aci

Results 2276 - 2300 of 2479Sort Results By: Published Date | Title | Company Name
Published By: Gomez IT     Published Date: Dec 04, 2009
Any business considering cloud computing to support its customer-facing Web applications must look beyond the cloud's cost savings and scalability and evaluate how cloud adoption will impact the end-user experience. This whitepaper addresses the Web experience challenges companies must address when adopting the cloud. It offers perspective and best practices to achieve world class Web performance and assist in the evaluation of cloud providers and development of cloud performance SLAs.
Tags : 
gomez, web performance, site performance, ecommerce, online shopping, web performance
    
Gomez IT
Published By: Emerson Network Power     Published Date: Nov 19, 2009
Download your free white paper today to get a better understanding of the trends driving data center design and management and how you can use them to reduce costs, improve equipment utilization and ensure high availability!
Tags : 
emerson network power, liebert, data center trends, data center design and management, high availability, flex capacity, high density, eco availability, dcim, energy efficiency, power supply
    
Emerson Network Power
Published By: BMC ESM     Published Date: Nov 06, 2009
Join BMC and learn how IT organizations have addressed these challenges, smoothly integrating new virtualized environments with their existing IT processes, tools, and staff. You'll learn about the major challenges that IT organizations face when embracing virtualization, and how BMC's complete lifecycle solutions have helped customers achieve reliable and cost-effective results.
Tags : 
bmc esm, virtual lifecycle management, virtualization
    
BMC ESM
Published By: IBM     Published Date: Oct 15, 2009
In the white paper, "Toward Transparency and Sustainability: Building a New Financial Order," you'll see how businesses are building sustainable, stable systems for the years to come, while fulfilling their brand promises.
Tags : 
global financial market, ibm, identity crisis, processors, over-the-counter, otc, market capitalization, banking system, financial architecture, roi, spend management
    
IBM
Published By: IBM     Published Date: Oct 14, 2009
Discover the unique support for data warehousing and business intelligence offered by the IBM DB2 portfolio. This white paper shows how an IBM System z server, integrated with the IBM DB2 family of solutions, can help you meet requirements for data warehousing and business intelligence.
Tags : 
data warehousing, ibm, business intelligence, total cost of ownership, tco, integrated facility for linux, eal5, workload consolidation, scalability, disaster recovery, workload management, operational data stores
    
IBM
Published By: IBM     Published Date: Oct 13, 2009
The modern data center has to keep pace with business growth, without outgrowing its physical space. It must meet customer demands, while containing operating costs. The solution lies in a scalable, modular data center-turnkey, high-density, energy-efficient and able to be deployed quickly. Discover how a number of industries have put this concept to work to provide better service and cut costs.
Tags : 
energy-efficient data centers, ibm, scalable modular data center, it infrastructure, smdc, server consolidation, computing capacity
    
IBM
Published By: IBM     Published Date: Oct 13, 2009
The disaster that seemed daunting in good economic times can be insurmountable when the economy takes a turn. This essential article outlines the "Five elements of business recovery," which can help you reduce the risk of lost revenue that downtime of any kind represents.
Tags : 
business recovery, data protection, networking, recovery plans, facilities, business continuity, ibm
    
IBM
Published By: ESET     Published Date: Oct 07, 2009
This white paper examines the looming threat horizon that is forcing companies to reexamine their endpoint security functions and discusses ESET's solution for integrated security management that is built around its advanced heuristic technology. The threat landscape facing businesses has evolved significantly, and corporations are looking for security products that can protect against known threats and prepare for future attackers in a simple-to-use architecture.
Tags : 
eset, security, threatsense, malware, threat trends, conficker, virus, agent, endpoint security, networkwide platforms, heuristic scanning, saas, proactive security, network architecture, security architecture
    
ESET
Published By: HP     Published Date: Oct 02, 2009
A white paper on HP Storage Essentials support for VMware host virtualization
Tags : 
hp storage, vmware host virtualization, storage resources management solution, storage area network, vmotion, capacity management, reporting and dashboard, hp operations orchestration, hp server automation
    
HP
Published By: Ruckus Wireless     Published Date: Sep 28, 2009
In this free white paper, discover the hidden costs of out-of-the-box Wi-Fi. Fluctuating connections can potentially cost thousands per day! Now get cost outlays for 5 vendors in 2 different scenarios; learn which 10 component(s) may avoid catastrophe; and find out when to prioritize coverage over capacity. If your business is riding on Wi-Fi, it pays to play it safe. Learn how-download your copy of this free white paper now.
Tags : 
ruckus, access points, wifi, wi-fi, wlan, aps, networking, wireless, smart mesh, 802.11n, 802.11
    
Ruckus Wireless
Published By: IBM     Published Date: Sep 11, 2009
Listen to IBM Internet Security Systems' take on network security convergence. This presentation will be available to audience members until February 22, 2010 at 09:00 AM Pacific Standard Time.
Tags : 
ibm, webcast, network security convergence, web 2.0, web application and database threats, security solutions
    
IBM
Published By: IBM     Published Date: Sep 10, 2009
As the demands for data capacity and higher service levels grow, protecting corporate data becomes more challenging. Continuous Data Protection, as discussed in this white paper by Evaluator Group and IBM, can cost-effectively improve security with As the demands for data capacity and higher service levels grow, protecting corporate data becomes more challenging. Continuous Data Protection, as discussed in this white paper by Evaluator Group and IBM, can cost-effectively improve security with minimal impact to operations.
Tags : 
new data protection strategies, ibm, data capacity, evaluator group, continuous data protection, tsm fastback, cdp technology, delicate balance, restore point objectives, rto, disaster recovery, remote office backup consolidation, wafs, vtl, dr solution gap, xpress restore, fulcrum
    
IBM
Published By: IBM     Published Date: Sep 10, 2009
As data center costs continue to rise, green is the word of the day. What it means is cost savings through consolidation and lower energy usage, as this white paper shows. See the role energy consumption plays in today's data centers, and how IBM Tivoli solutions can help optimize energy use in the data center.
Tags : 
ibm, u.s. environmental protection agency, green data centers, visualization and reporting, asset management and spatial awareness, optimizing power usage and cost, ibm tivoli, storage
    
IBM
Published By: IBM     Published Date: Aug 25, 2009
Reduce the long, after hours finger pointing through proactive performance monitoring all while facilitating collaboration and driving organizational efficiencies.
Tags : 
data management tools, ibm, dba, manage database, application changes, proactive performance monitoring, after hours finger pointing, organizational efficiencies, sla
    
IBM
Published By: IBM     Published Date: Aug 25, 2009
Facing tough IT decisions? Get insight from midsize businesses like yours.
Tags : 
opinion research corporation, midmarket, ibm, midsize companies, it infrastructure
    
IBM
Published By: AppSense     Published Date: Aug 21, 2009
Explore how AppSense Management Suite enables Microsoft Windows 2003 systems to deliver improved overall system security, simplified management and increased capacity and performance.
Tags : 
windows server, windows server 2003, network management, appsense, server optimization
    
AppSense
Published By: Aventail     Published Date: Aug 21, 2009
To thrive in an increasingly competitive world, forward-thinking organizations are encouraging workforce mobility.  Read this white paper by security expert Dave Piscatello, for an assessment of key attributes in a secure remote access solution and how you can benefit from replacing your IPSec VPN.
Tags : 
ssl, vpn, ssl vpn, ipsec, ipsec vpn, secure remote access, remote access, vpn upgrade, upgrade vpn, analyst report, aventail
    
Aventail
Published By: Aventail     Published Date: Aug 21, 2009
Companies are embracing wireless technologies to increase productivity, provide more flexible work arrangements for their employees, and work more closely with their business partners. Read this white paper to learn how SSL VPNs deliver a means of protecting every node, whether internal or external to the enterprise.
Tags : 
ssl, vpn, network security, wireless networking, ssl vpn, wlan infrastructure, infrastructure, wireless infrastructure, aventail
    
Aventail
Published By: Aventail     Published Date: Aug 21, 2009
By 2008, SSL VPNs are expected to be the primary access method for more than two-thirds of business employees who work remotely. This white paper and companion ROI calculator worksheet, provide a working methodology and real-world scenarios to help you determine annual ROI from replacing your existing IPSec VPN with an Aventail SSL VPN.
Tags : 
ssl, vpn, ssl vpn, ipsec, ipsec vpn, roi, return on investment, secure remote access, remote access security, employee productivity, productivity, cost control, aventail
    
Aventail
Published By: Aventail     Published Date: Aug 21, 2009
Internet Protocol Security virtual private networks (IPSec VPNs) were once the only options for secure remote access, but worked only site-to-site and were difficult and costly to maintain. Today, Secure Sockets Layer (SSL) VPNs are increasingly replacing IPSec VPNs because they are less costly to manage...
Tags : 
vpn, ssl, ssl vpn, ipsec, secure remote access, remote access security, network security, aventail
    
Aventail
Published By: Confio     Published Date: Aug 21, 2009
When facing high wait times, dropped sessions, and application lock-ups, the typical company response is to invest in expanded server hardware capacity and additional Oracle licenses, plus the accompanying installation and project management costs. This paper documents the sources of cost savings and IT ROI calculations associated with Ignite for Oracle analysis.
Tags : 
oracle, application performance management, application performance, infrastructure, it investment, it spending, ignite for oracle, oracle ignite, confio ignite, roi, dba, database, confio software, confio
    
Confio
Published By: iDirect     Published Date: Aug 21, 2009
The global demand for voice and data services delivered over cellular networks continues to grow as new markets open and existing ones increase capacity. The networking infrastructure to support subscriber growth and new services have experienced aggressive expansion as the worldwide economy evolves.
Tags : 
infrastructure, gsm, cellular, telecom, telecommunications, networking infrastructure, network expansion, voice services, data services, idirect
    
iDirect
Published By: Internet Security Systems     Published Date: Aug 21, 2009
Spyware is but the latest in a long list of Internet threats facing individuals and organizations alike. While it may sound relatively innocuous, spyware is the culmination of years of hacking development by cyber criminals. Spyware does more than just spy; it records and reports back specific information about the computer it infects.
Tags : 
spyware, information management, information theft, identity theft, data protection, anti spyware, anti-spyware, cybercrime, cyber crime, hacker, web security, internet security, internet security systems
    
Internet Security Systems
Published By: PKWARE     Published Date: Aug 21, 2009
Any organization that stores or transfers health or insurance records electronically must comply with HIPAA, from health care facilities to HR departments. PKWARE offers straightforward strategies for managing protected health information.
Tags : 
compliance, hipaa compliance, hipaa, healthcare, privacy, health, health information management, him, database security, data protection, pkware
    
PKWARE
Published By: SeeControl     Published Date: Aug 21, 2009
Facing increasing customer demands for equipment uptime and rapid service response, many companies servicing critical equipment and machinery are turning to on-customer-site spare parts inventory strategies. To maximize the benefits of this approach, leading companies are 'reverse engineering' their service chains to build restocking plans and manage performance based on parts consumption, not distribution, patterns.
Tags : 
service chain, supply chain management, scm, efficiency, consumption-based, supply and demand, service business, customer service, seecontrol, see control
    
SeeControl
Start   Previous    91 92 93 94 95 96 97 98 99 100    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.