cement

Results 451 - 475 of 524Sort Results By: Published Date | Title | Company Name

Understanding the HP Data Deduplication Strategy

Published By: HP     Published Date: Jul 08, 2009
Data deduplication technology represents one of the most significant storage enhancements in recent years, promising to reshape future data protection and disaster recovery solutions. Data deduplication offers the ability to store more on a given amount of storage and replicate data using lower bandwidth links at a significantly reduced cost. This white paper explains how deduplication technologies work in practice, the pros and cons of each approach, and when to choose a particular type.
Tags : 
data, data deduplication, data dedupe, disaster recovery, data protection, storage, bandwidth, virtual library system, vls, d2d, disk to disk, san, vtl, virtual tape libraries, pacs, retention, data rate, recovery point objectives, rpos, service level agreements
    
HP

Expanding Risk Evaluation Strategies for Better Information Protection

Published By: IBM     Published Date: Sep 09, 2008
Today, companies have more at risk than ever before. To stay in business, they must evolve their traditional business continuity programs to include continuous enhancements. They must also provide continuous service and support to their customers, suppliers, stockholders and stakeholders. The best approach requires a detailed analysis of both business and technical requirements, an understanding of available options, and a deep inspection of the many variables that will support their ultimate strategy.
Tags : 
business continuity, ibm, information, protection, risk, ibm mi, risk management
    
IBM

Free Trial: IBM Sametime 8.0

Published By: IBM     Published Date: Mar 04, 2009
Download IBM® Lotus® Sametime® Standard V8.0, a platform for unified communications and collaboration that combines security features with an extensible, open solution including integrated Voice over IP, geographic location awareness, mobile clients, and a robust Business Partner community offering telephony and video integration. Lotus Sametime Standard V8.0 expands on the existing instant messaging, Web conferencing, VoIP, point-to-point video, mobile clients, external IM gateway, and extensible client with additional platform support and enhancements to the end user experience, administration, and performance.
Tags : 
ibm, lotus, sametime, communications and collaboration, instant messaging, web conferencing, voip, point-to-point video, mobile clients, external im gateway, extensible client, wireless, enterprise applications, mobile computing, mobile workers, wireless infrastructure, video conferencing, voice recognition, voice over ip
    
IBM

EvolveWare’s S2T Technology - Automated Software Analysis, Documentation & Transformation

Published By: Evolveware     Published Date: Nov 06, 2006
Software analysis, documentation, migration, upgrades or replacements are daunting and risky endeavors because they are primarily manual and time-consuming. EvolveWare’s S2T Technology provides a solution to these problems with tools that automate the process up to 90%, thus reducing the time and cost of such initiatives by as much as 40-60%.
Tags : 
software analysis, software documentation, software migration, migration, software upgrades, patch management, s2t, software management, cost control, productivity, evolveware, it management, enterprise applications, auditing, compliance, application integration, business analytics, document management, records management, software compliance
    
Evolveware

Product Management: It is a Contact Sport

Published By: ZIGZAG Marketing, Inc.     Published Date: Feb 13, 2007
There's a good reason athletes in contact sports wear protective pads. History of the game has proven where injuries are most likely to occur, hence the placement of the pads.
Tags : 
product management, product development, product lifecycle management, zigzag
    
ZIGZAG Marketing, Inc.

3 Reasons to Archive Email

Published By: C2C Systems, Inc.     Published Date: Mar 15, 2007
Compliance, capacity management and e-policy enforcement. Which factors are driving email archiving at your organization? And how do you pick a solution that solves your specific problems without breaking the bank? There are many internal and external forces driving the need to archive.
Tags : 
email archiving, email security, storage, security policies, policy based management, compliance, exchange server, c2c, microsoft exchange
    
C2C Systems, Inc.

Conjoining Social, Mobile, ECM, and Process Automation

Published By: Interactive Intelligence     Published Date: May 07, 2012
IT strategies in insurance have traditionally been driven by business objectives and business strategy. But with technology advancements for mobile solutions, social media, analytics, content management (ECM), and process automation, insurers can now take a conjoinment view to evaluate opportunities and drive differentiation. Read more in this paper from Mark Breading of Strategy Meets Action.
Tags : 
interactive, technology, ecm, process automation, social and mobile technology, application integration, business analytics, content management system, business technology
    
Interactive Intelligence

Best Practices: LAN Security and 802.1X

Published By: Nevis Networks     Published Date: Sep 04, 2007
While 802.1X has a growing presence, it's still immature and may not provide all the policy enforcement features commonly required in most organizations. This white paper focuses on the 802.1X standard for authentication and access control and how it compares to the Nevis approach for LAN security.
Tags : 
security policies, policy management, authentication, access control, lan, lan security, 802.1x, nevis, nevis networks, precision prospects, local area networking, network security, 802.11, wireless security
    
Nevis Networks

LAN Security: Identity-Based Solution Guide

Published By: Nevis Networks     Published Date: Sep 04, 2007
The ability to monitor, track and report usage based on actual user identity and applications provides for quicker reaction time, easier reporting for compliance, as well as more visibility into the network. Learn about a complete line of solutions for effective identity-based policy enforcement.
Tags : 
lan, lan security, network security, security policies, security policy, policy management, best practices, nevis, nevis networks, dos, infrastructure, dmz, access control, precision prospects, local area networking, identity management, policy based management, security management
    
Nevis Networks

The Brand Lift of Search

Published By: Mediative     Published Date: Jan 14, 2008
More and more, companies are realizing the importance of creating a strong online presence both in the free organic search results and the paid advertisements that appear alongside those results. The tracking features of website logs and the measurability of pay-per-click ads enable marketers to monitor the traffic of their organic listings and the performance of their online advertising campaigns. However, it's comparatively more difficult to determine how the placement of those search listings and online ads affect consumer brand perceptions.
Tags : 
search marketing, organic search, buying behavior, buying behaviors, ctr, search, branding, google, eyetracking, heatmapping, heatmap, enquiro, enquiro research
    
Mediative

What Would Bond Do? A Spyware Survival Guide

Published By: CopiaTECH     Published Date: Mar 18, 2008
With the advancement of IT, technology has brought great improvements and new challenges. One such challenge is spyware: software designed to either capture your data or use your system for its own purposes. This paper discusses in detail various kinds of spyware and measures of protection against it.
Tags : 
copiatech, anti spam, anti spyware
    
CopiaTECH

Technology Lead Generation The Way You Want It

Published By: Find White Papers     Published Date: May 07, 2008
Learn how leading vendors in the technology space are reaching IT professionals through dedicated email blasts, contextual email placements, co-branded directories, and contextual placements. Reach millions of IT buyers on a cost per lead basis, paying for only the leads that download your research and that fall within your specified target audience.
Tags : 
fwp, find white papers, directories, white papers, whitepapers, libraries, research, research library, emarketing papers, investbrite, directories inc.
    
Find White Papers

Cisco Networking Academy

Published By: YouSendIt     Published Date: Jul 18, 2011
This whitepaper illustrates how, by using YouSendit and replacing FTP, Cisco has dramatically cut video administration costs by 90%. The Flip video file delivery process for Cisco Networking Academy's global operations is now much simpler, less costly and more efficient.
Tags : 
cisco networking academy, online file sharing, ftp replacement, send large files, secure file transfer, managed file transfer, file transfer, online file storage, large email attachment, upload, upload files, send it on, yousendit, file sharing, yousendit file sharing, ip networks, network architecture, content delivery, document management, information management
    
YouSendIt

Wacom Case Study

Published By: YouSendIt     Published Date: Jul 18, 2011
This case study illustrates how replacing FTP servers, CD's and courier services with YouSendit has resulted in a more secure, easier and efficient creative workflow process both internally and with their external vendors and parnters.
Tags : 
wacom, online file sharing, ftp replacement, send large files, secure file transfer, managed file transfer, file transfer, online file storage, large email attachment, upload, upload files, send it on, yousendit, file sharing, yousendit file sharing, ip storage, storage area networks, storage management, collaboration, content delivery
    
YouSendIt

Why You Need a Better Way to Manage Email Attachments

Published By: YouSendIt     Published Date: Jul 18, 2011
This whitepaper highlights how organizations can solve their attachment management problems while imposing little or no change on the way that users work and increasing IT's visibility into the process for compliance purposes -- inexpensively and at reduced corporate risk.
Tags : 
email attachments, online file sharing, ftp replacement, send large files, secure file transfer, managed file transfer, file transfer, online file storage, large email attachment, upload, upload files, send it on, yousendit, file sharing, yousendit file sharing, ip storage, storage area networks, storage management, content delivery, content management system
    
YouSendIt

Case Study: AMAG Pharmaceuticals

Published By: YouSendIt     Published Date: Jul 18, 2011
This case study illustrates how AMAG drastically cut completion time of critical projects by eliminating e-mail transfer of large files, ultimately improving security, increasing cost-savings and accelerating time to market.
Tags : 
amag, pharmaceuticals, intravenous drugs, anemia, online file sharing, ftp replacement, send large files, secure file transfer, managed file transfer, file transfer, online file storage, large email attachment, upload, upload files, send it on, yousendit, file sharing, yousendit file sharing, ip storage, storage area networks
    
YouSendIt

Embracing and Empowering the Consumerization of IT

Published By: YouSendIt     Published Date: Aug 10, 2011
This white paper provides a brief overview of the trend toward consumerized IT and Osterman Research's recommendations for addressing it. It also provides an overview of the offerings from YouSendIt, the sponsor of this white paper.
Tags : 
yousendit, ftp replacement, secure file transfering, online fire sharing, uploading files, consumerization of it, ip storage, network attached storage, storage management, information management, data warehousing, email archiving
    
YouSendIt

Proliferation of Options Requires B-to-B Media Channel Planning

Published By: Godfrey     Published Date: Oct 24, 2008
Media Channel Planning is the process of selecting the proper media channels to achieve the desired marketing outcomes. Godfrey believes Media Channel Planning is a critical part of any marketer’s strategic program, and should be an important part of annual planning as well as continuous improvement efforts throughout the program year.
Tags : 
godfrey, media channel planning, media fragmentation, media lobotomy, b2b marketing media, b-to-b, b2b, business-to-business, media, media channel planning, media planning, media placement, b-to-b strategy, integration, advertising, search, podcasts, media
    
Godfrey

Filter Press Basics and Issues vs. Alternative Batch or Continuous Replacement Tech

Published By: Genesys     Published Date: Mar 01, 2008
Filtration experts have discussed filter presses and their perceived shortcomings. This article discusses filter presses as well as the batch or continuous filtration alternatives to replace them.
Tags : 
enterprise applications, call center management, call center software, customer interaction service, contact management, customer experience management, sla
    
Genesys

Automated Document Marking & Printing for Paper-Based and PDF Workflows

Published By: Enhancement Software     Published Date: Jan 30, 2009
This white paper is intended to explore the process of secure and efficient paper‐based document marking and printing using Microsoft® Word. At the same time it will explore the savings that can be realized by implementing an automated practice that reduces risk of unintended use.
Tags : 
enhancement software, stampit, automated document marking, document integrity, corporate accountability, compliance, risk management, roi
    
Enhancement Software

Methodology Cuts 25% to 50% from the Procured Cost of Goods and Services

Published By: e-LYNXX     Published Date: Jul 22, 2010
New patents provide foundation advancement in the procurement of goods and services.
Tags : 
print procurement, cost savings, e-lynxx, patent, infringement, eprocurement, total cost of ownership
    
e-LYNXX

Business "Black Belt" Mastering the Basics

Published By: Washco Consulting     Published Date: Aug 19, 2010
This article describes the five basic principles through which you can begin your journey to becoming a "black belt" in business.
Tags : 
achieving success, career advancement tips, business success, success in business, skills for success
    
Washco Consulting

The Definitive Guide to Logon Script Replacement

Published By: ScriptLogic     Published Date: Aug 23, 2011
Free Whitepaper | The Definitive Guide to Logon Script Replacement
Tags : 
scriptlogic, desktop management, desktop configuration, dial, vpn, gpo, group policy objects, granular targeting criteria, ip networks, local area networking, service management
    
ScriptLogic

Standard School District Replaces Tape with Flexible and Affordable Disk Backup

Published By: Revinetix, Inc.     Published Date: Nov 11, 2010
Standard School District in Bakersfield, CA had outgrown their backup system and needed to find a replacement. This case study describes their challenges and how they solved their backup problem with a complete disk backup solution.
Tags : 
revinetix, school district, data protection, disk backup, network backup, tape backup, backup solution, exchange backup, sql backup, windows backup, school districts, affordable backup, flexible backup
    
Revinetix, Inc.

Reaching the Affluent on Social Media: 7 Strategies Using HR Executives to Build a Brand

Published By: Meet My Brand Tryvertising Agency     Published Date: Nov 13, 2010
Strategies Using Human Resource Executives for Brand Identity
Tags : 
branding, brand identity, marketing, social media, social marketing, product placement, advertising
    
Meet My Brand Tryvertising Agency
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.