tem

Results 7326 - 7350 of 7411Sort Results By: Published Date | Title | Company Name
Published By: Diskeeper Corporation     Published Date: Jun 08, 2007
With continued expansion of organizational storage allocation requirements, the time required for file-based data backup also continues to increase yet the time allotted for this data backup remains constant, exposing a critical issue. Though backup software vendors continue making advancements in technology to speed up the process, disk fragmentation will continue to remain an unresolved issue that must be addressed on the file system level to solve this bottleneck.
Tags : 
storage, storage management, backup, data backup, disk backup, defrag, defragment, defragmentation, optimize backup, optimizing backup, diskeeper, diskkeeper, disk keeper
    
Diskeeper Corporation
Published By: Diskeeper Corporation     Published Date: Jun 08, 2007
The size of today’s hard drives boggles the mind. Coupled with this surge in disk capacity is an explosion in file sizes. And multi-MB PowerPoints, MP3s and PDFs litter the hard drive. The problem is that drive I/O speed has not kept up the pace. As a result, it has developed into a serious bottleneck in system performance.
Tags : 
defrag, defragment, defragmentation, pc performance, disk performance, system performance, pc maintenance, diskeeper, diskkeeper, disk keeper
    
Diskeeper Corporation
Published By: Diskeeper Corporation     Published Date: Jun 08, 2007
While there is little dispute among IT professionals regarding the impact of disk fragmentation on system performance, no independent guidelines exist to recommend the frequency of defragmentation across an infrastructure. This white paper will outline the results of testing, draw conclusions, and make recommendations regarding managing fragmentation across your infrastructure.
Tags : 
defrag, defragment, defragmentation, system management, system maintenance, system performance, performance management, pc performance, diskeeper, disk keeper, diskkeeper
    
Diskeeper Corporation
Published By: Jumpnode Systems     Published Date: Jun 07, 2007
Get this free whitepaper now and read how a newer architecture, Appliance-enabled Software (AeS) services, combines a plug-in monitoring appliance with a hosted dashboard application to provide the benefits of SaaS (Software-as-a-Service) along with failover out-of-band communication capabilities for dependable alert notification and escalation.
Tags : 
saas, software as a service, monitoring, network monitoring, network management, remote access, remote network management, architecture, jumpnode, jumpnode systems
    
Jumpnode Systems
Published By: Casewise Systems Inc.     Published Date: Jun 05, 2007
Read this guide, that was published in BusinessWeek, on how organizations are now beginning to tackle this problem by taking a more holistic approach to IT Portfolio Management, enabling rapid decision-making based on a company roadmap.
Tags : 
business management, architecture, alignment, align, strategy, it management, network management, casewise, case wise
    
Casewise Systems Inc.
Published By: Ingate Systems     Published Date: May 31, 2007
Session Initiation Protocol (SIP) represents the third wave of Internet usage after SMTP (email) and HTTP (Web). Download this free guide now and learn why all firewalls will need to be SIP capable in order to support the wide-scale deployment of enterprise person-to-person communications.
Tags : 
communication, communications, voip, voice over ip, lan, local area network, ip networks, ip telephony, internet security, firewall, firewalls, ingate, ingate systems
    
Ingate Systems
Published By: Third Brigade     Published Date: May 25, 2007
This white paper identifies twelve critical questions that organizations need to consider when selecting a Host Intrusion Prevention System product. These questions relate to protection, manageability, integration and speed.
Tags : 
host ips, ips, hips, intrusion prevention, vendor selection, software selection, security, hacker prevention, hackers, anti virus, anti spyware, network security, cybercrime, third brigade
    
Third Brigade
Published By: Infor     Published Date: May 25, 2007
Given the potential for SOA to solve pressing business problems, it’s inevitable that most companies will begin adopting SOA constructs within the next year or two. As they move to SOA, the approach they choose will have both immediate and long-term effects on their ability to support and adjust their ecosystem to meet future business requirements.
Tags : 
soa, service oriented architecture, service-oriented architecture, business management, business process management, bpm, customer service, infor
    
Infor
Published By: AirDefense     Published Date: Apr 24, 2007
This white paper will explore what security challenges wireless networks present, suggest best practices to ensure Wireless LAN security, and demonstrate how AirDefense Enterprise, a Wireless Intrusion Detection and Prevention System, can help you define, monitor and enforce your wireless security policy.
Tags : 
best practices, sox, sarbanes-oxley, sarbanes oxley, sarbox, compliance, wireless security, wlan, wlan security, ids, intrusion prevention, intrusion detection, security policy, wireless security policy, airdefense
    
AirDefense
Published By: Quocirca     Published Date: Apr 23, 2007
Information management, which includes both data and content management, is an essential building block for Service-Oriented Architecture (SOA).  By taking a service oriented approach to information, you can achieve much greater value from your information assets.
Tags : 
information management, service oriented architecture, service-oriented architecture, soa, data management, mdm, master data management, content management, content management system, information integration, quocirca
    
Quocirca
Published By: Infor     Published Date: Apr 19, 2007
This paper includes a comparison between using RFID and barcoding for asset management as well as real-life examples of how RFID technology is being used by enterprising organizations today to gain significant time savings and enable better asset and maintenance management.
Tags : 
wireless, wireless hardware, wireless infrastructure, rfid, radio frequency, mobile data systems, asset management, barcode, barcoding, infor, erp
    
Infor
Published By: Vocalocity     Published Date: Apr 18, 2007
BLUESTREAK, Inc., a New Jersey-based promotional items manufacturer and distributor, needed to reduce telephone expenses to help maintain competitive advantage. Find out how VocalocityPBX, a hosted PBX voice communications solution helped them to achieve their goal and even exceed expectations.
Tags : 
networking, network management, pbx, phone, phone system, telecom, telecommunications, voice over ip, voip, vocalocity
    
Vocalocity
Published By: Vocalocity     Published Date: Apr 18, 2007
Hosted PBX phone solutions are revolutionizing how small and medium-sized businesses (SMBs) serve their customers, grow their business, and support their employees. Delivering the same enterprise level, professional phone system capabilities large businesses use at a much lower cost, hosted PBX is helping SMBs save money while putting their customer services on par with much larger organizations.
Tags : 
pbx, phone, phone system, ip telephony, telecom, telecommunications, voip, voice over ip, networking, network management, vocalocity
    
Vocalocity
Published By: Vocalocity     Published Date: Apr 18, 2007
CLP Resources needed a modern, but affordable and easy-to-manage phone system with the professional features used in a busy office. VocalocityPBX was the solution. Download this case study to learn more.
Tags : 
pbx, phone, phone system, voip, voice over ip, telecom, telecommunications, telephone, voice, vocalocity
    
Vocalocity
Published By: Vocalocity     Published Date: Apr 18, 2007
Fox Creek Leather needed a cost-effective, high-quality, and feature-rich alternative to a constrained traditional phone system and underperforming, in-house VoIP solution. Download this case study now to find out how VocalocityPBX, a hosted PBX office phone solution, delivered.
Tags : 
pbx, phone, phone system, voip, voice over ip, telecom, telecommunications, telephone, voice, vocalocity
    
Vocalocity
Published By: Vocalocity     Published Date: Apr 18, 2007
ANSR, Inc., needed a flexible, feature-rich office phone system that easily and quickly scales with the changing needs of a rapidly-expanding business. Download this case study to find out how VocalocityPBX, a hosted PBX office phone solution, catered to their needs.
Tags : 
pbx, phone, phone system, voip, voice over ip, telecom, telecommunications, scalable, scalability, case study, telephone, voice, vocalocity
    
Vocalocity
Published By: Informatica     Published Date: Apr 16, 2007
Don Tirsell, Senior Director of Product Marketing at Informatica, discusses "complex data," their recent acquisition of Itemfield, and how Itemfield's technology fits into Informatica's overall data integration platform.
Tags : 
data integration, crm, crm tool, crm tools, customer relationship management, podcast, informatica
    
Informatica
Published By: Microsoft Dynamics     Published Date: Apr 13, 2007
If your company uses a contact management or customer relationship management (CRM system), you need to ask one additional key question. Does your CRM or contact management system tie your consultative sales, ROI analysis and proposal production process together?
Tags : 
microsoft, microsoft white paper, crm, customer relationship management, contact management, sales, consultative sales, roi, crm software, microsoft dynamics
    
Microsoft Dynamics
Published By: Microsoft Dynamics     Published Date: Apr 13, 2007
This white paper walks through the key areas of a financial management solution so when you are evaluating current and future financial management software, you are prepared to avoid challenges and maximize your investment.
Tags : 
financial management, finance software, financial software, microsoft, microsoft white paper, microsoft white papers, microsoft paper, microsoft crm, microsoft dynamics, financial systems, financial planning
    
Microsoft Dynamics
Published By: Blue Lane     Published Date: Apr 03, 2007
One of the biggest challenges mirrors a problem in the physical server world: security patching. This paper describes in greater detail the benefits and challenges of server virtualization, and offers insight into how Blue Lane customers are utilizing the PatchPoint(r) System to combat the threat of software vulnerabilities.
Tags : 
virtualization, patching, security, vmware, network security, blue lane, patchpoint, server virtualization, patch management, servers
    
Blue Lane
Published By: Avalere     Published Date: Apr 02, 2007
Sensitive documents, files and intellectual property are extracted from a central repository such as a database, records management system, or document management system to complete daily tasks, however, extracting this information can lead to a security breach.  Avalere provides the tools you need to control the proliferation of sensitive information throughout your organization.
Tags : 
security, security management, database admin, dba, records management, database management, document management, data security, document security, avalere
    
Avalere
Published By: Avalere     Published Date: Apr 02, 2007
Laptops, USB devices, and other endpoint devices foster a flexible and more productive work environment, yet also increase a company's exposure to the loss or theft of critical information. Avalere inventories, protects, and controls your company’s laptop, desktop or removable storage device information to mitigate risks of lost or stolen equipment.
Tags : 
mobile computing, lost laptop, lost equipment, mobile data systems, computer loss, equipment loss, risk management, avalere
    
Avalere
Published By: ISYS     Published Date: Mar 26, 2007
Outlook, Hotmail, Yahoo!, AOL and more recently Gmail- the number of different email systems people use to read email in the UK market is seemingly endless. The purpose of this document is to help designers and marketers alike understand email HTML to help maximize your readability, deliverability and campaign effectiveness.
Tags : 
email marketing, newsletter design, deliverability, readability, enewsletter, e-newsletter design, adestra
    
ISYS
Published By: Business Assyst     Published Date: Mar 26, 2007
Interest in customer loyalty programs has never been more avid. After a number of years when such programs always seemed to be on the brink of taking off - but never quite managed to reach expectations - recent years have seen a real and dramatic increase in their uptake. This paper explores the issues which need to be addressed in order to cost justify the implementation of a customer loyalty system.
Tags : 
crm, customer relationship management, customer experience management, loyalty, retention, business metrics, affinity, business assyst
    
Business Assyst
Published By: Business Assyst     Published Date: Mar 26, 2007
This paper considers whether smart cards really do have a role to play in loyalty systems or whether they are simply being promoted by the suppliers of smart card technology into what they see as a fast growing, profitable marketplace.
Tags : 
customer satisfaction, customer relationship management, customer interaction service, customer experience management, smart card, smart cards, access control, business assyst
    
Business Assyst
Start   Previous    283 284 285 286 287 288 289 290 291 292 293 294 295 296 297    Next    End
Search Resource Library