trade

Results 301 - 325 of 358Sort Results By: Published Date | Title | Company Name
Published By: IAG Consulting     Published Date: Aug 23, 2010
Find the path to success in business requirements definition and management. Technology pervades almost every aspect of corporate competitiveness from customer experience to the products and services offered. Companies that do a poor job at requirements definition and management have trouble communicating needs between the business and technology operations. This inability to clearly and efficiently communicate business needs will eventually show up in the fiscal results of even the largest publicly traded companies.
Tags : 
iag, project management, project management, maturity, benchmark, microcast, consulting, business requirements
    
IAG Consulting
Published By: Symantec     Published Date: Nov 17, 2006
The latest release of Backup Exec allows you to eliminate backup windows and recover individual Exchange messages, folders, and mailboxes - without mailbox backups. Learn more about how Symantec Backup Exec™ 11d for Windows® Servers provides continuous, cost-effective, and high-performance disk-to-disk-to-tape backup and recovery for Windows server data.
Tags : 
disaster recovery, backup and recovery, storage management, network management, network performance, network performance management, business continuity, windows server, servers, symantec, storage
    
Symantec
Published By: Quocirca     Published Date: Jan 11, 2008
Small and medium-sized businesses (SMBs) can benefit from the expansive use of information technology (IT) just as much as their larger counterparts. Indeed, in many cases they have to, because to trade they need to interact with business partners of all sizes and IT failure affects not just internal users but those of third parties.
Tags : 
insight report, quocirca, smb, small business, soho, mid-sized business, smbs, data security, network security, small business it, it networks, securing data, networking, security, data management
    
Quocirca
Published By: Quocirca     Published Date: Aug 05, 2008
As the EU continues to expand, European businesses must look to how they can trade across increasing numbers of regional boundaries, languages, cultures and laws, both within the EU and across the greater Europe. The opportunities are huge – but the problems will daunt many who wish to enter into a pan-European trading environment.
Tags : 
quocirca
    
Quocirca
Published By: LANDesk     Published Date: Feb 12, 2007
White paper discussing how the LANDesk® Management Gateway in LANDesk® management solutions 8.6, along with LANDesk® Trusted Access™, help organizations extend the enterprise management of remote devices across the Internet without having to "punch holes" in the firewall or compromise the security of such devices or the corporate infrastructure.
Tags : 
network security, remote access, security, mobile workers, mobile workforce, remote user, remote workers, trusted access, web service security, internet security, landesk
    
LANDesk
Published By: LANDesk     Published Date: Feb 12, 2007
This white paper discusses how the network access control capabilities of LANDesk® Trusted Access™ available within LANDesk Security Suite 8.6 help organizations protect and secure their enterprise networks at their endpoints to reduce malicious attacks and the resulting downtime, lost productivity, and lost revenues.
Tags : 
network security, access control, nac, network access control, intrusion prevention, landesk
    
LANDesk
Published By: Trapeze Networks     Published Date: Apr 16, 2007
This paper identifies the requirements for next-generation WLANs, examines the limitations of existing approaches, and describes an innovative WLAN architecture from Trapeze Networks called Smart Mobile™, which overcomes those limitations.
Tags : 
802.11n, wireless, wi-fi, wireless local area network, wlan, wireless network, mobile, voice over ip, voip, voice over wlan, vowlanm, network access points, infrastructure, controllers, switches, network management, trapeze networks, cisco, aruba
    
Trapeze Networks
Published By: ProofSpace     Published Date: Sep 10, 2007
Read this paper and learn the principles that are prerequisites to enforceable electronic agreements as required by existing legal standards and electronic signature legislation.  This paper will also specify sixteen measurement criteria that can be used as metrics to assess whether the architecture of an electronic transaction will meet the requirements of admissibility.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography, public key cryptography, time stamp, timestamp, time and data stamping, file authentication, x9.95, accredited standards committee x9, x9.95-compliant, transient key technology, electronic signatures, fda 21 cfr part 11, u.s. e-sign act
    
ProofSpace
Published By: Ecora Software     Published Date: Aug 16, 2007
This paper offers the industry's only solution for automating detailed reporting that ensures Enterprise Configuration Visibility™ – reducing the time and cost associated with IT control, compliance, and security, and ensuring the highest levels of availability and performance for your organization.
Tags : 
configuration management, compliance, security management, audit, auditing, regulatory compliance, monitoring, itil, change management, ecora, enterprise applications
    
Ecora Software
Published By: InvestBrite     Published Date: May 05, 2008
Learn how Trade Center needed to reach highly qualified individual investors while educating them on the benefits of their products and services. Read how InvestBrite can help your investment firm get qualified investing sales leads. Read this paper today.
Tags : 
investor, investing, investbrite, stocks, bonds, trading, trade, stock
    
InvestBrite
Published By: IFS     Published Date: Aug 11, 2011
IFS Applications is a comprehensive, industry-specific solution that helps you balance supply and demand, streamline the supply chain, comply with new regulations, and turn new customers into repeat customers.
Tags : 
ifs applications™, food and beverage, supply chain, crm, customer relationship management, performance management
    
IFS
Published By: Bronto     Published Date: May 18, 2017
The internet has opened up a shopper's paradise where you can find and buy anything right from the living room. With a few simple key strokes, a consumer can choose products and services from merchants around the globe - from that authentic British trench coat to an Australian boomerang to wine straight from the California Coast. But with the gates to cross-country commerce opened wide, have consumers abandoned their local retailers for international merchants abroad? To answer this question, we commissioned a consumer study, conducted by Ipsos Research in the US and Australia and Census wide in UK. We hope this original research helps you better understand the opportunities and challenges of cross-country trade.
Tags : 
    
Bronto
Published By: Tail-f Systems     Published Date: Oct 01, 2008
Network management systems must adapt to meet the requirements of next generation networks.  For example, a user interfaces may need to be refreshed with a state-of-the-art Web interface or support for the NETCONF protocol may be required to help customers deploy scalable networks. Adding functionality and integrating with existing applications and data stores has multiple trade-offs in terms of development time and system efficacy.
Tags : 
network management, next-generation networks, netconf, legacy networks, network management systems, tail f, tail-f, tailf, networking
    
Tail-f Systems
Published By: Godfrey     Published Date: Oct 24, 2008
Recently, however, the explosive growth of online media has changed the PR game, creating a deeper, richer two-way communication between a marketer and its target audiences. Now, marketers can use social media strategies and tactics to engage their audiences directly. Those tactics include press release optimization, online media monitoring and reporting, social media press releases, RSS feeds, blogs, podcasts, webcasts and a host of other emerging technologies.
Tags : 
godfrey, convergent, public relations, business-to-business, traditional pr, media relations, press kits, trade show support, feature articles, case histories, application stories, press releases, social media, blogs, podcasts, press releases, rss feeds, webcasts, press release optimization, online media monitoring
    
Godfrey
Published By: Oracle Corp.     Published Date: Sep 07, 2012
Dubai Customs leveraged Oracle Database and Oracle Business Intelligence, among other solutions, to achieve business intelligence from customs declarations-gaining risk assessment and risk scoring capabilities, and valuable insight.
Tags : 
soa, service-oriented architecture, oracle, dubai customs, case study
    
Oracle Corp.
Published By: Mimosa Systems     Published Date: Jan 16, 2009
Since the rise of archiving systems in business more than a decade ago, the technology has made great strides forward. Recently, stringent regulations and highly demanding litigation procedures have amplified the need for a strong archive system. Messaging systems such as Microsoft® Exchange Server 2007—Microsoft’s latest version of Exchange Server—have also seen their share of changes and improvements in archiving and compliance. This document is intended as a guide and a blueprint for organizations looking at deploying Microsoft Exchange Server 2007 and Mimosa™ NearPoint™ in their environment.
Tags : 
mimosa systems, compliance, archiving systems, messaging systems, microsoft exchange server 2007, it management, storage
    
Mimosa Systems
Published By: Jive Software     Published Date: Mar 09, 2012
Social Customer Service offers a new approach that doesn't just tweak the existing trade-offs. It rewrites the entire equation, so companies can boost customer satisfaction, improve rep productivity, and reduce support costs at the same time. Download this whitepaper and learn how Jive can transform your customer service & support teams.
Tags : 
customer satisfaction, customer service, jive, technology, support, technical support
    
Jive Software
Published By: NetApp     Published Date: Mar 09, 2010
This reference architecture showcases virtualizing Microsoft applications on VMware® vSphere 4™ and NetApp® unified storage and includes best practices for effective backup and recovery in a virtualized environment.
Tags : 
netapp, microsoft, vmware vsphere 4, virtual infrastructure, unified storage, fibre channel, backup, recovery
    
NetApp
Published By: EMC Corporation     Published Date: Jun 12, 2012
Until recently, NorthStar Trade Finance Inc. had primarily been holding their data on legacy storage systems. Find out how they solved their infrastructure performance and growing storage issues using EMC VNXe in this complimentary case study!
Tags : 
emc vnx, northstar, finance, productivity, unified storage, storage, emc, idc analyst report, virtualization, backup and recovery, vm sprawl, vmware, disaster recovery, infrastructure, avamar
    
EMC Corporation
Published By: Red Hat     Published Date: Jan 21, 2011
Gordon Haff - Senior Cloud Product Manager, Red Hat You can build a private cloud today in an evolutionary way that makes use of and integrates with technologies that you already own. Proceed at your own pace and maintain strategic flexibility for the future using infrastructure products that provide a robust, enterprise-class environment that is consistent across bare metal, virtualized servers, private clouds, and public clouds. The steps are all thoroughly documented in a reference architecture, and can be augmented with additional Red Hat products and services as needed. In this session, Gordon Haff will take you through the steps.
Tags : 
red hat virtual tradeshow, live event, private cloud, virtualization, enterprise software, virtualized server
    
Red Hat
Published By: Red Hat     Published Date: Jan 21, 2011
Chuck Dubuque - Product Marketing Manager, Red Hat Server and desktop virtualization technologies, which bring cost and agility advantages to enterprise IT, have become mainstream in most datacenters. However, after nearly 10 years, virtualized servers still only represent about 30 percent of x86 production workloads due to technology limitations and the expense of proprietary virtualization platforms. In this session, Chuck Dubuque will cover: * The benefits of datacenter virtualization * Technologies in the open source community that will enable pervasive virtualization * The move to the cloud * The particular advantages of Red Hat Enterprise Virtualization and the Red Hat subscription model
Tags : 
red hat virtual tradeshow, live event, business agility, enterprise virtualization, product marketing, server, desktop virtualization, datacenter, virtualized server
    
Red Hat
Published By: Red Hat     Published Date: Jan 21, 2011
Daniel Walsh - Principal Software Engineer, Red Hat In this session, Daniel Walsh will show attendees new SELinux features and explain how to use them in Red Hat Enterprise Linux 6. He will cover several SELinux topics, including: * Confining users * Securing your virtual environment * Securing the desktop * Controlling grid jobs * Sandboxing: putting the power into the hands of the administrator * Building and shipping your own SELinux policy
Tags : 
red hat virtual tradeshow, live event, enterprise linux 6, security, desktop, selinux, virtual environment
    
Red Hat
Published By: Red Hat     Published Date: Jan 21, 2011
Red Hat Enterprise Virtualization for Desktops can help your business reduce desktop-associated costs, improve data security, and simplify overall desktop infrastructure management. In this session, Jeff Jameson will explain the technology features and benefits of delivering centrally hosted Linux and Windows desktops to the client of your choosing, while providing a true PC-like experience to your end users. With incredibly rich, integrated features like bi-directional audio and video, and kernel-level security enforcement, Red Hat Enterprise Virtualization for Desktops provides a complete solution for your virtual desktop deployments.
Tags : 
red hat virtual tradeshow, live event, enterprise virtualization, desktop infrastructure management, linux, windows desktop, security
    
Red Hat
Published By: Red Hat     Published Date: Jan 21, 2011
Gunnar Hellekson - Chief Technology Strategist, US Public Sector, Red Hat The government was an early advocate of open source and Red Hat. Red Hat is now ubiquitous, in every state, every branch of the Department Of Defense, and in every cabinet-level agency. After ten years, we no longer hear about security or whether open source is ready for the enterprise. So what's next? How is Red Hat driving the next wave of innovation in government?
Tags : 
red hat virtual tradeshow, live event, us government, public sector, department of defense
    
Red Hat
Published By: Red Hat     Published Date: Jan 21, 2011
Douglas O'Flaherty - Senior Manager, Product Marketing, Red Hat Red Hat Enterprise Linux is the proven leading enterprise open source operating system. Now, with cloud computing progressing into the enterprise and public clouds emerging as a viable alternative, Red Hat Enterprise Linux is well positioned to be leveraged as the cloud guest operating system of choice. In this session, Douglas O'Flaherty will cover the technical and business elements of Red Hat Enterprise Linux that are relevant when used in cloud computing infrastructures, emphasizing the unique challenge of public cloud deployments. Session topics will include: * Cloud-relevant technologies included within Red Hat Enterprise Linux * Release models for Red Hat Enterprise Linux on public clouds * ISV certifications * Security * Deployment flexibility & planning
Tags : 
red hat virtual tradeshow, live event, enterprise linux, operating system, cloud computing, isv certification, security, deployment flexibility
    
Red Hat
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee