RSS feed Get our RSS feed

News by Topic

minimize

Results 126 - 150 of 226Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: May 04, 2009
Increased processing needs means increased energy costs. In fact, power costs can often exceed hardware costs. Read this white paper and see how the pairing of new IBM System x and BladeCenter servers with the new Intel Xeon Processor 5500 series can reduce costs and improve performance.
Tags : ibm, express seller, virtualization, intel, xeon, processor, 5500, bladecenter
     IBM
By: IBM     Published Date: Jun 16, 2009
Tough times require tough actions. Business as usual is not enough. In today's economic environment, you are asked to do more with less -- at lower risk. During this Webinar, you will hear from two IBM WebSphere Portal customers about how their portal solutions have helped them reduce costs, improve productivity, and grow revenue. Come prepared with questions and leave with new ideas and answers!
Tags : ibm, webinar, ibm websphere, public utility, utilities, revenue, application, reduce costs
     IBM
By: GFI     Published Date: Jul 20, 2009
GFI MailEssentials for Exchange/SMTP/Lotus is a server based anti-spam, anti-phishing and email management solution, which is used by 80,000 customers worldwide. The latest version uses two anti-spam engines, along with advanced spam filtering techniques, to give administrators a high spam capture rate straight out-of-the-box, with minimal configuration. GFI MailEssentials also minimizes false positives, so you do not need to worry about important emails being marked as spam.
Tags : gfi, anti-spam, spam, lotus, gfi mailessentials, e-mail security, anti-phishing, phishing
     GFI
By: Stratus Technologies     Published Date: Dec 01, 2008
Certainly server virtualization offers an elegant way to minimize planned downtime during routine software and hardware maintenance, or scheduled upgrades. But that addresses only part of the availability story.
Tags : stratus technology, server virtualization, virtual machine, automated software, data centers
     Stratus Technologies
By: Intuit, Inc     Published Date: Mar 19, 2009
No matter what role you have within an organization – be it engineer, salesperson, consultant, marketer, or business owner – you’ve acquired a second responsibility: project manager. But managing marketing projects has become more challenging than ever. Why? The work environment has expanded across departments, across job roles – and even across continents. To achieve organizational objectives, cross-functional teams form, collaborate, dissolve and re-form to tackle precisely defined projects and fulfill specific deliverables within carefully controlled deadlines and budget demands. Learn more today!
Tags : intuit, project management, project team productivity, collaboration, communication, spreadsheet shuffle, centralizing project information, packaged vs. custom software
     Intuit, Inc
By: Intuit Inc.     Published Date: Mar 19, 2009
No matter what role you have within an organization – be it engineer, salesperson, consultant, marketer, or business owner – you’ve acquired a second responsibility: project manager. But managing projects has become more challenging than ever. Why? The work environment has expanded across departments, across job roles – and even across continents. To achieve organizational objectives, cross-functional teams form, collaborate, dissolve and re-form to tackle precisely defined projects and fulfill specific deliverables within carefully controlled deadlines and budget demands. Learn more today!
Tags : intuit, project management, project team productivity, collaboration, communication, spreadsheet shuffle, centralizing project information, packaged vs. custom software
     Intuit Inc.
By: IBM Software     Published Date: Feb 03, 2012
This paper from IBM describes how to build a proactive threat and risk strategy based on predictive analytics; examples of how organizations used predictive analytics to minimize the negative impact of risk and maximize positive results; and steps to advance your organization's use of predictive analytics to combat threat and risk.
Tags : predictive threat, security, technology, risk management, security policy, ibm, intrustion protection
     IBM Software
By: IBM Corporation     Published Date: Jun 28, 2011
Realize the value of green with IBM Tivoli Monitoring for Energy Management
Tags : tivoli, ibm, energy, management, green, infrastructure, energy management, energy efficiency
     IBM Corporation
By: CenturyLink     Published Date: Nov 18, 2011
Find out how your organization can protect business-critical functions, minimize downtime and mitigate risk.
Tags : centurylink, qwest, high speed internet, phone, mobile, tv services, offers, bundles
     CenturyLink
By: IBM     Published Date: Aug 08, 2012
Your goal is clear-produce high-quality goods while optimizing resources at every step of production. And in today's uncertain economy, cost-control efforts may never have been more important. Unscheduled downtime because of equipment failure can have a serious impact on your organization's bottom line. Download this white paper from IBM, and learn the basics of predictive maintenance, the benefits it provides manufacturing operations and the underlying technologies that make it possible. Predictive analytics helps you in a number of ways: identify when equipment is likely to fail or need maintenance and take action to maximize uptime and reduce future warranty claims costs; optimize allocated labor resources and spare part inventories, helping eliminate undue maintenance, prevent downtime and reduce inventory costs; and determine why certain production runs fail more often than others, identify the cause and analyze whether those runs warrant a recall.
Tags : ibm, technology, manufacturing, predictive maintenance, productivity, minimize downtime, reduce costs, white paper
     IBM
By: Sage     Published Date: Oct 14, 2014
Managing employer compliance can be a tedious task, but it’s a highly visible, important way that the human resources department minimizes risk for the business and keeps the workforce running smoothly. Use this guide to stay informed about employment laws, reporting rules, and developing workforce compliance issues that may impact your organization. We’ll help you navigate ten crucial mandates, explaining the obligations and compliance considerations you need to be aware of in order to take on your responsibilities.
Tags : sage, compliance, workforce, fines, reporting, mandates
     Sage
By: NETIQ     Published Date: Jan 12, 2017
Today’s attackers are targeting insider credentials for abuse. Even with an effective program in place, there are loopholes that can be exploited by attackers.
Tags : 
     NETIQ
By: VMTurbo     Published Date: Mar 25, 2015
This whitepaper examines the latency-inducing pitfalls of common VM placement tactics, as well as a network flow approach that minimizes network, compute, and storage latency all at once.
Tags : vmturbo, network flow, application performance, vm placement tactics, network flow approach, storage latency
     VMTurbo
By: Dell SecureWorks     Published Date: Sep 09, 2013
10 Tips to Help You Minimize the Duration and Impact of a Security Breach
Tags : dell, dell secureworks, risk consulting, cyber security, security, security breach, counter threat unit
     Dell SecureWorks
By: Plantronics     Published Date: Oct 18, 2013
The following describes some typical UC usage scenarios, and how you can deploy products that will maximize productivity while minimizing downtime, excessive inventory costs, operational overhead, and unsatisfied users.
Tags : plantronics, solutions for uc users, solutions for uc applications, sound innovation, mobile and wired workers, web-based collaboration, voice communications, deploy products
     Plantronics
By: ThousandEyes     Published Date: Nov 17, 2016
The rise of mobile applications, the shift from on-premises to Software-as-a-Service (SaaS), and the reliance on third-party services has increased the complexity application delivery. Online Operations and Site Reliability teams in firms of all types are now responsible for many parts of the application delivery chain. When things go wrong, no matter where, they’re expected to react quickly to minimize the impact on their customers. The challenge for application providers is that users may often experience service degradation when the application stack seems to be working perfectly fine, making troubleshooting extremely difficult. Download now to learn more!
Tags : 
     ThousandEyes
By: Avaya     Published Date: Jan 04, 2017
How the cloud maximizes IT productivity and minimizes IT costs
Tags : avaya, wireless lan management, cloud, avaya cloud networking platform, unified communications, contact center, collaboration, midsize business solutions
     Avaya
By: CrowdStrike     Published Date: May 10, 2018
Finding out your organization has been breached can be devastating news — knowing how to deal with an intruder that’s broken through your cyber defenses can be even more challenging. This white paper, “You’ve Been Breached — Now What? How to Respond to a Worst-Case Scenario,” offers practical steps IT and security professionals should take after a cyberattack occurs. You’ll receive guidance for both short-term and long-term strategies to help minimize damage, protect sensitive assets and preserve forensic evidence that can help during the investigation and remediation process. This paper also includes recommendations for strengthening your organization’s defenses against a future breach. They are based on decades of experience from CrowdStrike® incident responders who work on the front lines fighting cyberthreat actors every day. Download this White Paper to learn: • How to collect and preserve data after a breach so that critical forensic information can be retrieved • What sort of in
Tags : 
     CrowdStrike
By: CrowdStrike     Published Date: Nov 28, 2018
Finding out your organization has been breached can be devastating news — knowing how to deal with an intruder that’s broken through your cyber defenses can be even more challenging. This white paper, “You’ve Been Breached — Now What? How to Respond to a Worst-Case Scenario,” offers practical steps IT and security professionals should take after a cyberattack occurs. You’ll receive guidance for both short-term and long-term strategies to help minimize damage, protect sensitive assets and preserve forensic evidence that can help during the investigation and remediation process. This paper also includes recommendations for strengthening your organization’s defenses against a future breach. They are based on decades of experience from CrowdStrike® incident responders who work on the front lines fighting cyberthreat actors every day. Download this White Paper to learn: How to collect and preserve data after a breach so that critical forensic information can be retrieved What sort of int
Tags : 
     CrowdStrike
By: McAfee     Published Date: Mar 31, 2017
This e-book provides an overview of private cloud models, the underlying technologies that enable successful deployments and the security challenges—and benefits—of deploying a private cloud. Finally, it discusses security technologies and approaches that maximize protection, minimize risk and leverage the private cloud to drive innovation.
Tags : cloud security, cloud, private cloud, security technology
     McAfee
By: McAfee     Published Date: Mar 31, 2017
This e-book provides an overview of private cloud models, the underlying technologies that enable successful deployments and the security challenges—and benefits—of deploying a private cloud. Finally, itdiscusses security technologies and approaches that maximize protection, minimize risk and leverage the private cloud to drive innovation.
Tags : cloud security, cloud, private cloud, security technology
     McAfee
By: McAfee     Published Date: Mar 31, 2017
This e-book provides an overview of private cloud models, the underlying technologies that enable successful deployments and the security challenges—and benefits—of deploying a private cloud. Finally, it discusses security technologies and approaches that maximize protection, minimize risk and leverage the private cloud to drive innovation.
Tags : cloud security, cloud, private cloud, security technology
     McAfee
By: Epson     Published Date: Jan 10, 2019
Since the earliest days of the industry, insurance companies have faced a never-ending struggle: processing the voluminous amount of paperwork that underwriting, claims, and compliance require. But the days of enduring the burdens caused by mountains of paper can become a distant memory. By investing in new, proven methods of converting paper documents to readable digital formats, insurance organizations can fully automate document processing to accelerate workflows, minimize processing times and enable more efficient operations.
Tags : 
     Epson
By: Mimecast     Published Date: Sep 25, 2008
Email is one of the most critical applications in use in business today: it is embedded in many business workflows, it is used by engineers to inform them of infrastructure issues and it is used to communicate with customers and business partners. In short, the modern organization has email at the heart of its communications and business processes. This makes it critical to minimize both the downtime and loss of email upon the outset of a business continuity event.
Tags : mimecast, saas, malware, workflows, risk management, email solutions, email managemeng, archiving
     Mimecast
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics