idera

Results 776 - 800 of 802Sort Results By: Published Date | Title | Company Name

Future Proofing Your Mobile Computers

Published By: Intermec     Published Date: May 07, 2009
For companies that are evaluating mobile computers, several key considerations should drive the decision. Among these are whether the solution fits now, whether it will fit in the future and whether it will pay for itself in the short term.
Tags : 
terminal emulation, rfid, real time location systems, rtls, voice-over-ip, voip migration, mobile computers, proofing, mobile, touch screen, intermec, tco, business process automation, business process management, total cost of ownership, voice over ip, optoelectonics & displays
    
Intermec

Realising the full benefits of MFP integration with network fax

Published By: Lane Telecommunications     Published Date: Apr 14, 2009
There is little doubt that Multi Function Peripherals (MFP) offer businesses of all sizes significant benefits: they combine printing, scanning, copying and fax functions in one machine and deliver considerable cost and space savings. They also address some very important business process, management and legal issues faced by virtually every business. Within this discussion document we concentrate on the fax element and look specifically at the integration of MFPs with network fax run through a fax server such as Lane’s Passport Fax Server.
Tags : 
fax over internet protocol, mfp, multi function peripherals, network fax, erp applications, off-the-shelf, compliance, fragmented audit trail, optimum mfp, smtp, secure messaging, latency, lane, kudos, enterprise applications, business management, ip faxing
    
Lane Telecommunications

Critical Scalability Considerations in Evaluating Log Management Solutions

Published By: ArcSight     Published Date: Mar 03, 2009
This document provides an overview of the drivers for Log Management scalability and outlines the key requirements to consider as part of the evaluation process.
Tags : 
log management, security, fraud, insider threat, suspicious network activity, pci dss, hipaa, sox, application security, arcsight, mission critical assets, networking, network security, intrusion detection, intrusion prevention, hipaa compliance
    
ArcSight

Power Supplies Goes Digital

Published By: Ericsson     Published Date: Feb 06, 2009
Using digital control in power supplies is considerably more flexible than analog control in its ability to adapt to changes and digital control inside the power supply results in advantages to the system application such as improved efficiency, fewer external components and reduced overall cost.
Tags : 
ericsson, analog control, digital control power supply, system application, digital power management, digital power, digital techniques, power conversion, electronics, analog communications, digital signal processing, electronic design automation, system on a chip, electronic test and measurement, embedded design, power sources & conditioning devices
    
Ericsson

Guidelines for Effective Email Creative

Published By: SubscriberMail     Published Date: Dec 12, 2008
The growing complexity of today's email market has created a deeper need to carefully consider the creative aspects of your email messages. While the need for quality and effective design has always existed from a pure marketing standpoint, challenges unique to the email space require a different look at creative from the perspective of accomplishing specific goals via email. This white paper introduces several of the numerous critical parameters that should be given consideration when preparing email creative, and provides real-world tactics to optimize email creative for maximum results. Normal 0 false false false EN-US X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin;}
Tags : 
subscribermail, email creative, email copy, email marketing
    
SubscriberMail

How to Select Partners to Communicate Your News

Published By: Godfrey     Published Date: Oct 24, 2008
With the constantly-changing media landscape and the growing demand for media communication via 2.0 channels, you need to reconsider both your news and the vendor partners on whom you rely to distribute it. It could mean the difference between a purposeful, engaging and long interactive life for even the "smallest" news item, and a costly yet low-impact news distribution program that saps valuable resources. This white paper tells you some key considerations to help guide your selection process.
Tags : 
godfrey, white paper, b to b, business to business, 2.0, vendor, analytics, brand management, integrated marketing, wire distribution
    
Godfrey

Evolving Your Patch Management Technology to Proactively Combat Security Challenges

Published By: Lumension     Published Date: Oct 17, 2008
The realities of security and compliance have changed considerably since patch management faced its first big paradigm shift some years ago. At that time many organizations wrestled with the transition from manual patching and remediation to an automated process. Of course, nothing in security is ever static, so it is no surprise that patch management has continued to evolve since then. Though still automated, today’s best patch management tools and techniques are significantly different from their predecessors. In this whitepaper, Lumension Security’s Matt Mosher, Senior Vice President of the Americas, gives an historical perspective on how this evolution unfolded and why it is important for organizations to evolve their patch management technology in order to remain on top of increasing security attacks.
Tags : 
lumension, unix, linux, web 2.0, windows, cve
    
