SAP outsourcing provider.
Posted: 28 Mar 2011 | Published: 28 Mar 2011

itelligence, Inc.

How much security do you really need?
sponsored by IBM
WHITE PAPER: Deciding exactly how much to invest in security can be challenging for any business. Too great an investment can waste resources, too little can jeopardize the business. In this resource, explore the top security concerns for midsize organizations and how to determine a security approach that is both practical and effective.
Posted: 26 Apr 2012 | Published: 02 May 2011

IBM