businesses

Results 2401 - 2425 of 2511Sort Results By: Published Date | Title | Company Name

Effectively Securing Small Businesses from Online Threats

Published By: MessageLabs     Published Date: Sep 25, 2008
The Internet has proven to be a vital communications medium for worldwide commerce, but as an open and unprotected global network it can also present a wide range of threats that can cripple any business organization. Several years ago, most Internet threats were relatively benign examples of a young adolescent’s technical expertise but over time they have evolved into increasingly sophisticated domestic and foreign attacks that are designed to capture financial, personal, or strategic business information. Threats now come in the form of deliberately malicious acts, and exploitative opportunities for hackers and/or organized crime. The impact is serious, and the landscape of victims is getting broader every day. In response, no organization can afford to have its networks remain unprotected.
Tags : 
messagelabs, online threats, security, small & medium businesses, email spam, viruses, trojan horses, worms
    
MessageLabs

IBM BladeCenter S Provides Big Benefits for Smaller Offices

Published By: IBM     Published Date: Sep 23, 2008
See why IBM BladeCenter S chassis is the right choice for independent businesses that need a powerful, yet simple IT. The white papers inside this informative eKit will show you how this system is easy to deploy, easy to use, and easy to manage; and how its modular technology helps avoid a cable mess in your office space.
Tags : 
ibm, ibm mmdg, bladecenter, small office, soho, ekit, networking, infrastructure
    
IBM

The Small Business Guide to Big Business Email

Published By: 123Together     Published Date: Sep 19, 2008
Today's economy is especially hard on small businesses. How does your small business keep revenue coming in when your customers are spending less? How do you attract new customers in a cost efficient manner? How do you protect your businesses' valuable information assets without making a huge technology investment?
Tags : 
123together, it strategies, contact management, email, economy, stability, collaboration, green it
    
123Together

Assessing The IT Energy Efficiency of Your Business: A Step-by-Step Guide

Published By: IBM     Published Date: Sep 18, 2008
Powering your IT hardware often costs more than double the price of the actual machine. While this fact alone motivates businesses to build more energy efficient data centers, IBM's Project Big Green details the additional operational and social benefits for businesses. Read more on IBM's holistic approach to reducing your IT energy use to save you money.
Tags : 
ibm, network management, networking, green, green computing, green datacenter, green data center, data center
    
IBM

Reducing IT Energy Costs: The Mid-Size & Small Business Approach

Published By: IBM     Published Date: Sep 18, 2008
As total costs of small and mid-sized businesses increase, growing companies look ever closely at how their IT needs affect energy costs. The IBM case studies and survey results herein discuss opportunities to reduce IT energy costs, save money and devise IT investment strategies. Read them and learn how you can expand your business while helping the environment.
Tags : 
ibm, ibm mmdg, green, green computing, green data center, data center, datacenter, small business
    
IBM

Remote IT Management

Published By: Quocirca     Published Date: Sep 18, 2008
Businesses of all sizes have to manage an increasing diversity of remote users and devices. The task ranges from simply keeping systems running to ensuring security, compliance and the achievement of environmental goals. Under this sort of pressure, IT managers and managed service providers, to which the task is often outsourced, must have flexible access to powerful tools and an ability to share the data those tools rely on.
Tags : 
quocirca, remote, it management, remote network management
    
Quocirca

Keep Talking, Not Spending: 10 Tips for Effective and Efficient Use of Telecoms

Published By: Quocirca     Published Date: Sep 18, 2008
Even when facing challenging economic times, businesses still need to communicate and rely on technology to connect with customers, partners, suppliers and their own employees. Cutting back on communications spending will have a negative effect in a long downturn.  It will leave any business that does so with fewer options when conditions improve and at a disadvantage compared to competitors that continue to invest.  However, there are 10 steps that can be taken to grow the value and use of communications, while controlling costs.
Tags : 
telecom, telecoms, quocirca, networking, ip telephony
    
Quocirca

Expanding Roles of Data Management Professionals: A Survey From Industry Peers

Published By: CA Mainframe     Published Date: Sep 12, 2008
Data Professionals are now being asked to perform higher-level tasks and interact with businesses as “data stewards”.  In this survey, you will learn the challenges as outlined by over 850 data professionals. Get this CA-sponsored survey of the International DB2 Users Group (IDUG) conducted by Unisphere Research. The closer link between corporate performance and database performance is increasing pressure on data professionals to provide higher-level services to enterprise business customers.
Tags : 
database administrator, dba, database, data management, ca mainframe, mainframe, database security
    
CA Mainframe

Benefits of an Integrated E-Commerce Solution

Published By: LaGarde     Published Date: Sep 10, 2008
Businesses today are increasingly looking to the Web to streamline processes and maximize resources. Thus, an eCommerce solution that enables you to leverage existing processes and systems is the key to harnessing the power of the Web.
Tags : 
lagarde, ecommerce, e-commerce, ebusiness, enterprise software, web development, web services
    
LaGarde

CEO Roundtable: Improving Performance Through a Shared Business Model

Published By: Senn Delaney     Published Date: Sep 05, 2008
It's become a business imperative to maximize operational effectiveness, trim costs, standardize and streamline processes, achieve economies of scale and increase competitive advantage. Today's most successful leaders do this in a way that balances the greater good of the enterprise with the competing demands of their autonomous businesses that must respond to the individual needs of their markets. A more collaborative model that helps leaders of complex businesses to maximize effectiveness is gaining traction. Four prominent business leaders discuss their challenges and successes in shifting to this shared business model.
Tags : 
senn delaney, customer focused, brand management, customer-centric, employee management, employee engagement, application integration, application performance management
    
Senn Delaney

The Business Case for Email Archiving

Published By: GFI     Published Date: Sep 04, 2008
For businesses around the world, email has become the primary means of communication with people inside and outside of the organization. Business transactions kick off in the form of an email, most customers use e-mail to negotiate contracts and agreements and exchange invoices and payment information. Email is also heavily used by marketing departments to issue mailshots to customers announcing new offers and special deals and so on.
Tags : 
email archiving, archive, archiving, email management, email, sarbox, sarbanes oxley, sarbanes-oxley
    
GFI

Automating Data Flows to your Business Intelligence System

Published By: Tidal Software     Published Date: Sep 03, 2008
Businesses can gain greater value from their BI investment by improving the way in which data flows to the BI system are managed. Many problems result when the ETL process is handled by a patchwork of scripting, custom coding, and various built-in schedulers that are part of existing ETL solutions, because these systems do not provide end-to-end execution, monitoring, and control of the ETL process.
Tags : 
business intelligence, data warehousing, data management, data integration, etl, extract–transform-load, bi operations, bi management
    
Tidal Software

Virtualization in Action: Stories of Real Businesses That Have Deployed Virtualization

Published By: HP     Published Date: Aug 22, 2008
In this session, HP and ESG Storage Virtualization experts will share real HP customer case studies who have deployed virtualization in their environments and realized significant business benefits as a result.
Tags : 
hp eva 4400, eva4400, eva 4400, storage virtualization, virtualization, virtual, hp virtualization, virtual storage
    
HP

Establish ITIL Infrastructure Library (ITIL) Processes to Align Your IT With Business Objectives

Published By: IBM     Published Date: Aug 21, 2008
Today, an IT-driven, customer-centric business approach isn’t a luxury — it’s imperative. More and more businesses are moving out of a cost-centric view of their IT potential and into a realization that IT can transform business processes. This white paper shows how you can maximize your IT function by leveraging ITIL best practice processes. These guidelines can help you effectively manage IT changes, assets, personnel and service levels all while reducing costs—going beyond simple IT asset management to deliver proactive IT business improvements.
Tags : 
itil, best practices, service management, asset management, ibm, ibm mi, ibm grm
    
IBM

Understanding Web Application Security Challenges

Published By: IBM     Published Date: Aug 21, 2008
As businesses grow increasingly dependent upon Web applications, these complex entities are becoming more difficult to secure. Most companies equip their Web sites with firewalls, Secure Sockets Layer (SSL), and network and host security, but the majority of attacks are on applications themselves.
Tags : 
application security, web security, ibm, ibm mi, ibm grm, security, internet security, intrusion prevention
    
IBM

The Workplace Recovery: The Human Side of Business Continuity

Published By: IBM     Published Date: Aug 21, 2008
Natural and manmade disasters have costly, far-reaching impacts on businesses. And organizations of all types are making business continuity plans that protect their data, networks, core business applications and facilities. But it’s important to build resiliency into your business operations as well your human capital. This Web seminar on Workplace Recovery will take you through the risks related to human capital resiliency and provide a framework for addressing them.
Tags : 
ibm, ibm mi, ibm grm, disaster recovery, recovery, business continuity, security, storage
    
IBM

Entrepreneurs & Managed IT: Putting Big Company Strategies to Work for Small & Mid-Sized Businesses

Published By: Managed Systems, Inc.     Published Date: Aug 14, 2008
No matter the size of the business, technology plays a critical role in its financial success. At the most basic level, companies have to deal with desktop and laptop computers for all their employees, e-mail, access to the Internet, Blackberries, and other kinds of on-site and remote devices. Add networking issues like viruses, spam and bandwidth utilization, and suddenly, this effort becomes a major challenge to anyone operating a small or mid-sized business (SMBs) with limited resources and a limited budget.
Tags : 
network management, smb, small business, medium business, mid-sized business, smb networks, managed systems, it services
    
Managed Systems, Inc.

The New Europe: Creating a Viable Plan for Trading Across a Dynamic Geography

Published By: Quocirca     Published Date: Aug 05, 2008
As the EU continues to expand, European businesses must look to how they can trade across increasing numbers of regional boundaries, languages, cultures and laws, both within the EU and across the greater Europe. The opportunities are huge – but the problems will daunt many who wish to enter into a pan-European trading environment.
Tags : 
quocirca
    
Quocirca

A Guide to Application Delivery Optimization and Server Load Balancing for the SMB Market

Published By: KEMP Technologies     Published Date: Aug 04, 2008
Today’s small-to-medium sized businesses (SMB) are undergoing the same IT evolution as their enterprise counterparts, only on a smaller scale. For SMBs, website reliability, flexible scalability, performance and ease of management are as essential to SMB website infrastructure as they are to an enterprise. It’s fare to say that these capabilities are an important operational imperative for businesses of all sizes.
Tags : 
load balancer, load balancing, application delivery, ssl acceleration, application optimization, windows terminal services, terminal services, content switching
    
KEMP Technologies

LoadMaster Application Delivery Controller Security Overview

Published By: KEMP Technologies     Published Date: Aug 04, 2008
Small-to-medium sized businesses (SMB) are increasingly relying upon web-based applications and web-enabled services for running their business. Applications such as CRM, e-commerce transactions and other web-enabled applications are accessed both locally and remotely from outside the business facilities. These web-based applications are vulnerable to attacks from viruses, intrusions, and denial of service (DoS) attacks, as traffic comes into the network through various ports and firewalls without being inspected.
Tags : 
load balancer, load balancing, application delivery, ssl acceleration, application optimization, windows terminal services, terminal services, content switching
    
KEMP Technologies

REDPLAID Delivers Reliable Infrastructure for Hosting SMB’s Web Applications

Published By: KEMP Technologies     Published Date: Aug 04, 2008
Websites have become critical components of most businesses’ core operations. They support the brand and ordering process, serve as data information resources and assist in overall customer care. Having poor website performance or poor reliability can destroy or severely damage a business and its reputation. The increasing importance of these websites leads to critical requirements of security, reliability and scalability. Delivering these, however, can leave an SMB stretched beyond its resources.
Tags : 
load balancer, load balancing, application delivery, ssl acceleration, application optimization, windows terminal services, terminal services, content switching
    
KEMP Technologies

Configuration Assessment: Choosing the Right Solution

Published By: Tripwire     Published Date: Jul 08, 2008
Configuration assessment lets businesses proactively secure their IT infrastructure and achieve compliance with important industry standards and regulations. Learn why configuration assessment is so important, why organizations find it difficult to control system configurations, and what types of configuration assessment solutions are available.
Tags : 
tripwire, configuration, compliance, infrastructure, network management, configuration management
    
Tripwire

Loud and Clear: SMBs Get the Message About Unified Mobile Communications

Published By: Quocirca     Published Date: Jul 03, 2008
Businesses of all sizes adopt technology to make them more productive, cost effective or flexible and help them compete. Over the years the adoption of tools such as mobile phones, wireless laptops, the internet and email have all been driven by such expectations. Small and mid-sized businesses (SMBs) are often at the forefront as these technologies can give them a lead on their larger competitors. What starts as a useful extra tool or 'competitive edge' soon becomes the accepted norm and a search for improved quality and utility then ensues.
Tags : 
convergence, mobile, wireless, communications, unified communications, quocirca, small business networks, wireless communications
    
Quocirca

Javelin Research Pinpoints How Institutions Should Respond to Data Breaches

Published By: Javelin Strategy & Research     Published Date: Jul 02, 2008
Javelin Strategy & Research has released a study covering data breach victims, which highlights the acute awareness among consumers about data security and the significant implications security breaches represent to businesses once consumer trust is compromised. Read this report, which also reveals Javelin's recommendations to institutions to address consumer security concerns and expectations in the event of a data breach.
Tags : 
javelin, debix, customer service, customer experience, damage control, data breach, security breach, network security
    
Javelin Strategy & Research

Quantum Cryptography: The Future of Secure Communications

Published By: AT&T     Published Date: Jun 25, 2008
Quantum Cryptography is an emerging technology that may offer new forms of security protection. Relying on the laws of quantum mechanics, transmission is carried by a single particle that can only be measured one time, making encryption and decryption difficult to compromise. Businesses are evaluating architectural solutions using Quantum Cryptography to understand its potential benefits. Future implementations of the technology may soon make it more available for enterprise business.
Tags : 
att, at&t, encryption, decryption, quantum, quantum cryptography, cryptography, qkd
    
AT&T
Start   Previous    87 88 89 90 91 92 93 94 95 96 97 98 99 100 101    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.