Lumension

JBoss Enterprise Application Platform Migration Guidelines

Published By: JBoss     Published Date: Sep 23, 2008
This document is intended to provide insight into the considerations and processes required to move an enterprise application from a JavaEE-based application server, such as BEA WebLogic, Oracle Application Server, or IBM WebSphere, to the JBoss Enterprise Application Platform.
Tags : 
jboss, middleware, redhat, linux, red hat, server, server migration, migration, network management
    
JBoss

How RouteOne Is Linking Thousands of Dealers Nationwide to Multiple Finance Sources

Published By: IBM     Published Date: Aug 21, 2008
In highly competitive markets, technologies that save time and money earn top consideration. Until now, XML Web Services, often touted for their ability to create business value, has been left off the short list for implementation. In this case study you’ll see how RouteOne LLC redefined the credit application process for automobile dealers and their customers using XML Web Services technologies.
Tags : 
xml, web services, ibm, ibm mi, ibm grm, software development
    
IBM

Comparing Deduplication Approaches: Technology Considerations for Enterprise Environments

Published By: SEPATON     Published Date: Jun 23, 2008
Deduplication is becoming an essential tool to help data center managers control exponential data growth in the backup environment. The methods used to accomplish deduplication vary widely as do the levels of capacity optimization they can provide. Some techniques are well suited to small-to-medium sized backup environments, while others are optimized for larger enterprises. This report describes the various techniques used today to deduplicate data and highlights unique deduplication considerations for enterprise environments.
Tags : 
deduplication, sepaton, storage, vtl, virtual tape library, storage virtualization, small business networks, storage management, data deduplication
    
SEPATON

Forklift Free Plants - Considerations For Success

Published By: Kinetic Technologies     Published Date: Jun 23, 2008
Increasingly, companies are mandating the move to forklift free production floors on the basis of highly visible macro issues like safety improvements, reduced forklift lease and maintenance costs. However, there are many other less visible advantages with direct and secondary benefits that may play an important role in reducing costs and improving customer response.
Tags : 
production, productivity, scm, supply chain, kinetic technologies, k-tec
    
Kinetic Technologies

The CIO's Guide to Wireless in the Enterprise

Published By: BlackBerry     Published Date: May 22, 2008
Over the past decade, wireless technology has made huge strides in security, reliability and throughput. Companies that are moving forward with business mobility initiatives must plan for wireless security and mobile device management from the start. Learn about many of the notable trends and key issues associated with Business Mobility and where to find additional resources for consideration.
Tags : 
blackberry, mobile applications, cio, pim, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing, mobile computing, mobile data systems, pda, smart phones, wireless application software, wireless communications
    
BlackBerry

Considerations for Enterprise-Scale VTLs

Published By: Diligent Technologies     Published Date: Apr 11, 2008
Virtual tape library (VTL) solutions are taking hold in companies of all sizes, but not all VTLs are equipped to meet the requirements of enterprise data centers. Evaluating virtual tape technology based on a few key considerations will help narrow the field and minimize buyer’s remorse.
Tags : 
diligent, diligent technologies, vtl, virtual tape, virtual tape library, vtls, storage virtualization, virtual storage, storage, backup and recovery, storage management
    
Diligent Technologies

Business Flexibility: Removing Dependencies Between Business Process and Technical Infrastructure

Published By: IBM     Published Date: Mar 28, 2008
Many of today’s businesses have already moved from rigid siloed application approaches to more flexible business process focused solutions. This is driving the need for transparency in the underlying technologies, and for better levels of standardization and virtualization of the infrastructure, along with consideration of the value chain that includes a company’s suppliers and customers.
Tags : 
infrastructure, business process management, service oriented architecture
    
IBM

Video of the 12 SEO Campaign Killers

Published By: ICG Commerce     Published Date: Feb 08, 2008
Watch what not to do when launching a search engine optimization (SEO) campaign to attract more visitors, leads and sales. This video covers keyword performance, ROI considerations, holistic approaches and ranking analysis.
Tags : 
seo, search engines, search engine optimization, sem, search engine marketing, fathom, fathom seo, keywords, meta, keyword
    
ICG Commerce

White Paper: 12 SEO Campaign Killers

Published By: Fathom SEO     Published Date: Jan 28, 2008
Learn what not to do when launching a search engine optimization (SEO) campaign to attract more visitors, leads and sales. This guide covers keyword performance, ROI considerations, holistic approaches and ranking analysis.
Tags : 
seo, search engine, sem, search marketing, search engine marketing, meta, meta tags, natural search, keywords, traffic generation, site traffic, web traffic, fathom, fathom seo, marketing automation, return on investment, web development, search engines
    
Fathom SEO

Securing Mobile Connectivity with Two-Factor Authentication

Published By: Secure Computing     Published Date: Jan 25, 2008
Enterprises are increasingly opening up their networks to a greater constituency of remote users, but they often do not take into consideration the protection of user identity as a critical component of their strategy. The mobile workforce can now work productively from a remote location such as a home office, the airport, a hotel, or a customer site.
Tags : 
cell phone, cell phones, wireless security, mobile security, mobile workers, authentication, 2-factor authentication, iam, identity management, access control, securecomputing, secure computing, remote access, wireless phones, productivity
    
Secure Computing

Data Recovery for IBM AIX Environments

Published By: Vision Solutions     Published Date: Dec 31, 2007
For AIX IT departments looking to take the next step in data protection strategies, CDP is an essential consideration. Analysts agree that businesses will be incorporating this strategy in the next few years as part of an integrated solution. CDP enables you to reverse data corruption in a fraction of the time and labor required for recovery from tape.
Tags : 
aix, data protection, continuous data protection, cdp, high availability, disaster recovery, disk backup, tape backup, recovery, backup, mimix, vision, vision solutions, platforms, backup and recovery, business continuity, as/400, unix
    
Vision Solutions

You're Virtually There: Remote Support Best Practices and Benefits

Published By: WebEx Communications     Published Date: Dec 14, 2007
As support centers have deployed this new generation of remote support solutions, they have developed a series of best practices for maximizing their benefits. Based on market research performed from 2004 to 2007, this white paper summarizes these best practices, illustrates the benefits, and suggests considerations for selecting the remote access solution that will be most effective for your support organization.
Tags : 
remote access, remote support, customer service, help desk, productivity, customer satisfaction, webex, best practices
    
WebEx Communications

Compliance Becomes a Top Concern

Published By: Computhink     Published Date: Dec 10, 2007
In the arena of corporate governance and compliance, the Sarbanes-Oxley Act (SOX) has commanded considerable attention; in the healthcare industry, it's  HIPAA; similar regulations target the financial services and energy sectors. Organizations can use technology to meet compliance demands in a cost-effective way.
Tags : 
compliance, computhink, hipaa, sox, sarbox, sarbanes oxley, content management, hipaa compliance, document management, secure content management, sarbanes oxley compliance
    
Computhink

Employee Monitoring: An Essential Component of your Risk Management Strategy

Published By: Deep Software     Published Date: Nov 14, 2007
With so much of today's commerce being conducted electronically, providing staff with internet access has become a business necessity. The improper use of e-mail and instant messengers can lead to extremely expensive lawsuits, and the proliferation of mobile devices has made it considerably easier for errant employees to steal sensitive information. This white paper will detail the risks to which organizations that do not monitor their employees are exposed and explain the right way for organizations to go about monitoring.
Tags : 
security, security management, access control, identity management, data protection, email security, iam, authentication, instant messaging, tracking, workforce, workforce management, employee management, deep software, network security, risk management, messaging, employee performance, productivity
    
Deep Software

Access Control, Energy and the Environment

Published By: Borer Data Systems Ltd.     Published Date: Nov 07, 2007
Purchase price alone is not an accurate measure as to the true costs of a system. When evaluating the products offered by different vendors, the purchaser should take into consideration: purchase cost of equipment and software; cost of installing the infrastructure including data cable and mains power outlet and power cables; cost of installation; cost of maintenance; and more.
Tags : 
energy, power, energy conservation, cost, cost of operation, tco, total cost of ownership, power management, networking, network management, green, green business, environment, environmental, borer, access control, carbon footprint, borer, borer data systems, green office
    
Borer Data Systems Ltd.

Mobile Device Security: Securing the Handheld, Securing the Enterprise

Published By: Motorola     Published Date: Aug 09, 2007
Mobile devices represent a tremendous productivity advantage for today’s mobile worker. However, IT organizations must give consideration to the deployment of device security policies in order to provide the level of security that enterprises require.
Tags : 
mobile workers, mobile security, wireless security, mobile computing, mobility, enterprise security, network security, lost, stolen, disgruntled, data erase, authentication, compliance, wireless, encryption, motorola, good technology, data protection
    
Motorola

Case Study: AFS Increased Sales By 89% Using Engine Ready AdPilot

Published By: Engine Ready     Published Date: Jun 05, 2007
In its quest to continue increasing market share, American Financial Services (AFS) began to realize the importance of a solid analytics package to help develop and track a list of targeted keywords in several pay-per-click search engines. Additionally the highly competitive nature of their most popular keywords was creating a considerable marketing challenge.
Tags : 
pay per click, search engine marketing, web analytics, online marketing, web marketing, internet marketing, ppc, sem, engineready, engine ready
    
Engine Ready
Start   Previous    19 20 21 22 23 24 25 26 27 28 29 30 31 32 33    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.