Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

critical

Results 2601 - 2625 of 2678Sort Results By: Published Date | Title | Company Name
Published By: Vision Solutions     Published Date: Apr 11, 2008
If you need more than tape backup to protect your critical applications running on AIX operating environments, download this white paper and learn your options and strategies, including how new technologies have significantly improved the recovery time and data recovery points for AIX.
Tags : 
data management, disaster recovery, business continuity, ibm aix, backup, recovery, vision, vision solutions, platforms
    
Vision Solutions
Published By: Burton Group     Published Date: Apr 08, 2008
Most large enterprises have launched an initiative to adopt service-oriented architecture (SOA), but SOA is not a solution that comes in a tidy little box. SOA is a new way to design systems, and it is more about culture than it is about technology. SOA will impact many aspects of an organization—from software development and operations to accounting and incentive systems. Governance is critical.
Tags : 
soa, service oriented, service-oriented, burton group, governance, soa governance, it management
    
Burton Group
Published By: ASG Software Solutions     Published Date: Apr 02, 2008
Business Service Management (BSM) is of growing importance in the IT world. By managing IT systems according to the business services they support - like order entry, online sales, shipping, or customer service - IT is able to deliver on real business goals like providing competitive advantage, improving customer satisfaction, driving revenue growth, and increasing shareholder value.
Tags : 
asg, cmdb, bsm, itil, bsm, bsp, metacmdb, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, bsm, ecommerce, bpm, workflow, itsm, critical application, cms
    
ASG Software Solutions
Published By: IBM     Published Date: Mar 28, 2008
In the beginning, an SOA-based approach was used for projects in individual departments, usually for those with high returns, short-term rewards, and relatively low risk, with typically a high degree of new development. But as the value of the SOA concept has become more apparent and its tools have grown in both scope and robustness, organizations are applying them more broadly, to organizational-size problems and mission critical issues, leveraging more and more existing code and production systems.
Tags : 
    
IBM
Published By: Easynet     Published Date: Mar 26, 2008
As business communication needs in professional services firms become more complex, the development and implementation of collaborative solutions becomes critical to realizing strategic business objectives. Learn the basic tenets of this collaborative environment and more in this IDC paper.
Tags : 
collaboration, project management, managed networks, professional services, easynet, network management
    
Easynet
Published By: Progress Software Corporation CEP     Published Date: Mar 26, 2008
We all have an intuitive idea of what an event is. However, when it comes to the use of the term "event" within a business context then it is easy to get confused. This papers seeks to explain what events are, whey they are important to your business, and what the options are for processing and managing these events (depending on their type and volume).
Tags : 
bloor, progressive, software, complex event processing, cep, mission critical, rules-and-model, event pattern, detection, bpm, business process management, latency, soa, smartblocks, apama, correlator, event processing technical society, epts, rfid, scada
    
Progress Software Corporation CEP
Published By: Clarus Systems     Published Date: Mar 18, 2008
In today’s global marketplace, you rely on your IP telephony environment to unite employees who work remotely, in a branch, or at the office headquarters by providing seamless, effective communications. Whether at the time of deployment, during an upgrade, or through an operational review, validating these environments to function properly and meet user expectations is critical.
Tags : 
itil, clarus systems, ipt, ip telephony, unified communications, cisco, callmanager, best practices, voice engineering, pdioo, strategies, deployment, operations, day 1, day 2, clarusipc, automated testing, business intelligence, performance management, configuration management
    
Clarus Systems
Published By: Adaptive Growth     Published Date: Mar 12, 2008
It is a truism that in any complex activity, the critical, defining decisions should be made as early in the process as possible.  In ERP implementation projects this principle is routinely undermined by the nearly universal practice of separating acquisition and implementation activities into separate projects, performed by separate teams operating under separate control.
Tags : 
erp, adaptive growth, project management, enterprise applications, enterprise resource planning, adaptivegrowth
    
Adaptive Growth
Published By: IBM     Published Date: Mar 11, 2008
Regardless of what department you work in, it is business critical to ensure that your team members have easy and ready access to the latest information and project team members. Whether you work in sales, marketing, human resources, research and development, or any other functional area, you need a centralized virtual place where all of your team members can collaborate in realtime, share ideas and documents and be more productive online.
Tags : 
ibm, corporate portal, portal, portals, ep campaign
    
IBM
Published By: Salesforce.com     Published Date: Mar 11, 2008
This 34 page guide readies you for a Salesforce Mobile rollout. Salesforce Mobile helps your mobile teams succeed by keeping them in touch with the latest data, whenever and wherever they need it, directly from mobile devices. With Salesforce Mobile, field professionals are prompted to log information directly in Salesforce or AppExchange apps immediately after important customer calls, emails, and appointments, so critical information is logged in near real time.
Tags : 
salesforce, crm, customer relationship management, sales tools, collaboration, smart phones, blackberry, appexchange, salesforce mobile
    
Salesforce.com
Published By: ASG Software Solutions     Published Date: Mar 05, 2008
Because business success is tightly fused with technology, IT costs are rising, and this trend is expected to continue. As a result, businesses are demanding that IT be more than a static resource. IT is expected to deliver business results with a measurable contribution to the organization's bottom line.
Tags : 
asg, cmdb, bsm, itil, paradigm, btsm, sla, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms, itsm
    
ASG Software Solutions
Published By: IBM     Published Date: Feb 25, 2008
In preparation for disasters, it’s critical to have a backup site that can be used if your primary location goes down. Does your business have the right procedures and equipment to recover after a disaster? Get answers. Download this article about a new enterprise data center and learn more about protecting your IT infrastructure.
Tags : 
disaster recovery, business continuity, preparedness, natural disaster, redundancy, hurricane, backup, recovery, data management, ibm, ibm opt it, opt it, hurricane fay, infrastructure
    
IBM
Published By: Secure Computing     Published Date: Feb 20, 2008
Reputation systems add a critical first line of advanced protection to help organizations accurately detect and block all types of threats to their messaging, web, and network environments.  In simplest terms, deploying a reputation service at the network edge is analogous to having a peephole in the front door of your house.  You let in people you know and trust, question the ones you don’t know and shun the ones who look suspicious.  Just by taking these simple measures you reduce your risk.
Tags : 
it spending, whitelist, whitelisting, email security, spam, antispam, cast iron, castiron, roi, bandwidth management
    
Secure Computing
Published By: Cast Iron Systems     Published Date: Feb 14, 2008
Discover why traditional software and custom coding solutions are obsolete when solving integration problems in a SaaS environment and how they’re rapidly being replaced by Integration Appliances that use “configuration, not coding” to quickly integrate your SaaS applications with your business-critical data.
Tags : 
saas, software as a service, erp, scm, crm, data integration, application integration, marketing automation, sales automation, castiron, cast iron
    
Cast Iron Systems
Published By: Cast Iron Systems     Published Date: Feb 14, 2008
Midsized companies face the challenge of integrating key applications while keeping risks low, costs down, and schedules short.  Explore three approaches to application integration and discover a quick and cost-effective way to get your critical applications to work together without custom code or burdening specialist resources, ensuring rapid ROI for your application investment.
Tags : 
application integration, data integration, crm, erp, customer relationship, castiron, cast iron, eai
    
Cast Iron Systems
Published By: Stratus Technologies     Published Date: Feb 12, 2008
Discover best practices you can use to benefit from server virtualization today. Avoid mistakes that could affect the availability and performance of your mission-critical manufacturing IT solutions.
Tags : 
server virtualization, virtual, virtual server, virtual machine, manufacturing, stratus, stratus technologies, enterprise applications, servers
    
Stratus Technologies
Published By: Stratus Technologies     Published Date: Feb 12, 2008
This paper provides an introduction to server virtualization for hospitals and healthcare delivery organizations. It also offers best practices you can use to benefit from virtualization, while avoiding missteps that could affect the availability and performance of mission-critical healthcare IT.
Tags : 
server virtualization, virtual, virtual server, virtual machine, healthcare, health, medical, medicine, hospital, stratus, stratus technologies, servers
    
Stratus Technologies
Published By: Motorola     Published Date: Feb 06, 2008
In this paper, Frost & Sullivan has detailed leading mobile solution deployments, products in development and new product features and modifications for leading solution vendors in the mobile enterprise space. All solutions were then compared, evaluated and ranked based on parameters considered as critical in the implementation of a wireless enterprise solution.
Tags : 
mobile, wireless, wireless products, wireless phones, mobility, motorola, motorola good
    
Motorola
Published By: Motorola     Published Date: Feb 06, 2008
By empowering mobile users with interactive access to mission-critical systems, Good Mobile Intranet increases the ROI of your existing IT investments. Read this white paper to learn more about how to deliver mobile solutions that provide an intuitive user experience.
Tags : 
intranet, intranets, motorola, motorola good, mobile, wireless, mobile applications
    
Motorola
Published By: Motorola     Published Date: Feb 06, 2008
To stay competitive in the specialty pharmaceutical business, it is critical that a company's sales force, marketing team and executives have the business tools they need to keep them one step ahead of their rivals. Read this case study to learn how Good™ Mobile Messaging has helped the employees of MedPointe Pharmaceuticals stay connected to crucial information while they're on the road.
Tags : 
motorola, motorola good, case study
    
Motorola
Published By: Aerohive     Published Date: Feb 06, 2008
Yesterday’s fat access points and legacy wireless LANs typically can’t handle mission-critical, real-time applications, nor do they have a migration path to 802.11n. Aerohive Networks has developed a new controller-less architecture that provides an innovative way to handle tomorrow’s wireless challenges – like voice over WLAN and migrating to 802.11n – without costing you a fortune. This paper discusses the benefits of this approach and the key underlying technologies of cooperative control, including best path forwarding and policy enforcement at the edge.
Tags : 
business, roi, tco, wireless lan, enterprise wireless, economics, cooperative control, aerohive, aerohive networks, networking, wireless, local area networking
    
Aerohive
Published By: Aerohive     Published Date: Feb 06, 2008
Are you looking to reduce the operational cost of your existing wireless LAN, and to make it support mission-critical, real-time applications and 802.11n? At the same time, are you challenged with the cost and complexity associated with most next-generation wireless LAN architectures? Check out the enterprise-class, cost-effective new cooperative control architecture from Aerohive Networks. In this real-world case study, you’ll see how Aerohive Networks' cooperative control architecture combines the linear cost modeling of autonomous APs and the operational advantages of controller-based approaches.
Tags : 
business, roi, tco, wireless lan, enterprise wireless, economics, cooperative control, aerohive, aerohive networks, wireless, local area networking
    
Aerohive
Published By: Computhink     Published Date: Jan 31, 2008
Download this informative webcast by Doug Brennecke, VP Sales at Computhink, featuring Tom von Gunden, chief editor of enterprise content management news and solutions site ECM Connection.
Tags : 
document management, compliance, content management, computhink, video
    
Computhink
Published By: Secure Computing     Published Date: Jan 25, 2008
Enterprises are increasingly opening up their networks to a greater constituency of remote users, but they often do not take into consideration the protection of user identity as a critical component of their strategy. The mobile workforce can now work productively from a remote location such as a home office, the airport, a hotel, or a customer site.
Tags : 
cell phone, cell phones, wireless security, mobile security, mobile workers, authentication, 2-factor authentication, iam, identity management, access control, securecomputing, secure computing, remote access
    
Secure Computing
Published By: GlobalSCAPE     Published Date: Jan 08, 2008
In 2005, O’Hare International Airport began a project to relocate and modernize a 2.1 million ft.2 runway. Five independent firms worked on the project design with the IT/data management led by Milhouse Engineering and Construction, Inc.  Milhouse implemented GlobalSCAPE WAFS which mirrors critical files to all sites. This provided fast local access to all project files automatically without any administrative burden and with no delays.
Tags : 
globalscape, wide area networks
    
GlobalSCAPE
Start   Previous    94 95 96 97 98 99 100 101 102 103 104 105 106 107 108    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.