ad tech

Results 3301 - 3325 of 3367Sort Results By: Published Date | Title | Company Name

The Benefits of Continuous Data Protection (CDP) for IBM i5/OS and AIX Environments

Published By: Vision Solutions     Published Date: Apr 24, 2008
This white paper will provide a road map to the most effective strategies and technologies to protect data and provide fast recovery should data be lost or corrupted due to accident or malicious action.
Tags : 
vision, high availability, ibm, cdp, aix, business intelligence, configuration management, data protection
    
Vision Solutions

Get More Out of Existing Data Centers and Pay Less for Cooling Power

Published By: IBM     Published Date: Apr 23, 2008
Data center managers are finding that high-density equipment causes problems such as hotspots and rising cooling costs. In this video, IBM explains how to address green technology issues by getting more out of existing facilities, and then describes an IBM solution that can greatly reduce the energy and power consumption of your data center.
Tags : 
mobile measurement, cooling, cool, data center, heat, power, energy efficiency, ibm
    
IBM

Achieving Rapid Data Recovery for IBM AIX Environments

Published By: Vision Solutions     Published Date: Apr 11, 2008
If you need more than tape backup to protect your critical applications running on AIX operating environments, download this white paper and learn your options and strategies, including how new technologies have significantly improved the recovery time and data recovery points for AIX.
Tags : 
data management, disaster recovery, business continuity, ibm aix, backup, recovery, vision, vision solutions
    
Vision Solutions

Diligent HyperFactor: Redefining De-Duplication

Published By: Diligent Technologies     Published Date: Apr 11, 2008
New technologies exist that can radically slim down the physical storage requirements for secondary disk storage. Taneja Group refers to these technologies as Capacity Optimization (CO) technologies. In this technology brief, we will examine what IT teams should be looking for in a capacity optimization solution, and then share our perspective on the Diligent HyperFactor technology.
Tags : 
deduplication, minimizing storage, minimize storage, diligent technologies, diligent, storage, storage management, data deduplication
    
Diligent Technologies

Service-Oriented Architecture: Developing the Enterprise Roadmap

Published By: Burton Group     Published Date: Apr 08, 2008
Most large enterprises have launched an initiative to adopt service-oriented architecture (SOA), but SOA is not a solution that comes in a tidy little box. SOA is a new way to design systems, and it is more about culture than it is about technology. SOA will impact many aspects of an organization—from software development and operations to accounting and incentive systems. Governance is critical.
Tags : 
soa, service oriented, service-oriented, burton group, governance, soa governance, it management, service oriented architecture
    
Burton Group

Enhancing eCommerce ROI through Rich Internet Applications (RIAs)

Published By: Integration New Media     Published Date: Apr 01, 2008
This new white paper by Integration New Media looks at the benefits achieved through adding richness to eCommerce sites, with an emphasis on the impact that this change can have on a retailer’s bottom line. In addition, it presents samples of successful integrations and options for moving forward that leverage current technology, providing retailers with the biggest bang for the smallest investment.
Tags : 
inm, integration new media, ebusiness, return on investment
    
Integration New Media

Rich Internet Applications 101: a Primer for Marketing Agencies & Multimedia Developers

Published By: Integration New Media     Published Date: Apr 01, 2008
This new white paper by Integration New Media provides marketing agencies and multimedia developers with a strong foundation of information about Rich Internet Applications (RIAs). From basic definitions through to technology explanations, this white paper is a must-read for those looking to embrace new technologies to satisfy their clients’ growing needs.
Tags : 
multimedia, ria, rich internet applications, web development, inm, integration new media, software development, web services
    
Integration New Media

Transforming the IT Infrastructure to Generate Business Advantage

Published By: IBM     Published Date: Mar 28, 2008
With ever increasing pressure to drive higher operating efficiencies, fuel business growth and enhance shareholder value, executives today are rethinking their traditional strategies. Few areas of the business are being more challenged than information technology (IT). Increasingly, CIO's are exploring alternative IT infrastructure sourcing and delivery strategies.
Tags : 
networking, infrastructure, business management
    
IBM

Business Flexibility: Removing Dependencies Between Business Process and Technical Infrastructure

Published By: IBM     Published Date: Mar 28, 2008
Many of today’s businesses have already moved from rigid siloed application approaches to more flexible business process focused solutions. This is driving the need for transparency in the underlying technologies, and for better levels of standardization and virtualization of the infrastructure, along with consideration of the value chain that includes a company’s suppliers and customers.
Tags : 
infrastructure, business process management, service oriented architecture
    
IBM

Smart SOA: Best Practices for Agile Innovation and Optimization

Published By: IBM     Published Date: Mar 28, 2008
In this era of unprecedented change, organizations need agility to adapt rapidly. Part of what separates winners from losers is the ability to respond quickly and intelligently to market opportunities, competitive threats and regulatory constraints — in short, to innovate and create value. The best companies understand how to use technology for strategic advantage to help accomplish these goals.
Tags : 
best practices, service oriented architecture
    
IBM

Leisure, Entertainment and Travel ICT Transition: Harnessing Technology for Competitive Advantage

Published By: Easynet     Published Date: Mar 26, 2008
From the results of recent interviews with LET organisations, IDC positions the industry in the midst of a major transition phase from legacy to next-generation services and technology. This Executive Brief highlights the major technology and business trends taking place in the LET sector, and outlines the advantages of adopting new technologies and services in comparison with other industries.
Tags : 
leisure, entertainment, travel services, technology, managed networks, easynet, ip networks, vpn
    
Easynet

Straddling the Divide between IPT and IT: Implementing ITIL to Optimize Your IP Telephony Investment

Published By: Clarus Systems     Published Date: Mar 18, 2008
The recent momentum of Unified Communications (UC) and the disruptive enabling technology of IP Telephony have created a convergence between Voice Engineering and IT departments that is unprecedented - even since the advent of computer telephony integration. However, despite rapid and significant advances within these technologies, many enterprises, even the early adopters, have not fully embraced the alignment of these two worlds.
Tags : 
itil, clarus systems, ipt, ip telephony, unified communications, cisco, callmanager, best practices
    
Clarus Systems

ClarusIPC Plus+ 2.4: Diagnose, Troubleshoot, Validate

Published By: Clarus Systems     Published Date: Mar 18, 2008
Enterprise networks are going through massive change, and the convergence of voice and data including Communication deployments, upgrades, transformations and ongoing management remain a top priority. According industry analysts at Aberdeen Group, 61% are planning for Communications in the next two years. In order to get the most from their Unified Communications investment at the time of deployment and beyond, enterprises must leverage both active testing and configuration analysis techniques to certify and validate that environments are configured as designed.
Tags : 
itil, clarus systems, ipt, ip telephony, unified communications, cisco, callmanager, best practices
    
Clarus Systems

Going, Going, Gone Wireless? A Survival Guide

Published By: CopiaTECH     Published Date: Mar 18, 2008
Wireless networking is no more a new name to computer users these days than iPod is to music lovers. This technology is one of the most popular, inexpensive and simple modes of connecting computers to the internet or a network. Both home users, work users and laptop/mobile users, who want to stay connected, even while on the move, are adopting this technology. Download this paper to read about all the threats that come with wireless connections and ways to guard against them.
Tags : 
copiatech, wireless, wireless security, wifi
    
CopiaTECH

What Would Bond Do? A Spyware Survival Guide

Published By: CopiaTECH     Published Date: Mar 18, 2008
With the advancement of IT, technology has brought great improvements and new challenges. One such challenge is spyware: software designed to either capture your data or use your system for its own purposes. This paper discusses in detail various kinds of spyware and measures of protection against it.
Tags : 
copiatech, anti spam, anti spyware
    
CopiaTECH

The Final Buying Decision: Integrated Vs. Compatible

Published By: CopiaTECH     Published Date: Mar 18, 2008
Words like “integrated” and “centralized” have been used to describe application software solutions for some years now, often because of marketing messaging that implies more interoperability than the given technology can actually provide to the business customer. The terms are broad enough to be almost meaningless in some instances. In the field of IT security, the sheer range of tools and techniques in the hacker or virus writer’s armory that one must guard against has driven up the number of solutions required to prevent attacks.
Tags : 
copiatech, security, intrusion prevention, total cost of ownership
    
CopiaTECH

ProofMark System Concepts, Architecture, and Planning Guide

Published By: ProofSpace     Published Date: Mar 04, 2008
The ProofMark software solution is a broadly applicable system that operates on a computer, server, network, system, or infrastructure. This system utilizes public-key cryptography to create an irrefutable record of the time-existence and exact composition of any digital data. This document, the ProofMark System Concepts, Architecture, and Planning Guide, provides you with a broad technical overview of the ProofMark system.
Tags : 
public key, secure content, encryption, proofspace, proofmark, pki, document management, secure content management
    
ProofSpace

An Examination of Server Consolidation: Trends that Can Drive Efficiencies

Published By: IBM     Published Date: Feb 25, 2008
An organization’s success and ability to react to market and environmental changes are now more dependent than ever on an effective and efficient IT infrastructure. This white paper provides a starting point for organizations contemplating server consolidation. Download this guide for an overview of server consolidation concepts and techniques, plus guidance on methodologies that should be employed.
Tags : 
servers, migration, consolidation, infrastructure, server hardware, ibm
    
IBM

Optimize Retail Operations and Lower Costs by Enhancing Your Use of IT

Published By: IBM     Published Date: Feb 08, 2008
Point of service is the key to every retail operation. But with e-mail marketing, in-store/self-service kiosks and more, the definition of point of service is changing. These changes create a unique opportunity to utilize advanced technologies to improve the customer experience. The IBM Retail Environment for SUSE LINUX (IRES) is designed to help retailers do just this -- while generating higher profits.
Tags : 
pos, point of service, tco, marketing, customer experience, increase sales, profitability, retail
    
IBM

Best Practices for Globally Deploying Wireless Messaging

Published By: Motorola     Published Date: Feb 06, 2008
This paper describes the key issues a multi-national enterprise needs to consider when determining the requirements for deploying a global wireless messaging project. It then outlines how the Good™ Mobile Messaging solution addresses those key issues. Also included are includes two case studies of recent Good Technology customer deployments.
Tags : 
motorola, motorola good, mobile messaging, wireless messaging, mobile applications, wireless applications, productivity, wireless
    
Motorola

District of Columbia Case Study

Published By: Motorola     Published Date: Feb 06, 2008
Read this case study to learn how Chief Technology Officer, Mrs. Suzanne Peck, has helped the Government of the District of Columbia undergo a significant technological transformation.
Tags : 
motorola, motorola good, case study, d.c., district of columbia, wireless, wireless communications, wireless messaging
    
Motorola

DMX Music Case Study

Published By: Motorola     Published Date: Feb 06, 2008
DMX Music has always been at the leading edge of technology. As remote access to e-mail became a viable business solution, DMX Music's IT department began to consider the possibilities a wireless messaging system could bring to its business. Read this case study to learn what they found out.
Tags : 
motorola, motorola good, case study, mobile computing, mobile workers, wireless messaging, productivity
    
Motorola

Gates Corporation Case Study

Published By: Motorola     Published Date: Feb 06, 2008
With over 13,000 employees and a large sales force spread around the world, the Gates Corporation is continuously evaluating the effectiveness of its technology services on employee productivity. In preparation for a strategic, company-wide technology initiative, the corporation's Worldwide IT Group found several issues related to mobile communications.
Tags : 
motorola, case study, motorola good, wireless communications, productivity
    
Motorola

Managing Risk for Effective Access Governance

Published By: Aveksa     Published Date: Feb 04, 2008
User access-related business risk comprises a broad array of potentially damaging events that may be caused or made possible by inadequate governance of access to an enterprise’s information assets. Such events range from relatively minor policy and compliance violations to disastrous business losses.  The stakes involved in access-related risk have risen dramatically in recent years as organizations have become thoroughly operationalized by technology.
Tags : 
access control, user access, access, permissions, risk, risk management, compliance, governance
    
Aveksa

Perimeter Church Simplifies IT Administration with VMware

Published By: VMware Dell     Published Date: Jan 31, 2008
As Perimeter Church's congregation expanded, their IT staff needed to find a way to meet the growing IT needs of the church with limited staff. Download this case study to learn how the Perimeter IT team has been able to perform its administrative functions much more effectively with VMware technology.
Tags : 
server management, servers, server, virtual server, virtual machine, vmware, server software, infrastructure
    
VMware Dell
Start   Previous    121 122 123 124 125 126 127 128 129 130 131 132 133 134 135    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.