level

Results 1651 - 1675 of 1729Sort Results By: Published Date | Title | Company Name
Published By: CA WA     Published Date: May 12, 2008
While companies cope with increasing demands for speed from their customers, shareholders and customers alike demand that they make these changes cheaply, with minimal risk and with as few people resources as possible. Is there any way to meet these challenges? Take another look at modern enterprise job scheduling to see how it enables the real-time environment (RTE).
Tags : 
ca wa, workload automation, web services, service oriented, soa, service level, sla
    
CA WA
Published By: Catalyst SF     Published Date: Apr 30, 2008
This white paper is intended to provide an overview of the mobile marketing options available to marketers today. It is designed for the person who wants an entry level perspective on the platform. Ultimately, this document is meant as a starting point in your pursuit for greater understanding of emerging media options, in this case mobile. After reading, you should have some idea of how to proceed to explore digital marketing for your brand.
Tags : 
catalyst, mobile marketing, mobile, cell, cell phone, smart phone
    
Catalyst SF
Published By: Dell Software     Published Date: Apr 25, 2008
In Quest’s new white paper, learn how to implement a solid data protection, recovery, compliance and e-discovery strategy for your critical e-mail data.
Tags : 
disaster recovery, data protection, exchange recovery, exchange e-discovery, comprehensive data protection, continuous data protection, brick level recovery, email archiving, quest, quest software
    
Dell Software
Published By: Netwrix     Published Date: Apr 22, 2008
Windows’ newest technology, the User Account Control, found in the Vista operating system has been erroneously called an additional level of security by many computer security professionals. Instead, in the hope to reduce the incidence of malware, unauthorized software installation, and unintentional system changes the User Account Control separates standard user tasks from requiring administrator level password access.
Tags : 
vista, windows vista, microsoft, microsoft vista, netwrix, security breach, access control, user access control, security
    
Netwrix
Published By: Burton Group     Published Date: Apr 08, 2008
In this Methodologies and Best Practices document, Burton Group Research Director Daniel Blum recounts customer perspectives on the anti-malware battlefield playing out at the enterprise level. The document explores lessons learned, and what keeps customers awake at night even after good defensive strategies are in place. The Reference RFI alone is valuable for those switching anti-malware products, or seeking new ones.
Tags : 
burton group, best practices, malware, security, email security, network security, content filtering
    
Burton Group
Published By: BlueArc Corporation     Published Date: Mar 31, 2008
BlueArc’s Titan 3000 Series is designed to meet the requirements of today’s sophisticated enterprise data centers and vertical applications with new levels of storage performance, scalability and reliability. Titan is the first storage solution that consolidates and manages up to 4 petabytes of data in a single storage pool.
Tags : 
titan, tiered storage, storage, bluearc, storage system
    
BlueArc Corporation
Published By: IBM     Published Date: Mar 28, 2008
For many organizations, applications have been moved to an SOA environment and now must be extended to offer a service interface to new sets of users that were not originally planned.  Extending resources in this way requires that you reassess your security risk. To minimize any risk, you need the right level of security checks for user authentication and authorization.
Tags : 
security
    
IBM
Published By: IBM     Published Date: Mar 28, 2008
Many of today’s businesses have already moved from rigid siloed application approaches to more flexible business process focused solutions. This is driving the need for transparency in the underlying technologies, and for better levels of standardization and virtualization of the infrastructure, along with consideration of the value chain that includes a company’s suppliers and customers.
Tags : 
    
IBM
Published By: GFI     Published Date: Mar 25, 2008
This white paper explains what makes spam such an unbearable problem and how spamming tactics are evolving daily to beat anti-spam software. In the space of two months, spammers have switched from image spam to using PDF, Excel and ZIP file attachments. By using these attachments to send images instead of embedding them in the body of the email message, spammers have taken the cat-and-mouse game with anti-spam software developers to a new level.
Tags : 
attachment spam, filter attachment spam, image spam, pdf spam, excel spam, xls spam, stock spam, gfi, security
    
GFI
Published By: Identity Engines     Published Date: Mar 24, 2008
Guests, contractors, vendors, business partners, and other temporary users require and expect certain level of network access within organizations that they visit. Corporate network access has been typically open; internal LAN connections have seldom required authentication. Today however, regulatory and other security concerns demand that organizations adopt a more secure posture towards these short-term users.
Tags : 
idengines, id engines, identity engines, access control, authentication
    
Identity Engines
Published By: IBM     Published Date: Feb 25, 2008
Why is it that business and IT teams always seem to be at odds with one another? In this IBM white paper, Macehiter Ward-Dutton, specialists in IT business alignment, give a step-by-step explanation of how to make long-term improvements in the relationship between business and IT.
Tags : 
application development, infrastructure management, slm, sla, service level, service management, ibm, it management
    
IBM
Published By: IBM     Published Date: Feb 25, 2008
IBM HACMP supports a wide variety of configurations, and provides the cluster administrator with a great deal of flexibility. With this flexibility comes the responsibility to make wise choices. This paper discusses the choices that the cluster designer can make, and about the alternatives that make for the highest level of availability.
Tags : 
high availability, backup, recovery, utility computing, network management, ibm
    
IBM
Published By: IBM     Published Date: Feb 25, 2008
Virtualization provides opportunities to reduce complexity, improve service levels to the business and lower capital and operating costs to provide and maintain IT infrastructure. This paper for senior IT managers is intended as a starter guide for virtual infrastructure technical design, project planning, scoping, and implementation.
Tags : 
servers, virtual server, server virtualization, vmware, virtual, virtual machine, virtual server, ibm, opt it, ibm opt it
    
IBM
Published By: Tripwire     Published Date: Feb 25, 2008
Find out how to maintain the same level of stability and security across both virtual and physical environments, using the same software and approach.
Tags : 
virtual machine, virtual, virtualize, virtualized, virtualization, virtual server, configuration, configuration management, tripwire
    
Tripwire
Published By: ICC Decision Services     Published Date: Feb 18, 2008
In today’s competitive economy, the role of advertising and promotion has never been more important. Creating consumer awareness and driving them to make a buying decision continues to be the central focus, but the average consumer is attacked with more messages than ever before. As the level of total advertising has risen, there has been an evolution of the variety of methods and types in existence. This has placed the advertising industry in a state of chaos.
Tags : 
icc, decision services, event marketing, sales, marketing, branding, customer
    
ICC Decision Services
Published By: ICC/Decision Services     Published Date: Feb 18, 2008
In today’s competitive economy, the role of advertising and promotion has never been more important. Creating consumer awareness and driving them to make a buying decision continues to be the central focus, but the average consumer is attacked with more messages than ever before. As the level of total advertising has risen, there has been an evolution of the variety of methods and types in existence. This has placed the advertising industry in a state of chaos.
Tags : 
icc, decision services, event marketing, sales, marketing, branding, customer
    
ICC/Decision Services
Published By: ARX (Algorithmic Research)     Published Date: Feb 14, 2008
As the traditional “paper-based” world gives way to digital documentation and transactions, enterprises are demanding innovative solutions for digitally signing and authenticating such documents, files, and forms with iron-clad protection against forgery. Solutions must guarantee non-repudiation and promise the same level of security and trust that exists with conventional documentation. At the same time, such a solution should be simple to use, easy to deploy and offer a rapid ROI.
Tags : 
digital signature, electronic signature, digital signatures, electronic signatures, digital signature, arx, algorithmic research, pki, public key, authentication, document management
    
ARX (Algorithmic Research)
Published By: Stratus Technologies     Published Date: Feb 12, 2008
Application vulnerabilities and risks must be weighed to identify resources, performance requirements and service level objectives to ensure business continuity. Using real-world case studies, this white paper examines Information Lifecycle Management (ILM) best practices for disaster preparedness.
Tags : 
risk management, vulnerability, info management, information management, best practices, disaster recovery, stratus, stratus technologies
    
Stratus Technologies
Published By: IBM     Published Date: Feb 08, 2008
Throughout the industrialized world, healthcare systems are in crisis. Aging populations and skyrocketing costs are putting unprecedented financial and organizational pressure on healthcare providers and payers. The result is often a decreasing level of care. In response, fundamental changes are taking place. Patient-centric systems are evolving in which the patient's well-being and the responsibility for good health are defining treatment and operational policies.
Tags : 
health, healthcare, medical, medical records, patient, patient records, hipaa, customer-centric, medicine, hospital, hospitals, ibm
    
IBM
Published By: ESET     Published Date: Feb 01, 2008
With the ever evolving threat landscape, what will 2008 hold for IT Managers?  This podcast provides a high level overview of a few trends to watch for this year.
Tags : 
2008 predications, it security predictions, it security, mobile devices, laptops, endpoint, operating systems, antivirus, spam, viruses, trojans, rootkits, malware, threats, eset, nod32, trends, security, networks, spyware
    
ESET
Published By: Tripwire     Published Date: Jan 30, 2008
Learn from industry analysts how IT organizations are using configuration management to meet compliance requirements and instill best practices. Find out how these organizations are applying the resulting processes to enhance security and improve operational efficiency in order to increase their level of service delivery.
Tags : 
cmdb, change management, configuration management, risk management, compliance, idg, tripwire, lifecycle management
    
Tripwire
Published By: newScale     Published Date: Jan 30, 2008
Demand for IT services is outpacing the growth of IT budgets. The business constantly requests new services, requires higher service levels, and expects more consistent service delivery. With supply constrained, the only solution is to manage this demand more effectively. The new version of ITIL prescribes essential changes to help IT and the business tackle this difficult task.
Tags : 
service, service management, service catalog, newscale, itil, service catalog, service catalogue, itil service catalogue, it service catalogue, it management
    
newScale
Published By: Supply Chain Connect     Published Date: Jan 24, 2008
Corning Cable Systems offers the broadest range of end-to-end fibre optic and copper product solutions for telecommunications networks. Corning wanted to improve their supply chain to reduce inventory levels (thereby adding to bottom line savings) and reduce overall administrative costs- all without expensive or time-consuming investments.
Tags : 
supply chain, scm, erp, collaborating, collaboration, collaborative commerce, communication, vendor communication, vendor relationship, vendor relationships, corning, supply chain management, supply chain connect
    
Supply Chain Connect
Published By: Solidcore     Published Date: Jan 15, 2008
New report issued by Fortrex, Emagined Security and Solidcore reveals the cost of PCI compliance is justified. These PCI requirements exist to protect sensitive data - yet, research indicates that these are among the least satisfied requirements across Level 1 merchants, with almost 40% non-compliance. 
Tags : 
security
    
Solidcore
Published By: GlobalSCAPE     Published Date: Jan 08, 2008
Patton Harris and Rust and Associates has 13 branches.  Management and IT needed a way to help these offices work on projects together to optimize company resources.  Using GlobalSCAPE WAFS gave PHR+A fast file access across branches using minimal system resources. No management is required as it operates in the background and real time byte level differencing not only reduces bandwidth usage and spikes but also the changes are sent as they happen – not when they are needed.
Tags : 
wafs, wan, wans, wide area networks, file transfer, file transmission, secure file transfer, mft, eft, managed file transfer, enhanced file transfer, globalscape, file access
    
GlobalSCAPE
Start   Previous    56 57 58 59 60 61 62 63 64 65 66 67 68 69 70    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee