design

Results 1851 - 1875 of 1958Sort Results By: Published Date | Title | Company Name

Overloaded Networks and the Evolution of 'Rackonomics'

Published By: BLADE Network Technologies     Published Date: Nov 18, 2008
In this Product Brief, Clabby Analytics examines BLADE’s “rackonomics” concept (the idea that putting switches into blades and racks is more economical than using external core switches) — and its two new RackSwitch offerings (the G8000 and G8100) designed to implement its rackonomics view.
Tags : 
rackonomics, overloaded networks, blade network technologies, rackswitch, g8000, g8100, cisco, external core switches, it management, storage, blade servers
    
BLADE Network Technologies

Design Firm Raises Per-Employee Revenue by 25 Percent with Collaboration Solution

Published By: Microsoft Office SharePoint Server     Published Date: Nov 07, 2008
Engineering firm Barge Waggoner Sumner & Cannon, Inc. needed to collaborate more efficiently across its 11 offices in the eastern United States. The firm chose ProjectWise collaboration software for engineering content management, content publishing, and design review, and integrated it with Microsoft® Office SharePoint® Server 2007, to manage business processes and documents in a distributed environment. Find out more.
Tags : 
microsoft, sharepoint server, application virtualization, application security, compliance, server virtualization
    
Microsoft Office SharePoint Server

Dell Deployment Optimization Calculator

Published By: Dell     Published Date: Oct 23, 2008
The Dell Deployment Optimization Calculator is a TCO tool designed to analyze current PC deployment practices, make recommendations and quantify the value of improving practices.
Tags : 
dell, deployment optimization calculator, deployment assessment, deployment optimization practices
    
Dell

Microsoft Windows Vista Cost and Benefit Estimator

Published By: Dell     Published Date: Oct 21, 2008
Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4   This business-value discussion tool is designed to help quantify costs and benefits with Windows Vista.
Tags : 
dell, deployment, calculator, knowledge management, enterprise applications, data management, business metrics
    
Dell

Passing PCI Compliance Section 6.6: Code Reviews and Application Firewalls

Published By: HP - Enterprise     Published Date: Oct 16, 2008
If your company stores or processes credit card information, you must be able to demonstrate compliance with the Payment Card Industry (PCI) Data Security Standards (DSS). These standards include requirements for security management, policies, procedures, network architecture, design, and other critical protective measures. They also include one very prescriptive requirement:  Section 6.6 mandates that organizations secure all Web applications by conducting a code review or installing an application layer firewall. Companies have had a very difficult time passing the other parts of Section 6 and they have experienced a rising number of data breaches. Unless companies take 6.6 seriously, PCI compliance failure rates, and data breaches, will continue to grow.  Read this whitepaper to gain an overview of best practices to pass Section 6.6 and an understanding of the technology available to you.
Tags : 
business risk, security, application security, audit, risk, vulnerabilities, fortify, fortify software, hackers, cyber threats, application security standards, threats, assessment, remediation, pci, compliance, payment card industry, data security standards, data management, firewalls
    
HP - Enterprise

New Life for Aging Electronic Products

Published By: Orchid Technologies Engineering & Consulting     Published Date: Oct 07, 2008
As electronic product designs age, component parts become increasingly difficult to obtain.  Component buyers may experience difficulty in obtaining key parts within the design.  Component part prices may increase.  A point comes when component parts begin going end-of-life at an alarming rate.  Quick fixes are no longer sufficient.  Sometimes an OEM will procure a 'life-time' supply of problem parts – but this supply can be quickly wiped out should unforeseen demand develop.  Lack of component parts puts an end to production.There is an alternative.  Profitable, old products can be redesigned.  Either preserving the original form fit and function, or adding new features. Product redesign is a cost effective means by which to extend the life of a marketable product.
Tags : 
orchid technologies, texas instruments, original equipment manufacturers, (oem’s), software development, it management, storage
    
Orchid Technologies Engineering & Consulting

What To Look For in a SharePoint Consultant

Published By: Syntapa     Published Date: Sep 30, 2008
In order to understand the key skills for your SharePoint consultant, you need to understand that SharePoint itself is not really the source of the complexity. Rather, it is the design of the deployment, the uses made of it, its part in an integrated, unified business system, and how you actually use it to deliver on business objectives which make it challenging. This understanding is ultimately going to make the difference between a happy ending and frustrated customers who end up giving SharePoint a bad name.
Tags : 
sharepoint, sharepoint server, collaboration, syntapa, consult, consultant, consultancy, it management, workforce management, intranets
    
Syntapa

Disaster Recovery Using Dell EqualLogic PS Series Storage and VMware Site Recovery Manager

Published By: VMware Dell     Published Date: Sep 29, 2008
This technical report will discuss the installation and configuration of Site Recovery Manager with the Dell EqualLogic PS Series storage arrays. It will cover setup, testing, failover, failback and troubleshooting. This document is designed to be used in conjunction with the Administrator Guide for Site Recovery Manager and assumes a prior knowledge of VMware Virtual Infrastructure.
Tags : 
vmware, dell, equallogic, site recovery, disaster recovery, iscsi, windows server, microsoft, data protection, network management, storage virtualization
    
VMware Dell

Effectively Securing Small Businesses from Online Threats

Published By: MessageLabs     Published Date: Sep 25, 2008
The Internet has proven to be a vital communications medium for worldwide commerce, but as an open and unprotected global network it can also present a wide range of threats that can cripple any business organization. Several years ago, most Internet threats were relatively benign examples of a young adolescent’s technical expertise but over time they have evolved into increasingly sophisticated domestic and foreign attacks that are designed to capture financial, personal, or strategic business information. Threats now come in the form of deliberately malicious acts, and exploitative opportunities for hackers and/or organized crime. The impact is serious, and the landscape of victims is getting broader every day. In response, no organization can afford to have its networks remain unprotected.
Tags : 
messagelabs, online threats, security, small & medium businesses, email spam, viruses, trojan horses, worms, phishing attacks, spyware, adware, honeypots, sandboxing, the wildlist, anti spam, anti spyware, anti virus, email security, internet security, security management
    
MessageLabs

Quick sizing guide for SAS Grid running on HP BladeSystems and EVA Storage

Published By: HP SAS     Published Date: Sep 24, 2008
Designed for CIOs, IT managers, data center managers and grid computing architects seeking to improve performance, SAS Grid Computing on the HP BladeSystem. C-Class helps accelerate growth and mitigate risks with a simplified, consolidated infrastructure that’s agile enough to efficiently handle change. SAS Grid Manager on HP BladeSystem can lower costs through automation, virtualization and improved IT efficiency.   Download  HP's "Quick Sizing Guide for SAS Grid running on HP BladeSystem and EVA Storage" to learn more about the equipment needs to deploy SAS Grid Manager on HP BladeSystem.
Tags : 
hewlett packard, bladesystems, grid manager, grid computing, polyserve matrix, eva storage, data management, traffic management, blade servers, storage management, storage virtualization, data mining, data protection, data warehousing
    
HP SAS

How IBM Serves Smaller and Mid-Sized Companies

Published By: IBM     Published Date: Sep 18, 2008
IBM is committed to helping companies of all sizes stay competitive and grow. The IBM Express Advantage program, supported by a vast network of local IBM Business Partners, makes it simple to get exactly what you need from IBM. Download and browse the IBM Express Advantage catalog that’s full of useful offerings designed and priced especially for mid-sized companies.
Tags : 
ibm, ibm mmdg, smb, smbs, small business, networking, infrastructure, network management, small business networks
    
IBM

Knowing What's Necessary For Energy-Saving Data Centers

Published By: IBM     Published Date: Sep 18, 2008
As energy costs rise, your data center is being taxed and your business is at stake. CIOs are realizing they need to redesign and build energy-efficient data centers. This article simplifies that complex task. It explains how to pinpoint your biggest energy costs and match hardware, software and facilities options so you can create a truly green data center.
Tags : 
ibm, ibm mmdg, energy, green, green computing, data center, datacenter, network management, data center design and management
    
IBM

Understanding the Potential of Adobe Integrated Runtime (AIR)

Published By: Integration New Media, Inc.     Published Date: Sep 18, 2008
Most of the information that’s been made available about Adobe Integrated Runtime so far, has been written for the programmers that are building applications, not for the visionaries that are designing the client experiences. The objective of this paper is to provide executives, project managers, marketers and other visionaries with an introduction to Adobe AIR, and information about how Adobe AIR can be leveraged to create next generation web experiences.
Tags : 
inm, integration new media, adobe air
    
Integration New Media, Inc.

Intel Corporation's ATOM Processor and Low Power Chipset Solution

Published By: Orchid Technologies Engineering & Consulting     Published Date: Sep 03, 2008
Shrinking product development cycles coupled with demanding product requirements and increasingly complex design implementations can overwhelm a design team. The technical risk of employing new, complex, high-speed processor technology can often deter a design group from incorporating new technology in their product designs.
Tags : 
scm, supply chain, oem, manufacturing, manufacture, manufacturer, product development, chip, chips, electronics, orchid, product lifecycle management, supply chain management
    
Orchid Technologies Engineering & Consulting

Comparison of FTP and Signiant

Published By: Signiant     Published Date: Aug 14, 2008
FTP (File Transfer Protocol) is used to perform file transfers over Internet Protocol (IP) networks such as the public Internet and corporate intranets. FTP is widely deployed and is widely accepted as a file transfer solution. However, are there downsides to using FTP for file transfers? This paper compares FTP with file transfer methodologies of Signiant's software applications and identifies the shortcomings of FTP that Signiant was designed to overcome.
Tags : 
signiant, ftp, file transfer, file transfer protocol, content delivery, information management
    
Signiant

Comparison of FTP and Signiant

Published By: Signiant Inc.     Published Date: Aug 14, 2008
FTP (File Transfer Protocol) is used to perform file transfers over Internet Protocol (IP) networks such as the public Internet and corporate intranets. FTP is widely deployed and is widely accepted as a file transfer solution. However, are there downsides to using FTP for file transfers? This paper compares FTP with file transfer methodologies of Signiant's software applications and identifies the shortcomings of FTP that Signiant was designed to overcome.
Tags : 
signiant, ftp, file transfer, file transfer protocol, content delivery
    
Signiant Inc.

Should You Install Messaging Security Software on Your Exchange Server?

Published By: Sunbelt Software     Published Date: Aug 04, 2008
Security is the most single critical task for any email administrator. Starting with a foundation of anti-spam and anti-virus capabilities, organizations should focus on other capabilities, as well, including policy management and a variety of other tasks designed to protect the network and the company from external and internal threats.
Tags : 
email security, secure messaging, secure im, exchange, exchange server, microsoft exchange, ms exchange, sunbelt, sunbelt software, security, security management, secure instant messaging
    
Sunbelt Software

Best Practices Guide for Protecting Mission Critical Business Processes

Published By: Stratus Technologies     Published Date: Jul 29, 2008
Protect the availability of business-critical processes while keeping costs in line. This e-book takes you from business analysis to design and deployment to an actual case study using recognized industry best practices and governance guidelines.
Tags : 
stratus, best practices, business process, bpm, business process management
    
Stratus Technologies

IPAM Intelligence: All Roads Lead to Proteus

Published By: BlueCat     Published Date: Jul 09, 2008
A number of factors are fueling the demand for a new, intelligent approach to IP Address Management (IPAM). This document describes these factors while highlighting deficiencies in the legacy IPAM solutions and manual management techniques commonly used today. It also introduces the 'Five Pillars of IPAM Intelligence', BlueCat's framework for articulating its revolutionary, holistic approach to IPAM, and the foundation for the design of Proteus, BlueCat's next generation, intelligent IPAM platform.
Tags : 
ipam, ip address management, address management, dns, dhcp, ip address, bluecat, blue cat, ip networks, network management, tcp/ip protocol
    
BlueCat

Enterprise Architecture Is More Than Engineering

Published By: Burton Group     Published Date: Jul 07, 2008
While many enterprise architecture (EA) programs may be less than effective or threatened by extinction, the EA discipline is still an important set of skills and processes that improve IT decision-making and CIO effectiveness. Yet, after decades of architecting systems, the advent of several EA frameworks, and the many definitions available for the term EA, we still strive to understand what EA is, what it does, and what it looks like when it is successful.
Tags : 
architecture, architect, network architecture, it management, network design, network management, burton group, enterprise architecture, networking
    
Burton Group

Data Modeling: A Necessary and Rewarding Aspect of Data Management

Published By: Burton Group     Published Date: Jul 07, 2008
Data modeling has evolved from an arcane technique for database designers into an entire family of interrelated techniques that serves many constituencies, including techno-phobic business stakeholders and users. The new maturity of modeling tools and techniques arrives in the nick of time, because new technical and regulatory realities demand that enterprises maintain scrupulous awareness of their data and how it is used. Data modeling is no longer for databases only, no longer for technologists only, and no longer optional.
Tags : 
modeling, data modeling, data management, data mining, business intelligence, dba, database administration, burton group, business analytics
    
Burton Group

Financial Management and Business Intelligence Solutions for a High-Performance Workplace

Published By: Microsoft Dynamics     Published Date: Jul 03, 2008
Sound, responsible financial management is at the heart of business success. Download this webcast to learn more about the Microsoft solutions for financial management and business intelligence (BI) that can help you transform your business into a high-performance workplace. We describe how Microsoft business solutions are designed to help you work more efficiently by focusing on the tasks that add the most value to your business and enable you to make more informed decisions based on timely, accurate information.
Tags : 
business intelligence, financial management, business management, finance, financial, microsoft, analytical applications
    
Microsoft Dynamics

Microsoft Dynamics CRM 4.0: Enterprise Performance and Scalability

Published By: Microsoft Dynamics     Published Date: Jul 03, 2008
Microsoft Dynamics CRM 4.0 is designed to help enterprise organizations attain a 360-degree view of customers, achieve reliable user adoption, adapt quickly to business change, and accelerate project delivery and returns-all on a platform that provides enterprise levels of scalability and performance. Microsoft Dynamics CRM 4.0 addresses the stringent requirements of the enterprise in the areas of performance and scalability, application flexibility, efficient manageability, and network configurability.
Tags : 
microsoft, microsoft crm, microsoft dynamics, customer relationship management, contact management
    
Microsoft Dynamics

Sales Force Automation Case Study: adidas America

Published By: AT&T     Published Date: Jun 30, 2008
A leader in its industry, adidas America recognized that it could increase its sales potential by automating many components of the sales process. Tim Oligmueller, sales force automation manager for adidas America, wanted to reduce the number of calls from sales representatives in the field to check on product availability, enabling them to capture "at-once" business and show customers that the company is on the cutting edge not only in footwear and apparel design, but also in customer service.
Tags : 
sales force automation, salesforce automation, salesforce, blackberry, sales automation, business analytics, inventory, inventory management, wireless, mobile workforce, mobile sales force, outside sales, at&t, att, at&t wireless, mobile data systems, mobile workers, wireless application software
    
AT&T

How Institutions Should Respond to Data Breaches

Published By: Debix     Published Date: Jun 30, 2008
Fraud preventative solutions are designed to avert new accounts fraud before it occurs. The strategic advantage of fraud prevention therefore lies in the ability avoid losses to institutions and consumers.
Tags : 
database security, pci, pci-dss, compliance, pci compliance, data protection, identity theft, hacker detection, hack, hacking, debix, intrusion detection, intrusion prevention, customer relationship management, customer service, customer experience management
    
Debix
Start   Previous    65 66 67 68 69 70 71 72 73 74 75 76 77 78 79    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.