level

Results 1526 - 1550 of 1729Sort Results By: Published Date | Title | Company Name
Published By: Vocalocity     Published Date: Apr 18, 2007
Hosted PBX phone solutions are revolutionizing how small and medium-sized businesses (SMBs) serve their customers, grow their business, and support their employees. Delivering the same enterprise level, professional phone system capabilities large businesses use at a much lower cost, hosted PBX is helping SMBs save money while putting their customer services on par with much larger organizations.
Tags : 
pbx, phone, phone system, ip telephony, telecom, telecommunications, voip, voice over ip, networking, network management, vocalocity
    
Vocalocity
Published By: HP     Published Date: May 11, 2011
This paper demonstrates how migrating to HP BladeSystem delivers significant ROI through reduction in hardware and facilities expenditures.
Tags : 
hp intel, blade server, hp bladesystem, roi, it infrastructure, hardware, facilities, slas, service level agreements, vms, x86 servers, cost savings, datacenter
    
HP
Published By: GFI     Published Date: Jun 12, 2007
This white paper examines why having multiple anti-virus scanners at mail server level substantially reduces the chance of virus infection and explores ways in which this can be achieved.
Tags : 
anti virus, anti-virus, virus, norton, network security, email security, intrusion prevention, ips, gfi, virus engine, trojan, trojans
    
GFI
Published By: GFI     Published Date: Jul 24, 2007
This white paper explains what makes spam such an unbearable problem and how spamming tactics are evolving daily to beat anti-spam software. The latest tactic is to use the common PDF file format to send image spam. By using PDF attachments to send images instead of embedding them in the body of the email message, spammers have taken the cat-and-mouse game with anti-spam software developers to a new level.
Tags : 
adobe, adobe acrobat, acrobat, gfi, spam, image spam, pdf spam, anti-spam, anti spam, email security, zombie, zombies, botnet, botnets, hacker, vulnerability, filtering, blocking, mailessentials, mail essentials
    
GFI
Published By: GFI     Published Date: Jun 03, 2009
More than ever, SMBs need to focus on security as part of their IT infrastructure, building around it rather than considering it as an afterthought. This has become even more critical over the past few years as many businesses have unwittingly lost their customers’ personal data due to security breaches, and as states and countries have responded by enacting laws to force the businesses to implement additional levels of protection.
Tags : 
gfi, smbs, small, medium, business, it infrastructure, security, windows nt, exchange server, aup, acceptable use policy, remote access policy, secure, internet policy, it management
    
GFI
Published By: Torry Harris Business Solutions     Published Date: Jul 18, 2007
Service-Oriented Architecture (SOA) promises significant benefits to today's organizations. Successfully delivering SOA benefits, especially Business Agility and Component Reuse, will be dependant on the Test Approach that your organization adopts to implement your SOA.
Tags : 
soa, service oriented architecture, middleware, service level, performance testing, business agility, quality of service, qos, quality assurance, governance testing, testing, soa governance, torry harris, thbs
    
Torry Harris Business Solutions
Published By: Perimeter     Published Date: Jul 17, 2007
Before Microsoft released Microsoft XP Service Pack 2 (SP2), most attackers would compromise a computer system by simply attacking it with known vulnerabilities or "bugs" that could allow the attacker to gain some level of control over the system. Newer attack methods were starting to be seen where the attacker would take advantage of vulnerabilities within the Internet browser itself.
Tags : 
virus, anti-virus, anti virus, spyware, windows xp, xp sp2, intrusion detection, ids, intrusion prevention, ips, spam, filtering, blocking, malware, malicious code, windows firewall, perimeter, perimeter esecurity
    
Perimeter
Published By: MASERGY     Published Date: Jul 20, 2007
Organizations of all sizes are evolving to an enlightened, business-focused method of choosing network services and service providers called Total Customer Experience (TCE). This white paper describes the evolution toward a TCE approach and the benefits and clarity that TCE brings to the marketplace.
Tags : 
mice, multimedia, internet, communications, entertainment, service level, service level agreement, ip networks, collaboration, tce, quality of service, service provider, network provider, isp, masergy
    
MASERGY
Published By: Ecora Software     Published Date: Aug 16, 2007
This paper offers the industry's only solution for automating detailed reporting that ensures Enterprise Configuration Visibility™ – reducing the time and cost associated with IT control, compliance, and security, and ensuring the highest levels of availability and performance for your organization.
Tags : 
configuration management, compliance, security management, audit, auditing, regulatory compliance, monitoring, itil, change management, ecora, enterprise applications
    
Ecora Software
Published By: Ultimus     Published Date: Aug 16, 2007
By enabling Adaptive SOA, Ultimus Adaptive Discovery takes SOA to the highest level of rapid deployment and agility. It accomplishes this by enabling business processes to be developed rapidly, and to embrace change in real-time. More importantly, it empowers business professionals and analysts who own processes to discover and change processes with IT playing the supporting role to manage the infrastructure.
Tags : 
ultimus, bpm, business process management, automation, process discovery, discovery, adaptive discovery, bpa, productivity, adaptive soa, soa, service oriented architecture, service-oriented, enterprise applications
    
Ultimus
Published By: OneNeck IT Services     Published Date: Aug 24, 2007
When Spyder Active Sports offered to pay its IT outsourcing provider more money in return for more services, and the provider not only refused the offer but its service levels continued to go downhill, it was time to look for a new provider. It came down to three potential vendors, however, a number of factors lead Spyder to select OneNeck IT Services.
Tags : 
oneneck, erp hosting, erp outsourcing, it outsourcing, it hosting, outsourcing, governance, outsource, enterprise resource planning, it services, spyder, sports, it management
    
OneNeck IT Services
Published By: Indicative Software     Published Date: Aug 24, 2007
Learn about agent-based versus agentless monitoring approaches to enterprise management, and how a combination of data collection technologies can realize the benefits of both.
Tags : 
enterprise management, enterprise monitoring, data collection, data collection engines, agent-based monitoring, agentless monitoring, performance monitoring, application performance, synthetic monitoring, passive monitoring, active monitoring, service level management, service management, systems management, indicative
    
Indicative Software
Published By: Asentria Corporation     Published Date: Sep 04, 2007
Today’s service providers face more pressure than ever to keep remote equipment up and running as customers continue to demand higher levels of reliable service while keeping costs competitive. Thus, there is a growing need for remote site management solutions that can help service providers monitor, access and control telecom equipment located at customer sites.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures, fault management, network management, remote site monitoring, remote site alarms, environmental monitoring, network alarm monitoring, network alarm management, remote telemetry units, alarm management system, network management systems, network monitoring, protocol mediation
    
Asentria Corporation
Published By: Echopass     Published Date: Sep 07, 2007
Not all companies that have adopted multi-sourcing have realized the expected levels of savings.  A single over-arching problem is often the cause when multi-sourcing delivers disappointing results in service and/or savings.
Tags : 
multi-sourcing, call center outsourcing, remote agents, disaster prevention, ip call center, ip contact center, contact center solutions, contact center software, hosted call center, contact center, on-demand contact center, hosted contact center systems, crm, echopass
    
Echopass
Published By: Netwrix     Published Date: Apr 22, 2008
Windows’ newest technology, the User Account Control, found in the Vista operating system has been erroneously called an additional level of security by many computer security professionals. Instead, in the hope to reduce the incidence of malware, unauthorized software installation, and unintentional system changes the User Account Control separates standard user tasks from requiring administrator level password access.
Tags : 
vista, windows vista, microsoft, microsoft vista, netwrix, security breach, access control, user access control, security
    
Netwrix
Published By: Tideway Systems     Published Date: Dec 11, 2007
IT service providers need to offer services that deliver new business opportunities whilst increasing levels of availability, controlling risks and reducing costs. This paper provides you with practical guidance based on the practices in ITIL® V3 that will help you manage application and infrastructure changes and configurations.
Tags : 
service management, itil, change management, configuration management, knowledge management, service strategy, service design, tideway, tideway systems
    
Tideway Systems
Published By: VMware Dell     Published Date: Sep 29, 2008
Virtualization offers the promise of simplifying your IT infrastructure from the desktop to the data center. But can your virtual environment maintain the level of availability you need to keep your business running or to recover from a disaster?
Tags : 
vmware, dell, virtual data center, data protection, disaster recovery
    
VMware Dell
Published By: ICC Decision Services     Published Date: Feb 18, 2008
In today’s competitive economy, the role of advertising and promotion has never been more important. Creating consumer awareness and driving them to make a buying decision continues to be the central focus, but the average consumer is attacked with more messages than ever before. As the level of total advertising has risen, there has been an evolution of the variety of methods and types in existence. This has placed the advertising industry in a state of chaos.
Tags : 
icc, decision services, event marketing, sales, marketing, branding, customer
    
ICC Decision Services
Published By: ICC/Decision Services     Published Date: Feb 18, 2008
In today’s competitive economy, the role of advertising and promotion has never been more important. Creating consumer awareness and driving them to make a buying decision continues to be the central focus, but the average consumer is attacked with more messages than ever before. As the level of total advertising has risen, there has been an evolution of the variety of methods and types in existence. This has placed the advertising industry in a state of chaos.
Tags : 
icc, decision services, event marketing, sales, marketing, branding, customer
    
ICC/Decision Services
Published By: Catalyst SF     Published Date: Apr 30, 2008
This white paper is intended to provide an overview of the mobile marketing options available to marketers today. It is designed for the person who wants an entry level perspective on the platform. Ultimately, this document is meant as a starting point in your pursuit for greater understanding of emerging media options, in this case mobile. After reading, you should have some idea of how to proceed to explore digital marketing for your brand.
Tags : 
catalyst, mobile marketing, mobile, cell, cell phone, smart phone
    
Catalyst SF
Published By: Identity Engines     Published Date: Mar 24, 2008
Guests, contractors, vendors, business partners, and other temporary users require and expect certain level of network access within organizations that they visit. Corporate network access has been typically open; internal LAN connections have seldom required authentication. Today however, regulatory and other security concerns demand that organizations adopt a more secure posture towards these short-term users.
Tags : 
idengines, id engines, identity engines, access control, authentication
    
Identity Engines
Published By: Oce Business Services     Published Date: Jun 24, 2009
Download this free report to explore the potential of applying business performance management principles to advance document performance management to reduce costs; better manage documents as vital strategic, financial and information assets; and secure positive returns on investments from outsourcing. Learn more today!
Tags : 
oce, kpi, ekg, document processes, mail center, print/copy operations, records, operations, cost cutting, documents, information, roi, return on investments, oce max, real time, dpm, document intensive, bpm, ediscovery, key performance indicator
    
Oce Business Services
Published By: Clickatell     Published Date: May 20, 2008
In meeting the challenges of an increasingly competitive banking landscape, Standard Bank seeks to differentiate itself by providing the highest levels of service to its customer base. An integral part of achieving this goal has been its partnership with Clickatell to deliver personalized and relevant messaging to bank customers via their mobile phones.  Read this case study to learn more.
Tags : 
customer centric messaging, clickatell, standard bank
    
Clickatell
Published By: RenderX     Published Date: May 27, 2008
If you're producing transactional customer communications such as statements, invoices, policy notifications, or shipping documents, you probably already have some of the basic elements you need to start using TransPromo to take your marketing campaigns to the next level. TransPromo advertising in a PDF, PostScript and AFP electronic and print format can easily be injected into your application with RenderX.
Tags : 
transpromo, xml, xsl fo, pdf, postscript, afp, xep, direct advertising, pinpoint, xsl templates, memorystream, renderx, knowledge management
    
RenderX
Published By: Arcot     Published Date: Jun 04, 2008
Solutions including one-time-password (OTP) generator tokens, do not offer the same level of protection as the ArcotID against attacks such as the man-in-the-middle attack. The ArcotID secure software credential provides protection against common Internet threats and several futuristic attacks that are becoming popular among fraudsters.
Tags : 
authentication, digital signature, password management, cardholder authentication, arcot, smartcard
    
Arcot
Start   Previous    61 62 63 64 65 66 67 68 69 70    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee