RSS feed Get our RSS feed

News by Topic

scribe

Results 626 - 650 of 842Sort Results By: Published Date | Title | Company Name
By: rPath     Published Date: Dec 10, 2010
This white paper introduces rPath intelligent system automation as a way to bring consistency, control and scale to .NET production environments. In particular, it describes three scenarios for using rPath within .NET environments.
Tags : rpath, automation, sccm
     rPath
By: Centrify Corporation     Published Date: Dec 08, 2010
This white paper also describes Centrify DirectSecure's innovative, software-based approach to deploying a peer-to-peer IPsec solution that can dynamically isolate cross-platform systems and enable end-to-end encryption of data in motion.
Tags : centrify corporation, sensitive information, data protection, privacy and security, ipsec-based serve, domain isolation, microsoft active directory, data encryption
     Centrify Corporation
By: Symantec.cloud     Published Date: Nov 29, 2010
This three-part report describes how all businesses can benefit from SaaS services, in particular the variety of services that make up hosted services from Symantec.
Tags : messagelabs symantec hosted services, mobile workforce, saas services, security, management policies, distributed workforce
     Symantec.cloud
By: Quest Software, Inc.     Published Date: Nov 18, 2010
This white paper describes how real organizations have handled these challenges and how a strong and reliable messaging solution like Quest Recovery Manager for Exchange could have mitigated risk, reduced cost, and improved regulatory compliance.
Tags : quest software, messaging, microsoft exchange server, quest recovery manager, business communication, migration, consolidation
     Quest Software, Inc.
By: Revinetix, Inc.     Published Date: Nov 11, 2010
Standard School District in Bakersfield, CA had outgrown their backup system and needed to find a replacement. This case study describes their challenges and how they solved their backup problem with a complete disk backup solution.
Tags : revinetix, school district, data protection, disk backup, network backup, tape backup, backup solution, exchange backup
     Revinetix, Inc.
By: IBM Software     Published Date: Nov 02, 2010
This paper describes five practical steps companies can take to achieve customer intimacy and, by doing so, provide a springboard for excellence in the other critical value disciplines.
Tags : ibm cognos predictive analysis, business performance, customer relationship, customer intimacy
     IBM Software
By: Marsha Lee     Published Date: Oct 21, 2010
ATEN developed patented technology to correct a particular cable-induced distortion described as skew to cut video distortion automatically with one-way signal detection and is therefore very fast.
Tags : kvm switch
     Marsha Lee
By: SQC     Published Date: Oct 14, 2010
This paper describes why slow system integration is a major cause of project failure, why it happens and how to organize and prepare to avoid suffering the same fate.
Tags : software delivery, software management, integration, software integration testing, system integration
     SQC
By: IBM Software     Published Date: Oct 05, 2010
This paper describes 6 tactics to strengthen the case for BI investment in this environment.
Tags : ibm cognos, business analytics, business intelligence, bi investment, roi
     IBM Software
By: StrongMail     Published Date: Sep 28, 2010
Break through consumer consciousness with lessons from the Q3 2010 Email Breakthrough Report's featured best-in-class email campaigns. Read about the top five trends to watch and read expert commentary on each featured campaign, ranging from effective application of movement in email, to leveraging subscribers' word of mouth to promote your brand.
Tags : strongmail, email breakthrough, report, email campaigns, emarketing, email marketing services/software, list management
     StrongMail
By: Infosys Technologies Limited     Published Date: Sep 22, 2010
This white paper describes creating a governance framework for managing identity.
Tags : governance, compliance, identity analytics, identity management
     Infosys Technologies Limited
By: IBM Corporation     Published Date: Sep 20, 2010
This chapter describes some of the scalability challenges that exist in today's dynamic business and IT environments and how WebSphere eXtreme Scale addresses these challenges. An introduction of WebSphere eXtreme Scale and the key features of the product is also provided.
Tags : ibm caching and cloud, webspher extreme scale v7, solution architecture, scalability
     IBM Corporation
By: B Labs     Published Date: Sep 19, 2010
This white paper briefly overviews a functionality of enterprise-level IM systems and describes new features and tasks that can be important to corporate and business users.
Tags : chat, instant messaging, communication, server, messenger, messaging, collaboration
     B Labs
By: Net Atlantic     Published Date: Sep 10, 2010
Net Atlantic's free on-demand webinar, Solutions for Email Subscriber Management, covers several ways to manage your subscribers to maximize deliverability, including permission options, suppression files, re-engagement campaigns, and more. Your relationship with your clients is the most important factor in your success. A good email service provider should provide you with the tools to help you engage your subscribers successfully. View It Now - On Demand! Recorded Live on September 2, 2010
Tags : net atlantic, subscriber email, email management, deliverability, webinar, esp, crm, social media
     Net Atlantic
By: SAS     Published Date: Sep 08, 2010
This paper describes five business analytics styles used today and the building blocks required in implementing these styles. It is important to consider which of these styles is valid for your organization now and into the future.
Tags : sas, reporting, data warehouses, business activity monitoring, data integration
     SAS
By: Mentor Graphics     Published Date: Sep 01, 2010
This paper will examine current methods used to eliminate waived errors at the chip level and describe a new automatable method for identifying and removing waived errors from DRC results.
Tags : mentor graphics, automated drc, violation waiver management, ip block integration, design rule checking
     Mentor Graphics
By: Mentor Graphics     Published Date: Sep 01, 2010
What Is CFA and Why Do I Need It? This five-part paper series examines the conditions that led to the development of recommended rules, and describes the process by which automated design analysis and rule verification can help designers optimize designs to the fullest and most efficient use of area, while still ensuring manufacturability.
Tags : mentor graphics, critical feature analysis, cfa, design for manufacturing, dfm, automated design analysis, rule verification
     Mentor Graphics
By: Symantec.cloud     Published Date: Sep 01, 2010
Part 1 describes the threat landscape as seen by SMBs, and describes the security controls that belong in Stage 1.
Tags : messagelabs us, it security, smb, risk management, protection, malware, anti-spam, anti-virus
     Symantec.cloud
By: Symantec.cloud     Published Date: Sep 01, 2010
This is the second part of a three-part white paper series. Part 2 describes how organizations can develop a security profile for themselves that will show them which of the Stage 1 controls they most need to build up and strengthen.
Tags : messagelabs us, it security, smb, security profile, anti virus, anti spam, firewalls, vulnerability
     Symantec.cloud
By: Symantec.cloud     Published Date: Sep 01, 2010
This is the third part of a three-part white paper series. Part 3 describes how to move on from the basic controls and how each organization should decide which, of all the extra security controls available, are right to be brought in next.
Tags : messagelabs us, it security, smb, activity logging, vulnerability check
     Symantec.cloud
By: Citrix Online     Published Date: Aug 31, 2010
In this brief white paper we will describe the economic "reset" that is changing the rules for creating value.
Tags : citrix online marketing, distributed workforce, mobile work, interactive/pr agencies, search marketing agencies, interactive marketing, marketing software, webinars & web conferencing
     Citrix Online
By: Polystar     Published Date: Aug 31, 2010
This article describes the problems of monitoring modern 10Gbps telecom networks and some of the solutions.
Tags : polystar, 10gbps, network monitoring
     Polystar
By: SAS     Published Date: Aug 27, 2010
This report describes a research project that investigated how organizations are attempting to improve specific decisions.
Tags : sas, data management, decision making, tom davenport, decision making, iia, international institute of analytics
     SAS
By: Washco Consulting     Published Date: Aug 19, 2010
This article describes the five basic principles through which you can begin your journey to becoming a "black belt" in business.
Tags : achieving success, career advancement tips, business success, success in business, skills for success
     Washco Consulting
By: NetApp     Published Date: Aug 18, 2010
In this article hear from Keith Alioto, IT Director at Osiris Therapeutics discuss the evolution of their infrastructure and describe where they are now and where they're headed.
Tags : netapp, storage, consolidating windows storage, vmware, data management
     NetApp
Start   Previous    16 17 18 19 20 21 22 23 24 25 26 27 28 29 30    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics