idera

Results 676 - 700 of 806Sort Results By: Published Date | Title | Company Name

Going to the Web

Published By: Consulternatives, LLC     Published Date: Feb 19, 2013
A short review of key questions to answer and areas of consideration when developing, deploying, and maintaining a Web project.
Tags : 
    
Consulternatives, LLC

Delivering Enterprise Information Securely on Employee iPads

Published By: Citrix Systems     Published Date: Jan 29, 2013
This paper describes the issues that arise when allowing iPad into the enterprise network and the steps IT must take to maintain control. It outlines security considerations, risk mitigation options and the architecture required to support the iPad
Tags : 
ipad, android, tablet, mobility, byo, smartphone, citrix, knowledge management, data management, business technology, data center
    
Citrix Systems

Demystify tempdb Performance And Manageability

Published By: Idera     Published Date: Jan 23, 2013
This white paper provides clear guidance on best practices for managing tempdb to provide the optimum balance between performance, reliability, and manageability.
Tags : 
tempdb, performance, manageability, idera, it management, reliability, data management, business technology, data center
    
Idera

Top 10 SQL Performance Boosters - Increase SQL Server Performance

Published By: Idera     Published Date: Jan 23, 2013
In this idera white paper, it discusses the top 10 SQL performance boosters and ways to increase SQL server performance with the hardware you already own. Download it to learn more.
Tags : 
sql performanc boosters, sql, server performance, idera, it management, data management, business technology, data center
    
Idera

How Compliance Impacts Backup Strategy

Published By: Idera     Published Date: Jan 22, 2013
While most information can (at least in theory) be kept on paper, virtually all organizations now keep personnel, customer, financial, transactional and other records in digital format.
Tags : 
idera, compliance, backup strategy, industry regulations, six sigma, itil, disaster recovery plan
    
Idera

Worst Data Breaches of 2012

Published By: Idera     Published Date: Jan 22, 2013
STOLEN DATA LIVES ON; LOST DATA IS LOST FOREVER.
Tags : 
idera, data breaches, 2012, lost data, sony data thefts of 2011, data thefts, sony online entertainment, play station network, business technology
    
Idera

Internet Security THREAT REPORT 2013

Published By: Symantec     Published Date: Jan 11, 2013
Threats to online security have grown and evolved considerably in 2012. From the threats of cyberespionage and industrial espionage to the widespread, chronic problems of malware and phishing, we have seen constant innovation from malware authors.
Tags : 
symantec, internet security, cyberattacks, cyber attacks, phishing, spam, malware, online theft, online threats, data security, business security, web attacks, network security, backup and recovery, anti spam, anti spyware, anti virus, email security, firewalls, hacker detection
    
Symantec

Your Wi-Fi network is really only as good as your underlying network

Published By: iPass     Published Date: Dec 20, 2012
Today’s distributed enterprises find themselves with two primary WAN options for consideration: MPLS or an Internet IP VPN solution.
Tags : 
network, wan, vpn, mpls, enterprise, connectivity, networking, business technology
    
iPass

Cloud Servers: New Risk Considerations

Published By: Cloud Passage     Published Date: Nov 15, 2012
The tremendous scalability, flexibility, and speed of Infrastructure-as-a-Service (Iaas) make it one of the fastest-growing sectors of the cloud computing markets. Read on to learn more of the new risk considerations and major challenges of cloud.
Tags : 
cloudpassage, cloud infrastructure, cloud server, cloud elasticity, risk considerations, security, it management, data management, business technology, data center
    
Cloud Passage

Buying Considerations to Ensure Data Warehouse Project Success

Published By: Oracle     Published Date: Nov 06, 2012
The purpose of this white paper is to take a time-to-business-value look at financial services data warehousing technologies with a focus on the selection process and how it should take deeper considerations of the real-world implementation hurdles.
Tags : 
oracle, data, analytical data, data marts, industry-specific data warehouse, financial services
    
Oracle

Buying Considerations to Ensure Data Warehouse Project Success

Published By: Oracle     Published Date: Nov 06, 2012
The purpose of this white paper is to take a time-to-business-value look at financial services data warehousing technologies with a focus on the selection process and how it should take deeper considerations of the real-world implementation hurdles.
Tags : 
oracle, data, analytical data, data marts, industry-specific data warehouse, financial services, business technology
    
Oracle

Bring Your Own Device Policy Consideration

Published By: Good Technology Corporation     Published Date: Oct 23, 2012
As companies embrace the use of individual liable mobile devices to access corporate applications and data, Good provides guidance on creating individual liable usage policies.
Tags : 
byod, bring your own device, security, policy considerations, device, enterprise applications, business technology, virtualization, cloud computing
    
Good Technology Corporation

Top Considerations When Choosing an Application Delivery Controller

Published By: F5 Networks Inc     Published Date: Oct 19, 2012
Because of its location in the data center network, the selection of an Application Delivery Controller requires careful consideration of both function and finance. This paper explores elements to evaluate, like network performance, and security.
Tags : 
application delivery controller, load balancer, load balancing, adc, application delivery, application availability, application security, application scalability, application access, data management, business technology, data center
    
F5 Networks Inc

10 Steps to Optimize Sharepoint Performance

Published By: Idera     Published Date: Oct 18, 2012
Download this paper to learn how implementing basic performance enhancements can provide tremendous improvements to the operation and performance of SharePoint within the enterprise.
Tags : 
sql, servers, database traffic, data connectivity, microsoft sharepoint, data management, business technology, data center
    
Idera

CIO's Guide to Mobile Unified Communications & Collaboration (UCC)

Published By: BlackBerry     Published Date: Oct 03, 2012
This resource explores what you should look for in any mobile UCC solution. Explore the changing enterprise and top three considerations to make when considering any mobile UCC strategy.
Tags : 
ucc, collaboration, ucc strategy, mobile ucc solution, blackberry, mobile computing, smart phones, wireless application software, wireless communications, wireless hardware, business technology, mobile device management
    
BlackBerry

CIO's Guide to Mobile Unified Communications & Collaboration (UCC)

Published By: Blackberry     Published Date: Oct 03, 2012
This resource explores what you should look for in any mobile UCC solution. Explore the changing enterprise and top three considerations to make when considering any mobile UCC strategy.
Tags : 
ucc, collaboration, ucc strategy, mobile ucc solution, blackberry
    
Blackberry

Running Enterprise VoIP Hosted PBX Operations

Published By: VoIP Logic     Published Date: Sep 11, 2012
This white paper provides a primer on the considerations around designing and launching Enterprise VoIP Hosted PBX services.
Tags : 
    
VoIP Logic

The Top 10 Technical Considerations for Evaluating E-Commerce Platforms

Published By: Oracle     Published Date: Sep 11, 2012
This white paper offers 10 considerations to help guide the selection criteria for your next e-commerce platform--which should be the last e-commerce platform you ever need to buy.
Tags : 
e-commerce platforms, it marketing, e-commerce applications
    
Oracle

The Top 10 Technical Considerations for Evaluating E-Commerce Platforms

Published By: Oracle Corp.     Published Date: Sep 10, 2012
This white paper offers 10 considerations to help guide the selection criteria for your next e- commerce platform-which should be the last e-commerce platform you ever need to buy.
Tags : 
oracle, e-commerce, technical considerations, platforms, business technology
    
Oracle Corp.

Considerations for Deploying an Intelligent Recording Fabric

Published By: Endace     Published Date: Aug 20, 2012
Organizations don't know what's going on inside their networks, and that's costing them real money. Deploying an intelligent recording fabric with guaranteed 100% packet capture, accuracy, and storage is fundamental to solving the problem. But how do you embrace the new paradigm? To get started, create a list of the system criteria that are mandatory to delivering reliable and complete visibility information to your engineers, so you can be sure their decision-making is on target.
Tags : 
endace, technology, white paper, network, intelligent recording fabric, infrastructure, business risk, intelligent network, local area networking, network management, network performance management, business technology
    
Endace

The Pragmatic Path to Achieving NAC Results: Essential Implementation, Process and Control

Published By: ForeScout     Published Date: Aug 14, 2012
Business wants more fluid access to data while IT organizations must maintain security. As the variety of access and multitude of threats to network resources and sensitive information have grown, so has the need for more flexible and automated ways to effectuate security policies, controls and enforcement. Rarely is this need more keenly felt than at the network endpoint, where people, technology, information assets and requirements for security and compliance meet most directly.
Tags : 
pragmatic, path, achieving nac results, essential implementation, process, control, consideration, data, access, it organization, security, protection, network, access, control, nac, interoperability, 802.1x standards, control, options
    
ForeScout

Architecting a Flexible Strategy for Securing Enterprise Bring Your Own Device (BYOD)

Published By: ForeScout     Published Date: Aug 14, 2012
In a BYOD world, companies can choose to secure and manage the entire mobile device user pool or secure portions of that community. Either way, steps must be taken to prevent unauthorized access to network resources and data loss. Enterprises should consider solutions that allow policies to be applied based on user, device, network, application, and data leakage risks.
Tags : 
archetecting, flexible, strategy, for securing, enterprise, bring, device, byod, data, loss, prevention, mobile, security, landscape, data, access, device, mobility, risks, augmenting
    
ForeScout

Key Considerations for Leveraging Visualization and Keeping Your Applications Available

Published By: SunGard     Published Date: Aug 13, 2012
Today's IT organizations are faced with the daunting task of optimizing all aspects of their departments, including people, processes and technology. Optimizing and streamlining server utilization through virtualization represents one particularly exciting example. We found that one of the most popular usage models for virtualization is to drive down server procurements in development, test and production environments. When this model is followed, future server purchases are avoided; instead, new workloads are established on existing systems.
Tags : 
leveraging, visualization, optimizing, processes, technology, optimizing, server utlization, storage, data management, active directory, bandwidth management, convergence, infrastructure, interoperability, local area networking, network architecture, network management, network performance, network performance management, network provisioning
    
SunGard

Five Things to Consider When Using Tablet Computers in Forklift Applications

Published By: Intermec     Published Date: Aug 09, 2012
Tablet computing is one of the fastest growing categories of consumer electronics, led by the Apple iPad. This buzz is leading many businesses to explore new uses for tablet computers, and some devices are finding their way into evaluation trials on forklifts and other vehicle applications in the distribution center. This white paper compares ruggedized enterprise tablets to purpose-built vehicle mount computers, and addresses mounting, survivability, power, compatibility, and cost considerations between the two product categories.
Tags : 
intermec, tablet, computing, ipad, computers, compatibility, wireless application software, wireless hardware, application integration, application performance management, ebusiness, sales automation, server virtualization, workforce management, business intelligence, content integration, document management, records management, spend management, employee monitoring software
    
Intermec

Social Media Analytics - Making Customer Insights Actionable

Published By: IBM     Published Date: Aug 08, 2012
This white paper examines the role social media can play in presenting a more strategic view of customer data and how the right combination of technologies can deliver insight to help companies more effectively meet perpetually shifting consumer demands expressed through, and influenced by, these dynamic communication channels. Discover the implications of social media for marketing and sales, as well as IT. And learn the how and why social media tools and applications can be integrated with existing technology investments.
Tags : 
social media analytics, consumer insight, marketing digitization, ibm, facebook, strategic considerations, lower cost, influence, intimacy, scale, speed, assess, measure, integrate, predictive capabilities, virtualization, analysis, mobile computing, mobile data systems, mobile workers
    
IBM
Start   Previous    19 20 21 22 23 24 25 26 27 28 29 30 31 32 33    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.