data system

Results 1126 - 1150 of 1300Sort Results By: Published Date | Title | Company Name
Published By: Opalis     Published Date: Nov 06, 2006
Automating repetitive Data Center Operations into best practices makes response times faster, more reliable, and less costly. Learn how to extend your current IT systems to do more of the routine work, freeing up IT staff for higher-value projects.
Tags : 
process automation, automation, business process automation, bpa, data centers, datacenter, datacenters, response time
    
Opalis
Published By: TriTuns Innovation     Published Date: Nov 14, 2006
This paper examines the nature, cause and impact of data quality problems in typical IT system implementations.  It argues that the extent and impact of poor data quality is largely misunderstood and often ignored.
Tags : 
data quality, data protection, data improvement, improve data, trituns, trituns innovation, data management
    
TriTuns Innovation
Published By: Clarabridge     Published Date: Dec 06, 2006
This white paper describes how the Clarabridge Content Mining Platform avoids the pitfalls of previous approaches to unstructured analysis, and capitalizes on lessons learned from solving similar problems in the structured domain.
Tags : 
business intelligence, data warehousing, data mining, content integration, content management system, cms, business analytics, content mining
    
Clarabridge
Published By: Avalere     Published Date: Apr 02, 2007
Sensitive documents, files and intellectual property are extracted from a central repository such as a database, records management system, or document management system to complete daily tasks, however, extracting this information can lead to a security breach.  Avalere provides the tools you need to control the proliferation of sensitive information throughout your organization.
Tags : 
security, security management, database admin, dba, records management, database management, document management, data security
    
Avalere
Published By: Avalere     Published Date: Apr 02, 2007
Laptops, USB devices, and other endpoint devices foster a flexible and more productive work environment, yet also increase a company's exposure to the loss or theft of critical information. Avalere inventories, protects, and controls your company’s laptop, desktop or removable storage device information to mitigate risks of lost or stolen equipment.
Tags : 
mobile computing, lost laptop, lost equipment, mobile data systems, computer loss, equipment loss, risk management, avalere
    
Avalere
Published By: Infor     Published Date: Apr 19, 2007
This paper includes a comparison between using RFID and barcoding for asset management as well as real-life examples of how RFID technology is being used by enterprising organizations today to gain significant time savings and enable better asset and maintenance management.
Tags : 
wireless, wireless hardware, wireless infrastructure, rfid, radio frequency, mobile data systems, asset management, barcode
    
Infor
Published By: PEAK Technologies, Inc.     Published Date: Jul 05, 2007
Today's competitive, agile business demands anytime/anywhere connectivity and access to real time data. Outdated technology, security concerns and compliance requirements are forcing companies throughout industries to consider migrating to advanced wireless systems for supply chain operations.
Tags : 
scm, supply chain management, mobile computing, mobile data systems, real-time data, wireless systems, supply chain productivity, supply chain compliance
    
PEAK Technologies, Inc.
Published By: GAO RFID Inc.     Published Date: Feb 28, 2007
Institutional (academic) libraries and public libraries face growing challenges in managing the assets of their collection and maintaining or improving service levels to patrons. Learn how libraries can leverage RFID solutions to save time, reduce cost, and increase productivity.
Tags : 
mobile data systems, rfid, rfid tags, libraries, library, mobile data systems, gao, gao rfid
    
GAO RFID Inc.
Published By: GAO RFID Inc.     Published Date: Feb 28, 2007
Barcodes, magnetic stripes, and proximity readers all rely on the user to either make contact or place the badge very close to the reader. In addition, bar codes can only be read one at a time and the respective embedded information cannot be updated. Find out how an RFID access control system can provide an easy and efficient solution.
Tags : 
rfid, rfid tags, mobile data systems, access control, identity management, gao, gao group, gao rfid
    
GAO RFID Inc.
Published By: GAO RFID Inc.     Published Date: Feb 28, 2007
The applications for the healthcare industry are multiple, including asset tracking, patient tracking, staff location, baby monitoring, blood bank distribution, and more. Learn more in this overview by GAO RFID.
Tags : 
rfid, rfid tags, healthcare, wireless infrastructure, wireless data systems, wireless hardware, gao group, gao
    
GAO RFID Inc.
Published By: GAO RFID Inc.     Published Date: Feb 28, 2007
Efficient fleet maintenance is absolutely necessary given today's high equipment costs and climbing operating expenses. Whether you are involved in LTL, cartage, courier, direct store delivery (DSD) or field service operations, an integrated and cost effective fleet maintenance program is a prerequisite to increased profitability.
Tags : 
rfid, rfid tags, automotive, trucking, fleet management, fleet maintenance, wireless data systems, wireless hardware
    
GAO RFID Inc.
Published By: GAO RFID Inc.     Published Date: Feb 28, 2007
Railroads face a complex set of economic and operational challenges like competitive freight pricing, asset utilization and competition with trucking, capital expenditure levels, industry consolidation and debt management. Learn how RFID technology can help railroad professionals address these challenges.
Tags : 
rfid, rfid tags, mobile data systems, wireless hardware, gao, gao group, gao rfid, railroad
    
GAO RFID Inc.
Published By: Breece Hill, LLC     Published Date: Mar 15, 2007
Once a business clears the financial hurdle and begins to plan their data protection strategy the choices can appear daunting. Do they select tape or disk? Apply differential or incremental backups? How much will a new system cost and how much time will it take to implement? What data should be included in the backup? This article attempts to address these concerns.
Tags : 
smb, storage, archiving, backup, hardware, small business networks, storage, backup and recovery
    
Breece Hill, LLC
Published By: WorldTelemetry, Inc.     Published Date: Mar 26, 2007
ROI is based on the analysis of differential cash flows. In the case of remote data acquisition and aggregation systems for fuel tank operators, it is based on calculating the cost of acquiring and aggregating the data manually and compared to the total cost of owning, maintaining and operating an automated data acquisition and aggregation system.
Tags : 
business analytics, business intelligence, bi software, enterprise software, business management, business metrics, analyatical applications, roi
    
WorldTelemetry, Inc.
Published By: ProofSpace     Published Date: Aug 08, 2007
Digital signatures aren't enough. This paper posits that data integrity needs to be redefined within the context of a time-sensitive mechanism.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, time stamp
    
ProofSpace
Published By: ProofSpace     Published Date: Mar 04, 2008
The ProofMark software solution is a broadly applicable system that operates on a computer, server, network, system, or infrastructure. This system utilizes public-key cryptography to create an irrefutable record of the time-existence and exact composition of any digital data. This document, the ProofMark System Concepts, Architecture, and Planning Guide, provides you with a broad technical overview of the ProofMark system.
Tags : 
public key, secure content, encryption, proofspace, proofmark
    
ProofSpace
Published By: Ecora Software     Published Date: Aug 15, 2007
High-profile data losses are grabbing more and more headlines every week, threatening the reputation, customer base, and overall bottom line of organization whose systems have been exploited. In addition to this lurking threat, now organizations face potential fines for PCI non-compliance from VISA, beginning in September 2007. Ecora Software will provide you with the information you need to proactively address PCI compliance and, of equal importance, minimize your risk of a costly data breach.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial
    
Ecora Software
Published By: Ecora Software     Published Date: Aug 15, 2007
Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial
    
Ecora Software
Published By: Ecora Software     Published Date: Aug 15, 2007
Achieve and Maintain Compliance with PCI Data Security Standard – Part 4. Deep dive into PCI DSS requirements 10-12. Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial
    
Ecora Software
Published By: Ecora Software     Published Date: Aug 15, 2007
Deep dive into PCI DSS requirements 5-9. Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial
    
Ecora Software
Published By: Ecora Software     Published Date: Aug 16, 2007
Deep dive into the first 4 PCI DSS requirements. Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial
    
Ecora Software
Published By: Indicative Software     Published Date: Aug 24, 2007
Learn about agent-based versus agentless monitoring approaches to enterprise management, and how a combination of data collection technologies can realize the benefits of both.
Tags : 
enterprise management, enterprise monitoring, data collection, data collection engines, agent-based monitoring, agentless monitoring, performance monitoring, application performance
    
Indicative Software
Published By: AT&T     Published Date: Jun 30, 2008
In 2000, ICEE began to scrutinize the inefficiencies they found in the ICEE machine repair process. With so many field technicians servicing so many machines, streamlining the process would be no small feat. The company's existing paper-based system required that field technicians fill out paper work orders at the end of each job. One copy was given to the customer, one was filed at the regional office, and another was sent to headquarters in Ontario. This left a long, inefficient and error-prone paper trail.
Tags : 
wireless, field technicians, repair, mobile service, service, on-site repair, on-site service, wireless data systems
    
AT&T
Published By: Asentria Corporation     Published Date: Sep 04, 2007
More than ever before, IT managers need to secure equipment and facilities against a variety of intrusive conditions that could cripple critical operations, resulting in system malfunctions, loss of data or intellectual property, damage to mission critical hardware or even theft of valuable physical assets. Such conditions often include environmental events, failure of air conditioning systems, power outages, and untoward human actions.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures
    
Asentria Corporation
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
Chartered in 1973, San Francisco-based Spectrum Federal Credit Union serves over 12,000 members. When the issue arose on how to protect their members’ personal data residing on backup tapes, Spectrum FCU took no chances – they and their Techical Advisory Board made the decision to encrypt this important information with the help of NeoScale Systems, an undisputed leader in this emerging market.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management
    
Neoscale Systems, Inc.
Start   Previous    38 39 40 41 42 43 44 45 46 47 48 49 50 51 52    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.