mine

Results 1526 - 1550 of 1589Sort Results By: Published Date | Title | Company Name
Published By: GFI     Published Date: Sep 04, 2008
Today, more than ever before, legal and compliance issues are driving the case for email archiving. Email archiving legislation is complex and varies greatly from country to country. Unless companies are well versed in compliance law, the various regulations affecting email can be a minefield.
Tags : 
gfi, sox, sox compliance, sarbox, sarbanes oxley, sarbanes-oxley, compliance, email, email archive, email archiving, archiving, archive, storage
    
GFI
Published By: IBM     Published Date: Aug 21, 2008
There are many ways to uncover Web application vulnerabilities. This white paper examines a few of these vulnerability detection methods – comparing and contrasting manual penetration testing with automated scanning tools. What you’ll discover is that neither of these methods are an exhaustive method for identifying Web application vulnerabilities.
Tags : 
ibm, ibm mi, ibm grm, web security, internet security, application security, security
    
IBM
Published By: Senn Delaney     Published Date: Aug 21, 2008
Through a collaborative, groundbreaking study with three prominent U.S. business schools, Senn Delaney has discovered that people who operate from a unique set of three core principles consistently perform at the top 10 percent of performance ratings. The joint study and subsequent research and surveys led to creation of our new, evidence-based, practical performance model that can be taught, practiced, reinforced, applied and measured.
Tags : 
senn delaney, global information, customer focused, brand management, customer-centric, employee management, employee engagement
    
Senn Delaney
Published By: Senn Delaney     Published Date: Aug 21, 2008
Mergers and acquisitions are a fact of life in today's highly competitive global business environment. Unfortunately, up to one third of mergers fail within five years, and as many as 80 percent never live up to their full potential. A great deal of evidence indicates that the ultimate success of mergers and the amount of time it takes to get them on track is determined by how well the cultural aspects of the transition are managed.
Tags : 
senn delaney, mergers, acquisitions, sbc, at&t, customer focused, brand management, customer-centric, employee management, employee engagement
    
Senn Delaney
Published By: NewField IT     Published Date: Aug 19, 2008
In 2001, the international research group, Gartner released a briefing paper titled 'Rightsizing Output Fleets – The Hidden Gold Mine'. This research paper identified total print costs to be as much as 1-3% of an organization's revenue, a figure far higher than anyone had previously suggested. Gartner argued that print costs are so high they offer a 'goldmine' for any procurement or IT manager looking for savings.
Tags : 
knowledge management
    
NewField IT
Published By: Raritan Inc.     Published Date: Aug 07, 2008
This white paper examines the BOCA process and what is required to meet IT goals and objectives and maintain business continuity.
Tags : 
power distribution unit, raritan, pdu, power monitoring, environmental monitoring, data center power, data center monitoring, monitor power, power metering, data center temperature, electrical power meter
    
Raritan Inc.
Published By: EMC Backup & Recovery Solutions     Published Date: Aug 06, 2008
This workbook helps you assess current needs and usage and determine where deduplication can positively affect your IT consolidation initiatives, help reduce costs, and create a more "green" environment.
Tags : 
emc, data domain, efficiency, vmware, server consolidation, servers, data integrity, backup, recovery, idc, roi, it costs, infrastructure, dedupe, deduplication
    
EMC Backup & Recovery Solutions
Published By: NuSphere     Published Date: Jul 31, 2008
The problem of providing remote access to the files is nothing new, but the implementation of the solution quite often also determines reliability, safety and productivity. In this article we will look at accessing a remote computer (Unix, Linux or Windows) over non-trusted network.
Tags : 
remote files sharing, samba, ssh tunnel, nusphere
    
NuSphere
Published By: Microsoft Dynamics     Published Date: Jul 03, 2008
In this webcast, we discuss how companies excel when they empower their people to drive the business forward. While strategies, organization, motivation, and leadership all set the stage for business success, you also have to give your people the right tools, information, and opportunities to see results—because ultimately success is determined by your people. Learn why we call a business that fosters a winning environment a "people-ready business."
Tags : 
microsoft, business activity, business intelligence, business analytics, analytics, analytical, business strategy
    
Microsoft Dynamics
Published By: Laser Design Inc.     Published Date: Jun 23, 2008
A manufacturer of glass tableware noticed a decline in the quality of a glass mug it produced because of wear in its cavity mold. This case study illustrates the investigation process that determined where the errors were occurring so corrections could be made.
Tags : 
production, quality, quality assurance, quality control, manufacturing, laser, lasers, laser design, ldi
    
Laser Design Inc.
Published By: Cyon Research     Published Date: Jun 22, 2008
Can the JT data format solve the problem of interdisciplinary communications in the PLM industry? The white paper, "The Business Case for a Common Data Distribution Platform: A Look at UGS' JT," examines the case for its adoption as a standard for design, analysis and manufacturing in PLM and beyond.
Tags : 
plm, product lifecycle management, product design, scm, design, cyon, cyon research, cyon research, ugs teamcenter
    
Cyon Research
Published By: IBM     Published Date: Jun 11, 2008
Good governance of a service-oriented architecture is becoming a core competency. This Magic Quadrant report by Gartner examines the market for SOA governance through a set of integrated technologies. It evaluates leaders, challengers and innovators in the SOA governance technology market, providing feature information and strengths and cautions for each.
Tags : 
soa, ibm, ebf, governance, infrastructure
    
IBM
Published By: ASG Software Solutions     Published Date: Jun 08, 2008
As organizations have improved service delivery, they have also turned their focus to presenting business value more positively. These organizations are beginning to develop true BSM systems in two ways: by understanding the metrics that successful businesses employ to determine the value of IT, and by linking these metrics and associated business services to IT infrastructure components.
Tags : 
asg, cmdb, bsm, metadata, metacmdb, lob, ecommerce, bpm, workflow, itil, cmdmdb, service optimization
    
ASG Software Solutions
Published By: IBM     Published Date: May 30, 2008
People drive your business. Whether you are a customer, supplier, owner, or employee, it is cultivating and maintaining those people relationships within and beyond your company that determine how well you will fare in the marketplace. This is why IBM knows that it is important that you have ultimate choice and flexibility to work the way you want.
Tags : 
ibm, ep campaign, ibm ep, collaboration, relationship management, information management, desktop management, lotus notes, lotus, knowledge management
    
IBM
Published By: Oracle Corp.     Published Date: May 30, 2008
Current trends show that the vast majority of companies are moving to services-oriented architectures (SOAs) and deploying Web services within and across their IT infrastructure.However, the success of those deployments is determined by the integrations and innovations that Web services make possible and how Web services affect the quality and performance of the mission-critical applications with which they interface.
Tags : 
soa, soas, oracle, application testing suite, web services, mission-critical, enterprise java beans-based, quality assurance, ejb, user interface
    
Oracle Corp.
Published By: VMware/Intel Server Refresh and Cost Savings     Published Date: May 27, 2008
Server virtualization isn't just for big companies. Entry-level virtualization tools are free or low-cost, and there are many benefits to virtualization (including saving money).
Tags : 
vmware, virtualization, server virtualization, data center, fc san, fibre, networkattached storage, nas, nic, high availability, vmware consolidated backup, vcb
    
VMware/Intel Server Refresh and Cost Savings
Published By: P2 Security     Published Date: May 13, 2008
A large financial institution used a competitive product for Web Access Management. By working with P2 Security, the company was able to determine its true Total Cost of Ownership (TCO). An analysis following the installation of maXecurity revealed annual cost savings of millions of dollars per year. In addition, by switching to maXecurity, the Return on Investment (ROI) was measured in months.
Tags : 
maxecurity, tco, roi, web access management, internet security, web security
    
P2 Security
Published By: IBM     Published Date: May 12, 2008
In today's rapidly changing business environment, it's important to be ready to respond to every risk or opportunity. In this white paper, you'll learn how to determine risks, calculate impact, evaluate your current structure’s response and test overall resilience. Then you'll see how IBM can help you combine several risk management strategies into a single integrated one, so you’re better able to respond to the threat of disaster and stay ahead of the competition.
Tags : 
disaster recovery, d/r, business continuity, risk management, ibm, ibm g&rm, ibm grm, global services
    
IBM
Published By: Diligent Technologies     Published Date: Apr 11, 2008
New technologies exist that can radically slim down the physical storage requirements for secondary disk storage. Taneja Group refers to these technologies as Capacity Optimization (CO) technologies. In this technology brief, we will examine what IT teams should be looking for in a capacity optimization solution, and then share our perspective on the Diligent HyperFactor technology.
Tags : 
deduplication, minimizing storage, minimize storage, diligent technologies, diligent, storage
    
Diligent Technologies
Published By: AcquireWeb     Published Date: Apr 07, 2008
This article, published by Target Marketing in April 2008, examines principles and practices associated with acquisition e-mail, which also apply to CRM programs, that are often overlooked by marketers when building their e-mail strategies. These fundamentals serve as strategies to consider and employ to yield higher response rates and a more effective e-mail marketing effort.
Tags : 
acquireweb, acquisition email, email marketing, integrated marketing, e-mail, acquisition e-mail, lead generation, e-mail marketing, e-mail appending, acquirelocal, local marketing, local store marketing, restaurant marketing, franchise marketing, acquisition marketing
    
AcquireWeb
Published By: Adaptive Growth     Published Date: Mar 12, 2008
It is a truism that in any complex activity, the critical, defining decisions should be made as early in the process as possible.  In ERP implementation projects this principle is routinely undermined by the nearly universal practice of separating acquisition and implementation activities into separate projects, performed by separate teams operating under separate control.
Tags : 
erp, adaptive growth, project management, enterprise applications, enterprise resource planning, adaptivegrowth
    
Adaptive Growth
Published By: SEPATON     Published Date: Mar 11, 2008
Forrester evaluates 12 virtual tape library (VTL) vendors across 58 criteria to determine a relative ranking that centers on strength of current offering as well as market strategy.  This report is a must-read for companies considering revising their data protection strategies to include VTL.
Tags : 
vtl, virtual tape library, backup, recovery, storage, storage virtualization, sepaton
    
SEPATON
Published By: HP VMware     Published Date: Mar 03, 2008
Blades are one of the fastest-growing segments in the IT industry. This white paper examines the requirements for servers, storage, and blade systems in the midmarket; describes the features and capabilities of the HP c3000; and outlines some of the challenges and opportunities HP will face as it seeks to extend its innovative HP BladeSystem c-Class product line to serve the needs of the midmarket.
Tags : 
blades, blade server, bladesystem, blade system, storage, virtual storage, hp vmware
    
HP VMware
Published By: HP VMware     Published Date: Mar 03, 2008
Why have the majority of large enterprises embraced virtualization technology and why are midsize businesses the fastest growing market segment for new virtualization initiatives? This white paper will explore this important question, examine common virtualization deployment scenarios, and explain how virtualization solutions from HP and VMware can help midsize businesses achieve a wide variety of business continuity, performance, and efficiency goals.
Tags : 
vmware, virtual machine, virtual, virtual server, virtual storage, hp vmware, continuity
    
HP VMware
Published By: Stratus Technologies     Published Date: Feb 12, 2008
Application vulnerabilities and risks must be weighed to identify resources, performance requirements and service level objectives to ensure business continuity. Using real-world case studies, this white paper examines Information Lifecycle Management (ILM) best practices for disaster preparedness.
Tags : 
risk management, vulnerability, info management, information management, best practices, disaster recovery, stratus, stratus technologies
    
Stratus Technologies
Start   Previous    50 51 52 53 54 55 56 57 58 59 60 61 62 63 64    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee