mine

Results 1376 - 1400 of 1584Sort Results By: Published Date | Title | Company Name
Published By: Bocada     Published Date: Aug 21, 2009
This strategic view is the proverbial "gold" that can be mined from your data protection systems; it is the asset that will enable IT management to prioritize activity to bring activities in line with business objectives and communicate policy compliance to corporate officers and data owners.
Tags : 
data consolidation, data protection, business management, business value, security policies, security policy, policy management, mission critical, mission critical data, bocata, bocada, data management
    
Bocada
Published By: Core Security     Published Date: Aug 21, 2009
This IDC white paper examines key trends in the vulnerability management and assessment (VA&M) market and identifies the value of penetration testing as part of a comprehensive security methodology.
Tags : 
vulnerability management, security management, idc, vulnerability, vulnerability assessment, security audit, auditing, security, security infrastructure, compliance, security compliance, regulatory compliance, core security
    
Core Security
Published By: DataSynapse     Published Date: Feb 26, 2007
This brief examines how application virtualization can compress the development and test cycle, accelerating time-to-market, while reducing risk and complexity.  This brief highlights the impact of centralized command and control of application deployment and execution.
Tags : 
software development, quality assurance, software testing, return on investment, project management, data synapse, datasynapse
    
DataSynapse
Published By: HP     Published Date: Jul 08, 2009
Today's economic climate has heightened the goal of every IT department to provide high-quality IT service to the business, at the lowest possible cost, while improving business outcomes. Looking outside of the infrastructure itself, there are two key challenges related to data storage: provisioning capacity for applications and reducing risk through a sound data protection strategy. This white paper discusses the challenges of creating the right storage infrastructure, provides an overview of data storage options, and examines a storage solution that combines blade servers and network-attached storage.
Tags : 
storage, storageworks, hp bladesystem, server, infrastructure, nas, network-attached storage, blade servers, data protection, san, fibre channel, iscsi, serial attached scsi, sas, proliant, msa, disk arrays, ethernet, rack, servers
    
HP
Published By: IBM     Published Date: Dec 12, 2006
This white paper will examine the potential of a technological breakthrough to reduce trust-based risks and change the way organizations reach a harmonious balance between consumer privacy and information sharing.
Tags : 
identity management, compliance, knowledge management, contact management, information management, privacy, customer privacy, privacy policy, privacy policies, ibm, security
    
IBM
Published By: IBM     Published Date: May 30, 2008
People drive your business. Whether you are a customer, supplier, owner, or employee, it is cultivating and maintaining those people relationships within and beyond your company that determine how well you will fare in the marketplace. This is why IBM knows that it is important that you have ultimate choice and flexibility to work the way you want.
Tags : 
ibm, ep campaign, ibm ep, collaboration, relationship management, information management, desktop management, lotus notes, lotus, knowledge management
    
IBM
Published By: IBM     Published Date: Jun 11, 2008
Good governance of a service-oriented architecture is becoming a core competency. This Magic Quadrant report by Gartner examines the market for SOA governance through a set of integrated technologies. It evaluates leaders, challengers and innovators in the SOA governance technology market, providing feature information and strengths and cautions for each.
Tags : 
soa, ibm, ebf, governance, infrastructure
    
IBM
Published By: IBM     Published Date: Aug 21, 2008
There are many ways to uncover Web application vulnerabilities. This white paper examines a few of these vulnerability detection methods – comparing and contrasting manual penetration testing with automated scanning tools. What you’ll discover is that neither of these methods are an exhaustive method for identifying Web application vulnerabilities.
Tags : 
ibm, ibm mi, ibm grm, web security, internet security, application security, security
    
IBM
Published By: ICG Commerce     Published Date: Aug 21, 2009
This white paper examines how companies are successfully realizing benefits from their procurement initiatives and are viewing procurement as an integral part of their overall corporate strategy. They no longer perceive procurement as a cost center, but rather as a strategic lever for improving profits or funding new initiatives.
Tags : 
eprocurement, procurement, psp, procurement service provider, strategy, corporate strategy, icg commerce, icg
    
ICG Commerce
Published By: iDirect     Published Date: Jan 29, 2007
In this article, the second of a three-part series, readers will learn key questions that can be asked to determine the competence of any search engine optimization company that they are considering. This article can serve as a valuable resource for those researching search engine optimization companies.
Tags : 
search marketing, search engine optimization, seo, seo firm, seo firms
    
iDirect
Published By: NetSuite     Published Date: Mar 09, 2007
This exclusive Yankee Group White Paper reveals and examines how mid-size businesses can now build a real-time enterprises and leverage real-time information. Learn how to reduce scattered information and silo databases that prevent your enterprise from achieving operational excellence.
Tags : 
crm, netsuite, erp, real time enterprise, mid-size businesses, silo database, customer relationship management, enterprise resource planning, netsuite, it management, knowledge management, enterprise applications
    
NetSuite
Published By: Solidcore     Published Date: Aug 21, 2009
This white paper examines the problems enterprises currently face with their NT 4 server deployments, outlines the requirements that any effective solution must satisfy, and explains how Solidcore can help enterprises significantly lower the cost of supporting legacy NT 4 deployments.
Tags : 
windows nt, deployment, windows server, server deployment, server implementation, legacy, solidcore, solid core, platforms
    
Solidcore
Published By: Spectra Logic     Published Date: Aug 21, 2009
To put it simply, data protection is complicated. Simplifying it involves assessing solutions for their near-term and long-term value. This paper examines the less obvious- but not less important - issues in simplifying backup.
Tags : 
backup, data protection, back-up, tape-based backup, tape backup, disk-based backup, disk backup, simple backup, backup system, spectra logic, spectralogic
    
Spectra Logic
Published By: Spectra Logic     Published Date: Aug 21, 2009
Most data storage devices can be broadly characterized as either fixed media or removable media. This paper briefly examines and compares magnetic tape, magneto-optical disk, and removable magnetic disks, and identifies their positioning, future trends, and market applications.
Tags : 
backup, disk backup, tape backup, disk-based backup, tape-based backup, storage media, tape storage, disk storage, storage comparison, spectralogic, spectra logic, storage
    
Spectra Logic
Published By: Sybase     Published Date: Aug 21, 2009
The paper will explore the differences between smart-client and thin-client mobile architectures. It will then examine the details of common smart-client architectures, including what type of back-end systems they integrate with, the types of devices they support, how data is managed within the architecture, and development languages that can be used to build the application.
Tags : 
mobile app, mobile apps, mobile architecture, mobile device, mobile application, mobile application development, application development, mobile, sybase, wireless
    
Sybase
Published By: IAG Consulting     Published Date: Jul 27, 2010
Requirements quality is tangible. This hard-hitting 10 minute video microcast presents the concrete rules that will allow you to quickly assess a requirements document and determine if it will likely lead to an effective implementation.
Tags : 
iag, project management, project management, maturity, consulting, model
    
IAG Consulting
Published By: Symantec     Published Date: Nov 02, 2006
Remote control software has proven to be a cost-effective way of providing remote support. This paper examines how these products provide a cost-effective help desk tool and defines necessary security requirements.
Tags : 
remote control, help desk, remote access, remote network management, remote support, network security, symantec, networking
    
Symantec
Published By: Dell Software     Published Date: May 10, 2013
If you've ever had to determine the extent an employee’s access, you know how tedious, time-consuming and error-prone a thorough manual research can be. It can take a week using Windows native tools But this is a better way. Learn about a solution that makes permission management easy.
Tags : 
dell quest, access, permission management
    
Dell Software
Published By: Quocirca     Published Date: Oct 29, 2008
Outsourcing is a strategy increasingly being used by organizations to reduce costs and increase value. Outsourcing, however, has its risks. As organizations look to push out more of their custom software application development needs to outsourcing partners, careful planning is required in terms of building stringent software security requirements into contracts and creating a process and metrics to ensure that those requirements are met. This report examines outsourcing practices from 200 of the largest organizations in the UK and the US and provides pointers as to how the most experienced outsourcers are putting in place effective processes to drive the risk out of outsourcing.
Tags : 
quocirca, outsourcing, security, networking, software development
    
Quocirca
Published By: TriTuns Innovation     Published Date: Nov 14, 2006
This paper examines the nature, cause and impact of data quality problems in typical IT system implementations.  It argues that the extent and impact of poor data quality is largely misunderstood and often ignored.
Tags : 
data quality, data protection, data improvement, improve data, trituns, trituns innovation, data management
    
TriTuns Innovation
Published By: Customer Chemistry     Published Date: Nov 21, 2008
Since there are many ways to determine your marketing budget, it can be very overwhelming to choose which one is right for you. Even though most require a bit of trial and error, this article should help you narrow down your options. There is no one “correct” option to consider when setting your marketing budget, but here are a few methods that have worked for many companies.
Tags : 
marketing budgets, clarity quest marketing, setting marketing budgets, determining marketing budgets
    
Customer Chemistry
Published By: NetIQ Corporation     Published Date: Nov 18, 2006
This white paper is a must read for those involved in the process of log management for legal use. You'll examine the admissibility of log data in court cases; maintaining the authenticity of log data; and how log data can be attacked and stand up to scrutiny. And, learn legal terms like Hearsay, Best Evident Rules, etc.
Tags : 
log file, data protection, log management, legal log, log data, log law, authenticated log, netiq, net iq, networking
    
NetIQ Corporation
Published By: NetIQ Corporation     Published Date: Jan 29, 2007
This white paper identifies what is required for a comprehensive and integrated security management solution and examines the difference between SEM, SIM and SIEM and the challenges of enterprise level security monitoring.
Tags : 
security management, event management, network security, monitoring, network security, enterprise level security, enterprise security, netiq, net iq, security, it management
    
NetIQ Corporation
Published By: Cenzic     Published Date: Nov 21, 2006
Enterprises need to utilize software testing that can automatically review applications for security problems. This document examines the market drivers and technology associated with software security code review products and discusses how Cenzic is addressing this urgent need.
Tags : 
web applications, application security, web application security, security code, cenzic, security
    
Cenzic
Published By: Cenzic     Published Date: Nov 21, 2006
Enterprises are responding to new threat on communication protocols by hardening Web applications, and they are increasingly turning to Web application security assessment tools to improve the security of their applications. This report examines why high accuracy is critical to the effectiveness of the tools, and it discusses how Cenzic Hailstorm addresses this problem.
Tags : 
application security, web application security, hacker detection, cenzic, cenzic hailstorm, security
    
Cenzic
Start   Previous    46 47 48 49 50 51 52 53 54 55 56 57 58 59 60    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee