RSS feed Get our RSS feed

News by Topic

mission

Results 1001 - 1020 of 1020Sort Results By: Published Date | Title | Company Name
By: Axeda Corporation     Published Date: Nov 14, 2007
How secure are the VPNs and modems that your vendors and partners use to access your data center? Can you confidently track all activity to meet SOX, PCI, and HIPAA compliance requirements? Learn how Axeda ServiceLink for Data Centers empowers you to provide your vendors and partners with secure and auditable access to your mission-critical data center.
Tags : remote, remote access, remote network, network management, network security, hipaa, hippa, sox
     Axeda Corporation
By: Appistry     Published Date: Oct 11, 2007
Organizations serving the intelligence & defense community rely on the performance of their applications for more than revenue - national security depends upon those applications for mission-critical operations. This industry profile details how Appistry provides the reliability and performance demanded by intelligence & defense organizations.
Tags : application fabric, performance computing, application performance, grid computing, infrastructure, appistry
     Appistry
By: Stratus Technologies     Published Date: Sep 19, 2007
For mission-critical IT, service outages and data loss pose serious consequences.  This white paper examines how availability management, disaster recovery and business continuity support one another and offers insight to find success at all of them.
Tags : business continuity, disaster recovery, high availability, stratus, stratus technologies
     Stratus Technologies
By: Quocirca     Published Date: Sep 13, 2007
A sound IT infrastructure is fundamental to today’s businesses and when that infrastructure fails the consequences can be far reaching. Whether it is business-to-business, business-to-consumer or public sector organizations serving citizens, applications and the services they drive increasingly need to be available all day, every day. Many organizations find it hard to achieve such service levels. This briefing looks at some possible solutions.
Tags : data center, datacenter, data centers, datacenters, data centre, data centres, infrastructure, mission critical
     Quocirca
By: Quocirca     Published Date: Sep 13, 2007
File servers continue to proliferate, and email has moved from a basic tool for exchanging documents to an inherent part of an organization’s communication and collaboration portfolio. With such ad-hoc information sources now being a mission critical function, the need for data management and archival is becoming critical.
Tags : information management, servers, storage, quocirca
     Quocirca
By: ProofSpace     Published Date: Sep 10, 2007
Read this paper and learn the principles that are prerequisites to enforceable electronic agreements as required by existing legal standards and electronic signature legislation.  This paper will also specify sixteen measurement criteria that can be used as metrics to assess whether the architecture of an electronic transaction will meet the requirements of admissibility.
Tags : proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography
     ProofSpace
By: Asentria Corporation     Published Date: Sep 04, 2007
More than ever before, IT managers need to secure equipment and facilities against a variety of intrusive conditions that could cripple critical operations, resulting in system malfunctions, loss of data or intellectual property, damage to mission critical hardware or even theft of valuable physical assets. Such conditions often include environmental events, failure of air conditioning systems, power outages, and untoward human actions.
Tags : telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures
     Asentria Corporation
By: ACTEK, Inc.     Published Date: Aug 30, 2007
Download this very brief guide now and reflect on the 9 Indicators. If you answer "no" to two or more of the questions listed within, there is undoubtedly sufficient ROI to strongly consider replacing your current incentive compensation system.
Tags : incentive compensation, incentive, sales, salesforce, salesforce management, sales manager, sales management, bonus
     ACTEK, Inc.
By: Motorola     Published Date: Aug 09, 2007
In this paper, two case studies illustrate different approaches to unlocking the value of existing investments through mobilization. Each case study provides an overview of an application we mobilized, identifies the characteristics that made the application a good candidate and explains the value realized by enabling access to these applications from mobile devices.
Tags : applications, mobile applications, mobility, mobilization, pda application, optimizing applications, mobile computing, mobile workers
     Motorola
By: ProofSpace     Published Date: Aug 07, 2007
This white paper presents a solution framework for Life Science Organizations that want to implement enterprise digital trust management to protect their electronic value chain.
Tags : proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, time stamp
     ProofSpace
By: Infor     Published Date: Jul 23, 2007
Make EAM part of your Green Strategy; This white paper includes recommendations for a Green-centric Organization. Find out how a comprehensive, green-oriented asset performance management solution will enable you to achieve compliance, efficiency, and consumer appeal.
Tags : environment, environmental, social responsibility, greenhouse, greenhouse effect, green, gas emissions, environmentalism
     Infor
By: GFI     Published Date: Jun 14, 2007
This white paper details how integrated network faxing remains a relevant technology that can give you a business edge in an ever competitive marketplace, providing higher productivity and helping you save thousands of dollars in labor costs alone.
Tags : ip networks, ip network, ip fax, ip faxing, faxing, fax, fax server, fax security
     GFI
By: Synchronicity Marketing     Published Date: Mar 26, 2007
Since most marketers know a lot more about their customers than their non-customers, there are many unanswered questions when it comes to prospecting with email. Download this white paper to learn the five most important steps to successful prospecting with permission email.
Tags : email marketing, database and list managers, landing pages, list rentals, database marketing, synchronicity marketing, permission email
     Synchronicity Marketing
By: Xactis     Published Date: Feb 05, 2007
Learn the ‘bottom-up’ approach to start Business Rules Extracting, Migrating and Auto Re-architecting your current mission-critical legacy system and their data, into an SOA.
Tags : soa, service oriented architecture, service-oriented architecture, business rules extracting, software development, c++, quality assurance, legacy system
     Xactis
By: Xactis     Published Date: Feb 02, 2007
Learn the 'bottom-up' approach to start Business Rules Extracting, Migrating and Auto Re-architecting your current mission-critical legacy system and their data, into an SOA.  This is a "how-to" presentation addressing how to get started and eventually establish an internal L2S Center of Excellence.
Tags : soa, service oriented architecture, service-oriented architecture, business rules extracting, legacy system, erp, enterprise resource planning, mainframe
     Xactis
By: Medium Blue     Published Date: Jan 29, 2007
Two of the most popular methods a company can use for online marketing are organic search engine optimization and pay-per-click advertising - and these are often used in tandem. Learn more about the pros and cons of each of these methods.
Tags : search marketing, search engine optimization, pay per click marketing, search engine / directory submission, medium blue, search marketing agencies, search engine optimization (seo)
     Medium Blue
By: AcquireWeb     Published Date: Jan 22, 2007
This article addresses one of the biggest challenges associated with e-mail marketing programs – establishing meaningful contact with customer targets in order to increase sales, while protecting and enhancing your brand. It illustrates that successful e-mail marketing designed to drive sales and build brands requires adopting a methodology that includes more precise prospect targeting, better permission-based models, a better overall consumer experience and better quality lists.
Tags : email marketing, best practices, permission marketing, brand management, direct marketing, newsletter design, acquireweb, integrated marketing
     AcquireWeb
By: Infacta     Published Date: Jan 22, 2007
In this report, we will review the Can-SPAM Act and set out 5 key requirements that will ensure that our email is considered legitimate by our customers, email clients and ISPs.
Tags : permission, email permission, permission email, email marketing services/software
     Infacta
By: Infacta     Published Date: Jan 22, 2007
The lines of permission marketing are not as grey as many would suggest. It’s pretty clear cut. You either have someone’s permission to send them commerical email or you don’t. Listen to this podcast to learn more.
Tags : permission based email, list management, subscriber management, email marketing, email marketing services/software
     Infacta
By: Infacta     Published Date: Jan 22, 2007
Online consumers demand relevance, so list builders must focus on building large, highly-relevant lists rather than just gathering a bunch of email addresses. In this article, the author will discuss list size, registration methods, data collection and permission requirements.
Tags : subscriber list, subscription list, email marketing
     Infacta
Start   Previous    27 28 29 30 31 32 33 34 35 36 37 38 39 40 41     Next   End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics