bsp

Results 101 - 125 of 412Sort Results By: Published Date | Title | Company Name

Work smarter to remain competitive and keep up with customer demands.

Published By: IBM     Published Date: Oct 09, 2009
This webcast, "Untangle Your Connectivity Infrastructure - Free Up Your Cost," shows how IBM SOA solutions and IBM WebSphere untangle costly and debilitating complexities associated with connecting and integrating applications, services, and processes spread throughout the organization. The result is business agility and cost optimization.
Tags : 
connectivity infrastructure, ibm, application intergration, cost optimization, it complexity, business integration, infrastructure, application integration, it spending, web sphere
    
IBM

The benefits of IBM. The savings of open source.

Published By: IBM     Published Date: Oct 09, 2009
"Recently, Open Source Software has been gaining in popularity due to the ability it provides users to view and modify source code. Another attraction is the perceived cost savings. Read the white paper that takes a look at the truth about those savings. Initially, deployment environments like JBoss have an advantage-zero initial software acquisition costs. However, the white paper will show how, over time, IBM WebSphere Application Server (WAS) and IBM WebSphere Application Server Network Deployment (WAS ND) win the TCO battle. Learn more."
Tags : 
open source, ibm, tco, total cost ownership, roi, return on investment, application development, jboss, was nd, websphere, application integration, total cost of ownership, web sphere, service oriented architecture
    
IBM

UIM Evaluation: IBM Information on Demand

Published By: IBM     Published Date: Nov 17, 2009
The information agenda is intended to map out corporate business and technology goals and to create a roadmap to ensure that companies can leverage their corporate information as a strategic asset in the pursuit of these goals.
Tags : 
ium evaluation, ibm, information on demand, uim, iod, information management, scential, filenet, cognos, soa, cross-ibm initiative, websphere, lotus, tivoli, ibm global services, ovum 2008, information agenda, vanguard, master data management, enterprise content integration
    
IBM

System z software working in harmony for today and tomorrows SOA enterprise

Published By: IBM     Published Date: Nov 24, 2009
This paper is aimed at IT architects and managers who need to understand how IBM CICS Transaction Server can be used in a modern service oriented architecture (SOA) enterprise solution.
Tags : 
ibm, leveraging middleware, system z software, soa enterprise, websphere, db2, cics transaction server, ims, websphere mq, renault, workload management, websphere, transaction server, service oriented architecture, enterprise software, web sphere
    
IBM

Lock Down Applications for PCI DSS Compliance

Published By: Secure Computing     Published Date: Feb 06, 2008
The Payment Card Industry Data Security Standard requires merchants and transaction processors to protect customer data, and firewalls play a major role in the process.  This paper was written by Matt Sarrello, CISSP, contributing editor at Ziff Davis Enterprise and Michael Steinhart, senior editor at Ziff Davis Enterprise.
Tags : 
cardholder data, data security, database security, data protection, pci, pci dss, pci-dss, compliance, credit card, payment card, secure computing, securecomputing, tjx, security, firewalls, intrusion prevention, pci compliance
    
Secure Computing

ROI and Other Cost Benefits of Reputation-Based Services

Published By: Secure Computing     Published Date: Feb 20, 2008
Reputation systems add a critical first line of advanced protection to help organizations accurately detect and block all types of threats to their messaging, web, and network environments.  In simplest terms, deploying a reputation service at the network edge is analogous to having a peephole in the front door of your house.  You let in people you know and trust, question the ones you don’t know and shun the ones who look suspicious.  Just by taking these simple measures you reduce your risk.
Tags : 
it spending, whitelist, whitelisting, email security, spam, antispam, cast iron, castiron, roi, storage, bandwidth management, anti spam, return on investment
    
Secure Computing

Small Business Webcast: Are You Ready for CRM? 7 Ways to Know

Published By: Microsoft Dynamics     Published Date: Jul 03, 2008
Knowing your customers and their needs as thoroughly as possible is central to any business.  And that's the very point of customer relationship management software, sophisticated business software commonly known as CRM.  The question is, is CRM for you? This webcast provides an informative discussion around CRM and outlines seven criteria that will help you decide if you are ready for Microsoft CRM.
Tags : 
crm, microsoft crm, contact management, sales tool, contact tool, microsoft, customer relationship management, sales & marketing software
    
Microsoft Dynamics

High Availability: Is it Sufficient for Disaster Recovery and Business Continuity?

