Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

critical

Results 2251 - 2275 of 2642Sort Results By: Published Date | Title | Company Name
Published By: Emerson Network Power     Published Date: Feb 07, 2011
In this whitepaper, we will explain trends that drive management challenges that data center operators are faced with. We will then show you the value proposition of Emerson's solutions, which can help you to: . Adapt data center infrastructure without increased cost; . Improving efficiency without added risk; . Maximize existing infrastructure investments; . Ensure availability of mission-critical services; and . Extend the life of existing infrastructure. Read on for more.
Tags : 
emerson, data center, automation, infrastructure, virtualization, cloud computing, cloud
    
Emerson Network Power
Published By: Avaya     Published Date: Feb 03, 2011
Every small business strives for it: the ability to make their people more productive and responsive - to customers, vendors and each other - while keeping costs in check. To do more, with less. Maximizing productivity is critical to operating efficiently and profitably in today's challenging business climate. And small and medium size businesses often overlook one innovative technology that is proven to deliver results: IP Telephony.
Tags : 
avaya
    
Avaya
Published By: Symantec.cloud     Published Date: Jan 26, 2011
Manage Electronic Records, Minimize Workplace Risks and Maximize Compliance. Learn about the legal and compliance regulations associated with maintaining your business critical emails. Understand how your business could face legal issues if a proper archiving solution is not in place.
Tags : 
symantec cloud, email retention, archiving, legal and compliance, epolicy institute, cloud computing
    
Symantec.cloud
Published By: Cornerstone OnDemand     Published Date: Jan 25, 2011
Most talent management solutions are missing the one critical component that will make positive business impacts a reality - learning. The "Failing to Learn" whitepaper helps outline the best combination of learning management system and talent management application that will maximize revenue growth by addressing learning's role in onboarding, performance, succession, compensation, and social networking.
Tags : 
cornerstone ondemand, talent management, learning management, human resources, compensation, onboarding, performance, benefits
    
Cornerstone OnDemand
Published By: BP Logix     Published Date: Jan 17, 2011
This white paper covers how time is the critical element of the planning, oversight, and improvement of business processes. Learn how business users can gain ultimate control making processes more effective.
Tags : 
bpm, business process management, process management, worklfow
    
BP Logix
Published By: LifeSize, a division of Logitech     Published Date: Jan 12, 2011
Why Ease of Use and Quality of User Experience Are The Most Critical Criteria for Successful Videoconferencing Deployments.
Tags : 
lifesize, videoconferencing deployment, ip-network, user experience, telecommunication, ip networks, ip telephony
    
LifeSize, a division of Logitech
Published By: DataFlux     Published Date: Jan 07, 2011
This white paper describes a general approach for planning your organization's efforts to improve data quality, providing a data-example-driven perspective of some of the unique challenges of product data quality, as well as discuss and demonstrate three critical steps to improving product data quality.
Tags : 
dataflux, product data quality, standardization, matching
    
DataFlux
Published By: Infor     Published Date: Jan 06, 2011
You need a path through this madness.In this recorded webicast, Steve Muran will take you through a case study of how he methodically built and managed a cross-enterprise, multichannel program that deepened the customer wallet share. Steve will discuss the why, where, and how his lead generation capabilities made customer cross-sell, up-sell, and retention easier by highlighting the critical importance of customer data and analytics.
Tags : 
infor, cross-enterprise, lead generation, retention, customer data and analytics, social media
    
Infor
Published By: Infor     Published Date: Jan 03, 2011
You need a path through this madness.In this recorded webicast, Steve Muran will take you through a case study of how he methodically built and managed a cross-enterprise, multichannel program that deepened the customer wallet share. Steve will discuss the why, where, and how his lead generation capabilities made customer cross-sell, up-sell, and retention easier by highlighting the critical importance of customer data and analytics.
Tags : 
infor, cross-enterprise, lead generation, retention, customer data and analytics, social media
    
Infor
Published By: NetIQ     Published Date: Dec 23, 2010
This white paper provides the steps to successfully implement the critical security controls listed in the CAG in order to avoid "adding another checklist" to an already overburdened and underfunded organization that is struggling to meet growing security and compliance demands. It also describes how NetIQ can help federal agencies implement and automate these controls.
Tags : 
netiq, consensus audit guideline, cag, security control, federal agencies, cyber security, information security management
    
NetIQ
Published By: MoveOp     Published Date: Dec 15, 2010
This paper describes critical steps in executing a successful migration of servers and applications to a cloud-base Infrastructure as a Service (IaaS) vendor.
Tags : 
server migration, migrate to cloud, application migration, unix to linux
    
MoveOp
Published By: Shavlik Technologies     Published Date: Dec 15, 2010
Critical IT operations require solutions that are architected for today. Solutions that take a new look at modern technology, modern threats, and modern business reality. Read this white paper for more information.
Tags : 
shavlik, endpoint management, security strategy, it operation, threats, sensitive data, data center, hacker
    
Shavlik Technologies
Published By: Emerson Network Power     Published Date: Dec 14, 2010
Learn best practices for optimizing critical systems for cloud deployment in existing facilities, including optimizing power architectures for high availability.
Tags : 
emerson network power, liebert, dcim, data center infrastructure management, cloud computing, paas, iaas, saas
    
Emerson Network Power
Published By: IBM     Published Date: Dec 07, 2010
In today's business environment, having a full audit trail of decision making history is critical. Download this recorded discussion to discover Case Management and listen how organizations are able to optimize outcomes based on advanced intelligence capabilities.
Tags : 
ibm, advanced case management podcast, acm, audit trail, business intelligence, content management
    
IBM
Published By: CompareBusinessProducts     Published Date: Dec 03, 2010
Creating Your Needs Analysis First. When buying networking equipment: routers, switches, firewalls, and network management solutions for your company or organization, it's essential to create a needs analysis first, so that you make the right decisions from multiple standpoints
Tags : 
comparebusinessproducts, enterprise networks, network management, firewall, scalability, infrastructure, security, network security
    
CompareBusinessProducts
Published By: EventTracker     Published Date: Nov 22, 2010
Ten conditions in Windows to monitor to make your organization more secure, and suffer less operational impact due to unplanned outages.
Tags : 
windows, log management, siem, file changes, registry changes
    
EventTracker
Published By: Innotas     Published Date: Nov 22, 2010
Review this white paper now and learn how and why IT Governance is the best path to achieving this critical alignment.
Tags : 
innotas, it governance, project management, project portfolio management, ppm, application portfolio management, apm
    
Innotas
Published By: Emerson Network Power     Published Date: Nov 18, 2010
In this paper, we compare both cooling systems' ability to maintain favorable environmental conditions, and their energy efficiency and annual operating costs.
Tags : 
precision cooling, comfort cooling, optimized cooling, liebert, emerson network power, tco, heat management, energy efficiency
    
Emerson Network Power
Published By: Mimecast     Published Date: Nov 10, 2010
A successful Data Leak Prevention system will address the issue of email by policy, in a way that integrates with the systems your business has in place to address governance, risk and compliance rather than through a series of standalone tools.
Tags : 
mimecast, software as a service, saas, data loss prevention, risk and compliance, email, security
    
Mimecast
Published By: iolo technologies, LLC     Published Date: Nov 04, 2010
In this white paper iolo technologies discusses the critical role of Windows workstations in the never-ending battle to achieve higher levels of business productivity.
Tags : 
iolo technologies, windows workstation productivity, pc optimization, pc tuneup
    
iolo technologies, LLC
Published By: Revinetix, Inc.     Published Date: Nov 03, 2010
Ensuring immediate access to business critical data following a disaster event is a top priority for IT management. More organizations are replicating their backups to remote locations for disaster recovery.
Tags : 
revinetix, disaster recovery, business continuity, remote backup replication, business critical data, disk backup, remote replication, remote access
    
Revinetix, Inc.
Published By: IBM Software     Published Date: Nov 02, 2010
This paper describes five practical steps companies can take to achieve customer intimacy and, by doing so, provide a springboard for excellence in the other critical value disciplines.
Tags : 
ibm cognos predictive analysis, business performance, customer relationship, customer intimacy
    
IBM Software
Published By: Coverity, Inc.     Published Date: Nov 01, 2010
This report is the result of the largest public-private sector research project focused on open source software integrity, originally initiated between Coverity and the U.S. Department of Homeland Security in 2006. The results from the 2010 edition of the Coverity Scan Open Source Integrity Report detail the findings of analyzing more than 61 million lines of open source code from 291 popular and widely-used open source projects such as Android, Linux, Apache, Samba and PHP, among others.
Tags : 
coverity, static analysis, dynamic analysis, software analysis, software defects, software bugs, product safety, software safety
    
Coverity, Inc.
Published By: Mimecast     Published Date: Oct 25, 2010
A successful Data Leak Prevention system will address the issue of email by policy, in a way that integrates with the systems your business has in place to address governance, risk and compliance rather than through a series of standalone tools.
Tags : 
mimecast, data loss, data leaks prevention, dlp, risk, compliance, information security, email management
    
Mimecast
Published By: Perimeter E-Security     Published Date: Oct 21, 2010
Read our guide to learn more about the popular malware methods cyber criminals are using to compromise internal systems.
Tags : 
malware, malicious website, firewalls, ids/ips, web content filtering, gateway av, network security solutions, host-based ips
    
Perimeter E-Security
Start   Previous    84 85 86 87 88 89 90 91 92 93 94 95 96 97 98    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.