design

Results 1876 - 1900 of 1931Sort Results By: Published Date | Title | Company Name

ClarusIPC Plus+ 2.4: Diagnose, Troubleshoot, Validate

Published By: Clarus Systems     Published Date: Mar 18, 2008
Enterprise networks are going through massive change, and the convergence of voice and data including Communication deployments, upgrades, transformations and ongoing management remain a top priority. According industry analysts at Aberdeen Group, 61% are planning for Communications in the next two years. In order to get the most from their Unified Communications investment at the time of deployment and beyond, enterprises must leverage both active testing and configuration analysis techniques to certify and validate that environments are configured as designed.
Tags : 
itil, clarus systems, ipt, ip telephony, unified communications, cisco, callmanager, best practices
    
Clarus Systems

Contact Center Services: Testing & Monitoring Solutions

Published By: Clarus Systems     Published Date: Mar 18, 2008
Clarus Systems, Inc. has collaborated with IQ Services to deliver technology independent testing solutions that enhance end-to-end voice process lifecycle management within the contact center. The goal is to ensure a positive customer experience by incorporating voice testing and monitoring into every step of your contact center's life cycle - resulting in confidence that your solution works as designed.
Tags : 
itil, clarus systems, ipt, ip telephony, unified communications, cisco, callmanager, best practices
    
Clarus Systems

What Would Bond Do? A Spyware Survival Guide

Published By: CopiaTECH     Published Date: Mar 18, 2008
With the advancement of IT, technology has brought great improvements and new challenges. One such challenge is spyware: software designed to either capture your data or use your system for its own purposes. This paper discusses in detail various kinds of spyware and measures of protection against it.
Tags : 
copiatech, anti spam, anti spyware
    
CopiaTECH

IBM BladeCenter - Integrate Servers, Storage and Networking

Published By: IBM     Published Date: Mar 17, 2008
By doing more with less, you can realize savings and reduce complexity at the same time. IBM BladeCenter is a complete, compact and integrated system designed to simplify IT in small and mid-sized offices and distributed environments. It's packed with energy-saving features that lower operating costs and it's flexible enough to grow with your business. Learn about the features and options of the IBM BladeCenter and see why it's the right choice for your diverse business needs.
Tags : 
ibm, move up, blade system, blade center, blade, blade server, bladesystem, bladecenter
    
IBM

CoreNet Global Remarketing

Published By: BrightWave Marketing     Published Date: Mar 13, 2008
BrightWave Marketing designed and executed a remarketing email campaign to help CoreNet Global, the world’s leading professional association for corporate real estate and workplace executives, promote its Annual Summit. Read this case study to find out about the changes made and their results.
Tags : 
brightwave, email marketing, event marketing, conference, conferences, registrations, register, registration
    
BrightWave Marketing

Denison University: Email Marketing Delivers ROI for College Fund Raising

Published By: BrightWave Marketing     Published Date: Mar 13, 2008
Denison University utilizes a multi-faceted direct marketing program to communicate with their alumni and other key constituents. Email marketing has become a more important part of their development strategy in recent years due to the cost effectiveness, tracking capabilities and growing use of email and internet to contribute to the school’s Annual Fund.
Tags : 
brightwave, email design, email marketing, philanthropy, fund raising, fund raiser, alumni, alumnus
    
BrightWave Marketing

Best Practices in High Availability Cluster MultiProcessing

Published By: IBM     Published Date: Feb 25, 2008
IBM HACMP supports a wide variety of configurations, and provides the cluster administrator with a great deal of flexibility. With this flexibility comes the responsibility to make wise choices. This paper discusses the choices that the cluster designer can make, and about the alternatives that make for the highest level of availability.
Tags : 
high availability, backup, recovery, utility computing, network management, ibm, backup and recovery
    
IBM

The Roadmap to Virtual Infrastructure: Practical Implementation Strategies

Published By: IBM     Published Date: Feb 25, 2008
Virtualization provides opportunities to reduce complexity, improve service levels to the business and lower capital and operating costs to provide and maintain IT infrastructure. This paper for senior IT managers is intended as a starter guide for virtual infrastructure technical design, project planning, scoping, and implementation.
Tags : 
servers, virtual server, server virtualization, vmware, virtual, virtual machine, virtual server, ibm
    