Published By: Stratus Technologies     Published Date: Sep 19, 2007
For mission-critical IT, service outages and data loss pose serious consequences.  This white paper examines how availability management, disaster recovery and business continuity support one another and offers insight to find success at all of them.
Tags : 
business continuity, disaster recovery, high availability, stratus, stratus technologies, linux, sap, windows, service management
    
Stratus Technologies

Closing the IT Availability Gap: New Options for Traditional and Virtualized IT Environments

Published By: Stratus Technologies     Published Date: Jul 25, 2008
Faced with a growing number of business-critical applications and services to support, SMBs and enterprises with remote environments are experiencing a real need for high availability.  This paper discusses an easy-to-use, affordable high-availability and virtualization solution using standard x86 servers.
Tags : 
high availability, virtualization, ha software, stratus avance software, fault-tolerant hardware, ftserver systems, stratus, server virtualization
    
Stratus Technologies

Don't get caught with egg on your face!

Published By: Stratus Technologies     Published Date: Dec 03, 2008
"Virtualization can be like putting all your eggs in one basket.  Ensure you have a resilient basket…"
Tags : 
stratus technologies, virtualization, application server, enterprise applications, server virtualization
    
Stratus Technologies

The Real Fault Tolerant

Published By: Stratus Technologies     Published Date: Mar 10, 2009
Fault Tolerant is a pretty common term in the world of IT, also an often misused and misleading term.  For 3 decades, Stratus Technologies has been engineering and manufacturing purpose built Fault Tolerant solutions. Check out this short video to understand what it takes to be REAL Fault Tolerant.
Tags : 
stratus, virtualization, fault tolerance, real fault, it management, industry standard components, disaster prevention, enterprise applications, enterprise resource planning, server virtualization
    
Stratus Technologies

Fault Tolerant Becoming Mired in Marketing Mud

Published By: Stratus Technologies     Published Date: Mar 10, 2009
Late comers to the market, talk the talk, but can’t walk the walk for critical workloads.  Stratus Director of Product Management Denny Lane resets the definitions of fault tolerance and high availability.
Tags : 
stratus, fault tolerance, critical workloads, mission critical business solution, server virtualization, lexicon, high availability, continuous availability, disaster prevention, networking, it management, enterprise applications, enterprise resource planning
    
Stratus Technologies

24/7 Uptime for Electronic Health Records

Published By: Stratus Technologies     Published Date: Apr 17, 2009
The long migration to electronic health records (EHRs) in the U.S. is set to speed up with the funding authorized by the American Reinvestment and Recovery Act of 2009.  But what are the specific risks when clinicians can’t access electronic health records? How far-reaching are the consequences when EHR data is lost, or its integrity is compromised?  This paper looks at the mission-critical role of EHR systems, and introduces availability solutions that build in uptime protection to ensure the continuity of operation that both caregivers and patients can depend on.
Tags : 
stratus, electronic health records, ehrs, american reinvestment and recovery act, health, records, availability solutions, mission-critical, medical grade servers, electronic medical records, emr, patient health records, phrs, computerized health record system, community health record (chr), diagnostic records, lab results, prescribed medication, downtime risk, stratus ftserver
    
Stratus Technologies

Managing Risk for Effective Access Governance

Published By: Aveksa     Published Date: Feb 04, 2008
User access-related business risk comprises a broad array of potentially damaging events that may be caused or made possible by inadequate governance of access to an enterprise’s information assets. Such events range from relatively minor policy and compliance violations to disastrous business losses.  The stakes involved in access-related risk have risen dramatically in recent years as organizations have become thoroughly operationalized by technology.
Tags : 
access control, user access, access, permissions, risk, risk management, compliance, governance, aveksa, corporate governance
    
Aveksa

ESET Global Threat Report 2007

Published By: ESET     Published Date: Jan 30, 2008
As another year draws to a close, few can have failed to notice the plagues of malicious software, floods of fraudulent emails and the generally increased pestilence of our online world, marking out 2007 as one of the most remarkable in the history of malware.  This report covers the top malware threats in 2007 and provides monthly summaries.
Tags : 
malware, global threats, 2007, threats, email, threat summary, threat report, viruses, eset, antivirus, nod32, internet threats, web-borne threats, phishing, trojans, spam, attacks, exploits, computers, malicious software
    
ESET

Steganography: Secret Files Lurking Inside Photos and Music

Published By: ESET     Published Date: Jan 30, 2008
Steganography is the science of hiding data inside of items, such as sound and picture files.  Listen to this podcast to learn more about steganography and the potential IT security concerns it poses.
Tags : 
embedded files, steganography, hiding data, secret files, coding, av signatures, traditional antivirus, norton, symantec, trend micro, mcafee, malware, threats, email, viruses, eset, antivirus, nod32, internet threats, web-borne threats
    
ESET

Are We Doomed? Security Predictions For 2008

Published By: ESET     Published Date: Feb 01, 2008
With the ever evolving threat landscape, what will 2008 hold for IT Managers?  This podcast provides a high level overview of a few trends to watch for this year.
Tags : 
2008 predications, it security predictions, it security, mobile devices, laptops, endpoint, operating systems, antivirus, spam, viruses, trojans, rootkits, malware, threats, eset, nod32, trends, security, networks, spyware
    
ESET

Building a Threat Model for Small and Medium Sized Businesses

Published By: ESET     Published Date: Feb 01, 2008
It is important for businesses to have a plan in place that addresses the changing threat landscape.  This podcast discusses various items for businesses to consider when developing an IT threat model.
Tags : 
threat planning, testing, penetration testing, defense in depth, multilayered, firewall, filtering, white listing, it strategy, eset, nod32, antivirus, malware, internet threats, web based threats, web 2.0, smb, small business, medium business, eset
    
ESET

TCO Comparison Report: Reducing Costs in the Data Center

Published By: SEPATON     Published Date: Mar 11, 2008
Is backup and recovery unnecessarily draining your budget and resources? This report measures the TCO of an enterprise environment using various data protection models, including tape, virtual tape library, and data deduplication solutions.  Learn how each stacks up in this comparative report.
Tags : 
backup, data deduplication, deduplication, sepaton, tco, data management, backup and recovery, total cost of ownership, data protection
    
SEPATON

The Forrester Wave: Enterprise Open Systems Virtual Tape Libraries

Published By: SEPATON     Published Date: Mar 11, 2008
Forrester evaluates 12 virtual tape library (VTL) vendors across 58 criteria to determine a relative ranking that centers on strength of current offering as well as market strategy.  This report is a must-read for companies considering revising their data protection strategies to include VTL.
Tags : 
vtl, virtual tape library, backup, recovery, storage, storage virtualization, sepaton, backup and recovery, data protection
    
SEPATON

ESG Brief: Case Studies on Backing Up VMware

Published By: SEPATON     Published Date: Jun 23, 2008
This report is a must-read for companies struggling to back up their newly virtualized server environments.  Read this brief to get real-world case studies on how Sterling Testing and Kindred Healthcare have overcome the challenges of protecting VMware environments by implementing high performance virtual tape libraries (VTLs).
Tags : 
backup, recovery, storage, vtl, virtual tape library, virtual storage, storage virtualization, sepaton, backup and recovery, storage management
    
SEPATON

Run Away to Join the New Circus - Sales 2.0 Whitepaper Part 1

Published By: Landslide Technologies     Published Date: Apr 21, 2008
What sales is has not changed. How sales are accomplished is changing radically. In this first of a two-part whitepaper,  we present an overview of the state of sales today, supported by metrics from our 2007 Sales Performance Optimization survey.  The differences between S1.0 and S2.0 are represented in the comparison between old-style circus companies and  the modern circus (think Ringling Bros. vs. Cirque du Soleil).
Tags : 
sales, sales 2.0, landslide, crm, metrics, business metrics, customer relationship management, sales & marketing software, sales automation, productivity
    
Landslide Technologies

Think. Think Different. Think Again. Sales 2.0 Whitepaper Part 2

Published By: Landslide Technologies     Published Date: Apr 21, 2008
If you think you know sales, you likely are bringing to this topic a history and track record that has served you well.  This paper attempts to offer the cautionary warning that what has worked in your past may not serve your current  sales reps as well today, and could actually hurt their performance. Sales 1.0 was about lone wolves, product superiority,  proven skills and making the number.
Tags : 
landslide, customer relationship, customer loyalty, loyalty, crm, sales, sales, sales 2.0, sales 1.0, business metrics, customer relationship management, sales & marketing software, sales automation, collaboration
    
Landslide Technologies

Run Away to Join the New Circus. Sales 2.0 Whitepaper Part 1

Published By: LandslideCRM     Published Date: May 17, 2012
What sales is has not changed. How sales are accomplished is changing radically. In this first of a two-part white paper,  we present an overview of the state of sales today, supported by metrics from our 2007 Sales Performance Optimization survey.  The differences between S1.0 and S2.0 are represented in the comparison between old-style circus companies and  the modern circus (think Ringling Bros. vs. Cirque du Soleil).
Tags : 
sales, sales 2.0, landslide, crm, metrics
    
LandslideCRM

5 Steps to Building an Online Customer Experience Competency

Published By: Tealeaf     Published Date: May 12, 2008
While many companies believe they are delivering adequate online experiences, their customers are in pain. Why do most organizations miss the mark? Improving online customer experience requires organizations to have one view of the online customer and to utilize a common language when discussing customer experience.  Tealeaf gives you insights via their new guide, "Building an Online Customer Experience Competency: Five Steps".
Tags : 
tealeaf, customer experience, website development, web development
    
Tealeaf
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.