businesses

Results 2376 - 2400 of 2513Sort Results By: Published Date | Title | Company Name

Comparing iSCSI Initiator Implementations

Published By: Dell Storage     Published Date: Jan 16, 2009
With the advent of iSCSI as the standard for networked storage, businesses can leverage existing skills and network infrastructure to create Ethernet-based SANs that deliver the performance of Fibre Channel—but at a fraction of the cost. iSCSI enables block-level data to be transported between a server and a storage device over an IP network. An iSCSI initiator is hardware or software that runs on a host and initiates I/O to an iSCSI target, which is a storage device (usually, a logical volume) that responds to read/write requests.
Tags : 
dell, iscsi, networked storage, initiator implementations, block-level data, fibre channel, storage, storage management, storage virtualization
    
Dell Storage

IBM portal technologies help drive more value from dashboards

Published By: IBM     Published Date: Jan 13, 2009
Many dashboards have limitations that can make it difficult for businesses to provide value beyond the executive level. But with IBM portals, you can create a foundation to build more effective active dashboards. This executive brief shows how next-generation dashboards can provide a competitive advantage by helping improve flexibility and decision-making.
Tags : 
ibm, portal technologies, dashboards, ibm portals, dashboard trends, composite applications, data management, application integration, service oriented architecture, web service management, customer experience management
    
IBM

Addressing a growing problem An explosion of IP addresses

Published By: Quocirca     Published Date: Jan 13, 2009
Given today’s economic climate, businesses are, more than ever, looking to create additional value through the reduction of risk and by saving costs. For many, the economic downturn is seen as the best time to optimise the infrastructure that they already have in place, to look at ways to trim unnecessary expenditure and to use existing resources more effectively. As organisations are increasingly reliant on data networks that encompass an ever-growing range and number of internet protocol (IP) enabled devices and applications, they need to more effectively administer and manage these assets—they can no longer take the management of their IP networks for granted.
Tags : 
quocirca, ipam, dynamic host configuration protocol, domain name system, radio frequency identification, voice over ip, enterprise applications, enterprise software
    
Quocirca

Block Evolving Spam, Secure Your Network

Published By: MessageLabs     Published Date: Jan 13, 2009
New spamming techniques are upon us -  419 spam, botnets, CAPTCHA cracking – what’s next from the 'bad guys'? Spam remains the biggest email-born threat to businesses. Learn how to protect your business.  FREE Whitepaper (PDF/40KB)
Tags : 
messagelabs, secure network, block spam, spamming techniques, spam, business threat, networking, security, network security, anti spam, anti spyware
    
MessageLabs

Make full use of Web 2.0 with IBM WebSphere Portal

Published By: IBM     Published Date: Jan 12, 2009
To remain competitive, today’s businesses need to meet high expectations for rich, interactive browser experiences. IBM WebSphere Portal offers extensive support for Web 2.0, and can enable your organization to easily deploy high performing, intuitive applications. Watch this demo to learn about the Web 2.0 features available today with IBM.
Tags : 
ibm, websphere portal, web 2.0, interactive browser experience, intuitive applications, networking, software development, it management
    
IBM

Leveraging Capex-Free Managed Hosting

Published By: The Planet     Published Date: Jan 05, 2009
With all the competitive challenges and technology demands faced by web-based SMBs today, the possibility of a capital-expense-free alternative for providing world-class IT systems and services is extremely viable. By offering enterprise-class IT systems and services for a monthly fee, managed hosting helps to level the playing field as well as improve the technical capabilities of businesses that until now could not afford to match their larger competitors. Learn more today!
Tags : 
the planet, managed hosting, it hosting, capex-free, enterprise-class it systems, it management, enterprise applications, application integration, application performance management, business intelligence, business management, customer relationship management, employee performance, colocation and web hosting
    
The Planet

Best Practices in Data Governance (Video)

Published By: IBM     Published Date: Dec 30, 2008
Does your business need to safeguard information, keep auditors and regulators satisfied, and improve data quality? Data governance is the answer. This informative video outlines the latest challenges and best practices in data governance. IBM data governance solutions help businesses with:• Audit and reporting • Data architecture/infrastructure • Data quality • Information lifecyle management • Metadata/business glossaries • Organizational design/development • Policy/risk management • Security/privacy/compliance • Stewardship/value creation
Tags : 
ibm, data governance, safeguard information, data quality, data architecture, data infrastructure, information lifecycle management, metadata, business glossaries, organizational design, organizational development, policy management, risk management, security, privacy, compliance, stewardship, value creation, enterprise applications, data management
    
IBM

Top 14 Marketing Tips for Technology Businesses

Published By: Clarity Quest Marketing     Published Date: Dec 22, 2008
The sluggish economy makes it one of the best times to re evaluate your company’s marketing strategy. Here are some proven marketing tips for technology product or services companies.
Tags : 
clarity quest marketing, testimonials, branding, research, word-of-mouth, pay-per-click, cross promotion, customer satifaction
    
Clarity Quest Marketing

The Business Benefits of Hosted Email Security for the SMB

Published By: Trend Micro SaaS     Published Date: Dec 17, 2008
All businesses face a daily bombardment of email spam that consumes valuable IT staff time as well as end-user productivity. In addition, email is an attack vector for many types of security threats to businesses, including phishing, viruses, spyware, and malicious URLs. Given that all businesses are experiencing the financial pressures of a tightening world economy, coupled with the uncertainty of any near-term recovery, small and medium-sized business (SMB) managers are searching for ways to cut costs while continuing to maintain a consistent level of service and protection for their businesses.
Tags : 
saas, trend, trend micro, software as a service, smb, spyware, hacker, trendlabs, email security, security, interscan messaging, service level agreement, sla, virus, spam, phishing, distributed denial of service, ddos, filtering, anti spam
    
Trend Micro SaaS

IBM System Storage DS3400: Consolidate and share data within your SAN

Published By: IBM     Published Date: Dec 03, 2008
As your data volume and value increases, reduce your risk with the IBM System Storage DS3400 Express. This direct-attach storage (DAS) or SAN solution is scalable and expandable to consolidate your data. It’s also flexible and affordable for small and midsize businesses. Get all the details at a glance in this data sheet.
Tags : 
ibm, express seller, system storage, ds3400, san solution, ds3400 express, storage, raid, storage virtualization
    
IBM

Modular systems and storage solutions for small and midsized businesses

Published By: IBM     Published Date: Dec 03, 2008
Small and mid-sized businesses are dealing with larger volumes of data than ever before, but without the big enterprise budgets. What they need are budget-stretching solutions that reduce the complexities of data storage while being easy to use.
Tags : 
ibm, express seller, storage solutions, modular systems, ibm express advantage, ibm system storage, storage, iscsi, raid, storage management, storage virtualization
    
IBM

Soaring across the regions - A view of the impact of the internet on business

Published By: Quocirca     Published Date: Dec 02, 2008
The internet offers any business the opportunity to present a commercial image independent of the organization's size and location. Small and medium sized businesses (SMBs) across the UK have exploited the internet as it has evolved from an interesting medium for the technology-aware to an essential commercial platform. With this increasing importance, and the internet’s ability to extend the reach of a business, it is valuable to realize precisely what different internet service providers (ISPs) offer before buying. This includes evaluating service level and support capabilities and understanding how these vary throughout the UK.
Tags : 
quocirca, smbs, internet service providers, information technology, security, compliance, email security, internet security, intrusion prevention
    
Quocirca

Introduction to AutoMate 6

Published By: Network Automation     Published Date: Dec 02, 2008
Businesses today are under constant pressure to lower costs while improving overall operational efficiency. Enterprises of all sizes can reduce costs and improve business agility if they can automate various operational aspects of their IT and business processes.
Tags : 
network automation, automation, systems integration, networking, it management, network management, network performance management
    