IBM

Cooling Strategies for IT Wiring Closets and Small Rooms

Published By: APC     Published Date: Feb 19, 2008
Cooling for IT wiring closets is rarely planned and typically only implemented after failures or overheating occur. Historically, no clear standard exists for specifying sufficient cooling to achieve predictable behavior within wiring closets. An appropriate specification for cooling IT wiring closets should assure compatibility with anticipated loads, provide unambiguous instruction for design and installation of cooling equipment, prevent oversizing, maximize electrical efficiency, and be flexible enough to work in various shapes and types of closets. This paper describes the science and practical application of an improved method for the specification of cooling for wiring closets.
Tags : 
apc, power, cooling, it wiring, heat removal, green computing, infrastructure, internetworking hardware
    
APC

10 Common Misconceptions Businesses Have About Identity Proofing

Published By: IDology     Published Date: Feb 11, 2008
There is a new automated technology available now that is helping businesses combat identity theft and prevent fraud. It is called identity proofing and it is specifically designed to verify consumer identities online. With all the fraud prevention solutions available in the market today you are probably wondering, does my company really need to use an identity proofing solution?
Tags : 
identity management, iam, access management, iam, risk management, identity theft, hackers, fraud
    
IDology

Optimize Retail Operations and Lower Costs by Enhancing Your Use of IT

Published By: IBM     Published Date: Feb 08, 2008
Point of service is the key to every retail operation. But with e-mail marketing, in-store/self-service kiosks and more, the definition of point of service is changing. These changes create a unique opportunity to utilize advanced technologies to improve the customer experience. The IBM Retail Environment for SUSE LINUX (IRES) is designed to help retailers do just this -- while generating higher profits.
Tags : 
pos, point of service, tco, marketing, customer experience, increase sales, profitability, retail
    
IBM

How General Cable Reduces Over 50% of Time and Costs Associated with Purchasing

Published By: Supply Chain Connect     Published Date: Jan 24, 2008
General Cable operates 28 manufacturing locations in 8 countries and is a leader in the development, design, manufacture, marketing and distribution of copper, aluminum and fiber optic wire and cable products. Their products are widely used in communications, energy, industrial and speciality markets. General Cable has nearly 300 suppliers of raw material for their US operations.
Tags : 
supply chain, scm, supply chain connect, business management, erp, manufacturing, manufacture, edi
    
Supply Chain Connect

Combating Malware: Leveraging the Power of a Planet

Published By: Panda Security     Published Date: Jan 16, 2008
A new white paper from Panda Security discusses the new breed of silent online threats that can bypass traditional antivirus programs and penetrate even the most highly 'protected' networks.  Additionally, the sheer volume of malware has overwhelmed the antivirus industry as a whole. Collective Intelligence is a new global security model specifically designed to combat the next evolution of malicious code.
Tags : 
malware, virus, anti-virus, spyware, anti-spyware, anti-malware, bot, botnet
    
Panda Security

Milhouse Engineering Manages the O’Hare Airport Project with GlobalSCAPE WAFS

Published By: GlobalSCAPE     Published Date: Jan 08, 2008
In 2005, O’Hare International Airport began a project to relocate and modernize a 2.1 million ft.2 runway. Five independent firms worked on the project design with the IT/data management led by Milhouse Engineering and Construction, Inc.  Milhouse implemented GlobalSCAPE WAFS which mirrors critical files to all sites. This provided fast local access to all project files automatically without any administrative burden and with no delays.
Tags : 
globalscape, data management, wide area networks, high availability, project management, information management
    
GlobalSCAPE

CMDB Adoption in the Real World: Just How Real Is It?

Published By: Tideway Systems     Published Date: Dec 11, 2007
This report provided by Enterprise Management Associates (EMA) is developed around research that's focused on showing the many faces of the CMDB – as a central point for governance, asset, inventory, change and configuration control, and as a core system, in many cases for more effective service assurance. Designated for IT adopters and planners – read by executives, as well as, architects, and technical influencers.
Tags : 
cmdb, configuration management, change management, itil, service management, itsm, tideway systems, tideway
    
Tideway Systems

ITIL v3: Managing Application and Infrastructure Changes

Published By: Tideway Systems     Published Date: Dec 11, 2007
IT service providers need to offer services that deliver new business opportunities whilst increasing levels of availability, controlling risks and reducing costs. This paper provides you with practical guidance based on the practices in ITIL® V3 that will help you manage application and infrastructure changes and configurations.
Tags : 
service management, itil, change management, configuration management, knowledge management, service strategy, service design, tideway
    
Tideway Systems

From Concept to Customer: Winning Web Strategies for Small Business

Published By: PTC     Published Date: Nov 27, 2007
Defining an effective Internet and domain name strategy is vital to any business — especially small- or medium-sized businesses which have limited development and promotional budgets. From defining this strategy, to understanding the keys to Web promotion, here is vital information that every entrepreneur should know.
Tags : 
web development, web site, web marketing, buy domains, buydomains, web site design, site promotion, seo
    
PTC

Completing the 4G Vision: Gateways for Mobile WiMAX

Published By: WiChorus     Published Date: Oct 12, 2007
Wireless technologies are migrating from complex hierarchical voice-oriented architectures to flatter, low latency, all-IP based designs – reducing cost and complexity for service providers while efficiently supporting real time IP services. Coupled with this trend is the migration to higher performance OFDMA air links with MIMO and AAS, providing much greater bandwidth with improved interference characteristics.
Tags : 
wimax, access controller, asn-gw, gateway, base station, ofdma, edge router, farpoint group
    
WiChorus

Secure By Design

Published By: Guardian Digital     Published Date: Oct 02, 2007
Guardian Digital's EnGarde Secure Linux is the world's premier secure operating platform engineered from Open Source Technologies.  Written in an easy to read, plain-language format, you will get introduced to the full range of benefits that makes EnGarde "Secure By Design."
Tags : 
open source, open source security, network security, adaptability, security management, email security, guardian digital, digital guardian
    
Guardian Digital

Informatica Announces Salesforce.com On-Demand Solution: TDWI

Published By: Informatica     Published Date: Sep 28, 2007
On-demand computing is apparently in demand, at least in the eyes of data integration specialist Informatica Corp. The Switzerland of data integration, as some have called it, just announced availability of its first on-demand offering, which is specifically designed to handle data from Software-as-a-Service (SaaS) stalwart, Salesforce.com.
Tags : 
salesforce, crm tools, crm, customer relationship management, salesforce.com, crm tool, on-demand, ondemand
    
Informatica

Assembling a Quality Email Marketing Team

Published By: Arial Software     Published Date: Aug 22, 2007
Email marketing should be considered a key component of a company’s overall marketing strategy. In the past many companies treated email marketing as an afterthought, failing to devote the talent and resources needed to affect an appreciable return on investment. To get the most out of an ongoing email marketing campaign, a quality team of knowledgeable professionals must be assembled.
Tags : 
staffing, hiring, marketing, marketing manager, email marketing, email marketing manager, marketing director, staff
    
Arial Software

Microsoft Workflow Foundation, SharePoint Workflow Designer and the Ultimus BPM Suite

Published By: Ultimus     Published Date: Aug 16, 2007
Windows Workflow Foundation (WF) and the Ultimus BPM Suite compliment each other. WF can be used to extend the capabilities of Ultimus by performing specialized services. The Ultimus BPM Suite can be invoked by WF activities to perform workflows that are not simple and require extensive and robust human-centric capabilities.
Tags : 
ultimus, bpm, business process management, automation, bpa, productivity, bpm basics, profitability
    
Ultimus

Intrusion Defense: Is Your Castle Protected?

Published By: Perimeter     Published Date: Jul 17, 2007
Read this interesting comparison about designing an intrusion defense strategy that identifies the value of business processes, and implements appropriate strategies to protect these systems using a layered defense approach is not only a good security practice, but also a regulation in many cases.
Tags : 
ids, intrusion defense, intrusion prevention, firewall, security, compliance, layered security, ips
    
Perimeter

The Importance of Personalization

Published By: Gold Lasso     Published Date: Jul 13, 2007
Since the introduction of e-mail as a viable marketing and communications vehicle, the focus has shifted from a "one size fits all" model to content that is relevant and specific to the intended recipient. This paper reviews general concepts behind personalization, further investigates its advantages, discusses the challenges to personalizing campaigns and provides solutions to overcome the challenges.
Tags : 
personalization, newsletter design, content personalization, return on investment, email marketing, ebusiness, ecommerce, e-commerce
    
Gold Lasso

Microsoft Dynamics Case Study: Best Buy for Business

Published By: Microsoft Dynamics     Published Date: Jul 09, 2007
Saddled with a home-grown business-management tool originally designed for its retail business, the Best Buy for Business sought a solution that would support its extensive outside sales force and would provide a commercial CRM solution it could sell to business customers. Best Buy for Business found both in Microsoft Dynamics CRM.
Tags : 
microsoft, microsoft dynamics, sales automation, salesforce automation, scm, supply chain management, crm, customer relationship management
    
Microsoft Dynamics
Start   Previous    64 65 66 67 68 69 70 71 72 73 74 75 76 77 78    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.