nec

Results 3226 - 3250 of 3343Sort Results By: Published Date | Title | Company Name
Published By: Intermedia     Published Date: Nov 10, 2008
There are two main BlackBerry smartphone mobile connectivity options, and they are quite different. The first is the BlackBerry Internet Service, in which your mobile carrier acts as a liaison between your email and your BlackBerry smartphone. The second option is to use a BlackBerry Enterprise Server, which directly links your wireless device to your email, contacts, calendars and business applications— virtually automatically and almost instantly. If you’re using a BlackBerry smartphone solely for personal email, then a BlackBerry Internet Service account is all you need, and you can stop reading here. But if you’re a business user and are only using BlackBerry Internet Service, you’re leaving lots of important functionality unused.
Tags : 
intermedia, blackberry enterprise server, blackberry business user, blackberry internet service, blackberry smartphone, wireless, pda, smart phones, wireless application software, wireless communications, wireless hardware
    
Intermedia
Published By: IBM     Published Date: Nov 07, 2008
As business conditions force companies to become more and more flexible, service oriented architecture (SOA) provides a scalable, reliable way to connect with, interact with, and deliver information. This brochure shows how you can be a superhero by making WebSphere MQ the messaging backbone for your SOA, creating a common connection for the free flow of information.
Tags : 
ibm, ebf, soa, websphere, business management, business process management, service oriented architecture
    
IBM
Published By: Diskeeper Corporation     Published Date: Oct 30, 2008
Virtualization does have its dangers, as it incurs greater stress on physical resources. While under utilization of CPU may be a driving factor to virtualize servers, other hardware resources may become overtaxed. Given that a host system has limited ability (depends on application) to page memory used by the guest systems, the most recognized bottleneck to address is physical memory (RAM). Options to programmatically alleviate memory bottlenecks incur performance issues when the disk is re-introduced. Another major component and perhaps less acknowledged is the disk subsystem. In many cases, depending the purpose and application of the guest/virtual systems, the disk bottleneck will be the most significant barrier to performance. Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4
Tags : 
diskeeper corporation, virtualize servers, virtualizations, divergence, convergence, enterprise applications, storage, server virtualization
    
Diskeeper Corporation
Published By: SyberWorks     Published Date: Oct 21, 2008
This blind case study focuses on the operations division of a Fortune 500 company had significant challenges training its franchisees. They struggled with an 8 to 12 month backlog in providing training for their new franchisees coming on board. Anecdotally, when they did get around to training new people, the requirements and curriculum were outdated and in the process of being revised. Their franchisees and employees were never current on updated company policies and procedures. These franchises were spread all over the country, so it was costly to train their franchisees using traditional onsite training methods.
Tags : 
syberworks, learning management system, roi, learning management systems, learning management system, e-learning, elearning, web based training, training management systems, training management system, online training software, web based training software, e-learning, sop automation, seminar logistics, classroom management, online survey tool, competency management, schedule simulation, fda 21 cfr part 11
    
SyberWorks
Published By: DataMotion     Published Date: Oct 20, 2008
Almost every task one performs at work includes the exchange of information in one form or another and much of that is exchanged via email and its attachments. Yet too many enterprises view e-mail as a mature technology that simply accomplishes a rather mundane but necessary task, taking e-mail for granted. They rarely seek to leverage it beyond its most fundamental function. However, the messaging services that form the basis of e-mail are far more valuable than the e-mail itself, and can be used innovative ways to save time and money in our every day tasks. Download to learn more.
Tags : 
certifiedmail, datamotion, microsoft exchange, security, e-mail security, maintenance, email security, security management
    
DataMotion
Published By: HP SAS     Published Date: Oct 15, 2008
Today's server blades simply aren't optimized for virtualization. So we built one for you that is. The ProLiant BL495c virtualization blade helps you remove bottlenecks to virtual server performance by packing two-times more memory slots and more network connections per server than other two processor server blades. Listen to the HP ProLiant BL495C Virtualization Blade podcast:
Tags : 
hp sas, server blades, virtualization, proliant, storage, blade servers, storage virtualization
    
HP SAS
Published By: Sparta Social Networks     Published Date: Oct 10, 2008
This case-study talks about how the Packet8 broadband voice over Internet protocol (VoIP) and video communications service which lets broadband Internet users add digital voice and video communications services to their high-speed Internet connection. Videophone users now account for almost 5 percent of Packet8’s 74,000 lines, and are one of several drivers in the company's quarterly growth, up 54 percent in the most period to $6 million in revenue. Download to learn more.
Tags : 
sparta, social network, packet8, internet protocol (voip)
    
Sparta Social Networks
Published By: Microsoft Office     Published Date: Oct 09, 2008
Living in a connected world, many of the economic and intellectual barriers that once separated the world’s businesses no longer exist. Free trade, growing labor markets, increased capital, and business and technology standards contribute to a worldwide information-based economy. People and businesses work together in ways never before possible. As local economies adapt to this new world of work, certain worldwide trends emerge. These trends define how your company conducts business and how you work with information and other people.Learn more by downloading this paper.
Tags : 
microsoft, office, content management, knowledge management, enterprise applications, data management, microsoft exchange, content management system
    
Microsoft Office
Published By: Microsoft Exchange     Published Date: Oct 02, 2008
Lifetime Products manufactures tables, chairs, and basketball equipment for customers in more than 50 countries. Its employees in the United States and China depend on messaging technologies to stay connected to customers and the office. To improve productivity, Lifetime deployed Microsoft® Exchange Server 2007 Unified Messaging. Employees can access their e-mail, voice-mail, and fax messages in their inboxes—while at work, at home, or on the road.
Tags : 
microsoft, microsoft exchange, exchange server, messaging, productivity, unified messaging, convergence, collaboration
    
Microsoft Exchange
Published By: DataMotion     Published Date: Oct 02, 2008
This white paper focuses on the need to monitor and manage outbound content, discusses the key drivers that are making it necessary and discusses the steps that an organization should take to mitigate the risks it faces from employee use of communication tools. Also included in this document are brief descriptions of the companies that have co-sponsored it.
Tags : 
certifiedmail, borderware, postini, symantec, workshare, data management, data protection, database security
    
DataMotion
Published By: Quocirca     Published Date: Oct 01, 2008
The internet has grown rapidly from a random collection of mainly academic networks and military control and routing protocols into a global, integrated and sophisticated commercial utility. No longer simply an 'Information Superhighway', it has extended to embrace voice telephony, video and mobile communications as part of a converged network. Connection options and services have expanded, with opportunities for internet service providers (ISPs) to add value beyond simply forwarding bit and bytes.
Tags : 
quocirca, isp, isps, internet service provider, convergence, ip telephony, voip, networking
    
Quocirca
Published By: CA WA 2     Published Date: Oct 01, 2008
Given the increased complexities and requirements thrust onto data center management environments over time, a more holistic management approach is necessary for efficient and cost effective delivery of IT services. Authors and analysts Judith Hurwitz and Robin Bloor bring their research and extensive experience to light in respect to the state of data center management by building the case for automation as a key strategy for efficient and cost effective management.
Tags : 
datacenter automation, data center automation, network management, ca wa, ca wa 2, it management, network architecture, business process automation, data center design and management
    
CA WA 2
Published By: LogRhythm     Published Date: Sep 26, 2008
Get the facts you need to know about how the collection, management and analysis of log data are integral to meeting many GCSx requirements. Read this whitepaper to learn more…
Tags : 
uk gcsx, uk compliance, gcsx, government connect secure extranet, compliance, comply, security, information technology, information security management, log management, log analysis, log collection, log analyzer, log tool, logrhythm, security event management, web logs, log collection, regulatory, regulations
    
LogRhythm
Published By: Breakout Solutions     Published Date: Sep 24, 2008
Current trends are telling organizations exactly where their customers are congregating online but there seems to be a disconnect between users spending more time online in social networks and organizations spending more dollars and resources to reach them. Read this research today!
Tags : 
breakout solutions, blogs, videos, social networks, social media, web 2.0, social media optimization, social media marketing, social influence marketing
    
Breakout Solutions
Published By: IBM     Published Date: Sep 18, 2008
As energy costs rise, your data center is being taxed and your business is at stake. CIOs are realizing they need to redesign and build energy-efficient data centers. This article simplifies that complex task. It explains how to pinpoint your biggest energy costs and match hardware, software and facilities options so you can create a truly green data center.
Tags : 
ibm, ibm mmdg, energy, green, green computing, data center, datacenter, network management, data center design and management
    
IBM
Published By: Quocirca     Published Date: Sep 18, 2008
Even when facing challenging economic times, businesses still need to communicate and rely on technology to connect with customers, partners, suppliers and their own employees. Cutting back on communications spending will have a negative effect in a long downturn.  It will leave any business that does so with fewer options when conditions improve and at a disadvantage compared to competitors that continue to invest.  However, there are 10 steps that can be taken to grow the value and use of communications, while controlling costs.
Tags : 
telecom, telecoms, quocirca, networking, ip telephony
    
