RSS feed Get our RSS feed

News by Topic

act

Results 13551 - 13575 of 14372Sort Results By: Published Date | Title | Company Name
By: ATP International     Published Date: Mar 10, 2009
"High Speed Ethernet-Promoting Openness in Hybrid Control" debunks the myth that developments in Ethernet backbones are directed only towards high speed, real-time factory automation. This paper shows how high speed Ethernet supports hybrid control through standard and flexible function blocks, bridging Fieldbus networks and allowing the use of Foundation Fieldbus and Profibus solutions.
Tags : atp international, high speed ethernet, hybrid control, fieldbus, profibus, ethernet backbones, process automation, hse network
     ATP International
By: TRUSTe     Published Date: Mar 10, 2009
A case study explaining why JungleSource views TRUSTe as core enabler to their business.
Tags : privacy policy, truste, privacy policy generator, free privacy policy generator, privacy policy template, free privacy policy template, how to increase online sales, boost online sales
     TRUSTe
By: Raritan Inc.     Published Date: Mar 05, 2009
This White Paper examines these considerations in greater detail and defines best practices when evaluating and deploying a Smart Card Authentication solution.
Tags : power distribution unit, raritan, pdu, power monitoring, environmental monitoring, data center power, data center monitoring, monitor power
     Raritan Inc.
By: IBM     Published Date: Mar 04, 2009
The traditional view of online transactions is anchored on the idea that online stores are first and foremost a venue for transactions, which, by and large, tend to be tightly structured interactions involving the buyer and the retailer. Within this interaction, the retailer’s key job is to provide customers with the information they need to purchase–such as pricing, product descriptions and orderly merchandising–and to deliver all within the context of a superior customer experience. However, the way customers are seeking and processing this information is beginning to change, and that’s expected to have a big impact on tomorrow’s online experience.
Tags : ibm, online transactions, customer experience, online experience, moosejaw, customer satisfaction, purchasing, ecommerce
     IBM
By: IBM     Published Date: Mar 04, 2009
Many of your customers prefer doing business with you online. They go to your Web sites to learn about your products and services, to find products and/or services that address their needs, to configure and price the products and/or service s that they’d like to buy, and to purchase those products and/or services. They also set up and manage accounts with you. When those customers are consumers, we call these activities B2C (business to consumer) ecommerce.
Tags : ibm, ibm websphere commerce, customer service, b2c, business to consumer, ecommerce, b2b, web-sphere commerce saas
     IBM
By: ArcSight     Published Date: Mar 04, 2009
Whitepaper highlighting the twelve PCI DSS requirements and the technology necessary to address the PCI DSS 1.2 requirements.
Tags : pci dss, pci dss 1.2, log management, arcsight logger, siem, payment card industry, pci, dss
     ArcSight
By: ArcSight     Published Date: Mar 04, 2009
This document will outline the requirements for an effective fraud mitigation solution. It will detail a solution that considers the entirety of an organization’s fraud mitigation strategy.
Tags : fraud, siem, arcsight, mitigating fraud, intrusion prevention systems, fraudsters, fraud policy, insider threats
     ArcSight
By: ArcSight     Published Date: Mar 04, 2009
This whitepaper will outline the drivers for log management as well as their underlying challenges and drive towards a common set of requirements for evaluation of log management tools.
Tags : log management, logs, siem, arcsight logger, event logs, security, compliance, regulatory audits
     ArcSight
By: ArcSight     Published Date: Mar 03, 2009
This document provides an overview of the drivers for Log Management scalability and outlines the key requirements to consider as part of the evaluation process.
Tags : log management, security, fraud, insider threat, suspicious network activity, pci dss, hipaa, sox
     ArcSight
By: ArcSight     Published Date: Mar 03, 2009
This whitepaper presents ArcSight EnterpriseView, a solution designed to help customers understand who is on the network, what data they are seeing, and which actions they are taking with that data. While doing so, EnterpriseView provides the context to understand whether the business faces additional risk of data loss, compliance breach, or fraud.
Tags : idm, identity management, user monitoring, identityview, enterpriseview, logs, siem, event logs
     ArcSight
By: Point It     Published Date: Mar 02, 2009
Many business-to-business (B2B) marketers fail at search without even knowing it. The very basic performance reports available through Google™ and other search providers can lead an advertiser to believe that his or her campaign is generating plenty of qualified interest, when the actual truth could be precisely the opposite.
Tags : point it, keywords, tracking, b2b marketers, cost per click, ctr, impressions, cost-per-click
     Point It
By: Progress Software BTA Financial     Published Date: Mar 02, 2009
Forrester used in-depth interviews and Forrester's powerful "Total Economic Impact" (TEI) methodology to model and analyze the costs, risks, resource usage, and payback period of a U.S. financial services company using Actional in production. Follow their calculations and find out the results.
Tags : forrester, tei, total economic impact, roi, actional, progress, soa, crm
     Progress Software BTA Financial
By: BMC ESM     Published Date: Mar 01, 2009
Free utility finds the fragmentation that's crippling your network! New Disk Performance Analyzer for Networks 2.0 takes the guesswork out of tracking networked system performance. This revolutionary utility scans networked systems' performance from one single access point. It equips administrators with an arsenal of performance data, so they can zero in on systems' fragmentation and slows. This second edition comes with a series of improvements which afford users more control and flexibility. Systems can be selected from the Active Directory or IP Address. And this cutting-edge tool supports custom grouping. So, repeated scans are easy to set up and run. Performance reports can also be scheduled for off-peak hours. Results will be automatically sent to your e-mail address. Performance reports are now exported to a MicrosoftT SQL database for easy sorting and querying. Don't let low-functioning systems go unnoticed. Get Disk Performance Analyzer for Networks 2.0 free now!
Tags : 
     BMC ESM
By: VMware     Published Date: Feb 26, 2009
In this brief, you'll learn how CA Recovery Management Products, like CA ARCserve Backup and CA XOsoft solutions, can be applied with VMware Infrastructure to help you effectively respond to the challenges and opportunities of business-critical computing.
Tags : vmware, business continuity, ca recovery management, ca arcserve, ca xosoft solutions, vmware infrastructure, business-critical computing, virtualization
     VMware
By: VMware     Published Date: Feb 26, 2009
This flash demonstrates how CA ARCserve Backup, CA XOsoft High Availability and CA XOsoft Replication help protect the virtualization data without impacting performance.
Tags : vmware, ca arcserve backup, ca xosoft high availability, virtualization data, security, storage
     VMware
By: VMware     Published Date: Feb 26, 2009
The primary goal of this guide is not simply to provide a checklist of tasks, but to help you develop an understanding of the disaster recovery (DR) planning process and the principles that underlie it. Before getting into the details, let’s consider first just what this guide will do for you and equally importantly, what it will not do. What this guide will do is to lay out a framework for DR planning that keeps things conceptually simple and helps you know what steps must be carried out and why, without a lot of jargon or unnecessary formality.
Tags : ca xosoft, vmware, disaster recovery, business impact analysis, bia, outside-in analysis, inside-out analysis, contingency planning guide
     VMware
By: BlackBerry     Published Date: Feb 25, 2009
When interactivity is combined with unified communications and location awareness, next-generation social networks will have significant business value. Unified communications integrates the wide variety of voice, data, video and collaboration tools that business professionals use today into a single environment. This can dramatically improve the speed of decision-making by connecting collaborators quickly, regardless of their location.
Tags : blackberry, ecosystem, social networking, unified communications, microsoft exchange, mobile device management, mobile device management software, mobile workers
     BlackBerry
By: Progress Software BTA Telecommunications     Published Date: Feb 25, 2009
Based on the Forrester Total Economic Impact (TEI) methodology, frameworks and interviews, Forrester Consulting, in this commissioned study for Progress, measured the total economic impact and potential ROI that using Progress Actional delivered in monitoring and managing the CRM system of a leading media and entertainment services provider.
Tags : progress software, telecommunications, tei, crm, telcos, telecom, business transaction, vanson
     Progress Software BTA Telecommunications
By: InMage     Published Date: Feb 24, 2009
Leveraging DR-Scout: Howard Rice Lowers TCO and Streamlines Backups with a Disas­ter Recovery Solution Howard Rice Nemerovski Canady Falk & Rabkin P.C. is a San Francisco-based law firm with leading national and international practices, representing entities and individuals across a comprehensive range of practice areas.
Tags : inmage, backup windows, rising tco, dr-scout, disaster recovery, data backup, data recovery, network-attached storage
     InMage
By: Quocirca     Published Date: Feb 23, 2009
Networked printers and multifunction peripherals often require a high level of support and manual intervention. Secure remote monitoring platforms reduce device downtime through automating service alerts, providing proactive toner replenishment and automatic meter reading. End users benefit through improved device uptime, and manufacturers and their service partners can build proactive service relationships which can drive greater customer loyalty.
Tags : quocirca, printers, networked printers, multifunction peripherals, secure remote monitoring, document output devices, remote monitoring, managed print service (mps)
     Quocirca
By: Motorola, Inc.     Published Date: Feb 20, 2009
The purpose of this research and market trends study was to better understand the Information Technology (IT) environment and business strategy concerning enterprise mobility systems and mobility applications.
Tags : motorola, mobility, enterprise mobility
     Motorola, Inc.
By: Trend Micro SaaS     Published Date: Feb 20, 2009
Hosted, or "in-the-cloud", messaging security capabilities are becoming increasingly popular with organizations of all sizes. Some have already adopted hosted services, while others are becoming more receptive to the notion of using third party services to manage their security infrastructure than they were just a year ago. Particularly driven by the current economic recession, decision makers are realizing that hosted email security can provide a cost-effective solution while actually improving security.
Tags : saas, trend, trend micro, software as a service, on-premise, cloud, trendlabs, email security
     Trend Micro SaaS
By: IBM     Published Date: Feb 18, 2009
This white paper explains how the IBM® Optim™ Data Growth Solution provides proven technology and comprehensive capabilities that make archiving complex relational data both practical and desirable.
Tags : ibm integrated data management, database growth, optim data growth solution, database archiving, idm, disaster recovery, database referential integrity
     IBM
By: IBM     Published Date: Feb 18, 2009
This white paper explains the steps you need to consider when developing your privacy strategy and implementing your first data privacy project. Find out how you can help your organization implement best practices in privacy protection and make your privacy project successful from start to finish.
Tags : ibm integrated data management, data privacy, data security, ibm optim data privacy solution, hackers, security breach, best practices for data security, data inventory
     IBM
By: HP Data Center     Published Date: Feb 18, 2009
Data centers are large, important investments that, when properly designed, built, and operated, are an integral part of the business strategy driving the success of any enterprise. Yet the central focus of organizations is often the acquisition and deployment of the IT architecture equipment and systems with little thought given to the structure and space in which it is to be housed, serviced, and maintained. This invariably leads to facility infrastructure problems such as thermal “hot spots”, lack of UPS (uninterruptible power supply) rack power, lack of redundancy, system overloading and other issues that threaten or prevent the realization of the return on the investment in the IT systems.
Tags : hp data center, data center, business strategy, it architecture, ups, uninterruptible power supply, rack power, lack of redundancy
     HP Data Center
Start   Previous    536 537 538 539 540 541 542 543 544 545 546 547 548 549 550    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics