Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

art

Results 8626 - 8650 of 8760Sort Results By: Published Date | Title | Company Name
Published By: Microworld     Published Date: Dec 12, 2007
MicroWorld Winsock Layer (MWL) is a radical technology that fights viruses and other threats from a new perspective. Developed by MicroWorld Technologies Inc., MWL blocks threats at the Internet gateway itself and does not allow them to enter your system. This article discusses features of MWL and explains how it does its anti virus and content security tasks, efficiently and quietly.
Tags : 
winsock, ethreats, e-threats, malware, email security, internet security, spam, anti-spam, anti spam, anti virus, anti-virus, mwl, escan, microworld
    
Microworld
Published By: Tideway Systems     Published Date: Dec 11, 2007
A world class IT organization needs to be better than even the regulators require – and good IT governance doesn't have to tie the IT department up in red tape. Judicious application of IT best practices, frameworks and methodologies can help achieve this, based on an accurate picture of the IT environment, at which point regulatory compliance becomes a happy side effect. Find out how you can have an up-to-date true view of your infrastructure on a daily basis – not just at a point in time by reading this white paper.
Tags : 
compliance, regulation, regulations, regulator, regulators, governance, compliant, infrastructure, best practices, regulatory compliance, cmdb, tideway, tideway systems, it management
    
Tideway Systems
Published By: TeraCloud     Published Date: Dec 11, 2007
Storage spawns where it is needed. This leaves IT to manage many islands of storage devices scattered across the enterprise. Compliance requirements, multimedia-rich applications, unstructured content and a proliferation of databases are pushing IT departments to increase the size and complexity of their storage networks. All of this is occurring at a time when the need for centralized storage management has never been greater.
Tags : 
storage, storage management, infrastructure, compliance, tsa, teracloud, teracloud storage analytics, san, storage area networks
    
TeraCloud
Published By: Computhink     Published Date: Dec 10, 2007
Like most law firms, Salter Feiber deals with vast amounts of documents, a significant portion of which needs to be kept for long periods of time. "We tried to keep the files closed during the last 12 months onsite," says Kim Chewning, Firm Administrator. "Everything else was sent to a third party for storage in a secure facility." However, as the archive grew, so did the storage cost.
Tags : 
documents, document, document management, storage, law firm, lawyer, secure content management, customer service, spend management, minimal storage, minimize storage, cut storage costs, viewwise, viewise, computhink
    
Computhink
Published By: Computhink     Published Date: Dec 10, 2007
Park West’s successful landscape business had a paper problem. The 11 separate companies (including their headquarters) created paperwork havoc for their Accounts Payable (AP) Department. They required an electronic document management alternative that could meet their criteria to standardize the process for all 11 companies. They needed this at a price that would enable them to realize return on investment in a reasonable length of time.
Tags : 
roi, return on investment, document management, electronic document management, viewwise, viewise, computhink, landscape, landscaper, parkwest, paperless
    
Computhink
Published By: Computhink     Published Date: Dec 10, 2007
TMCC's Financial Aid Department (FA) stores about 14,000 hardcopy files, and processes approximately 7,000 new applications a year. FA workers were running out of space to house all of the files when they were told their office might be moved, resulting in the loss of their file room altogether. Since they are required by the U.S. Department of Education to keep files for four years (sometimes longer depending on a specific regulation) they knew converting to an electronic file system would save both time and money while serving their students better.
Tags : 
college, university, education, school, case study, paperless, document management, electronic document management, workflow, roi, return on investment, idm, computhink, viewwise, viewise
    
Computhink
Published By: Computhink     Published Date: Dec 10, 2007
To properly serve their customers, Cortes & Hay must create files of documents that need to be distributed to appropriate parties. The documents that comprise a title insurance binder come from two places. There are documents generated internally, and documents that come from external sources.
Tags : 
document management, title insurance, paperless, cortes & hay, insurance, documents, electronic document management, best practices, computhink, viewwise, viewise
    
Computhink
Published By: Aveksa     Published Date: Dec 07, 2007
Every large enterprise has employees who need some level of access to its critical information resources, and many also provide a wide variety of types and levels of access to contractors, partners, vendors, and customers. Each of these points of access represents a source of potential business and compliance risk.
Tags : 
access control, access certification, compliant, certification, rules, compliance, governance, risk management, rbac, iam, identity management, access management, identity & access management, identity and access management, aveksa
    
Aveksa
Published By: uptime software     Published Date: Dec 06, 2007
You’ll learn what the 12 pitfalls of IT Systems Management really are, as well as the bridges you need to cross them. Learn what the big framework solutions don't want you to know, and why they might not be the answer for your IT Department. Learn to leverage what you have and your limited budget to get you the Systems Management tools and Solutions you need.
Tags : 
high availability, systems management, server management, network management, server, servers, it management, spending, cost, cost effective, agent, agentless, monitoring, uptime, uptime software, downtime, infrastructure
    
uptime software
Published By: uptime software     Published Date: Dec 06, 2007
Monitoring servers, applications, and services has become an essential part of the IT department over the past 10 years. However, it can be a daunting task to find the right solution for your Enterprise. This brief paper will examine the differences between Agent and Agentless monitoring, so you can make the right decision based on your company's needs, the metrics you need, your budget range, your resource availability, and your management's reporting needs.
Tags : 
server monitoring, monitoring tool, capacity planning, performance monitoring, service level management, service level agreement, sla, infrastructure, systems management, network management, uptime, server uptime, downtime, it management, monitoring, servers
    
uptime software
Published By: ElcomSoft     Published Date: Dec 06, 2007
Rapid development of digital technologies and electronic communication, availability of mobile PCs and smart phones, abundance of tools for creating documents or high-quality presentations coupled with constantly growing volumes of information and yearning for doing business more effectively leads to switching to electronic exchange of information.
Tags : 
pdf, acrobat, adobe acrobat, document security, secure content, secure pdf, password recovery, pdf password, elcomsoft, portable document, document management
    
ElcomSoft
Published By: ElcomSoft     Published Date: Dec 06, 2007
Information is crucial in decision making. No wonder that protection of information is paid much attention. The most part of information is created and stored digitally (Microsoft Office documents, different databases, and financial data in Intuit Quicken etc). Thus software and hardware means of protecting information are the first to talk about.
Tags : 
password, password recovery, system recovery, elcomsoft
    
ElcomSoft
Published By: Computhink     Published Date: Nov 30, 2007
The Auburn-Washburn School District provides public education to approximately 5,300 Kindergarten through 12th graders in Topeka, KS. It consists of 128 square miles of rural and suburban areas. Descriptive terms like academically challenging, progressive, small classes, high-achievement, modern and excellent are all used to describe the district.
Tags : 
frcp, search and retrieval, email management, email archiving, email archive, viewwise, computhink, school, education, roi, e-discovery, network management
    
Computhink
Published By: Computhink     Published Date: Nov 30, 2007
The Marin Community Foundation (MCF) was established in 1986 with the assets of a trust created by long-time Marin residents Leonard and Beryl H. Buck. From the start, MCF’s mission was to use philanthropic contributions to help improve the human condition and enhance the quality of life in Marin County, CA. An unintended consequence was that they were swimming in paper.
Tags : 
electronic document, document management, information management, case study, marin, mcf, marin community foundation, workflow, computhink
    
Computhink
Published By: Computhink     Published Date: Nov 29, 2007
Transervice Logistics Inc. provides total transportation management. They have over 38 years of experience in the transportation industry and are driven by the needs of their customers. They understand the customers’ desires and deliver innovative services to meet those needs. Their goal is to provide the customer with professional service on the most cost-effective basis.
Tags : 
document management, transportation, fleet management, transportation management, electronic data, records, records management, image management, paperless, paperless office, content management, computhink, transervice
    
Computhink
Published By: Axeda Corporation     Published Date: Nov 14, 2007
How secure are the VPNs and modems that your vendors and partners use to access your data center? Can you confidently track all activity to meet SOX, PCI, and HIPAA compliance requirements? Learn how Axeda ServiceLink for Data Centers empowers you to provide your vendors and partners with secure and auditable access to your mission-critical data center.
Tags : 
remote, remote access, remote network, network management, network security, hipaa, hippa, sox, sarbox, sarbanes oxley, sarbanes-oxley, pci, pci-dss, pci dss, compliance, auditing, audit, security audit, axeda, security
    
Axeda Corporation
Published By: Borer Data Systems Ltd.     Published Date: Nov 07, 2007
Developed by Borer in conjunction with AND-Group, the CruSafe software and hardware system provides a state-of-the-art safety system specifically developed to address the key requirement for real-time tracking of personnel. AND CruSafe is a state-of-the-art safety system which has been specifically developed to address the key requirement for real-time tracking of personnel (often known as POB- Personnel On Board). CruSafe has already been proven to reduce muster times by 70%.
Tags : 
security, security management, access control, identity management, iam, authentication, crusafe, and-group, tracking, workforce, workforce management, employee management, borer, crusafe, and group, borer, borer data systems, access control, locker, locker management
    
Borer Data Systems Ltd.
Published By: ITManagement     Published Date: Nov 06, 2007
ITManagement delivers the critical information you need quickly, easily and concisely. We know you don't have time to spend researching the latest innovations in data network solutions and finding free third party information is near impossible... we have done it for you.
Tags : 
networking, network management, switch, ethernet networking, gigabit networking, mbps, gigabit, ethernet, ethernet switch, network management, internetworking hardware, switches, stack, stacking, stackable, infrastructure, itmanagement, it management, tippit
    
ITManagement
Published By: ITManagement     Published Date: Nov 06, 2007
Our handy comparison chart lines up the vendors in the market and compares the most important factors in a networking equipment decision.
Tags : 
networking, network management, switch, ethernet networking, gigabit networking, mbps, gigabit, ethernet, ethernet switch, network management, internetworking hardware, switches, stack, stacking, stackable, infrastructure, itmanagement, it management, tippit
    
ITManagement
Published By: InsideCRM.com     Published Date: Nov 05, 2007
Considering adding a contact center to your business? Our analyst-written buyer's guide is a great place to start your search. We provide you with an in depth  market overview, a rundown of standard and advanced features and will point you in the direction that will be most beneficial and efficient for your organization.
Tags : 
software, call center, call center software, contact center, contact center software, crm, customer relationship management, insidecrm, inside crm, buying guide, buyers guide
    
InsideCRM.com
Published By: Aventail     Published Date: Oct 26, 2007
The goal of pervasive BI applications is to take the data that produced the back office ROI of more than 400% and deliver it to front-line employees in a form appropriate to their job functions – with similar results. There are thousands of business process steps in a typical enterprise where pervasive BI insights can be added. What are leading companies doing with pervasive BI?
Tags : 
business intelligence, database, enterprise data warehouse, data mart, data warehouse, data mining, active data warehousing, active data warehouse, informatica
    
Aventail
Published By: Informatica     Published Date: Oct 26, 2007
The goal of pervasive BI applications is to take the data that produced the back office ROI of more than 400% and deliver it to front-line employees in a form appropriate to their job functions – with similar results. There are thousands of business process steps in a typical enterprise where pervasive BI insights can be added. What are leading companies doing with pervasive BI?
Tags : 
business intelligence, database, enterprise data warehouse, data mart, data warehouse, data mining, active data warehousing, active data warehouse, informatica
    
Informatica
Published By: PKWARE     Published Date: Oct 22, 2007
Text-messaging, or SMS, usage is on the rise while email usage is falling. Meanwhile many more mobile phones than personal computers are sold around the world. Long story short: Marketers who want to reach consumers with targeted campaigns had better put an SMS strategy in place. mobileStorm's new white paper, "SMS Or Die," explains why mobile marketing, particularly SMS marketing, is the ideal platform to reach consumers.
Tags : 
sms marketing, mobile marketing, email marketing, text messaging, text marketing, sms, sms, mobile, email, text, sms messaging, mobile messaging, mobilestorm, mobilestorm
    
PKWARE
Published By: eGain     Published Date: Oct 12, 2007
The Internet, years after its emergence, continues to be a challenge for most organizations. This paper examines the notion of eService and the need for it in large, global organizations in particular. It also provides guidelines for developing an effective eService plan, and concludes with a discussion of the most significant benefits of implementing such a plan.
Tags : 
eservice, customer service, online customer service, online help, helpdesk, help desk, e-service, online support, online assistance, global support, egain
    
eGain
Published By: 6th Sense Analytics     Published Date: Oct 11, 2007
This whitepaper asserts that moving to the next generation of software development and sourcing requires moving from art to science. Given how dependent we are on software as a foundation for every product and service, anything less creates a climate of risk, uncertainty, and unjustifiable costs that undermines our ability to compete in a global marketplace.
Tags : 
development, software development, offshore, offshoring, outsource, outsourcing, programming, 6th sense, 6th sense analytics
    
6th Sense Analytics
Start   Previous    337 338 339 340 341 342 343 344 345 346 347 348 349 350 351    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.