Quocirca
Published By: MessageLabs     Published Date: Sep 17, 2008
Social and business networking sites are changing the way people talk online. Sites like Facebook, MySpace and Bebo help friends stay in touch while LinkedIn and Plaxo mainly connect business users. They are very popular but present new challenges to IT managers. They seem to have come out of nowhere. For example, Facebook currently has 70m users, 40% of which are located in the US.  The rapid growth of such sites is part of the problem. Companies risk being caught off guard.  Learn how to protect your business from threats posed by online social networking in this 7 Step Guide for IT Managers.
Tags : 
web security, internet security, social networking, facebook, myspace, my space, social, messagelabs, employee, security, network security, web service security, workforce management
    
MessageLabs
Published By: IBM     Published Date: Aug 21, 2008
IT is becoming increasingly important in virtually every aspect of business. For enterprises to compete effectively in the marketplace, IT service management must broaden its focus and take a more holistic attitude toward IT service provision. The goal is to resolve the disconnect between IT and business within organizations in order to achieve necessary levels of resilience, control, availability and quality of service.
Tags : 
ibm, ibm mi, ibm grm, service management, it management, itil, itsm
    
IBM
Published By: ASG Software Solutions     Published Date: Aug 20, 2008
A forward-looking CMDB does more than keep an organization's IT operations running. It draws clear connections between IT components and business services, which is the core of Business Service Management (BSM). But even more critical than the CMDB's ability to support business as it is now, is the question of how well it will drive business innovation in the future.
Tags : 
asg, cmdb, bsm, metadata, metacmdb, lob, ecommerce, business activity monitoring, business process management, system management software, application integration, business intelligence, configuration management, web service management, content management system
    
ASG Software Solutions
Published By: NewField IT     Published Date: Aug 19, 2008
As offices review their office printing costs, one significant area almost entirely overlooked is the cost of having A3 devices. The perception is that the A3 document is as necessary to our office printing needs as power-steering is to our cars. The reality, as evidenced by NewField IT's review of more than 70,000 devices supporting over 200,000 users, is that A3 output in the office is remarkably low – less than 2.5% of total page volumes on average.
Tags : 
knowledge management, document management
    
NewField IT
Published By: Utimaco     Published Date: Aug 18, 2008
Most of today’s standards and compliance regulations are concerned largely with the protection of private data at rest, during transactions, and while it traverses network connections. Some of these regulations make specific recommendations or require particular technologies for compliance. For all of them, however, encryption can be employed to satisfy the protection requirements.
Tags : 
leak, leakage, data protection, pci, cardholder, cardholder data, utimaco, database security, data encryption, encryption, security, compliance, pci compliance
    
Utimaco
Published By: KEMP Technologies     Published Date: Aug 04, 2008
Today’s web and application infrastructure continues to expand applications for e-commerce, and communications with customers, partners and internal employees. For those responsible for deploying, maintaining and supporting these networked applications, there is an increasing need to get the highest performance out of datacenter equipment, while simplifying the complexity that causes excess overhead and unnecessary costs.
Tags : 
load balancer, load balancing, application delivery, ssl acceleration, application optimization, windows terminal services, terminal services, content switching, server load balancing, application security, network security, kemp, kemp technologies, infrastructure, networking, spend management
    
KEMP Technologies
Published By: HP     Published Date: Jul 29, 2008
Connect to this special web event to hear from Forrester Research and HP on how to address key vulnerabilities in the storage network, receive tips and recommendations on selecting and implementing data storage encryption solutions and details on how to achieve centralized key management and data encryption where it matters most.
Tags : 
mission critical, security, datacenter, data center, storage security, storage, network security, encryption
    
HP
Published By: Burton Group     Published Date: Jul 07, 2008
Data modeling has evolved from an arcane technique for database designers into an entire family of interrelated techniques that serves many constituencies, including techno-phobic business stakeholders and users. The new maturity of modeling tools and techniques arrives in the nick of time, because new technical and regulatory realities demand that enterprises maintain scrupulous awareness of their data and how it is used. Data modeling is no longer for databases only, no longer for technologists only, and no longer optional.
Tags : 
modeling, data modeling, data management, data mining, business intelligence, dba, database administration, burton group, business analytics
    
Burton Group
Published By: VMware Dell     Published Date: Jul 02, 2008
Bell Canada began an initiative to provide desktop solutions at reduced costs. With 8,000 call center agents, Bell Canada faced hardware attrition and rising costs. Streamlining systems, facilitating outsourcing and increasing capabilities to telecommute would reduce costs while improving service. This would require creating customized workstations for users. Bell Canada approached VMware Partner CGI Group Inc., which provides end-to-end IT and business process services, for a solution.
Tags : 
vmware, call center, virtualization, virtual machine, virtual workstation, telecom, bell canada, call center software, customer service, server virtualization
    
VMware Dell
Start   Previous    120 121 122 123 124 125 126 127 128 129 130 131 132 133 134    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.