Network Automation

B2B Marketing with Video: Driving ROI from Awareness to Advocacy

Published By: BrightCove     Published Date: Nov 26, 2008
With the rapid growth of online video, more and more B2B marketers are using video to drive results and ROI throughout the customer lifecycle. Because video enables marketers to tell more engaging stories about their businesses, brands and products, video has quickly proven to be one of the most successful ways of acquiring, interacting with and converting new customers. With this white paper, you will see case studies from successful video marketers and discover 5 ways you can begin leveraging online video today .
Tags : 
brightcove, video imperative, branding & awareness, video advertising, online video platforms, google analytics, enterprise applications, application integration, marketing automation, product lifecycle management, video conferencing
    
BrightCove

Outsource Marketing: A Smart Choice for Technology Businesses

Published By: Customer Chemistry     Published Date: Nov 21, 2008
Many businesses believe they only have two choices when it comes to marketing -- establish an internal department or contract specific services with a full-service marketing agency. There is a third option worth exploring.  Strategic outsource marketing provides the commitment of an internal resource and the capabilities of a full-service agency without the operating costs of either.
Tags : 
clarity quest marketing, strategic outsource marketing, outsource marketing, outsourcing services
    
Customer Chemistry

What Is Open Storage? The Need for a New Storage Architecture

Published By: Sun Microsystems     Published Date: Nov 14, 2008
This free white paper reveals how businesses are benefiting from latest generation of open storage systems. Years ago, all servers were closed and proprietary; then open systems hit the market, combining rapid technological innovation with market-driven choice. In the white paper, you'll explore how open architectures are helping some of today's best-known enterprise names stay flexible and profitable.
Tags : 
open storage, sun, sun microsystems, opensolaris, iscsi, sas, hpc, web 2.0, server virtualization, blade servers, network attached storage, storage area networks, storage management, storage virtualization, total cost of ownership
    
Sun Microsystems

SOA In Any Economic Climate

Published By: IBM     Published Date: Nov 11, 2008
Keep ahead of change with service oriented architecture (SOA). With SOA, businesses can flexibly adjust strategies and practices while lowering costs by repurposing existing software rather than replacing it. Other savings are possible as well, making SOA a sound investment. This white paper from ZapThink discusses how organizations can quickly benefit from SOA, regardless of the economic climate.
Tags : 
ibm, ebf, soa, globalization, service-oriented architecture, data management, service oriented architecture
    
IBM

In-House Vs. Hosted Email Security

Published By: Intermedia     Published Date: Nov 10, 2008
Microsoft Exchange is the leading business email and collaboration solution for the small,up to the large, business markets, and this whitepaper compares the security of Microsoft Exchange Services deployed in-house versus a hosted model with SaaS service providers. By choosing Intermedia as their Hosted Exchange SaaS Solution Provider, businesses can achieve email and total messaging security, as well as a piece of mind, by leveraging Intermedia’s infrastructure and experience with running a secured messaging platform.
Tags : 
intermedia, email security, logical server security, software as a service, saas, microsoft exchange services, security assessment testing, security, microsoft exchange
    
Intermedia

Hosted Vs. In-House for Microsoft Exchange: Five Myths Debunked

Published By: Intermedia     Published Date: Nov 10, 2008
For companies with strapped and/or non-existent IT teams, outsourcing Microsoft Exchange can be an extremely smart, cost-effective option. While the hosted email market is indeed growing fast, a few stubborn myths continue to hold back many businesses from embracing it as a viable option to an in-house solution. In this article we will debunk those falsehoods one by one to show why a hosted Exchange model is the best choice for smaller organizations.
Tags : 
intermedia, exchange solution, exchange model, in-house exchange solution, hosted exchange solution, security, compliance, email security, microsoft exchange
    
Intermedia

Application Brief: Localize Your Advertising and Web Content

Published By: Quova     Published Date: Oct 27, 2008
Learn what real-time geolocation technology can do for online businesses. Discover how companies like yours are achieving cost-per-click improvements of up to 30 percent, while lowering home page drop-off rates by as much as 70 percent—and how you can do the same. Also, discover how knowing a Web visitor’s location can help you sell more product; increase customer loyalty; comply with state and country regulations; and track campaign effectiveness. Download your copy now.
Tags : 
quova, geolocation technology, quova, geolocation data, geographically targeted advertisement
    
Quova

Email Retention and Archiving:Manage E-Records, Minimize Workplace Risks & Maximize Compliance

Published By: MessageLabs     Published Date: Oct 15, 2008
Failure to strategically manage email can be costly for any businesses. Learn about the risks of poor email management, and how to implement a comprehensive, best practices-based email retention policy.  Enforce your policy by implementing MessageLabs Managed Email Archiving Service to minimize email risks and maximize compliance with organizational, legal, and regulatory rules.  
Tags : 
messagelabs, email retention, archiving, risk, compliance, knowledge management, data management, data protection, records management, pci compliance
    
MessageLabs

Microsoft® Communication and Collaboration: Working Together in the New World of Work

Published By: Microsoft Office     Published Date: Oct 09, 2008
Living in a connected world, many of the economic and intellectual barriers that once separated the world’s businesses no longer exist. Free trade, growing labor markets, increased capital, and business and technology standards contribute to a worldwide information-based economy. People and businesses work together in ways never before possible. As local economies adapt to this new world of work, certain worldwide trends emerge. These trends define how your company conducts business and how you work with information and other people.Learn more by downloading this paper.
Tags : 
microsoft, office, content management, knowledge management, enterprise applications, data management, microsoft exchange, content management system
    
Microsoft Office

InterScan Messaging Hosted Security

Published By: Trend Micro SaaS     Published Date: Oct 08, 2008
Businesses are experiencing a dramatic increase in spam and email-based attacks. These assaults not only hurt employee productivity, they consume valuable IT staff time and infrastructure resources. These threats can also expose organizations to data leaks, compliance issues and legal risks. Trend Micro's SaaS email security solution blocks spam, viruses, phishing, and other email threats before they touch your network, helping you reclaim IT staff time, end-user productivity, bandwidth, mail server storage and cpu capacity. Optional content filtering enforces compliance and helps prevent data leaks.
Tags : 
saas, trend, trend micro, software as a service, email threats, mail server, productivity, bandwidth, trendlabs, email security, security, interscan messaging, service level agreement, sla, virus, spam, phishing, distributed denial of service, ddos, filtering
    
Trend Micro SaaS

Using Likewise to Comply with the PCI Data Security Standard

Published By: Likewise Software     Published Date: Oct 07, 2008
This document describes how Likewise and Microsoft Active Directory can foster compliance with the Payment Card Industry Data Security Standard, a set of requirements for businesses that process payment card information. Developed by Visa, American Express, Discover Financial Services, and other members of the PCI Security Standards Council, the standard sets forth policies, procedures, and practices to protect customer account data. The standard includes specific requirements for strictly controlling access to customer data, authenticating business users, monitoring access, maintaining a secure network, and auditing system resources. Likewise integrates Linux, Unix, and Mac OS X workstations and servers into Active Directory, providing the basis to assign each user a unique ID for authentication, authorization, monitoring, and tracking. Likewise also provides group policies for non-Windows computers so that their security settings and other configurations can be centrally managed in the same way as Windows computers.
Tags : 
likewise, pci data security, linux, unix, mac os x, windows, data protection
    
Likewise Software

When Commanding the Stage Means Passing the Mic

Published By: NeighborhoodAmerica     Published Date: Oct 01, 2008
Virtually all organizations are realizing the importance of customer engagement. But in order to benefit, we must subscribe to the idea that consumers really can add value to our organization. And sometimes, that means removing the notion that we are the experts in exchange for the belief that we can learn a thing or two from our customers. The collective intelligence of the communities we serve is largely an untapped asset - a stream of valuable input that can help improve the decisions we make and shape the products we sell. This book explores the value of many - and the role that customer engagement will play in shaping the future of our businesses, our government, and our economy.
Tags : 
neighborhood america, social network, web 2.0, data integration
    
NeighborhoodAmerica
Start   Previous    87 88 89 90 91 92 93 94 95 96 97 98 99 100 101    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.