RSS feed Get our RSS feed

News by Topic

aditi

Results 1476 - 1500 of 1519Sort Results By: Published Date | Title | Company Name
By: HP - Enterprise     Published Date: Oct 23, 2008
Fortify's report summarizes electronic as well as traditional methods of voting including absentee ballots.  This voting guide will provide recommendations for voters who want to make sure their vote counts and for federal and state governments on how to devise efficient and accurate voting processes and systems.
Tags : fortify, application security, security risks, voting, fortify, fortify software, election process, local government
     HP - Enterprise
By: SyberWorks     Published Date: Oct 21, 2008
In most cases, the biggest quandary an organization must solve is to put together a rational, i.e., a cost justified, business case why they should spend capital to invest in a learning management system. The focus of this white paper will outline the benefits of web-based training along with a practical framework for developing ROI when looking at the cost of traditional training methods verses e-Learning.
Tags : syberworks, e-learning, roi, global workforce, just-in-time learning, learning management systems, learning management system, e-learning
     SyberWorks
By: SyberWorks     Published Date: Oct 21, 2008
This blind case study focuses on the operations division of a Fortune 500 company had significant challenges training its franchisees. They struggled with an 8 to 12 month backlog in providing training for their new franchisees coming on board. Anecdotally, when they did get around to training new people, the requirements and curriculum were outdated and in the process of being revised. Their franchisees and employees were never current on updated company policies and procedures. These franchises were spread all over the country, so it was costly to train their franchisees using traditional onsite training methods.
Tags : syberworks, learning management system, roi, learning management systems, learning management system, e-learning, elearning, web based training
     SyberWorks
By: Trend Micro SaaS     Published Date: Oct 08, 2008
According to experts at TrendLabs, spam now makes up close to 95% of all email and continues to grow. In the first three months of 2008 spam rates almost doubled over rates observed at the end of 2007 and TrendLabs predicts that average daily spam volumes will increase by 30 to 50 billion messages per day within the year.1 As spam continues to grow at dramatic rates, traditional on-premise email security products are failing to keep up. This limitation is one of the primary reasons that IDC predicts demand for hosted security solutions -also known as SaaS (Software as a Service) solutions-will grow by more than 30% annually through 2012.2 For context, the growth rate for hosted email security is projected to be more than eight times that of the traditional software email security market, and more than 60% faster than appliance-based email security solutions.
Tags : saas, trend, trend micro, software as a service, trendlabs, email security, security, interscan messaging
     Trend Micro SaaS
By: Amacai     Published Date: Oct 03, 2008
Data is at the core of your business. And yet, complete and accurate data is harder and harder to come by these days. Traditionally, the White Pages and Directory Assistance have been the main source of marketing data, whether it's direct marketing lists, base-file compilations or database verification and enhancement.
Tags : targusinfo, whitepapers, lead generation, whitepages, voip, wireless service, data management/analytics
     Amacai
By: MessageLabs     Published Date: Sep 25, 2008
A close look at the data provides a clear picture of how spammers vary their tactics to overwhelm traditional corporate email defenses, through changes in duration, frequency and intensity among others. This whitepaper will help you understand these threats to your business, and how MessageLabs provides a unique solution.
Tags : messagelabs, spam, data analyst, traffic, trends, anti-spam, security
     MessageLabs
By: MessageLabs     Published Date: Sep 25, 2008
In order to better understand where spyware is going, or more importantly, where it’s evolved from, we actually need to wind the clock back a lot further than may be first imagined; in fact, over fifteen years. If we look at the embryonic stages of the anti-virus industry, around sixteen years ago there were the first boot-sector viruses. It has taken this time for viruses as we’ve traditionally known them to evolve towards the more commercially viable, or intellectual-property-theft status that we now associate with contemporary viruses, a fact not realized by many. This whitepaper goes in-depth to discuss the history of spyware and its evolving future.
Tags : messagelabs, spyware, viruses, botnets, microsof, browser helper object, web threats, malware
     MessageLabs
By: MessageLabs     Published Date: Sep 22, 2008
In this whitepaper, get a detailed look at dangerous robot networks or “botnets,” such as Sobig, StormWorm and MayDay. Understand how their creators are constantly evolving these threats to prevent detection by traditional forms of security. Finally, learn how the MessageLabs solution provides unique protection against botnets.
Tags : botnet, bot, messagelabs, email security, malware, virus, security
     MessageLabs
By: IBM     Published Date: Sep 09, 2008
Today, companies have more at risk than ever before. To stay in business, they must evolve their traditional business continuity programs to include continuous enhancements. They must also provide continuous service and support to their customers, suppliers, stockholders and stakeholders. The best approach requires a detailed analysis of both business and technical requirements, an understanding of available options, and a deep inspection of the many variables that will support their ultimate strategy.
Tags : business continuity, ibm, information, protection, risk, ibm mi
     IBM
By: Tidal Software     Published Date: Sep 03, 2008
IT groups must support many applications and servers across multiple platforms that frequently operate independently of each other. However, coordinating job scheduling across all these applications and networks is often required to optimize resource utilization. The traditional approach of applying more staff, toolkits, and rudimentary scheduling software to cobble together automated batch processing solutions becomes cost-prohibitive, inefficient, and error-prone, as the number of moving parts increases and the environment becomes more heterogeneous.
Tags : job scheduling, job scheduler, batch scheduling, batch processing, cron, workload automation, application scheduling, enterprise scheduling
     Tidal Software
By: HP     Published Date: Jul 29, 2008
"Power and Cooling", a video presentation, uses vivid computer modeling to illustrate why traditional trial-and-error approaches are inadequate for effective thermal management . Data center cooling costs now account for half of all power-related outlays. And they continue to soar. But cutting these costs - while at the same time improving availability and capacity - is achievable. The trick is knowing how.
Tags : power, cooling, data center, mission critical
     HP
By: Stratus Technologies     Published Date: Jul 25, 2008
Faced with a growing number of business-critical applications and services to support, SMBs and enterprises with remote environments are experiencing a real need for high availability.  This paper discusses an easy-to-use, affordable high-availability and virtualization solution using standard x86 servers.
Tags : high availability, virtualization, ha software, stratus avance software, fault-tolerant hardware, ftserver systems, stratus
     Stratus Technologies
By: BlueCat     Published Date: Jul 09, 2008
This paper briefly traces some of the challenges involved with IP address distribution over the past two decades, to the current adoption of DHCP as the dynamic protocol of choice for pain-free management of network resources. Integral to the theme of secure yet reliable network administration is the integration of DNS and DHCP into a single network device called the Adonis DNS/DHCP Appliance which ensures that traditional barriers to secure and effective resource allocations are overcome with an efficient yet easy-to-use solution that enhances enterprise information security.
Tags : ipam, ip address management, address management, dns, dhcp, ip address, bluecat, blue cat
     BlueCat
By: Microsoft Dynamics     Published Date: Jul 03, 2008
The business landscape is evolving; the traditional way people work together-in the office or in the field-looks very different today than it did just a couple of years ago. Download this webcast to learn how Microsoft Dynamics CRM empowers you to take advantage of your existing technology investments to extend the reach of your business and enable your mobile workforce to drive better business results.
Tags : microsoft, microsoft dynamics, crm, software, crm software, contact management, business management
     Microsoft Dynamics
By: NCP Engineering GmbH     Published Date: Jul 03, 2008
While IPSec VPN implementation has traditionally been viewed as expensive and time-consuming for large organizations, Quocirca has found that the next generation of IPSec VPN technologies has addressed these management headaches through automation, integrated security policy management, and centralized control.
Tags : ipsec, vpn, security policies, policy management, ncp, ncp engineering, vpn, ipsec
     NCP Engineering GmbH
By: NLB Corp.     Published Date: Jun 23, 2008
Paint booth cleaning has evolved into a critical step in assuring customers of a high-quality finished product. Manufacturers must deliver this quality while meeting demanding production schedules and tight operating budgets. This has led to significant growth in the use of high-pressure water jetting as an alternative to the traditional methods of chemical stripping and incineration, or burn-off.
Tags : paint stripping, paint, cleaning, jet, water jet, jetting, nlb, nlb corp.
     NLB Corp.
By: IBM     Published Date: Jun 19, 2008
IBM BladeCenter JS12 Express blade brings the power of mainframes to blades. Coupled with the IBM BladeCenter S chassis, it is ideal for small database and application serving. This complete solution is compact, reliable and extremely energy efficient. Find out how to simplify your traditional UNIX, IBM i and Linux rack-mount and tower setup with the IBM BladeCenter JS12 Express blade and BladeCenter S chassis.
Tags : blade, blades, blade server, ibm, bladecenter, mainframe, green green computing, express seller
     IBM
By: IBM     Published Date: Jun 11, 2008
Traditionally, retail promotions were handled by the merchandising, marketing and finance departments. Now companies are finding that by implementing promotions strategies deep within their infrastructure, they can increase profit uplift. Get the IBM white paper and see how optimizing retail promotions can positively affect your business.
Tags : promotions, optimization, aberdeen, retail research, promotions technology, promotions optimization, promotions managment, retail promotions technology
     IBM
By: SchemaLogic     Published Date: Jun 11, 2008
The Associated Press, like all publishing and digital media companies, must work rapidly to meet the demands of a shifting media landscape. An exploding wave of free content on the web meant that AP not only had to deliver more content online, but needed to create more relevance and niche content in order to update traditional ad revenue models with targeted web-based products and more potential for advertising dollars.
Tags : schemalogic, associated press, content delivery, content management, cms, content management system
     SchemaLogic
By: StrongMail     Published Date: Jun 08, 2008
The growing trend towards insourcing marketing and transactional email is being driven by businesses that are looking for ways to improve their email programs, increase data security and lower costs. When evaluating whether it makes more sense to leverage an on-premise or outsourced solution, it's important to understand how the traditional arguments have changed.
Tags : strongmail, social media, email marketing, on-premise advantage, transactional email, insourcing, bounce management, spam trappers
     StrongMail
By: IBM     Published Date: May 30, 2008
Unified communications and collaboration strategies can help organizations deliver a user experience that brings together communications and collaboration silos across and beyond traditional business boundaries. This paper reviews how by providing users with a single, integrated experience across both business applications and communications and collaboration tools, organizations can cultivate more dynamic and flexible business systems.
Tags : unified communication, unified communications, collaboration, lotus, lotus notes, ibm ep, ep campaign, ibm
     IBM
By: MessageLabs     Published Date: May 28, 2008
So-called "redirector" or "search engine" spam emerged in late 2007 and has now grown into a significant threat to businesses. In this new MessageLabs whitepaper, learn about the latest spammer ploy to get dangerous links past traditional defenses, and how MessageLabs delivers a proven, cost-effective solution.
Tags : spam, anti-spam, anti spam, email security, trojan, hacker, messagelabs, message labs
     MessageLabs
By: Quocirca     Published Date: May 14, 2008
Virtual private networks (VPNs) are the technologies most widely used by organizations today in the provision of remote access to their networks for employees, business partners and suppliers. Of the VPNs available, IPSec (Internet Protocol Security) VPNs provide the most complete remote access solution, although they have traditionally been seen as costly and difficult to deploy. 
Tags : vpn, ipsec, remote access quocirca
     Quocirca
By: CA WA     Published Date: May 12, 2008
This IDC White Paper presents an overview of key concerns driving IT management and how they translate into needs that can be addressed through modern approaches to job scheduling and workload automation. The paper traces evolutionary trends in job scheduling software, which is growing from traditional batch job schedulers to cross-platform and event-driven capabilities. It also explores the role of job schedulers in providing automation capabilities.
Tags : roi, soa, job scheduling, ca wa, workload automation
     CA WA
By: IBM     Published Date: Apr 22, 2008
As service execution becomes increasingly important and complex, traditional job management tools aren't cutting it. With IBM Tivoli workload automation products, you can easily automate and manage simultaneous workloads across heterogeneous environments.
Tags : business process, automation, tivoli, ibm, opt it, ibm opt it, service management, productivity
     IBM
Start   Previous    47 48 49 50 51 52 53 54 55 56 57 58 59 60 61    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics