cto

Results 2476 - 2500 of 2793Sort Results By: Published Date | Title | Company Name
Published By: Trapeze Networks     Published Date: Apr 16, 2007
This analyst report written by Stan Schatt, VP & Research Director, Networking at ABI Research  helps you decipher the WLAN security alphabet soup, understand architectural approaches to WLAN security, upcoming standards for roaming, load balancing and management frame encryption, and key security requirements that you should consider for you next WLAN deployment.
Tags : 
wi-fi, wireless, wlan, remote technologies, roaming, encryption, access point, service set identification
    
Trapeze Networks
Published By: Decru     Published Date: Apr 23, 2007
Company data is vulnerable to threats from - insiders, unauthorized access to data, data backup, off-site mirroring - just to name a few. Encrypting data at rest, on tape or disk, significantly mitigates these threats. This document provides guidance into some of the factors a company should consider when evaluating storage security technology and solutions.
Tags : 
storage, security, encryption, key management, protecting your data, security controls, networked storage environments, audit & logging
    
Decru
Published By: Diskeeper Corporation     Published Date: Oct 30, 2008
Virtualization does have its dangers, as it incurs greater stress on physical resources. While under utilization of CPU may be a driving factor to virtualize servers, other hardware resources may become overtaxed. Given that a host system has limited ability (depends on application) to page memory used by the guest systems, the most recognized bottleneck to address is physical memory (RAM). Options to programmatically alleviate memory bottlenecks incur performance issues when the disk is re-introduced. Another major component and perhaps less acknowledged is the disk subsystem. In many cases, depending the purpose and application of the guest/virtual systems, the disk bottleneck will be the most significant barrier to performance. Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4
Tags : 
diskeeper corporation, virtualize servers, virtualizations, divergence, convergence, enterprise applications, storage
    
Diskeeper Corporation
Published By: Torry Harris Business Solutions     Published Date: Jul 05, 2007
The information overload on SOA is largely on describing its merits, its principles and the vast variety of products intended to address its needs. This document is written to identify the factors to be considered, and articulate the principles and questions to be asked that will drive the decisions within each enterprise towards creating a road map for implementation.
Tags : 
service oriented, service-oriented, soa, network architecture, soa roi, change management, it spending, governance
    
Torry Harris Business Solutions
Published By: Gold Lasso     Published Date: Jul 13, 2007
There are more than one hundred Email Service Providers (ESPs) selling their services in the market today and all of them are on the hunt for new customers. This white paper identifies what we call, "decision points," factors that make it worth your while to consider finding a new ESP.
Tags : 
email service, isp, esp, vendor selection, vendors, email marketing, service provider, dns configuration
    
Gold Lasso
Published By: Interactive Intelligence     Published Date: Feb 28, 2013
Are your collectors FDCPA-compliant when they're on the phone with consumers? There are many options available to call centers and collection agencies. In this white paper, we get through the thoughts and opinions and various voices in the industry.
Tags : 
better hiring, better work environment, better quality management, fdcpa compliancy, better hiring, better quality management, knowledge management, enterprise applications
    
Interactive Intelligence
Published By: Interactive Intelligence     Published Date: Feb 28, 2013
In an effort to help receivables management companies achieve compliance with federal and state laws and regulations, Interactive Intelligence queried a group of ten ARM industry professionals about the future trajectory of compliance issues in 2012.
Tags : 
debt collection, compliance, 2012, interactive intelligence, debt collection compliance, arm, interactive intelligence, knowledge management
    
Interactive Intelligence
Published By: OneNeck IT Services     Published Date: Aug 24, 2007
ERP Outsourcing for the Mid-Market discusses the nuances of outsourcing and critical success factors for mid-market companies.  Specifically, how companies can effectively select a compatible outsourcing partner who understands both parts of the equation - business and technology - and how to create a governance environment that fosters a successful outsourcing relationship.
Tags : 
oneneck, erp hosting, erp outsourcing, it outsourcing, it hosting, j.d. edwards, oracle, baan
    
OneNeck IT Services
Published By: OneNeck IT Services     Published Date: Aug 24, 2007
When Spyder Active Sports offered to pay its IT outsourcing provider more money in return for more services, and the provider not only refused the offer but its service levels continued to go downhill, it was time to look for a new provider. It came down to three potential vendors, however, a number of factors lead Spyder to select OneNeck IT Services.
Tags : 
oneneck, erp hosting, erp outsourcing, it outsourcing, it hosting, outsourcing, governance, outsource
    
OneNeck IT Services
Published By: AT&T     Published Date: Jun 25, 2008
When evaluating the pros and cons of DSL and cable modem Internet access, enterprises should factor speed, cost, installation, consistency and security into the decision-making process. While the right access choice is a function of location, availability and service offerings, DSL is often the better option for remote workers, satellite offices and traveling employees.
Tags : 
dsl, cable, internet, internet connection, connection, connectivity, data line, at&t
    
AT&T
Published By: Solarflare Communications Inc.     Published Date: Sep 14, 2007
This white paper discusses how utilizing copper cabling in the data center can lead to high performance networking, along with other beneficial features.
Tags : 
data center, semiconductor, 10 gbe, copper cabling, solarflare, network performance, network performance management, ip networks
    
Solarflare Communications Inc.
Published By: Solarflare Communications Inc.     Published Date: Nov 08, 2007
This paper will highlight the improvements that SolarStorm's virtualization acceleration can provide, not only in networking I/O performance, but also in server efficiency.
Tags : 
data center, semiconductor, 10 gbe, copper cabling, solarflare, network performance, network performance management, ip networks
    
Solarflare Communications Inc.
Published By: Solarflare Communications Inc.     Published Date: Mar 13, 2008
Solarflare’s creation of a ‘virtualization aware’ smart network adapter and modified Xen will allow direct, but safe, access to such adapters from guest operating systems in order to improve network performance.
Tags : 
data center, semiconductor, 10gbe, solarflare, phy solutions, virtualization
    
Solarflare Communications Inc.
Published By: Network Engines     Published Date: Sep 21, 2007
Enterprise customers want software applications delivered as server appliances because they help to reduce IT costs and complexity. Appliances provide better performance, security and manageability. Learn from experts, about factors to consider and things to avoid with the appliance delivery model.
Tags : 
software as an appliance, hardware, server hardware, software appliance, software delivery, software management, enterprise software, software installation
    
Network Engines
Published By: Informatica     Published Date: Sep 28, 2007
Don Tirsell, Senior Director of Product Marketing at Informatica, discusses "complex data," their recent acquisition of Itemfield, and how Itemfield's technology fits into Informatica's overall data integration platform.
Tags : 
data integration, crm, crm tool, crm tools, customer relationship management, podcast, informatica, itemfield
    
Informatica
Published By: Informatica     Published Date: Sep 28, 2007
In Informatica's data migration podcast, Arvind Parthasarathi spoke with editorial director, James E. Powell.  He explores "the seven steps", what IT does wrong, what keeps IT from getting started and what one can do to improve the odds of data migration success.
Tags : 
data migration, podcast, crm, customer relationship management, informatica, data management
    
Informatica
Published By: Informatica     Published Date: Oct 26, 2007
The goal of pervasive BI applications is to take the data that produced the back office ROI of more than 400% and deliver it to front-line employees in a form appropriate to their job functions – with similar results. There are thousands of business process steps in a typical enterprise where pervasive BI insights can be added. What are leading companies doing with pervasive BI?
Tags : 
business intelligence, database, enterprise data warehouse, data mart, data warehouse, data mining, active data warehousing, active data warehouse
    
Informatica
Published By: Technolytics     Published Date: Oct 05, 2007
Recently, a series of cyber attacks on the Defense Department and Defense contractors in the United States as well as the Ministry of Defense and Parliament in the U.K. have created significant cause-for-concern by computer security experts. It is imperative you read this brief and learn how we're all vulnerable and what is being done to prevent these Cyber Attacks.
Tags : 
spy ops, spy-ops, cyber attack, hacker, hackers, government, internet security, national security
    
Technolytics
Published By: Netwrix     Published Date: Aug 01, 2013
Netwrix Auditor takes a holistic approach to IT infrastructure auditing, providing the visibility, intelligence, security and control you need to keep your business up and running, minimize troubleshooting, meet regulatory compliance standards and make sure your critical IT assets are secure - and stay that way
Tags : 
netwrix, free trial, netwrix auditor, it infrastructure, configuration, it systems, configuration auditing, active directory auditing
    
Netwrix
Published By: ITManagement     Published Date: Nov 06, 2007
Our handy comparison chart lines up the vendors in the market and compares the most important factors in a networking equipment decision.
Tags : 
networking, network management, switch, ethernet networking, gigabit networking, mbps, gigabit, ethernet
    
ITManagement
Published By: Thinksoft     Published Date: Nov 13, 2007
This guide/primer serve as an introductory how-to guide on outsourced software testing for business heads as well as software project managers. It first places testing within the content of total product life cycle and then describes the sequential stages within testing program, and how these stages can run parallel with the other development stages.
Tags : 
outsourcing, outsourced software testing, software testing, testing vendor, stages in outsourced software testing, product development life cycle, thinksoft, thinksoft global
    
Thinksoft
Published By: Computhink     Published Date: Jan 31, 2008
Lisa Morgan, Director Channel Programs, and Vince Smolek, Technical Services Manager at Computhink discuss the benefits of ViewWise, an email archive service.
Tags : 
email archiving, email archive, archive, archiving, storage, computhink, video
    
Computhink
Published By: Elastic Collision     Published Date: Feb 14, 2008
Media coverage of Second Life typically favors the opinions of industry analysts and naysayers. All too often, the concerns of regular users are overlooked. In October 2007, as part of a larger survey, we asked more than 800 Second Life residents what advice they would give to real-world organizations establishing a presence in Second Life.
Tags : 
elastic collision, virtual, virtual world, virtual reality, sims, avatar, avatars, social networking
    
Elastic Collision
Published By: Identity Engines     Published Date: Mar 24, 2008
Guests, contractors, vendors, business partners, and other temporary users require and expect certain level of network access within organizations that they visit. Corporate network access has been typically open; internal LAN connections have seldom required authentication. Today however, regulatory and other security concerns demand that organizations adopt a more secure posture towards these short-term users.
Tags : 
idengines, id engines, identity engines, access control, authentication
    
Identity Engines
Published By: Easynet     Published Date: Mar 26, 2008
From the results of recent interviews with LET organisations, IDC positions the industry in the midst of a major transition phase from legacy to next-generation services and technology. This Executive Brief highlights the major technology and business trends taking place in the LET sector, and outlines the advantages of adopting new technologies and services in comparison with other industries.
Tags : 
leisure, entertainment, travel services, technology, managed networks, easynet
    
Easynet
Start   Previous    93 94 95 96 97 98 99 100 101 102 103 104 105 106 107    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.