RSS feed Get our RSS feed

News by Topic

ip technology

Results 376 - 400 of 406Sort Results By: Published Date | Title | Company Name
By: Clarity Quest Marketing     Published Date: Dec 22, 2008
The sluggish economy makes it one of the best times to re evaluate your company’s marketing strategy. Here are some proven marketing tips for technology product or services companies.
Tags : clarity quest marketing, testimonials, branding, research, word-of-mouth, pay-per-click, cross promotion, customer satifaction
     Clarity Quest Marketing
By: IBM     Published Date: Dec 03, 2008
The System x3350 is a uniprocessor server that includes technology previously found only on multiprocessor servers. So you get enterprise-strength processing power that uses less energy and generates less heat. The tour includes an overview video, plus videos on market research, an airflow comparison, and a power comparison.
Tags : ibm express seller, optimizing performance, security, application server, ibm, ibm system x3350, uniprocessor server, airflow comparison
     IBM
By: BLADE Network Technologies     Published Date: Nov 18, 2008
This document describes enterprise virtualization today and the anticipated uses of this technology, particularly leveraging the capabilities provided by widespread adoption of 10 Gigabit Ethernet (10GbE) as a single, converged network fabric.
Tags : blade network technologies, next-generation datacenter networks, virtualization today, 10gbe, network virtualization
     BLADE Network Technologies
By: IBM     Published Date: Nov 13, 2008
Improve operational efficiencies with next-gen networks and servicesThere has never been a better time for service providers to streamline operations, improve responsiveness and reduce costs. Find out in this white paper how all three can be accomplished with IBM Tivoli® Netcool® solutions. Also discover methods to boost efficiency and minimize expenditures.
Tags : ibm, operations management, tivoli, value-added services, operational support systems, wireless, ibm, power
     IBM
By: HP - Enterprise     Published Date: Oct 16, 2008
If your company stores or processes credit card information, you must be able to demonstrate compliance with the Payment Card Industry (PCI) Data Security Standards (DSS). These standards include requirements for security management, policies, procedures, network architecture, design, and other critical protective measures. They also include one very prescriptive requirement:  Section 6.6 mandates that organizations secure all Web applications by conducting a code review or installing an application layer firewall. Companies have had a very difficult time passing the other parts of Section 6 and they have experienced a rising number of data breaches. Unless companies take 6.6 seriously, PCI compliance failure rates, and data breaches, will continue to grow.  Read this whitepaper to gain an overview of best practices to pass Section 6.6 and an understanding of the technology available to you.
Tags : business risk, security, application security, audit, risk, vulnerabilities, fortify, fortify software
     HP - Enterprise
By: LogRhythm     Published Date: Sep 26, 2008
Is your organization adequately meeting the rules and regulations set forth in the Accountability Act of 1996 (HIPAA)? Learn how LogRhythm’s comprehensive log management and analysis solution can help your organization meet or exceed HIPAA regulatory requirements.
Tags : hipaa, hipaa compliance, health it, health regulations, compliance, comply, security, information technology
     LogRhythm
By: LogRhythm     Published Date: Sep 26, 2008
LogRhythm, the leader in Log and Security Event Management Solutions, has prepared a "Quick Read" whitepaper to help you understand what's required to ensure compliance with: CIP- 003-1 – Cyber Security – Security Management controls; CIP- 005-1 – Cyber Security – Electronic Security Perimeter(s); CIP- 006-1 – Cyber Security – Physical Security of Critical Cyber Assets; CIP -007-1 – Cyber Security – Systems Security Management; CIP -008-1 – Cyber Security – Incident Reporting and Response PlanningThe whitepaper also contains a compliance reference chart with the specific CIP requirements matched with recommended steps to ensure compliance.
Tags : nerc, nerc cip, nerc cip requirements, critical cyber assets, electronic security perimeter, critical cyber assets, compliance, comply
     LogRhythm
By: IBM     Published Date: Sep 18, 2008
When bound to regulation and compliance, process manufacturers find opportunities to grow through enterprise resource planning (ERP). However, 50% of process manufacturers execute non-integrated ERP strategies. This Aberdeen Group research study reveals best practices to help you adapt or select an ERP vendor that improves your business performance.
Tags : erp, enterprise resource planning, cindy jutras, process, process industry, chemical, food and beverage, food
     IBM
By: HP Service Management     Published Date: Sep 03, 2008
In this first chapter of "The Shortcut Guide to IT Service Management and Automation," you will be led through a step by step analysis of your company's IT and business relationships, providing you with a basis for a strategic plan to turn service lifecycle management into a valuable business asset. Author and compliance expert Rebecca Herold demonstrates how technology acts as a strategic differentiator by enabling business growth, driving operational efficiencies to lower maintenance costs, optimizing outcomes, and reducing IT risks.
Tags : itil, itil v3, bsm, bsa, dca, itsm, it service management, operations
     HP Service Management
By: CA WA     Published Date: Aug 15, 2008
Infrastructure Performance Management (IPM) applies to operations quality. Implemented well, IPM frees you from constant firefighting and can transform your role from tactical first responder to strategic business enabler. Applying good IPM technology and processes can deliver a number of benefits to your career as well as to your organization. This report introduces IPM, offers tips for successful IPM implementation, and explores how IPM can benefit your enterprise as well as your career.
Tags : ca wa, computer associates, infrastructure, itil, infrastructure management, performance management
     CA WA
By: Microsoft Dynamics     Published Date: Jul 03, 2008
Get this webcast to discover a customer relationship management (CRM) solution that works the way you do, the way your business does, and the way technology should. We explore how Microsoft Dynamics CRM delivers a familiar Microsoft Office Outlook interface to create a productive work environment. We also illustrate the powerful workflow and integrated reporting capabilities in Microsoft CRM that help you drive business processes and results.
Tags : bpm, crm, microsoft crm, microsoft dynamics, microsoft
     Microsoft Dynamics
By: AT&T     Published Date: Jun 25, 2008
IP Multimedia Subsystem (IMS) is an open international standard for Next Generation Networking. It supports the delivery of Voice over IP (VoIP) and various multimedia services. IMS is not in itself a service, but an architecture for service delivery. IMS was originally developed by wireless carriers within the context of the Third Generation Partnership Project (3GPP) in 2002. Since then, its advantages have led to the adoption of IMS by wireline carriers.
Tags : voip, voice over ip, ip telephony, ip networks, wireless ip, wireless technology, at&t, att
     AT&T
By: VMware Dell     Published Date: Jun 05, 2008
The First American Corporation is America’s largest provider of business information. Their numerous acquisitions and diverse lines of business meant that First American had multiple datacenters dispersed throughout the country. They turned to VMware virtualization technology to consolidate facilities. They standardized on VMware technology and avoided purchasing 700 physical machines.
Tags : server consolidation, server containment, desktop manageability, vmware infrastructure, vmware, green it, green
     VMware Dell
By: IBM     Published Date: Apr 23, 2008
Data center managers are finding that high-density equipment causes problems such as hotspots and rising cooling costs. In this video, IBM explains how to address green technology issues by getting more out of existing facilities, and then describes an IBM solution that can greatly reduce the energy and power consumption of your data center.
Tags : mobile measurement, cooling, cool, data center, heat, power, energy efficiency, ibm
     IBM
By: Diligent Technologies     Published Date: Apr 11, 2008
Virtual tape library (VTL) solutions are taking hold in companies of all sizes, but not all VTLs are equipped to meet the requirements of enterprise data centers. Evaluating virtual tape technology based on a few key considerations will help narrow the field and minimize buyer’s remorse.
Tags : diligent, diligent technologies, vtl, virtual tape, virtual tape library, vtls, storage virtualization, virtual storage
     Diligent Technologies
By: Clarus Systems     Published Date: Mar 18, 2008
In this document, you'll learn to enable the successful execution and completion of IPT Deployment projects through a standardized set of processes and methodologies based upon Information Technology Infrastructure Library (ITIL) standards.
Tags : itil, clarus systems, ipt, ip telephony, unified communications, cisco, callmanager, best practices
     Clarus Systems
By: CopiaTECH     Published Date: Mar 18, 2008
Wireless networking is no more a new name to computer users these days than iPod is to music lovers. This technology is one of the most popular, inexpensive and simple modes of connecting computers to the internet or a network. Both home users, work users and laptop/mobile users, who want to stay connected, even while on the move, are adopting this technology. Download this paper to read about all the threats that come with wireless connections and ways to guard against them.
Tags : copiatech, wireless, wireless security
     CopiaTECH
By: Vendor Guru     Published Date: Jan 04, 2008
Profound developments in business telephony have left some small businesses reeling under perceptions of a steep learning curve for expensive new products. But there’s no reason to be left behind. Affordability is the hallmark of the new generation in business telephony, thanks to hosted IP and other networked solutions. Is your business applying the new technology to best advantage?
Tags : ip pbx, pbx, acd, predictive dialing, automatic call distribution, voicemail, business communications, voice mail
     Vendor Guru
By: Vendor Guru     Published Date: Dec 21, 2007
Managing customer relationships profitably is a challenge many businesses face. Increasingly available information and customer choices translate into a decrease in automatic loyalty. New distribution and communication channels create more complex customer interactions. Implementing powerful technology enablers may be prohibitively expensive for many firms.
Tags : crm, customer relationship management, crm solution, crm software, loyalty, customer loyalty, customer satisfaction, customer interaction
     Vendor Guru
By: Pivotal CRM     Published Date: Dec 21, 2007
For more than a decade, Pivotal CRM has been the choice of Microsoft-centric organizations that want the flexibility to model their specific business practices within their customer relationship management system. The Pivotal CRM product line leverages the Microsoft technology stack to provide usability and productivity advantages through integration to Microsoft Office, and more.
Tags : pivotal, crm, customer relationship management, microsoft, partner, partnership, alliance, product
     Pivotal CRM
By: Computhink     Published Date: Dec 10, 2007
In the arena of corporate governance and compliance, the Sarbanes-Oxley Act (SOX) has commanded considerable attention; in the healthcare industry, it's  HIPAA; similar regulations target the financial services and energy sectors. Organizations can use technology to meet compliance demands in a cost-effective way.
Tags : compliance, computhink, hipaa, sox, sarbox, sarbanes oxley, content management
     Computhink
By: mindSHIFT     Published Date: Nov 29, 2007
Will Voice over IP technology provide business-class security and reliability you expect in your phone system?
Tags : voip, voice over ip, vonage, communication, phone, phone system, long distance provider, phone service provider
     mindSHIFT
By: Borer Data Systems Ltd.     Published Date: Nov 07, 2007
Purchase price alone is not an accurate measure as to the true costs of a system. When evaluating the products offered by different vendors, the purchaser should take into consideration: purchase cost of equipment and software; cost of installing the infrastructure including data cable and mains power outlet and power cables; cost of installation; cost of maintenance; and more.
Tags : energy, power, energy conservation, cost, cost of operation, tco, total cost of ownership, power management
     Borer Data Systems Ltd.
By: Borer Data Systems Ltd.     Published Date: Nov 07, 2007
Swiping a card to gain access to a company building is now a perfectly accepted feature of everyday corporate life. Over the years, we have all grown familiar with the routine and the advantages it brings to access control. But where cards were once used exclusively to open doors, controlling who went where and when in a building, now they can be used for a wide variety of extra functions.
Tags : security, security management, access control, identity management, iam, authentication, tracking, workforce
     Borer Data Systems Ltd.
By: Motorola     Published Date: Oct 30, 2007
For many wireless broadband network operators, the term "unlicensed reliability" is seen as an oxymoron. For many, the idea of building a high-speed network in the unlicensed band isn't a good one. A great deal has been said about crowded frequencies, self-interference and costly network rips. About how microwaving popcorn can cause interference. About disgruntled and perplexed customers. And ex-customers.
Tags : wireless, broadband, broadband spectrum, wireless infrastructure, wlan, wisp, cwisp, wimax
     Motorola
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics