RSS feed Get our RSS feed

News by Topic

strategies

Results 1701 - 1725 of 1732Sort Results By: Published Date | Title | Company Name
By: Clarus Systems     Published Date: Mar 18, 2008
Clarus Systems, Inc. has collaborated with IQ Services to deliver technology independent testing solutions that enhance end-to-end voice process lifecycle management within the contact center. The goal is to ensure a positive customer experience by incorporating voice testing and monitoring into every step of your contact center's life cycle - resulting in confidence that your solution works as designed.
Tags : itil, clarus systems, ipt, ip telephony, unified communications, cisco, callmanager, best practices
     Clarus Systems
By: SEPATON     Published Date: Mar 11, 2008
Forrester evaluates 12 virtual tape library (VTL) vendors across 58 criteria to determine a relative ranking that centers on strength of current offering as well as market strategy.  This report is a must-read for companies considering revising their data protection strategies to include VTL.
Tags : vtl, virtual tape library, backup, recovery, storage, storage virtualization, sepaton
     SEPATON
By: Ultraseek     Published Date: Mar 07, 2008
The value of effective site and intranet search is clear. Finding the most relevant document helps your organization identify and capitalize on opportunities, accelerate business cycles, and implement and execute effective strategies. But whether you have a few thousand pages on your public website or a few million documents scattered across the globe, selecting the right search solution for your enterprise can challenge even the most seasoned technology buyer.
Tags : ultraseek, search
     Ultraseek
By: Catalyst SF     Published Date: Feb 29, 2008
This white paper has been written for executives at media publishing and content companies interested in learning about the exploding “non-streamed” or portable video market and finding out about best practices for driving revenue through advertising in this medium.
Tags : downloadable video, downloadable media, video, catalyst, catalyst sf, interactive/pr agencies
     Catalyst SF
By: IBM     Published Date: Feb 25, 2008
Virtualization provides opportunities to reduce complexity, improve service levels to the business and lower capital and operating costs to provide and maintain IT infrastructure. This paper for senior IT managers is intended as a starter guide for virtual infrastructure technical design, project planning, scoping, and implementation.
Tags : servers, virtual server, server virtualization, vmware, virtual, virtual machine, virtual server, ibm
     IBM
By: OnForce     Published Date: Feb 19, 2008
Learn how VARs, solution providers and IT staffing firms are finding the contract IT service professionals they need to drive service revenue without adding overhead.  Get the free Ziff Davis white paper, “Strategies For Growing IT Service Revenues.”
Tags : crn, reseller, retailer, service, vendor selection, onforce, on force, var
     OnForce
By: APC     Published Date: Feb 19, 2008
Cooling for IT wiring closets is rarely planned and typically only implemented after failures or overheating occur. Historically, no clear standard exists for specifying sufficient cooling to achieve predictable behavior within wiring closets. An appropriate specification for cooling IT wiring closets should assure compatibility with anticipated loads, provide unambiguous instruction for design and installation of cooling equipment, prevent oversizing, maximize electrical efficiency, and be flexible enough to work in various shapes and types of closets. This paper describes the science and practical application of an improved method for the specification of cooling for wiring closets.
Tags : apc, power, cooling, it wiring, heat removal, green computing
     APC
By: IBM     Published Date: Feb 08, 2008
Unexpected disasters threaten organizations across the globe daily. Surprisingly, many businesses are not prepared for such disasters. They lack business continuity plans which can provide both proactive and reactive strategies to minimize the impact of unforeseen setbacks.
Tags : disaster recovery, business continuity, natural disaster, infrastructure, ibm
     IBM
By: APC     Published Date: Feb 07, 2008
Voice Over IP (VoIP) deployments can cause unexpected or unplanned power and cooling requirements in wiring closets and wiring rooms. Most wiring closets do not have uninterruptible power available, and they do not provide the ventilation or cooling required to prevent equipment overheating. Understanding the unique cooling and powering needs of VoIP equipment allows planning for a successful and cost effective VoIP deployment. This paper explains how to plan for VoIP power and cooling needs, and describes simple, fast, reliable, and cost effective strategies for upgrading old facilities and building new facilities.
Tags : apc, voip, power, cooling, pbx, communication, wiring, heating
     APC
By: Secure Computing     Published Date: Feb 06, 2008
With the recent rise in data breaches and identity thefts, implementing a sound information security program is no longer optional. Companies processing credit card information are encouraged to embrace and implement sound data protection strategies to protect the confidentiality and integrity of payment information. Some of the challenges for achieving PCI compliance are outlined in this white paper, as well as successful tips to help organizations navigate through them.
Tags : cardholder data, data security, database security, data protection, pci, pci dss, pci-dss, compliance
     Secure Computing
By: netForensics     Published Date: Jan 04, 2008
To manage threats to the enterprise and successfully meet compliance challenges, organizations need a comprehensive security strategy that can successfully do battle with inside as well as outside threats. Today, companies are increasingly leveraging security information management (SIM) solutions to build a clean, concise, and manageable process for dealing with the tremendous volumes of raw security information from disparate devices, applications, and databases.
Tags : monitoring, hackers, internal threats, bad employee, identity theft, data protection, hacker, security management
     netForensics
By: Vision Solutions     Published Date: Dec 31, 2007
For AIX IT departments looking to take the next step in data protection strategies, CDP is an essential consideration. Analysts agree that businesses will be incorporating this strategy in the next few years as part of an integrated solution. CDP enables you to reverse data corruption in a fraction of the time and labor required for recovery from tape.
Tags : aix, data protection, continuous data protection, cdp, high availability, disaster recovery, disk backup, tape backup
     Vision Solutions
By: WebEx Communications     Published Date: Dec 14, 2007
Health services organizations around the world are discovering that they can optimize business strategies while protecting patient records. These companies use WebEx online applications to reach and support a growing number of employees and customers. They also follow HIPAA mandates using WebEx secure connections that encrypt all content. This content is never uploaded to any WebEx server, ensuring the highest level of data security and confidentiality.
Tags : online presentations, online training, staff training, interactive selling, system management, remote support, web meetings, online meetings
     WebEx Communications
By: WebEx     Published Date: Dec 14, 2007
Despite the ease and enthusiasm with which knowledge workers have embraced Web collaboration, user-driven integration can only go so far. It is imperative that CIOs take control of their collaboration deployments now and weave collaboration solutions deep into the fabric of their business processes and enterprise software strategies.
Tags : collaboration, collaborate, web conferencing, online meeting, web meeting, bpm, business process management, software
     WebEx
By: PTC     Published Date: Nov 27, 2007
Defining an effective Internet and domain name strategy is vital to any business — especially small- or medium-sized businesses which have limited development and promotional budgets. From defining this strategy, to understanding the keys to Web promotion, here is vital information that every entrepreneur should know.
Tags : web development, web site, web marketing, buy domains, buydomains, web site design, site promotion, seo
     PTC
By: BuyDomains     Published Date: Nov 27, 2007
Defining an effective Internet and domain name strategy is vital to any business — especially small- or medium-sized businesses which have limited development and promotional budgets. From defining this strategy, to understanding the keys to Web promotion, here is vital information that every entrepreneur should know.
Tags : web development, web site, web marketing, buy domains, buydomains
     BuyDomains
By: Blue Lane     Published Date: Nov 15, 2007
Virtualization has become all the rage for companies interested in optimizing their servers and storage systems. This shift in data center architecture allows IT organizations to reduce operational costs and increase flexibility and responsiveness to changing business demands.
Tags : data center security, datacenter security, data centre, network security, virtual server, virtual data center, server virtualization, blue lane
     Blue Lane
By: Motorola     Published Date: Aug 09, 2007
Wireless access to enterprise information is going mainstream. However, while the groundswell of enthusiasm for wireless access is coming from the bottom up, the management of wireless access needs to be driven from the top down. Learn how you can build a solid wireless strategy for your organization.
Tags : wireless, mobility, mobile computing, wireless security, remote access, fleet management, mobile workforce, mobile worker
     Motorola
By: TRIRIGA     Published Date: Jul 27, 2007
Leaders in every industry perform sale-leaseback transactions to unlock the value of real estate, improve the balance sheet and realize tax benefits. The paper discusses how sale-leasebacks enhance financial ratios, elevate operations and re-focus real estate strategies on profitability rather than logistics.
Tags : sales-leaseback, sale-leaseback, sales leaseback, sale leaseback, real estate, balance sheet, tax benefits, leased properties
     TRIRIGA
By: Perimeter     Published Date: Jul 17, 2007
Read this interesting comparison about designing an intrusion defense strategy that identifies the value of business processes, and implements appropriate strategies to protect these systems using a layered defense approach is not only a good security practice, but also a regulation in many cases.
Tags : ids, intrusion defense, intrusion prevention, firewall, security, compliance, layered security, ips
     Perimeter
By: Perimeter     Published Date: Jul 17, 2007
With the decrease in the total number of viruses, some have theorized that the need for virus protection is becoming less and less necessary. The purpose of this paper is to help individuals understand the scope of the problem, and specific strategies available to combat this continually changing threat.
Tags : patch, ips, intrusion prevention, ids, intrusion defense, security policies, spam, spyware
     Perimeter
By: Cognos     Published Date: Jun 19, 2007
The Performance Manager, Proven Strategies for Turning Information into Higher Business Performance, strengthens the partnership between decision-makers and the people who provide the information that drives better decisions. It suggests 42 decisions areas, or information sweet spots, to help you understand your data, plan, and monitor your performance.
Tags : performance, business analytics, business metrics, evaluation, analyze, analytical applications, cognos, business intelligence
     Cognos
By: GFI     Published Date: Jun 12, 2007
GFI MailSecurity can be deployed as an SMTP gateway or as a VS API version for Exchange 2000/2003. This technical white paper describes each operating mode and helps you decide which to deploy and whether you should deploy both.
Tags : gfi, mailsecurity, email security, anti virus, virus, network security, deployment, implementation
     GFI
By: Infor     Published Date: May 25, 2007
External forces can knock your business off balance with no warning. To meet these external challenges, you need the capability to extend supply chain visibility, respond to changes in real time, and improve performance measurement across the entire chain.
Tags : supply chain, scm, business management, bpm, best practices, customer service, manufacturing, manufacture
     Infor
By: Infor     Published Date: Apr 19, 2007
Aberdeen's 2006 ERP in Manufacturing Benchmark Report explored how ERP strategies are evolving as enterprises strive to derive more and better business value from their implementations. That often means driving the use of ERP deeper into their organizations or broader across more of the enterprise.
Tags : buyers guide, buying guide, erp, enterprise resource planning, best practices, best of breed, best-of-breed, manufacturing
     Infor
Start   Previous    56 57 58 59 60 61 62 63 64 65 66 67 68 69 70    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics