base

Results 4576 - 4600 of 4749Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: May 30, 2008
WinterCorp analyzes IBM's DB2 Warehouse and how it addresses twin challenges facing enterprises today: improving the value derived from the torrents of information processed every day, while lowering costs at the same time. Discover why WinterCorp believes the advances in data clustering strategies and intelligent software compression algorithms in IBM's Data Warehouse improves performance of business intelligence queries by radically reducing the I/O's needed to resolve them.
Tags : 
data warehousing, data management, database management, database administration, dba, business intelligence, ibm, leveraging information
    
IBM
Published By: IBM     Published Date: May 30, 2008
Not all data is created equal, however, and deriving business value from information dispersed over many different sources means integrating, analyzing and optimizing heterogeneous types and sources of information throughout its lifecycle. Find out how, when deployed together in the same environment, IBM TotalStorage Productivity Center, IBM System Storage SAN Volume Controller and IBM Tivoli Storage Manager deliver the core technologies need to help customers tier their storage based on classes of service.
Tags : 
information lifecycle, information management, tivoli, storage management, leveraging information, ibm, ibm li, li campaign
    
IBM
Published By: IBM     Published Date: May 30, 2008
View to this webcast and learn how Memorial Health System, a 500-bed hospital system in Colorado Springs, Colorado, has recently implemented a portal strategy based on IBM WebSphere Portal and Lotus Web Content Management that allows them to quickly and securely provide online capabilities for their external and internal user constituencies.
Tags : 
hospital, portal, corporate portal, collaboration, ibm, websphere, ibm ep, ep campaign
    
IBM
Published By: IBM     Published Date: May 30, 2008
Many healthcare providers have gone through several challenging years of organizing their electronic records systems. And during that time, consumer-driven healthcare has gained momentum. This executive brief explains how an IBM WebSphere Portal software–based solution can provide a flexible and valuable long-term solution compared to other options, with personalized user experiences that help deliver agile, security-rich access to relevant information.
Tags : 
healthcare, hospital, medicine, medical, websphere, ibm, ep campaign, ibm ep
    
IBM
Published By: IBM     Published Date: May 30, 2008
Collaboration. It is the critical element to success and IBM Lotus software is at the forefront. With collaborative innovations that enable users to work the way they want to, Lotus software offers a compelling portfolio that is based on open, integrated and secure solutions.
Tags : 
collaboration, web 2.0, ibm, ibm ep, ep campaign, knowledge management
    
IBM
Published By: IBM     Published Date: May 30, 2008
With open, flexible Web 2.0 technologies from IBM, organizations from all over the world are adding a new dimension of imagination and innovation with these advanced collaborative tools. Learn how you can benefit from social software and team-based collaboration that is helping companies to ride the Web 2.0 wave to collaborative freedom.
Tags : 
collaboration, web 2.0, ibm, ibm ep, ep campaign, knowledge management
    
IBM
Published By: Oracle Corp.     Published Date: May 30, 2008
Current trends show that the vast majority of companies are moving to services-oriented architectures (SOAs) and deploying Web services within and across their IT infrastructure.However, the success of those deployments is determined by the integrations and innovations that Web services make possible and how Web services affect the quality and performance of the mission-critical applications with which they interface.
Tags : 
soa, soas, oracle, application testing suite, web services, mission-critical, enterprise java beans-based, quality assurance
    
Oracle Corp.
Published By: MessageLabs     Published Date: May 28, 2008
Whether its spyware hidden amidst a seemingly innocuous download, a “spoofed” social networking identity, or phishing emails that gain access to valuable information, web and email-based security threats are more advanced and more covert than ever before. Learn how MessageLabs integrated web and email security services protect your business.
Tags : 
    
MessageLabs
Published By: IEX     Published Date: May 27, 2008
Customers and business leaders alike demand a great deal of contact centers which cannot easily be met using the simplistic approaches used to develop early, isolated contact centers. In order to provide a top-shelf customer experience, contact centers must adopt sophisticated processes which can evaluate and route calls quickly and effectively to the right agent, and which schedule agents based on their abilities as well as predicted call demand.
Tags : 
call center management, customer service, workforce management, contact management, iex, contact center, call center
    
IEX
Published By: RenderX     Published Date: May 27, 2008
This paper presents a complete, generic framework for creating modifiable, flowing PDF forms, based on XML content and standard XSL templates. It requires no programming to generate dynamic, fillable, custom PDF forms by mapping some RenderX XSL FO extensions to form elements.
Tags : 
itext, xsl fo, pdf, pdf forms, dynamic forms, xep, xepwin, fill-able forms
    
RenderX
Published By: Stratavia     Published Date: May 21, 2008
This white paper provides an overview of current challenges in the modern data center, the impact those challenges have on the business, and Stratavia’s approach to solving those problems.
Tags : 
data center automation, stratavia, automation, dca, rba, run book automation, operational maturity, operational efficiency
    
Stratavia
Published By: Stratavia     Published Date: May 21, 2008
This document provides an overview of data center consolidation methodologies, the general impact of each method, and how Stratavia’s Data Palette helps data center consolidation initiatives.
Tags : 
data center consolidation, data center standardization, logical consolidation, data center rationalization, data center automation, stratavia, automation, dca
    
Stratavia
Published By: Clickatell     Published Date: May 20, 2008
To attract and retain customers, financial institutions today must be able to provide customers with real-time, reliable information about their bank accounts and transactions, no matter where they are located. Anywhere access to actionable account information helps customers control their finances, fight fraud, and conduct their lives more efficiently.
Tags : 
clickatell, location based services
    
Clickatell
Published By: Clickatell     Published Date: May 20, 2008
In meeting the challenges of an increasingly competitive banking landscape, Standard Bank seeks to differentiate itself by providing the highest levels of service to its customer base. An integral part of achieving this goal has been its partnership with Clickatell to deliver personalized and relevant messaging to bank customers via their mobile phones.  Read this case study to learn more.
Tags : 
customer centric messaging, clickatell, standard bank
    
Clickatell
Published By: CheetahMail     Published Date: May 19, 2008
This white paper provides a number of well-tested, organic methods for email acquisition – giving marketers actionable insight to attract and retain a loyal, profitable subscriber base. Download it now.
Tags : 
cheetah mail, email acquisition, list building, email marketing, cheetah, cheetahmail, experian
    
CheetahMail
Published By: Process Software     Published Date: May 14, 2008
Spyware is on the rise and has been the cause of many data breaches. Stopping it needs to be a strategic part of an organization's overall security plan. Reactive signature-based anti-virus and firewall technology is not a complete solution to prevention. Read this white paper to learn the top five behaviors associated with data theft and how advanced behavioral detection solutions is an effective technology for stopping spyware and can identify and prevent legitimate applications from being misused.
Tags : 
spyware, trojan, virus, malware, web security, internet security, process software, process
    
Process Software
Published By: SAP     Published Date: May 14, 2008
As information flows more freely in the business world, decisions need to be made quicker and based on sturdier data. The analytical capability that was once reserved for large enterprises has now permeated the world of Small to Medium Businesses (SMBs) and provided a solid foundation of visibility into what really matters to these companies.
Tags : 
business intelligence, sap
    
SAP
Published By: Hewlett-Packard     Published Date: May 13, 2008
Learn how SARCOM, a leading IT services provider, used a virtualized HP-based SAN infrastructure linked to server blades, with point-in-time replication (full data set snapclones) and backup to tape libraries to improve storage performance, flexibility, and reliability while reducing costs and protecting data.
Tags : 
hp data protection, data protection, sarcom, virtualization, storage virtualization, virtual storage, virtual array, eva
    
Hewlett-Packard
Published By: Hewlett-Packard     Published Date: May 13, 2008
Describes the growing need for data backup and recovery solutions, the advantages of disk-based systems, and the software required to manage these systems. The paper also looks at the role of Hewlett Packard's Data Protector software in this strategically important market.
Tags : 
hp data protection, data protection, idc, analyst, backup, storage, recovery, storage virtualization
    
Hewlett-Packard
Published By: CA WA     Published Date: May 12, 2008
Although typically thought of as an artifact of legacy computing, batch processes remain vital to today’s real-time enterprises. Behind the real time systems that power the real time enterprise, such as customer order fulfillment, account management, supply chain scheduling and optimization, or financial trading systems, are regularly-updated back office business systems. Over the years, batch technology has evolved from script-based automation to rules or policy-driven workload automation.
Tags : 
bpa, business process automation, soa, service oriented, workload automation, ca wa
    
CA WA
Published By: CA WA     Published Date: May 12, 2008
Emerging information technologies like composite and multi-tier applications, service oriented architectures (SOA), virtualization, grid and cluster computing, and Web Service-based application delivery create an extraordinary opportunity for IT managers. With these dynamic technologies, they can provide business owners with IT services that are extremely flexible and agile, driving a more dynamic and competitive business.
Tags : 
ca wa, workload automation, roi
    
CA WA
Published By: BlueArc Corporation     Published Date: Apr 24, 2008
BlueArc’s Titan Architecture creates a revolutionary step in file servers by creating a hardware-based file system that can scale throughput, IOPS and capacity well beyond conventional software-based file servers. With its ability to virtualize a massive storage pool of up to 4 petabytes of usable, tiered storage, Titan can scale with growing data requirements and provide a competitive advantage for business processes by consolidating applications while ensuring optimal performance.
Tags : 
bluearc, storage, titan
    
BlueArc Corporation
Published By: Astrocom     Published Date: Apr 23, 2008
Quality of Service (QoS) enables outbound network traffic to be identified and controlled to give priority to certain types of traffic. Network traffic may be categorized based on a variety of criteria including addressing information, protocol, port number (TCP and UDP), and packet length.
Tags : 
astrocom, networking, traffic, quality of service, traffic management, network management
    
Astrocom
Published By: Diligent Technologies     Published Date: Apr 11, 2008
Virtual tape library (VTL) solutions are taking hold in companies of all sizes, but not all VTLs are equipped to meet the requirements of enterprise data centers. Evaluating virtual tape technology based on a few key considerations will help narrow the field and minimize buyer’s remorse.
Tags : 
diligent, diligent technologies, vtl, virtual tape, virtual tape library, vtls, storage virtualization, virtual storage
    
Diligent Technologies
Published By: Tripwire     Published Date: Mar 31, 2008
Discover how to achieve and maintain FISMA compliance to ensure security of systems and data.
Tags : 
fisma, government, federal regulations, federal regulation, fisma compliant, citizen, constituent, constituency
    
Tripwire
Start   Previous    176 177 178 179 180 181 182 183 184 185 186 187 188 189 190    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee