Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

critical

Results 2401 - 2425 of 2611Sort Results By: Published Date | Title | Company Name
Published By: e-DMZ Security LLC     Published Date: Sep 27, 2010
This white paper discusses key issues and offers innovative solutions to support granting access to production resources.
Tags : 
e-dmz security. emergency access, production access, access control, compliance, developer access, mission-critical, business-critical, datacenter security
    
e-DMZ Security LLC
Published By: Ayehu eyeShare     Published Date: Oct 06, 2010
Simplifying Problem Resolution with Cutting-Edge IT Technology
Tags : 
it automation, it process automation, runbook automation, problem resolution, it operations automation, incident managament, itil, mttr
    
Ayehu eyeShare
Published By: VMware     Published Date: May 02, 2011
The cost of downtime and/or lost data can be devastating. For this reason, business continuity and disaster recovery (BC/DR) is becoming a critical mandate. Virtualization can keep your business running through many types of planned and unplanned IT outages. Download this white paper to learn more.
Tags : 
smb, vmware, virtualization, business continuity, disaster re vsphere, downtime, it failure, vms
    
VMware
Published By: Datex     Published Date: Oct 11, 2010
For companies offering time critical services, the ability to access information and packages quickly can result in time and labor savings and improve customer satisfaction.
Tags : 
software, courier, warehouse, logistics, wms
    
Datex
Published By: Perimeter E-Security     Published Date: Oct 21, 2010
Read our guide to learn more about the popular malware methods cyber criminals are using to compromise internal systems.
Tags : 
malware, malicious website, firewalls, ids/ips, web content filtering, gateway av, network security solutions, host-based ips
    
Perimeter E-Security
Published By: EventTracker     Published Date: Nov 22, 2010
Ten conditions in Windows to monitor to make your organization more secure, and suffer less operational impact due to unplanned outages.
Tags : 
windows, log management, siem, file changes, registry changes
    
EventTracker
Published By: MoveOp     Published Date: Dec 15, 2010
This paper describes critical steps in executing a successful migration of servers and applications to a cloud-base Infrastructure as a Service (IaaS) vendor.
Tags : 
server migration, migrate to cloud, application migration, unix to linux
    
MoveOp
Published By: BP Logix     Published Date: Jan 17, 2011
This white paper covers how time is the critical element of the planning, oversight, and improvement of business processes. Learn how business users can gain ultimate control making processes more effective.
Tags : 
bpm, business process management, process management, worklfow
    
BP Logix
Published By: HP and Intel® Xeon® processors     Published Date: Sep 06, 2011
This IDC White Paper discusses the impact of the critical records management, data retention, and data protection regulations across key geographies. It concludes with recommendations for developing global information governance best practices.
Tags : 
hp + intel, idc, data retention, data protection regulations, records management, global records compliance, content management
    
HP and Intel® Xeon® processors
Published By: HP and Intel® Xeon® processors     Published Date: Sep 06, 2011
This white paper discusses how SMBs can effectively address their data protection challenges, implementing solutions that help store and protect their business-critical data as they cut costs and improve efficiency and reliability.
Tags : 
hp + intel, data protection stratefy, smbs, backup and recovery, disk, tape, d2d storage, data deduplication
    
HP and Intel® Xeon® processors
Published By: HP and Intel® Xeon® processors     Published Date: Nov 12, 2012
Use the Mission-Critical Converged Infrastructure as the foundation for the next decade of your computing. Combine years of trusted HP Integrity resiliency with HP BladeSystem efficiencies in the newest line of HP Integrity systems.
Tags : 
virtualization, hp integrity server, server, it infrastructure, data management., enterprise applications
    
HP and Intel® Xeon® processors
Published By: HP and Intel® Xeon® processors     Published Date: Nov 12, 2012
The Mission-Critical Converged Infrastructure is the foundation for the next decade of computing. The newest line of HP Integrity systems combines years of trusted HP Integrity resiliency with HP BladeSystem efficiencies. Read on to learn more.
Tags : 
migration, workload migration, consolidation, it infrastructure, dynamic optimization, data center
    
HP and Intel® Xeon® processors
Published By: MicroStrategy     Published Date: Apr 11, 2019
A&BI platforms are evolving beyond data visualization and dashboards to encompass augmented and advanced analytics. Data and analytics leaders should enable a broader set of users with new expanded capabilities to increase the business impact of their investments.
Tags : 
    
MicroStrategy
Published By: SkillSoft MKG     Published Date: Oct 09, 2010
Equipping the workforce with the critical perspectives and peripheral vision it needs to be business effective has become one of the single most vexing challenges facing organizations today. SkillSoft's 10x10x10 framework can help.
Tags : 
skillsoft, 10x10x10 framework, global workforce, framework
    
SkillSoft MKG
Published By: dvsAnalytics     Published Date: Apr 20, 2011
Due to increasingly strict federal, state, and industry regulations aimed at protecting health & financial information, an understanding of the required rules and standards and how they relate to call recording is critical
Tags : 
hipaa, pci dss, nacha, audit logs, call recording, data encryption, user access controls, ephi
    
dvsAnalytics
Published By: Achievers     Published Date: Mar 21, 2012
Organizations spend over $48 billion per year on employee rewards and recognition programs; however there are critical limitations to the traditional approach. In this research bulletin, Bersin & Associates discusses how Rewards and Recognition has changed to cater today's workforce.
Tags : 
employee recognition, employee engagement, employee rewards, hr trends, generation, gen x, gen y, millennials
    
Achievers
Published By: Achievers     Published Date: Dec 11, 2012
Managers that use employee recognition benefit from increased employee performance and achievement of organizational goals. Read this white paper to understand why managers are a critical component for successful employee recognition programs
Tags : 
employee recognition, employee rewards, online recognition program, trends
    
Achievers
Published By: Mobile PRM     Published Date: May 18, 2011
This eBook offers the exclusive and critical rules for using the power of mobile to transform your patient relationships.
Tags : 
mobile health, mhealth, ehealth platform, pharmaceutical marketing, patient-centric, mobile health technology
    
Mobile PRM
Published By: IBM Corp     Published Date: Sep 23, 2011
Networked storage is being deployed in combination with server virtualization by an increasing amount of organizations interested in - consolidation, reduced costs, improved flexibility and availability of mission-critical applications. This ESG Lab report presents the results of a mixed workload performance benchmark test designed to assess the real world performance capabilities of an IBM Storwize V7000 storage system and IBM x3850 X5 servers in a VMware-enabled virtual server environment. Download now to find out the results.
Tags : 
ibm, technology, esg, storage system, vmware, storwize v7000
    
IBM Corp
Published By: IBM Corporation     Published Date: Jun 09, 2011
Learn the 10 critical database activities & behaviors enterprises should audit now.
Tags : 
ibm, guardium, database, audit, security, risk, monitoring, webcast
    
IBM Corporation
Published By: ProcessPro Premier     Published Date: Jun 08, 2011
Integrated ERP can resolve the most critical manufacturing challenges.
Tags : 
inventory control, lot tracking, mrp, reporting, real-time, integrated data
    
ProcessPro Premier
Published By: TriNet     Published Date: Jan 22, 2013
Talent acquisition and retention are critical to the growth of startups and midsize companies.
Tags : 
    
TriNet
Published By: Visible Logic     Published Date: Jun 17, 2011
Whitepaper showing results of survey that determined that branded email addresses critical to professional image
Tags : 
email, branding, survey, whitepaper, startups, entrepreneurs, free email addresses, professional image
    
Visible Logic
Published By: EDGE Technology Services     Published Date: Jun 22, 2011
Aligning IT to your business is critical, especially media. Learn how to leverage digital without sacrificing margins or a competitive advantage.
Tags : 
broadcasting, strategy, media
    
EDGE Technology Services
Published By: KeyedIn Solutions     Published Date: Feb 02, 2012
This paper will first outline the challenges of ERP selection and implementation and then offer practical advice and critical success factors to make sure your ERP process is smooth and effective.
Tags : 
erp, saas, software, implementation, keyedin, keyed in, enterprise applications
    
KeyedIn Solutions
Start   Previous    91 92 93 94 95 96 97 98 99 100 101 102 103 104 105    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.