Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

art

Results 8601 - 8625 of 8835Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jun 19, 2008
Maintaining data security, performance, availability and recoverability is a growing challenge. The IBM Power platform offers many advantages in performance, scalability and key functional capabilities to support key database serving. In addition, it simplifies virtualization, making it easier to reduce the number of physical servers required. This ITG report shows the advantages of the IBM Power platform as an alternative to commodity Windows servers in mid-sized companies.
Tags : 
ibm, express seller, servers
    
IBM
Published By: IBM     Published Date: Jun 19, 2008
Energy costs keep going up, and IT departments must find new ways to save. The IBM Power Configurator tool is designed to show you how IBM System x and IBM BladeCenter servers offer high-performance and flexibility businesses need, plus advanced power management that keeps energy costs as low as possible. Download the Power Configurator tool and see how much savings IBM System x and IBM BladeCenter can deliver for you.
Tags : 
green, ibm, system x, express seller, energy, energy efficient, green computing, infrastructure, network management, network performance, network performance management
    
IBM
Published By: IBM     Published Date: Jun 19, 2008
We're dedicated to helping small and medium-sized businesses find the right systems hardware while protecting their investments with flexible, scalable products that can grow as business grows. The Systems advisor tool can help you, too. By answering a few quick questions, we'll identify products that can help meet your business needs. Let's get started.
Tags : 
ibm, express seller, hardware, systems hardware, server hardware, servers, infrastructure, platforms
    
IBM
Published By: Dell EqualLogic     Published Date: Jun 17, 2008
IT departments constantly face demands to deploy, maintain and grow a broad array of services and applications, but this has lead to server sprawl and high energy costs. Consolidation and containment solutions implemented with a virtual infrastructure meet the challenges of server sprawl and underutilization by reducing hardware and operating costs by as much as 50%.
Tags : 
infrastructure, server, server consolidation, servers, hardware, dell, equallogic, migration, network management
    
Dell EqualLogic
Published By: Quocirca     Published Date: Jun 13, 2008
Over the past decade, the internet has evolved from a technical environment into a commercial marketplace. The impact on consumers and large enterprises has been significant, but what about the small and medium sized business? With few of the skills and resources of their larger counterparts, these organizations need to get the best value from the internet and the network based services it enables, without risking day-to-day operations.
Tags : 
quocirca, smb, smbs, small business, medium business, mid-sized business, connectivity, ip networks, small business networks
    
Quocirca
Published By: GFI     Published Date: Jun 13, 2008
Spam generates an enormous amount of traffic that is both time-consuming to handle and resource intensive. Apart from that, a large number of organizations have been victims of NDR spam that has an effect similar to a Distributed Denial of Service on the email system. In this paper we provide a technical explanation of NDR Spam and recommend solutions that can prevent or limit exposure to this kind of unsolicited email.
Tags : 
email security, ddos, denial of service, distributed denial of service, ndr, spam, non-delivery report, non delivery report, anti spam, anti-spam, gfi, security
    
GFI
Published By: Symantec     Published Date: Jun 12, 2008
An effective email management solution is essential for organizations in today's litigious environment. Learn more from Gartner research about the market and top vendors providing active archive solutions today. Download this research study to learn more.
Tags : 
symantec, email management, email archiving, archive, archiving
    
Symantec
Published By: IBM     Published Date: Jun 11, 2008
Traditionally, retail promotions were handled by the merchandising, marketing and finance departments. Now companies are finding that by implementing promotions strategies deep within their infrastructure, they can increase profit uplift. Get the IBM white paper and see how optimizing retail promotions can positively affect your business.
Tags : 
promotions, optimization, aberdeen, retail research, promotions technology, promotions optimization, promotions managment, retail promotions technology, ibm, mmdg
    
IBM
Published By: IBM     Published Date: Jun 11, 2008
Today's organizations face a tough set of challenges. Markets around the world have become increasingly volatile. Competition is more intense. Mergers, acquisitions and divestitures demand revisions in business plans and the IT infrastructures that support them. And IT departments have to keep doing more-and better-with budgets and resources that are already stretched to the limit. To meet these critical challenges, your organization needs much greater flexibility in its business models and business processes.
Tags : 
ibm, ebf, ibm ebf, it management
    
IBM
Published By: IBM     Published Date: Jun 11, 2008
Good governance of a service-oriented architecture is becoming a core competency. This Magic Quadrant report by Gartner examines the market for SOA governance through a set of integrated technologies. It evaluates leaders, challengers and innovators in the SOA governance technology market, providing feature information and strengths and cautions for each.
Tags : 
soa, ibm, ebf, governance, infrastructure
    
IBM
Published By: BlueHornet     Published Date: Jun 11, 2008
The effectiveness of your targeting and personalization efforts are only as good as the data used to power them. This article will help you discover effective ways of collecting subscriber data -- allowing you to drive campaigns that evolve as your subscribers' preferences and behaviors change over time.
Tags : 
blue hornet, bluehornet, data collection, data mining, subscriber information, subscriber, newsletter design, newsletter managment, campaign managment
    
BlueHornet
Published By: SchemaLogic     Published Date: Jun 11, 2008
Chevron and its subsidiaries use Microsoft SharePoint 2007 to share and exchange information. Yet, it was still a challenge for offices in one part of the world to use materials created by an office in another part of the world. And, the amount of information, shared electronically, was growing exponentially. As a result, the company faced a bit of chaos and a productivity hurdle that begged for more muscle.
Tags : 
chevron, schemalogic, oil, gas, collaboration, sharepoint, share point
    
SchemaLogic
Published By: Clearswift     Published Date: Jun 09, 2008
In this white paper Clearswift address the question "Is it possible to build a leak free enterprise?" In addition to a Gartner research note on "Understand Data Leakage" we answer the question by describing 15 of the most common mistakes of web and email security and the associated risks and solutions.
Tags : 
data protection, clearswift, data management, network security
    
Clearswift
Published By: Clearswift     Published Date: Jun 09, 2008
Websites that did not exist five years ago are now at the top of the most visited and used sites on the Web.  Yesterday's teenagers and college students, who have grown up using MySpace, YouTube and other Web 2.0 sites are bringing their social habits into the workplace, and creating a number of challenges for employers.
Tags : 
enterprise security, web 2.0, gartner, clearswift, clearswift, social media, social networking, network security
    
Clearswift
Published By: BlueHornet     Published Date: Jun 06, 2008
Applying opt-in email marketing strategies and best practices to transactional emails can be a win-win for customers and marketers. But the two types of communications are not the same. This white paper is written to help email marketers and online retailers understand: What sets transactional emails apart from commercial messages; how they must comply with all federal regulations; and where to take advantage of opportunities to optimize their transactional email program.
Tags : 
email marketing, email messaging, blue hornet, bluehornet
    
BlueHornet
Published By: VMware Dell     Published Date: Jun 05, 2008
Radiator Express Warehouse (1800Radiator), a fast-growing automotive parts distributor, found that it was running at maximum power and its racks were full. Using VMware virtualization technology, the company was able to take 31 physical servers out of production, resulting in a 25 percent reduction in power and cooling costs.
Tags : 
virtualization, vmware, virtual infrastructure, x86, server consolidation, server containment, business continuity, disaster recovery, energy savings, vmware infrastructure 3, vi3, vmware, green computing, power and cooling
    
VMware Dell
Published By: VMware Dell     Published Date: Jun 05, 2008
IT departments constantly face demands to deploy, maintain and grow a broad array of services and applications, but this has lead to server sprawl and high energy costs. This brief discusses how VMware virtualization helps IT organizations increase utilization, lower energy costs, increase manageability and improve management of future growth.
Tags : 
servers, server consolidation, server virtualization, virtualization, virtual machine, vmware, server hardware
    
VMware Dell
Published By: VMware Dell     Published Date: Jun 05, 2008
WWF is the world’s largest independent conservation organization. As part of its IT department’s contribution to environmentally-friendly business practices, WWF-UK deployed VMware virtualization into its live production environment. They decreased server count, lessened cooling requirements, minimized the space needed to house their datacenter and significantly reduced their overall carbon footprint.
Tags : 
virtualization, vmware, virtual infrastructure, x86, server consolidation, server containment, business continuity, disaster recovery, energy savings, vmware infrastructure 3, vi3, vmware, infrastructure, green computing, power and cooling
    
VMware Dell
Published By: Arcot     Published Date: Jun 04, 2008
In the past, authentication solutions were either easy to use and inexpensive, but insecure (such as username/password) or very secure but expensive or difficult to implement (such as OTP tokens and smart cards). Arcot offers a third option: WebFort, a software-only, two-factor authentication solution. It delivers the right balance of cost, convenience, and strength.
Tags : 
arcotid, pki, multi-factor authentication, strong authentication, cryptographic camouflage, webfort x.509 certificate, public key infrastructure, authentication, arcot, security
    
Arcot
Published By: Arcot     Published Date: Jun 04, 2008
Solutions including one-time-password (OTP) generator tokens, do not offer the same level of protection as the ArcotID against attacks such as the man-in-the-middle attack. The ArcotID secure software credential provides protection against common Internet threats and several futuristic attacks that are becoming popular among fraudsters.
Tags : 
authentication, digital signature, password management, cardholder authentication, arcot, smartcard
    
Arcot
Published By: HP     Published Date: Jun 02, 2008
VMware describes their partnership with HP storage and how the HP StorageWorks EVA4400 is a great fit for many small and medium businesses that want the advantages of virtualization.
Tags : 
hp eva 4000, hp eva 4400, storage, storage virtualization, virtualization, virtual storage
    
HP
Published By: HP     Published Date: Jun 02, 2008
Hear from Oracle how the new the HP StorageWorks EVA4400 has been fully tested to be ready for full production loads, and how it is tuned to take particular advantage of Oracle VM.
Tags : 
hp eva 4000, hp eva 4400, storage, storage virtualization, virtualization, virtual storage
    
HP
Published By: RenderX     Published Date: May 27, 2008
If you're producing transactional customer communications such as statements, invoices, policy notifications, or shipping documents, you probably already have some of the basic elements you need to start using TransPromo to take your marketing campaigns to the next level. TransPromo advertising in a PDF, PostScript and AFP electronic and print format can easily be injected into your application with RenderX.
Tags : 
transpromo, xml, xsl fo, pdf, postscript, afp, xep, direct advertising, pinpoint, xsl templates, memorystream, renderx
    
RenderX
Published By: BlackBerry     Published Date: May 22, 2008
Over the past decade, wireless technology has made huge strides in security, reliability and throughput. Companies that are moving forward with business mobility initiatives must plan for wireless security and mobile device management from the start. Learn about many of the notable trends and key issues associated with Business Mobility and where to find additional resources for consideration.
Tags : 
blackberry, mobile applications, cio, pim, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: MX Logic     Published Date: May 21, 2008
Rootkits, Trojans, ransomware, Denial-of-Service and much more – this newly released white paper from MX Logic covers the everchanging security threat landscape. Learn what malicious intrusions are out there, how to identify them and how to keep your network safe.
Tags : 
botnets, dha, dos, denial of service, queen bot, malware, drive by, storm worm, blended threats, rootkits, trojans, spyware, viruses, virus, worm, worms, polymorphism, push propagation, pull propagation, zero day
    
MX Logic
Start   Previous    338 339 340 341 342 343 344 345 346 347 348 349 350 351 352    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.