bsp

Results 101 - 125 of 411Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Oct 09, 2009
"Recently, Open Source Software has been gaining in popularity due to the ability it provides users to view and modify source code. Another attraction is the perceived cost savings. Read the white paper that takes a look at the truth about those savings. Initially, deployment environments like JBoss have an advantage-zero initial software acquisition costs. However, the white paper will show how, over time, IBM WebSphere Application Server (WAS) and IBM WebSphere Application Server Network Deployment (WAS ND) win the TCO battle. Learn more."
Tags : 
open source, ibm, tco, total cost ownership, roi, return on investment, application development, jboss, was nd, websphere
    
IBM
Published By: IBM     Published Date: Nov 17, 2009
The information agenda is intended to map out corporate business and technology goals and to create a roadmap to ensure that companies can leverage their corporate information as a strategic asset in the pursuit of these goals.
Tags : 
ium evaluation, ibm, information on demand, uim, iod, information management, scential, filenet, cognos, soa, cross-ibm initiative, websphere, lotus, tivoli, ibm global services, ovum 2008, information agenda, vanguard, master data management, enterprise content integration
    
IBM
Published By: IBM     Published Date: Nov 24, 2009
This paper is aimed at IT architects and managers who need to understand how IBM CICS Transaction Server can be used in a modern service oriented architecture (SOA) enterprise solution.
Tags : 
ibm, leveraging middleware, system z software, soa enterprise, websphere, db2, cics transaction server, ims, websphere mq, renault, workload management, websphere, transaction server, service oriented architecture
    
IBM
Published By: Secure Computing     Published Date: Feb 06, 2008
The Payment Card Industry Data Security Standard requires merchants and transaction processors to protect customer data, and firewalls play a major role in the process.  This paper was written by Matt Sarrello, CISSP, contributing editor at Ziff Davis Enterprise and Michael Steinhart, senior editor at Ziff Davis Enterprise.
Tags : 
cardholder data, data security, database security, data protection, pci, pci dss, pci-dss, compliance, credit card, payment card, secure computing, securecomputing, tjx, security
    
Secure Computing
Published By: Secure Computing     Published Date: Feb 20, 2008
Reputation systems add a critical first line of advanced protection to help organizations accurately detect and block all types of threats to their messaging, web, and network environments.  In simplest terms, deploying a reputation service at the network edge is analogous to having a peephole in the front door of your house.  You let in people you know and trust, question the ones you don’t know and shun the ones who look suspicious.  Just by taking these simple measures you reduce your risk.
Tags : 
it spending, whitelist, whitelisting, email security, spam, antispam, cast iron, castiron, roi, storage
    
Secure Computing
Published By: Microsoft Dynamics     Published Date: Jul 03, 2008
Knowing your customers and their needs as thoroughly as possible is central to any business.  And that's the very point of customer relationship management software, sophisticated business software commonly known as CRM.  The question is, is CRM for you? This webcast provides an informative discussion around CRM and outlines seven criteria that will help you decide if you are ready for Microsoft CRM.
Tags : 
crm, microsoft crm, contact management, sales tool, contact tool, microsoft
    
Microsoft Dynamics
Published By: Stratus Technologies     Published Date: Sep 19, 2007
For mission-critical IT, service outages and data loss pose serious consequences.  This white paper examines how availability management, disaster recovery and business continuity support one another and offers insight to find success at all of them.
Tags : 
business continuity, disaster recovery, high availability, stratus, stratus technologies
    
Stratus Technologies
Published By: Stratus Technologies     Published Date: Jul 25, 2008
Faced with a growing number of business-critical applications and services to support, SMBs and enterprises with remote environments are experiencing a real need for high availability.  This paper discusses an easy-to-use, affordable high-availability and virtualization solution using standard x86 servers.
Tags : 
high availability, virtualization, ha software, stratus avance software, fault-tolerant hardware, ftserver systems, stratus
    
Stratus Technologies
Published By: Stratus Technologies     Published Date: Dec 03, 2008
"Virtualization can be like putting all your eggs in one basket.  Ensure you have a resilient basket…"
Tags : 
stratus technologies, virtualization, application server, enterprise applications
    
Stratus Technologies
Published By: Stratus Technologies     Published Date: Mar 10, 2009
Fault Tolerant is a pretty common term in the world of IT, also an often misused and misleading term.  For 3 decades, Stratus Technologies has been engineering and manufacturing purpose built Fault Tolerant solutions. Check out this short video to understand what it takes to be REAL Fault Tolerant.
Tags : 
stratus, virtualization, fault tolerance, real fault, it management, industry standard components, disaster prevention, enterprise applications
    
Stratus Technologies
Published By: Stratus Technologies     Published Date: Mar 10, 2009
Late comers to the market, talk the talk, but can’t walk the walk for critical workloads.  Stratus Director of Product Management Denny Lane resets the definitions of fault tolerance and high availability.
Tags : 
stratus, fault tolerance, critical workloads, mission critical business solution, server virtualization, lexicon, high availability, continuous availability, disaster prevention, networking, it management, enterprise applications
    
Stratus Technologies
Published By: Stratus Technologies     Published Date: Apr 17, 2009
The long migration to electronic health records (EHRs) in the U.S. is set to speed up with the funding authorized by the American Reinvestment and Recovery Act of 2009.  But what are the specific risks when clinicians can’t access electronic health records? How far-reaching are the consequences when EHR data is lost, or its integrity is compromised?  This paper looks at the mission-critical role of EHR systems, and introduces availability solutions that build in uptime protection to ensure the continuity of operation that both caregivers and patients can depend on.
Tags : 
stratus, electronic health records, ehrs, american reinvestment and recovery act, health, records, availability solutions, mission-critical, medical grade servers, electronic medical records, emr, patient health records, phrs, computerized health record system, community health record (chr), diagnostic records, lab results, prescribed medication, downtime risk, stratus ftserver
    
Stratus Technologies
Published By: Aveksa     Published Date: Feb 04, 2008
User access-related business risk comprises a broad array of potentially damaging events that may be caused or made possible by inadequate governance of access to an enterprise’s information assets. Such events range from relatively minor policy and compliance violations to disastrous business losses.  The stakes involved in access-related risk have risen dramatically in recent years as organizations have become thoroughly operationalized by technology.
Tags : 
access control, user access, access, permissions, risk, risk management, compliance, governance, aveksa
    
Aveksa
Published By: ESET     Published Date: Jan 30, 2008
As another year draws to a close, few can have failed to notice the plagues of malicious software, floods of fraudulent emails and the generally increased pestilence of our online world, marking out 2007 as one of the most remarkable in the history of malware.  This report covers the top malware threats in 2007 and provides monthly summaries.
Tags : 
malware, global threats, 2007, threats, email, threat summary, threat report, viruses, eset, antivirus, nod32, internet threats, web-borne threats, phishing, trojans, spam, attacks, exploits, computers, malicious software
    
ESET
Published By: ESET     Published Date: Jan 30, 2008
Steganography is the science of hiding data inside of items, such as sound and picture files.  Listen to this podcast to learn more about steganography and the potential IT security concerns it poses.
Tags : 
embedded files, steganography, hiding data, secret files, coding, av signatures, traditional antivirus, norton, symantec, trend micro, mcafee, malware, threats, email, viruses, eset, antivirus, nod32, internet threats, web-borne threats
    
ESET
Published By: ESET     Published Date: Feb 01, 2008
With the ever evolving threat landscape, what will 2008 hold for IT Managers?  This podcast provides a high level overview of a few trends to watch for this year.
Tags : 
2008 predications, it security predictions, it security, mobile devices, laptops, endpoint, operating systems, antivirus, spam, viruses, trojans, rootkits, malware, threats, eset, nod32, trends, security, networks, spyware
    
ESET
Published By: ESET     Published Date: Feb 01, 2008
It is important for businesses to have a plan in place that addresses the changing threat landscape.  This podcast discusses various items for businesses to consider when developing an IT threat model.
Tags : 
threat planning, testing, penetration testing, defense in depth, multilayered, firewall, filtering, white listing, it strategy, eset, nod32, antivirus, malware, internet threats, web based threats, web 2.0, smb, small business, medium business, eset
    
ESET
Published By: SEPATON     Published Date: Mar 11, 2008
Is backup and recovery unnecessarily draining your budget and resources? This report measures the TCO of an enterprise environment using various data protection models, including tape, virtual tape library, and data deduplication solutions.  Learn how each stacks up in this comparative report.
Tags : 
backup, data deduplication, deduplication, sepaton, tco, data management
    
SEPATON
Published By: SEPATON     Published Date: Mar 11, 2008
Forrester evaluates 12 virtual tape library (VTL) vendors across 58 criteria to determine a relative ranking that centers on strength of current offering as well as market strategy.  This report is a must-read for companies considering revising their data protection strategies to include VTL.
Tags : 
vtl, virtual tape library, backup, recovery, storage, storage virtualization, sepaton
    
SEPATON
Published By: SEPATON     Published Date: Jun 23, 2008
This report is a must-read for companies struggling to back up their newly virtualized server environments.  Read this brief to get real-world case studies on how Sterling Testing and Kindred Healthcare have overcome the challenges of protecting VMware environments by implementing high performance virtual tape libraries (VTLs).
Tags : 
backup, recovery, storage, vtl, virtual tape library, virtual storage, storage virtualization, sepaton
    
SEPATON
Published By: Landslide Technologies     Published Date: Apr 21, 2008
What sales is has not changed. How sales are accomplished is changing radically. In this first of a two-part whitepaper,  we present an overview of the state of sales today, supported by metrics from our 2007 Sales Performance Optimization survey.  The differences between S1.0 and S2.0 are represented in the comparison between old-style circus companies and  the modern circus (think Ringling Bros. vs. Cirque du Soleil).
Tags : 
sales, sales 2.0, landslide, crm, metrics
    
Landslide Technologies
Published By: Landslide Technologies     Published Date: Apr 21, 2008
If you think you know sales, you likely are bringing to this topic a history and track record that has served you well.  This paper attempts to offer the cautionary warning that what has worked in your past may not serve your current  sales reps as well today, and could actually hurt their performance. Sales 1.0 was about lone wolves, product superiority,  proven skills and making the number.
Tags : 
landslide, customer relationship, customer loyalty, loyalty, crm, sales, sales, sales 2.0, sales 1.0
    
Landslide Technologies
Published By: LandslideCRM     Published Date: May 17, 2012
What sales is has not changed. How sales are accomplished is changing radically. In this first of a two-part white paper,  we present an overview of the state of sales today, supported by metrics from our 2007 Sales Performance Optimization survey.  The differences between S1.0 and S2.0 are represented in the comparison between old-style circus companies and  the modern circus (think Ringling Bros. vs. Cirque du Soleil).
Tags : 
sales, sales 2.0, landslide, crm, metrics
    
LandslideCRM
Published By: Tealeaf     Published Date: May 12, 2008
While many companies believe they are delivering adequate online experiences, their customers are in pain. Why do most organizations miss the mark? Improving online customer experience requires organizations to have one view of the online customer and to utilize a common language when discussing customer experience.  Tealeaf gives you insights via their new guide, "Building an Online Customer Experience Competency: Five Steps".
Tags : 
tealeaf, customer experience, website development, web development
    
Tealeaf
Published By: HP Service Management     Published Date: Sep 04, 2008
Today, 84% of IT organizations view automation as a top investment priority for delivering on business outcomes.  Explore key priorities and trends based on IDC’s global survey of 164 IT professionals, including the role of automation across “IT silos” and virtualization, cost efficiencies and process standardization, and market maturity.  Read this new IDC survey to learn more.
Tags : 
communications, network and service management, software, infrastructure software, system management software, hp sm, hpsm, service management, hp service management, enterprise applications
    
HP Service Management
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.