system application

Results 626 - 644 of 644Sort Results By: Published Date | Title | Company Name

How AON Simplified & Automated Files Transfers with GlobalSCAPE

Published By: GlobalSCAPE     Published Date: Jan 08, 2008
AON’s Human Capital division needed a better way to automate their data transfer processes. They wanted a simple yet flexible system that didn’t require customization to adapt to growing needs.  They wanted to consolidate their sensitive data transfers and ensure the security of this data and to provide integration with current workflow and key legacy applications. AON deployed the GlobalSCAPE EFT (Enhanced File Transfer) server.
Tags : 
file transfer, file transmission, eft, mft, secure file transfer, data transfer, data transmission, globalscape
    
GlobalSCAPE

Using Windows Server System and Melio FS for Dynamic Resource Allocation and 7-24 Application Uptime

Published By: Sanbolic     Published Date: Dec 03, 2007
It is now possible to build a distributed virtualized data center that can easily be managed using standard Windows tools - made possible by recent advances in cluster file system technology.
Tags : 
sanbolic, windows, data center, datacenter, data centers, virtual data center, data center virtualization, windows storage server
    
Sanbolic

The Impact of Virtualization Software on Operating Enivronments

Published By: VMware/Intel Server Refresh and Cost Savings     Published Date: Oct 23, 2007
Today's use of virtualization technology allows IT professionals to automatically manage the resources of the physical server to efficiently support multiple operating systems, each supporting different applications. This IDC Technology Assessment presents IDC's view of how virtualization technologies are impacting and will continue to impact operating environments and the operating environment market near- and long-term.
Tags : 
vmware, operating environments, virtualization, x86, server virtualization, data center, fc san, fibre
    
VMware/Intel Server Refresh and Cost Savings

UT Health Science Center at Houston Safeguards Personal Health Information with NeoScale

Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
The HSC network services group supports more than 2000 desktops, servers and backend systems such as e-mail, file, networking, application and storage services for general administration, dental and medical schools. HSC wanted to manage and reduce HIPAA compliance costs and processes associated with protecting PHI data within its storage infrastructure – a legacy SAN environment with evolving applications.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management
    
Neoscale Systems, Inc.

Taridium Managed VoIP Offering

Published By: Taridium     Published Date: Aug 23, 2007
The Taridium managed VoIP offering (TMV) is a complete PBX replacement solution for small to medium enterprises. Taridium Managed VoIP combines the reliability of an on-premise open standards VoIP telephony system with the convenience of a simple monthly fee for equipment, services and support.
Tags : 
voip, sip, ip pbx, ip telephony, sip voip, voip pbx, microsoft pbx, microsoft integration
    
Taridium

T4G Case Study: Open Source and Standards SIP/IAX-Based Solution

Published By: Taridium     Published Date: Aug 22, 2007
By 2003, T4G was experiencing significant growth, adding offices, and increasing telecommunication expenses. This case study will show how Taridium's ipbx enterprise VoIP platform offered T4G all the advantages of an open standards solution with the reliability of non-stop hardware, 24x7 monitoring and software support.
Tags : 
voip, sip, ip pbx, ip telephony, sip voip, voip pbx, microsoft pbx, microsoft integration
    
Taridium

Achieve and Maintain Compliance with PCI Data Security Standard - Part 2

Published By: Ecora Software     Published Date: Aug 16, 2007
Deep dive into the first 4 PCI DSS requirements. Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial
    
Ecora Software

Ultimus and the Business Process Ecosystem: Complementing SAP and Enterprise Applications

Published By: Ultimus     Published Date: Aug 16, 2007
With the largest global installed base of pure-play BPM solutions, the Ultimus BPM Suite exemplifies the role of managing OSAP processes in the business process ecosystem. Customers worldwide use it to extend, maximize and complement their investments in SAP or other enterprise applications.
Tags : 
ultimus, bpm, business process management, automation, bpa, productivity, bpm basics, profitability
    
Ultimus

Achieve and Maintain Compliance with PCI Data Security Standard - Part 1

Published By: Ecora Software     Published Date: Aug 15, 2007
Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial
    
Ecora Software

Achieve and Maintain Compliance with PCI Data Security Standard - Part 4

Published By: Ecora Software     Published Date: Aug 15, 2007
Achieve and Maintain Compliance with PCI Data Security Standard – Part 4. Deep dive into PCI DSS requirements 10-12. Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial
    
Ecora Software

Achieve and Maintain Compliance with PCI Data Security Standard - Part 3

Published By: Ecora Software     Published Date: Aug 15, 2007
Deep dive into PCI DSS requirements 5-9. Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial
    
Ecora Software

Advanced Virtualization and Workload Management

Published By: SWsoft     Published Date: Jun 27, 2007
Virtualization and workload management are essential technologies for maximizing scalability, availability and value on high-end computing systems, and Itanium(r) 2-based servers offer many options. One is SWsoft Virtuozzo, a proven, software-based virtualization solution for consolidating Linux and Windows applications. 
Tags : 
virtualize, server virtualization, virtualization, workload management, wlm, application management, application integration, virtuozzo
    
SWsoft

Parking Control Systems

Published By: GAO RFID Inc.     Published Date: Feb 28, 2007
GAO RFID has launched an intelligent parking control management system, integrating RFID technology, automatic control technology and applications software. Learn how the implementation of RFID technology can improve conditions and potentially increase revenues for your parking facility.
Tags : 
rfid, wireless hardware, wireless infrastructure, rfid tags, parking, transportation, gao, gao group
    
GAO RFID Inc.

Dude! You Say I Need an Application Layer Firewall?!

Published By: Secure Computing     Published Date: Feb 27, 2007
This industry white paper takes the mystery out of the key differences in the main classes of firewall architectures. It was independently written by Marcus J. Ranum, a world-renowned expert on security system design and implementation. It includes fundamental lessons about building application layer firewalls, technical examples, and concludes with predictions about the future of firewall technology.
Tags : 
security, firewalls, firewall, internet security, intrusion detection, intrusion prevention, application security, email security
    
Secure Computing

Technical White Paper on Application Virtualization

Published By: DataSynapse     Published Date: Feb 26, 2007
This technical white paper reviews the principal tenets of application virtualization; freeing application configurations from OS and infrastructure; gaining centralized command and control over system resources; and dynamically allocating resources to applications based on demand. 
Tags : 
infrastructure, interoperability, load balancing, utility computing, business continuity, enterprise applications, application integration, data synapse
    
DataSynapse

AutoPlay Media Studio 6.0 Customer Presentation

Published By: Indigo Rose Corporation     Published Date: Feb 14, 2007
An introductory view of AutoPlay Media Studio 6.0 from the ground up. Learn all about AutoPlay Media Studio 6.0 and see everything it can do. Create everything from attractive front-end menu systems for CD/DVD-ROMs to full multimedia applications!
Tags : 
enterprise applications, sales & marketing software, multimedia software, multimedia, indigo rose
    
Indigo Rose Corporation

Making the Case for Software Management

Published By: SoftLanding Systems     Published Date: Dec 04, 2006
This white paper is packed full of practical advice on how to win management's support for improving your software management infrastructure.
Tags : 
software management, development, buyin, buy-in, software management system, sms, applications management, softlanding
    
SoftLanding Systems

Building Scalable, High Performance Cluster and Grid Networks: The Role of Ethernet

Published By: Force10 Networks     Published Date: Dec 04, 2006
With Grid computing, computer systems and other resources aren’t necessarily constrained to be dedicated to individual users or applications, but can be made available for dynamic pooling or sharing to meet the changing needs of the organization.
Tags : 
ethernet, cluster, grid computing, performance cluster, utility computing, force10, force 10, force10 networks
    
Force10 Networks

Security Design Principles

Published By: Nixu     Published Date: Nov 06, 2006
This white paper is an overview of the Nixu Security System and the various security principles it encompasses.  Topics discussed include security design, application security, OS hardening, patch management, and more.
Tags : 
network security, patch management, firewall, intrusion prevention, application security, security management, nixu, security
    
Nixu
Start   Previous    12 13 14 15 16 17 18 19 20 21 22 23 24 25 26     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.