RSS feed Get our RSS feed

News by Topic

technologies

Results 3201 - 3225 of 3617Sort Results By: Published Date | Title | Company Name
By: Trusted Network Tech     Published Date: Aug 21, 2009
Authentication technologies such as tokens and smart cards help meet the challenges of protecting sensitive data and securing application access. This white paper presents four cases in which an identity-based solution provides a compelling, low-cost alternative or complement to strong authentication technologies.
Tags : network management, network security, access control, nac, network access control, identity management, security management, authentication
     Trusted Network Tech
By: XOsoft     Published Date: Aug 21, 2009
Creating business value is the ultimate goal of investing in new IT technologies. This paper offers recommendations for both IT users and vendors that are vital to ensure that this goal is met.
Tags : storage management, productivity, business management, added value, it spending, tco, total cost of ownership, it management
     XOsoft
By: XOsoft     Published Date: Aug 21, 2009
Achieve significant cost savings through consolidation of disaster recovery servers by combining the award-winning disaster protection of XOsoft's WANSync with the latest virtual server technologies from Microsoft and EMC. Consolidating disaster recovery servers on virtual machines can yield both reduced hardware costs and significantly lessened management burden.
Tags : disaster plan, disaster recovery, virtual machines, servers, network management, it management, data protection, xosoft
     XOsoft
By: SBE     Published Date: Nov 17, 2006
This white paper covers the use of new growth-oriented file systems with snapshot capabilities, iSCSI for network layer independence, and a collection of other technologies provided by various vendors and open source projects to create a multi-tiered storage solution with self-service data restoration, long term growth, and disaster recovery.
Tags : iscsi, storage management, storage scalability, scalable storage, scalability, multi tiered, multitiered, sbe
     SBE
By: EMC     Published Date: Nov 06, 2006
EMC, the world leader in storage and IT management, developed these Top 10 Tips for SMBs considering stepping up to SAN. The following tips can help you make informed decisions when selecting the hardware and technologies that you use.
Tags : storage management, it management, storage area networks, san, small business, smbs, smb, purchase decision
     EMC
By: Quocirca     Published Date: May 14, 2008
Virtual private networks (VPNs) are the technologies most widely used by organizations today in the provision of remote access to their networks for employees, business partners and suppliers. Of the VPNs available, IPSec (Internet Protocol Security) VPNs provide the most complete remote access solution, although they have traditionally been seen as costly and difficult to deploy. 
Tags : vpn, ipsec, remote access quocirca
     Quocirca
By: Quocirca     Published Date: Jul 03, 2008
Businesses of all sizes adopt technology to make them more productive, cost effective or flexible and help them compete. Over the years the adoption of tools such as mobile phones, wireless laptops, the internet and email have all been driven by such expectations. Small and mid-sized businesses (SMBs) are often at the forefront as these technologies can give them a lead on their larger competitors. What starts as a useful extra tool or 'competitive edge' soon becomes the accepted norm and a search for improved quality and utility then ensues.
Tags : convergence, mobile, wireless, communications, unified communications, quocirca
     Quocirca
By: Quocirca     Published Date: Apr 08, 2009
The automation of traditional paper based processes with technology can lead to unnecessary complexity. This leads to increased costs and other challenges which can be avoided if solutions are simple and fit closely to the business task in hand.
Tags : quocirca, paper systems, it systems, it infrastructure, mobile technologies, functionality, capacity, cost control
     Quocirca
By: Quocirca     Published Date: Jul 27, 2009
With data breaches widespread, no organisation can afford to be complacent, but most data losses are avoidable. Many of the breaches making headline news are caused by the loss or theft of laptops and other portable devices. To protect themselves from financial and reputational damage, encryption technologies can reduce risks by ensuring the information on such devices is secure when users are on the move. They can also add value by allowing the secure sharing of information among authorised users and by enabling more secure remote working.
Tags : quocirca, encryption, security, information protection, compliance, data management
     Quocirca
By: 8e6 Technologies     Published Date: Jan 12, 2007
Add spyware to the list of urgent security concerns. With resources already stretched thin in fighting viruses and stopping spam, companies now also have to defend against a threat that strikes silently and does much of its damage before it’s even detected.
Tags : spyware, anti spyware, malware, vulnerability management, anti virus, virus, viruses, hipaa compliance
     8e6 Technologies
By: Cenzic     Published Date: Nov 11, 2008
This paper explores the role of white box vs. black box testing. White box testing technologies have a definite but limited use and value. From a Web application security perspective it must be understood that significant blind spots come with white box testing. Ultimately white box testing is not sufficient to secure your applications: simply put organizations that rely solely on white box technologies will be exposed to vulnerabilities in their applications, thus making it an ineffectual method of testing real-world risks. This paper will demonstrate black box or dynamic testing is ultimately the appropriate solution for “truly” securing Web applications.
Tags : cenzic, web application security, white box texting, black box testing, secure web applications, cenzic, security
     Cenzic
By: Force10 Networks     Published Date: Dec 04, 2006
This white paper explores the technologies needed to ensure businesses are prepared to meet the new challenges and opportunities of the emerging “answer economy”.
Tags : virtualization, ethernet, it consolidation, consolidation, data center, datacenter, business management, new economy
     Force10 Networks
By: Online Insight     Published Date: Dec 12, 2006
This white paper describes the technologies underpinning the enterprise software solution suite that OnlineInsight offers today in its Fourth Generation products, and explains how our enterprise-class software systems take software "abilities" to new levels.
Tags : enterprise software, software deployment, scalable software, future of software, online insight
     Online Insight
By: Online Insight     Published Date: Dec 12, 2006
This white paper communicates the value of software technologies that provide a single point of entry for prospects and health plan providers (including agents) to educate a new or renewing insured on the full value proposition of each plan offering.
Tags : healthcare, enterprise software, health care, insurance, health insurance, health, insured, insurer
     Online Insight
By: LANDesk     Published Date: Feb 12, 2007
LANDesk Software and Lenovo have teamed up to create an integrated hardware and software management solution to manage your systems from a single console.
Tags : it management, network management, remote network management, security management, systems management, landesk
     LANDesk
By: PEAK Technologies, Inc.     Published Date: Jul 05, 2007
Today's competitive, agile business demands anytime/anywhere connectivity and access to real time data. Outdated technology, security concerns and compliance requirements are forcing companies throughout industries to consider migrating to advanced wireless systems for supply chain operations.
Tags : scm, supply chain management, mobile computing, mobile data systems, real-time data, wireless systems, supply chain productivity, supply chain compliance
     PEAK Technologies, Inc.
By: PEAK Technologies, Inc.     Published Date: Apr 19, 2007
Download this paper now and read why many businesses now recognize that comprehensive management of their wireless device infrastructure is a crucial component of a total IT enterprise management solution.
Tags : wireless, infrastructure, wireless infrastructure, wireless device, wireless networking, wlan, mobile computing, it management
     PEAK Technologies, Inc.
By: PEAK Technologies, Inc.     Published Date: Aug 20, 2007
Wherever there is a label on a product, there is a potential need for printer applicators. Download this whitepaper now for a thorough analysis of the complete labeling requirement, from part production to end user application, which must to be completed to determine the correct printer applicator.
Tags : barcode, barcodes, bar code, bar codes, upc, upc symbol, inventory, scan
     PEAK Technologies, Inc.
By: WorldTelemetry, Inc.     Published Date: Mar 26, 2007
To be successful in today's safety-conscious and efficiency-minded marketplace, companies must combine compelling new technologies to offer the most convenient and effective business services and solutions. For monitoring remote tank sites, that means combining the intelligence of General Packet Radio Service (GPRS) communication with the risk mitigation properties of intrinsic safety.
Tags : business analytics, business management, business metrics, business intelligence, bi software, enterprise software, world telemetry, worldtelemetry
     WorldTelemetry, Inc.
By: Blue Lane     Published Date: Aug 31, 2007
Needing to implement a patch management solution to comply with SAS 70, Davidson found the solutions on the market lacking. They either required significant resources to test all patches, or were expensive automated solutions. Then, Davidson learned about Blue Lane Technologies, a concept that Davidson loved.
Tags : server virtualization, server security, network security, patch management, sas70, sas 70, compliance, sox compliance
     Blue Lane
By: Trapeze Networks     Published Date: Apr 16, 2007
This analyst report written by Stan Schatt, VP & Research Director, Networking at ABI Research  helps you decipher the WLAN security alphabet soup, understand architectural approaches to WLAN security, upcoming standards for roaming, load balancing and management frame encryption, and key security requirements that you should consider for you next WLAN deployment.
Tags : wi-fi, wireless, wlan, remote technologies, roaming, encryption, access point, service set identification
     Trapeze Networks
By: Proto Software     Published Date: Jun 14, 2007
This paper explores trends past, current, and future in the mashup space and surveys the types of tools used to build and distribute mashups. The goal is to develop a set of criteria for the reader to use when evaluating mashup platforms for the development of business applications. Where appropriate, analogies to existing technologies and methodologies are employed.
Tags : mashup, mashups, mash-up, mash-ups, data integration, application integration, business integration, integration
     Proto Software
By: Ultimus     Published Date: Aug 16, 2007
In the coming years, we believe that BPM will become the most important technology-driven business initiative for most companies. It leads you toward a focus on using technology to support your business processes, rather than adapting your business processes to support your technologies. It provides strong, sustainable ROI and competitive advantage.
Tags : ultimus, bpm, business process management, automation, process discovery, discovery, adaptive discovery, bpa
     Ultimus
By: Interactive Intelligence     Published Date: Feb 21, 2013
The modern contact center is a company's primary resource for delivering a differentiated customer experience and driving efficient and cost-effective customer satisfaction. Top tier contact centers make regular investments in advanced technologies.
Tags : implementing skills, routing, interactive intelligence
     Interactive Intelligence
By: Interactive Intelligence     Published Date: Feb 21, 2013
The economic pressures of the last three years have forced businesses to focus on cost reduction, often ahead of everything else. At the onset, the belt-tightening in the customer contact organization was viewed as temporary. Read on for more.
Tags : home agent series, leveraging technologies, remote agents, interactive intelligence
     Interactive Intelligence
Start   Previous    122 123 124 125 126 127 128 129 130 131 132 133 134 135 136    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics