RSS feed Get our RSS feed

News by Topic

isp

Results 876 - 892 of 892Sort Results By: Published Date | Title | Company Name
By: Motorola     Published Date: Oct 30, 2007
For many wireless broadband network operators, the term "unlicensed reliability" is seen as an oxymoron. For many, the idea of building a high-speed network in the unlicensed band isn't a good one. A great deal has been said about crowded frequencies, self-interference and costly network rips. About how microwaving popcorn can cause interference. About disgruntled and perplexed customers. And ex-customers.
Tags : wireless, broadband, broadband spectrum, wireless infrastructure, wlan, wisp, cwisp, wimax
     Motorola
By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
Chartered in 1973, San Francisco-based Spectrum Federal Credit Union serves over 12,000 members. When the issue arose on how to protect their members’ personal data residing on backup tapes, Spectrum FCU took no chances – they and their Techical Advisory Board made the decision to encrypt this important information with the help of NeoScale Systems, an undisputed leader in this emerging market.
Tags : storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management
     Neoscale Systems, Inc.
By: Asentria Corporation     Published Date: Sep 04, 2007
Organizations today depend upon their networks to increase productivity and reduce network infrastructure and maintenance costs. Accordingly, these networks must be secure and perform reliably in order to accommodate geographically dispersed users. Unplanned remote site downtime due to equipment failure or adverse environmental conditions can severely impair network service.
Tags : telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures
     Asentria Corporation
By: InsideCRM.com     Published Date: Aug 13, 2007
Use this crisp and clean comparison chart to stack the top CRM vendors side-by-side on the following:  Features, Price per User, Services and Support, and Marketing Capabilities.
Tags : crm, crm tool, crm tools, crm software, customer relationship management, salesforce, right now, rightnow
     InsideCRM.com
By: MASERGY     Published Date: Jul 20, 2007
Organizations of all sizes are evolving to an enlightened, business-focused method of choosing network services and service providers called Total Customer Experience (TCE). This white paper describes the evolution toward a TCE approach and the benefits and clarity that TCE brings to the marketplace.
Tags : mice, multimedia, internet, communications, entertainment, service level, service level agreement, ip networks
     MASERGY
By: Gold Lasso     Published Date: Jul 13, 2007
There are more than one hundred Email Service Providers (ESPs) selling their services in the market today and all of them are on the hunt for new customers. This white paper identifies what we call, "decision points," factors that make it worth your while to consider finding a new ESP.
Tags : email service, isp, esp, vendor selection, vendors, email marketing, service provider, dns configuration
     Gold Lasso
By: Gold Lasso     Published Date: Jul 13, 2007
There are more than one hundred Email Service Providers (ESPs) selling their services in the market today and all of them are on the hunt for new customers. This white paper identifies what we call, "decision points," factors that make it worth your while to consider finding a new ESP.
Tags : email service, isp, esp, vendor selection, vendors, email marketing, service provider, dns configuration
     Gold Lasso
By: Tripwire     Published Date: Jul 05, 2007
Find out step-by-step what it takes to become compliant with the Payment Card Industry (PCI) Data Security Standard (DSS), and how Tripwire can help your company achieve and maintain PCI compliance.
Tags : pci, pci compliance, payment card, credit card, credit cards, payment card industry, cisp, privacy
     Tripwire
By: Tripwire     Published Date: Jul 05, 2007
Learn about the validation requirements of the payment card industry's data security standard (PCI DSS), including administrative and technical elements of the program, and the potential sanctions for failure to comply.
Tags : pci, pci compliance, payment card, credit card, credit cards, payment card industry, cisp, privacy
     Tripwire
By: Cognos     Published Date: Jun 19, 2007
This paper looks at research into the link between visual perception and understanding, and translates the findings into practical techniques that you can use to communicate more clearly with your data.
Tags : visual communication, visual perception, graph, graphical representation, graphs, presentations, evaluation, presentation
     Cognos
By: GFI     Published Date: Jun 12, 2007
A buyers' guide to anti-spam software, this white paper highlights the key features to look for in anti-spam software and why.
Tags : buyers guide, buyer's guide, buying guide, antispam, anti spam, anti-spam, spam, network security
     GFI
By: Diskeeper Corporation     Published Date: Jun 08, 2007
While there is little dispute among IT professionals regarding the impact of disk fragmentation on system performance, no independent guidelines exist to recommend the frequency of defragmentation across an infrastructure. This white paper will outline the results of testing, draw conclusions, and make recommendations regarding managing fragmentation across your infrastructure.
Tags : defrag, defragment, defragmentation, system management, system maintenance, system performance, performance management, pc performance
     Diskeeper Corporation
By: netVigilance     Published Date: May 30, 2007
Bonded Sender, the world’s leading email accreditation program, increases inbox delivery at more that 35,000 domains, averaging a 21 percent improvement across accepting ISPs according to a recent Return Path study. For marketers, email deliverability translates directly to the bottom line.
Tags : deliverability, deliverable, undeliverable, spam filter, filter, blocking, filtering, email marketing
     netVigilance
By: Infacta     Published Date: Jan 22, 2007
In this report, we will review the Can-SPAM Act and set out 5 key requirements that will ensure that our email is considered legitimate by our customers, email clients and ISPs.
Tags : permission, email permission, permission email, email marketing services/software
     Infacta
By: Business Intelligence Inc.     Published Date: Nov 18, 2006
Surprisingly low-cost technology MSSO/SD4E transforms Excel into an incredibly powerful and completely secure Business Intelligence tool capable of quickly and easily manipulating and analyzing live data directly from multiple, disparate data sources, generating even the most complex and sophisticated analytical reports with a simple keystroke.
Tags : business intelligence, business analytics, excel, business intelligence inc., analytical applications, analytics
     Business Intelligence Inc.
By: Quocirca     Published Date: Nov 09, 2006
Growth in overall email volume (driven by more sophisticated spamming attacks), the need to filter out malware, and ensuring suitable content for purpose means that we now must re-address how we view email within the organization.
Tags : email security, it management, malware, email communications, internet security, anti spam, anti-spam, spam
     Quocirca
By: Tripwire     Published Date: Nov 30, 1999
This paper covers the basic requirements of PCI, with a focus on the administrative and technical elements of the program. It also reviews the validation requirements of the standard and potential sanctions for failure to comply.
Tags : pci, pci compliance, payment card, credit card, credit cards, payment card industry, cisp, privacy
     Tripwire
Start   Previous    22 23 24 25 26 27 28 29 30 31 32 33 34 35 36     Next   End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics