RSS feed Get our RSS feed

News by Topic

read

Results 4851 - 4875 of 5467Sort Results By: Published Date | Title | Company Name
By: OutlookSoft     Published Date: Aug 21, 2009
As vendors rush to embrace and exploit predictive analytics, only those with a truly unified solutions will succeed in capitalizing on this powerful and promising technology. Read this insightful white paper to learn more.
Tags : analytics, business analytics, performance managment, business process management, bpm, business activity monitoring, metrics, business metrics
     OutlookSoft
By: PTC     Published Date: Aug 21, 2009
In February 2004, the FDA issued a Draft Guidance requiring the electronic submission of labeling content to be provided in an XML-based format called Structured Product Labeling (SPL). The purpose of this white paper is for the reader to gain an understanding and prepare for the FDA's new electronic labeling submission standard.
Tags : best practices, enterprise software, product lifecycle management, plm, product information, product information management, pim, catalog
     PTC
By: PTC     Published Date: Aug 21, 2009
DITA is one of the most important innovations in XML publishing in recent memory.  Though DITA is an IBM invention and plenty of material has been written about it already, this paper must be read as well to clear the air about any errors, omissions, or misinterpretations, from previous publications on this topic.
Tags : xml, dita, darwin, ibm, ptc
     PTC
By: Secure Computing     Published Date: Nov 20, 2006
Spammers have now fired a new barrage of image spam using randomized images that appear identical to the human eye, yet appear to be entirely unique to most anti-spam software. Many of the changes to the images contained within spam messages are so subtle that they require a pixel-by-pixel examination of the image in order to detect the differences.  Read how Secure Computing effectively addresses this problem.
Tags : security, anti spam, email security, image spam, malware, spyware, crimeware, intrusion prevention
     Secure Computing
By: Solidcore     Published Date: Jan 28, 2008
Are you about to implement change management using BMC Remedy Service Management or BMC IT Service Management for Mid-sized Businesses (a.k.a. Magic or Service Desk Express)? Have you already implemented one of these systems and want to maximize the return on your investment? Get this white paper to see how others have optimized their change management implementation approach to derive the most value from their investment by adding closed-loop control.
Tags : cmdb, change management, service management, bmc, remedy, bmc remedy, it management, roi
     Solidcore
By: Spectra Logic     Published Date: Aug 21, 2009
Read how Spectra Logic Corporation's BlueScale Encryption integrates hardware encryption directly into the electronics of a tape library, offering a practical, affordable, & scalable option.
Tags : backup, database security, data security, encryption, tape-based backup, tape backup, data encryption, spectralogic
     Spectra Logic
By: Spectra Logic     Published Date: Aug 21, 2009
Most companies continue to turn their backs on backup encryption because they think it will lead to new costs, performance problems, and recovery headaches. Read why ESG believes things are about to change to radically upset the backup encryption status quo and why Spectra Logic's recent entry into backup encryption is worth noting.
Tags : encryption, data encryption, backup, esg, backup encryption, data security, hackers, tape backup
     Spectra Logic
By: St Bernard Software     Published Date: Aug 21, 2009
Download this white paper from St. Bernard Software to read about a variety of contemporary, Internet-borne threats that are making it foolhardy for any business to provide unfettered Internet access for its users.
Tags : filtering, email security, firewall, access control, employee internet access, internet security, web security, restrictions
     St Bernard Software
By: Texas Instruments     Published Date: Aug 21, 2009
Download this whitepaper now and read how WLAN technology embedded in CE devices offers consumers a glimmer of hope that someday soon they will be free to experience their media content on their terms.
Tags : wireless, wlan, ce device, consumer electronics, electronics, digital media, vcr, tivo
     Texas Instruments
By: Texas Instruments     Published Date: Nov 06, 2006
Read how the Next Generation Residential Gateway (RG) is capable of supporting the ever increasing need for higher data throughput rates, signaling range that covers the whole house and robustness capable of mitigating the sources of interference found in the home.
Tags : bandwidth, residential gateways, bandwidth management, home networking, wireless networking, consumer electronics, texas instruments
     Texas Instruments
By: Third Brigade     Published Date: Aug 21, 2009
Organizations that need to protect business critical applications, and sensitive data and hosts recognize that traditional network defenses can be readily bypassed by attackers. This white paper defines four key qualities of an effective host-based IPS.
Tags : intrusion prevention, network security, data protection, hacker detection, intrusion detection, ips, intrusion prevention systems, host-based ips
     Third Brigade
By: TopLayer     Published Date: Aug 21, 2009
This white paper written by Reymann Group, compliance consultant firm, showcases thought leadership on how intrusion prevention solutions can enable proactive security responses necessary to protect today's corporate enterprise and its customers from real time threats posed by widespread cyber terrorists, hackers, and rogue insiders.
Tags : sarbanes, intrusion prevention, ips, sox, sarbanes-oxley, sarbox, network security, cybercrime
     TopLayer
By: Baystate Health / Baystate Medical Center     Published Date: Jul 16, 2007
Get this free white paper to read why mass casualty and other public health emergencies create a demand for information within hospitals, between hospitals, between hospitals and local incident command centers, and between local, statewide and multi-state incident command centers and agencies.
Tags : hospital, healthcare, health care, medical records, fema, disaster, natural disaster, business continuity
     Baystate Health / Baystate Medical Center
By: Symantec     Published Date: Dec 12, 2006
Read this whitepaper to find out how this latest release of Symantec's Backup Exec can help safeguard critical Microsoft Exchange 2000 Server and Exchange Server 2003 data.
Tags : backup, backup and recovery, high availability, microsoft exchange, data protection, symantec
     Symantec
By: Symantec     Published Date: Feb 09, 2007
Imagine being able to eliminate your backup windows and recovery individual Exchange messages, folders, and mailboxes - without mailbox backups. Read this document to find out how Backup Exec 11d for Windows Servers provides the gold standard in continuous, cost-effective, high-performance disk-to-disk-to-tape backup and recovery.
Tags : storage, backup and recovery, email archiving, windows server, symantec, backup plan, backup, back-up
     Symantec
By: Symantec     Published Date: Jun 12, 2008
Looking for a network security solution? Whether you've already adopted NAC for your enterprise or are researching options, download this helpful survey presented by IDC about NAC benefits and vendor overviews.
Tags : network access control, network security, security, nac, symantec
     Symantec
By: Dell Software     Published Date: Jul 18, 2012
Control your software and licenses
Tags : software, licenses, technology
     Dell Software
By: Castelle     Published Date: Nov 01, 2006
Investing in a fax server is like providing everyone in the office with a virtual fax machine, at a fraction of the cost. Read all about the benefits in this informative paper.
Tags : fax, network faxing, faxing, ip telephony, voip, ip networks, voice over ip, ip faxing
     Castelle
By: Quocirca     Published Date: Mar 06, 2007
Arguably IP is the most successful open standard ever, but as network communications converge under a single standard used for an increasing number of applications, we need to understand how effectively these critical assets are being managed. Read more in this white paper now.
Tags : networking, ip networks, ip telephony, voip, convergence, voice over ip, network management, telecommunications
     Quocirca
By: Quocirca     Published Date: Sep 18, 2008
Whether we like it or not we are all IT users now. Through the ubiquity of networks of devices that we rely on for information, security and day-to-day transactions even those who eschew technology now rely on it, even if they do not acknowledge it. The failure of these networks can lead to widespread disruption, unhappy customers, unproductive employees and lost business. Ensuring their availability, security and efficiency is a job for experts who need powerful tools to carry out the task.
Tags : quocirca, service management, high availability, security
     Quocirca
By: Quocirca     Published Date: Jan 13, 2009
Given today’s economic climate, businesses are, more than ever, looking to create additional value through the reduction of risk and by saving costs. For many, the economic downturn is seen as the best time to optimise the infrastructure that they already have in place, to look at ways to trim unnecessary expenditure and to use existing resources more effectively. As organisations are increasingly reliant on data networks that encompass an ever-growing range and number of internet protocol (IP) enabled devices and applications, they need to more effectively administer and manage these assets—they can no longer take the management of their IP networks for granted.
Tags : quocirca, ipam, dynamic host configuration protocol, domain name system, radio frequency identification, voice over ip
     Quocirca
By: Quocirca     Published Date: Feb 23, 2009
Networked printers and multifunction peripherals often require a high level of support and manual intervention. Secure remote monitoring platforms reduce device downtime through automating service alerts, providing proactive toner replenishment and automatic meter reading. End users benefit through improved device uptime, and manufacturers and their service partners can build proactive service relationships which can drive greater customer loyalty.
Tags : quocirca, printers, networked printers, multifunction peripherals, secure remote monitoring, document output devices, remote monitoring, managed print service (mps)
     Quocirca
By: Quocirca     Published Date: Jul 27, 2009
With data breaches widespread, no organisation can afford to be complacent, but most data losses are avoidable. Many of the breaches making headline news are caused by the loss or theft of laptops and other portable devices. To protect themselves from financial and reputational damage, encryption technologies can reduce risks by ensuring the information on such devices is secure when users are on the move. They can also add value by allowing the secure sharing of information among authorised users and by enabling more secure remote working.
Tags : quocirca, encryption, security, information protection, compliance, data management
     Quocirca
By: 8e6 Technologies     Published Date: Jan 12, 2007
Add spyware to the list of urgent security concerns. With resources already stretched thin in fighting viruses and stopping spam, companies now also have to defend against a threat that strikes silently and does much of its damage before it’s even detected.
Tags : spyware, anti spyware, malware, vulnerability management, anti virus, virus, viruses, hipaa compliance
     8e6 Technologies
By: Customer Chemistry     Published Date: Nov 14, 2006
Predictive analytics can be utilized to uncover root causes so that problems can be eradicated.  Read this white paper to learn how companies can use predictive analytics treatment and prevention approaches to save time and resources, eliminate root causes of problems, and obtain the actionable insight required to improve marketing effectiveness.
Tags : analytics, predictive analytics, marketing strategy, customer research, market trends, marketing roi, customer chemistry
     Customer Chemistry
Start   Previous    188 189 190 191 192 193 194 195 196 197 198 199 200 201 202    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics