Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

gen

Results 7026 - 7050 of 7126Sort Results By: Published Date | Title | Company Name
Published By: Trend Micro SaaS     Published Date: Dec 07, 2007
Um mit dem Wachstum Schritt zu halten und allen Schülern eine Umgebung zu bieten, in der sie optimal lernen und sich entfalten können, setzen die Shakopee-Schulen im Netzwerk eine vielschichtige Sicherheitslösung ein, die alle Standorte im Bezirk verbindet. Die IT-Abteilung muss ständig Funktionalität und Kosten gegeneinander abwägen, um mit der Installation ein Höchstmaß an Qualität und Nutzen zu gewährleisten.
Tags : 
trend micro, schutz, kosten-nutzen, shakopee-schulbezirks, funktionalität, interscan, officescan, pc-cillin, control manager
    
Trend Micro SaaS
Published By: uptime software     Published Date: Dec 06, 2007
You’ll learn what the 12 pitfalls of IT Systems Management really are, as well as the bridges you need to cross them. Learn what the big framework solutions don't want you to know, and why they might not be the answer for your IT Department. Learn to leverage what you have and your limited budget to get you the Systems Management tools and Solutions you need.
Tags : 
high availability, systems management, server management, network management, server, servers, it management, spending, cost, cost effective, agent, agentless, monitoring, uptime, uptime software, downtime, infrastructure
    
uptime software
Published By: uptime software     Published Date: Dec 06, 2007
Monitoring servers, applications, and services has become an essential part of the IT department over the past 10 years. However, it can be a daunting task to find the right solution for your Enterprise. This brief paper will examine the differences between Agent and Agentless monitoring, so you can make the right decision based on your company's needs, the metrics you need, your budget range, your resource availability, and your management's reporting needs.
Tags : 
server monitoring, monitoring tool, capacity planning, performance monitoring, service level management, service level agreement, sla, infrastructure, systems management, network management, uptime, server uptime, downtime, it management, monitoring, servers
    
uptime software
Published By: Trend Micro SaaS     Published Date: Dec 05, 2007
eSecurityToGo hat sich auf Sicherheitslösungen für kleine und mittlere Unternehmen (SMB) von heute spezialisiert. Einen großen Teil des Kundenstamms bilden andere IT-Berater, die das umfassende Fachwissen und die besonderen Schwerpunkte von eSecurityToGo zu schätzen wissen. Das Unternehmen ist Reseller der kompletten Produktpalette von Trend Micro Lösungen. Es sichert sich damit zufriedene Kunden, die sich auch in Zukunft für Trend Micro entscheiden.
Tags : 
gegensatz, unternehmen, esecuritytogo, interscan messaging, trend micro, smb
    
Trend Micro SaaS
Published By: NetSuite     Published Date: Nov 27, 2007
But what is "BI" and how do small/mid size business owners acquire it without too much cost?  This Executive White Paper will outline the issues and solutions for the "BI" requirements of growing companies.
Tags : 
analytics, business analytics, business intelligence, bi tools, business planning, erp data, netsuite
    
NetSuite
Published By: InsideCRM.com     Published Date: Nov 05, 2007
Shopping for a contact-center solution can be confusing and frustrating, so let us do the leg work for you! This easy-to-use guide compares the major vendors offering contact-center solutions today, including Genesys, Oracle, Verizon and many others.
Tags : 
software, call center, call center software, contact center, contact center software, genesis, oracle, verizon, contactual, interactive intelligence, crm, customer relationship management, insidecrm, inside crm
    
InsideCRM.com
Published By: Aventail     Published Date: Oct 26, 2007
The goal of pervasive BI applications is to take the data that produced the back office ROI of more than 400% and deliver it to front-line employees in a form appropriate to their job functions – with similar results. There are thousands of business process steps in a typical enterprise where pervasive BI insights can be added. What are leading companies doing with pervasive BI?
Tags : 
business intelligence, database, enterprise data warehouse, data mart, data warehouse, data mining, active data warehousing, active data warehouse, informatica
    
Aventail
Published By: Informatica     Published Date: Oct 26, 2007
The goal of pervasive BI applications is to take the data that produced the back office ROI of more than 400% and deliver it to front-line employees in a form appropriate to their job functions – with similar results. There are thousands of business process steps in a typical enterprise where pervasive BI insights can be added. What are leading companies doing with pervasive BI?
Tags : 
business intelligence, database, enterprise data warehouse, data mart, data warehouse, data mining, active data warehousing, active data warehouse, informatica
    
Informatica
Published By: eGain     Published Date: Oct 12, 2007
The Internet, years after its emergence, continues to be a challenge for most organizations. This paper examines the notion of eService and the need for it in large, global organizations in particular. It also provides guidelines for developing an effective eService plan, and concludes with a discussion of the most significant benefits of implementing such a plan.
Tags : 
eservice, customer service, online customer service, online help, helpdesk, help desk, e-service, online support, online assistance, global support, egain
    
eGain
Published By: 6th Sense Analytics     Published Date: Oct 11, 2007
This whitepaper asserts that moving to the next generation of software development and sourcing requires moving from art to science. Given how dependent we are on software as a foundation for every product and service, anything less creates a climate of risk, uncertainty, and unjustifiable costs that undermines our ability to compete in a global marketplace.
Tags : 
development, software development, offshore, offshoring, outsource, outsourcing, programming, 6th sense, 6th sense analytics
    
6th Sense Analytics
Published By: Appistry     Published Date: Oct 11, 2007
Organizations serving the intelligence & defense community rely on the performance of their applications for more than revenue - national security depends upon those applications for mission-critical operations. This industry profile details how Appistry provides the reliability and performance demanded by intelligence & defense organizations.
Tags : 
application fabric, performance computing, application performance, grid computing, infrastructure, appistry, enterprise applications
    
Appistry
Published By: Appistry     Published Date: Oct 11, 2007
Learn why GeoEye chose Appistry EAF to reduce development and operational cost and complexity, and enhance the company's agility in meeting the evolving needs of its customers.
Tags : 
application, application performance, application performance management, application fabric, application fabrics, grid computing, appistry, enterprise applications, infrastructure
    
Appistry
Published By: Trend Micro SaaS     Published Date: Oct 07, 2007
Der umfassende Hosted-Service wehrt Bedrohungen ab, ehe sie das Netzwerk erreichen, und kombiniert dazu leistungsfähige Anti-Spam- und Anti-Phishing-Funktionen mit mehrfach ausgezeichnetemViren- und Spyware-Schutz. Trend Micro, einer der Marktführer im Bereich der Sicherheits-Software, aktualisiert und optimiert die Lösung, um das Netzwerk des Kunden zuverlässig zu schützen und gleichzeitig wertvolle IT-Ressourcen einzusparen.
Tags : 
trend, messaging hosted security, e-mail, netzwerk, mx-datensatzes, spyware-schutz
    
Trend Micro SaaS
Published By: Quocirca     Published Date: Oct 05, 2007
Knowledge of the location of customers, property, products or any other asset is invaluable intelligence for improving competitive advantage and operational efficiency.  However, despite the proliferation of data that businesses generate today, the potential value of this location dimension is often overlooked in the business intelligence process.
Tags : 
business intelligence, business analytics, historical data, data analysis, gis, geospacial, geographic information system, geocoding, geocode, location, quocirca
    
Quocirca
Published By: Solution Publishing     Published Date: Oct 02, 2007
In point of fact, a lead that does not result in a sale has negative value to the company since resources must be spent to determine its futility. In this whitepaper we have endeavored to demonstrate a technological method to predict a lead's probability of becoming a sale and propose solutions for those targeting HR or IT professionals. Download this free whitepaper to learn how to improve your lead quality when targeting HR or IT professionals.
Tags : 
solution publishing, lead gen, lead generation, lead quality, b2b, b-to-b, smartstream, sas
    
Solution Publishing
Published By: Informatica     Published Date: Sep 28, 2007
David Loshin, consultant and author talked to Karen Hsu about Informatica's data quality, unstructured data and data governance solutions. Karen highlighted customers like Navteq and Humberside Police's innovative use of Informatica.
Tags : 
b-eye, business intelligence, data integration, karen hsu, interview, informatica, crm, customer relationship management, crm tools, crm tool, data governance, data quality
    
Informatica
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
CCU sought to encrypt its backup tapes for keeping customer data secure in transit and in storage at the offsite tape-vault vendor’s facility. As a financial institution, CCU was subject to stringent government regulations. With nearly 60 gigabytes of data to encrypt each night, CCU knew that a software solution was out of the question.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management, key management for enterprise, effective encryption key management, key management system, information security, protecting offsite tape storage, disaster recovery, data privacy regulations, backup tapes, security appliance, data security, secure key management, wire-speed encryption
    
Neoscale Systems, Inc.
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
The HSC network services group supports more than 2000 desktops, servers and backend systems such as e-mail, file, networking, application and storage services for general administration, dental and medical schools. HSC wanted to manage and reduce HIPAA compliance costs and processes associated with protecting PHI data within its storage infrastructure – a legacy SAN environment with evolving applications.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management, key management for enterprise, effective encryption key management, key management system, information security, protecting offsite tape storage, disaster recovery, data privacy regulations, backup tapes, security appliance, data security, secure key management, wire-speed encryption
    
Neoscale Systems, Inc.
Published By: Quocirca     Published Date: Sep 13, 2007
The general public is becoming increasingly cynical about the environment claims of businesses and with much bad press around data centers, information technology (IT) is in the front line. But data centers are actually the easiest bit of IT to control and consolidating infrastructure into them can help reduce the overall energy usage of IT and, if used well, IT itself can help businesses reduce their overall carbon footprint.
Tags : 
environment, environmental, green, green business, efficient, efficiency, energy, energy efficient, energy saving, power, infrastructure, symantec, quocirca, data center, datacenter, data centers, datacenters, data centre, data centres, internetworking hardware
    
Quocirca
Published By: Quocirca     Published Date: Sep 07, 2007
Companies are faced with increasing pressures on the communications capabilities they offer their employees.  More employees are mobile, working from home or in other remote locations with a growing need to talk and share information with their colleagues.  This cuts across fixed and mobile communications, but businesses still want the flexibility of mobile, and the costs, predictability, quality and service models of fixed.
Tags : 
telecom, quocirca, mobility, soho, voip, ip telephony, convergence, small business, wi-fi, wifi, united kingdom, mobile, ip networks, small business networks
    
Quocirca
Published By: Echopass     Published Date: Sep 07, 2007
Not all companies that have adopted multi-sourcing have realized the expected levels of savings.  A single over-arching problem is often the cause when multi-sourcing delivers disappointing results in service and/or savings.
Tags : 
multi-sourcing, call center outsourcing, remote agents, disaster prevention, ip call center, ip contact center, contact center solutions, contact center software, hosted call center, contact center, on-demand contact center, hosted contact center systems, crm, echopass
    
Echopass
Published By: Asentria Corporation     Published Date: Sep 04, 2007
Simple voicemail has evolved into complex integrated messaging platforms and the generic black handset has been replaced by a plethora of devices. Service providers can become critical partners for companies looking to ensure availability of their voice network.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures, fault management, network management, remote site monitoring, remote site alarms, environmental monitoring, network alarm monitoring, network alarm management, remote telemetry units, alarm management system, network management systems, network monitoring, protocol mediation
    
Asentria Corporation
Published By: OneNeck IT Services     Published Date: Aug 24, 2007
In 2004, J.W. Childs had the opportunity to acquire the Sunny Delight Beverage Co. (SDBC) through a unique carve-out of brands by Procter & Gamble. An accurate and in-depth assessment of the infrastructure required to support SunnyD’s business going forward would be absolutely essential to Childs’ decision to purchase the company.
Tags : 
oneneck, erp hosting, erp outsourcing, it outsourcing, it hosting, jw childs, j.w. childs, sunny d, sunny delight, acquisition, buyout, enterprise resource planning, outsourcing, governance, outsource, it management
    
OneNeck IT Services
Published By: Indicative Software     Published Date: Aug 24, 2007
Learn about agent-based versus agentless monitoring approaches to enterprise management, and how a combination of data collection technologies can realize the benefits of both.
Tags : 
enterprise management, enterprise monitoring, data collection, data collection engines, agent-based monitoring, agentless monitoring, performance monitoring, application performance, synthetic monitoring, passive monitoring, active monitoring, service level management, service management, systems management, indicative, infrastructure, monitoring, network performance management
    
Indicative Software
Published By: Ecora Software     Published Date: Aug 15, 2007
Understand why FISMA is heating up, what's the impact on Agency IT departments, what role configuration reporting plays, how the right documentation can build a strong audit trail, and how automation fast tracks your compliance plan.
Tags : 
change management, configuration management, it management, fisma, fisma compliant, fisma compliance, project management, compliance, compliant, regulatory compliance, audit, auditing, cmdb, gisra, ecora
    
Ecora Software
Start   Previous    272 273 274 275 276 277 278 279 280 281 282 283 284 285 286    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.