trade

Results 301 - 325 of 374Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: Aug 18, 2014
Cisco continues to improve the industry's most innovative and leading data center architecture, and now makes it easy to save when you trade up to the record-setting performance of Cisco UCS M3 Blade Servers with the latest Intel® Xeon® processors. UCS Advantage* is a limited time program that allows customers with qualified HP servers and blade chassis to refresh legacy equipment and get credit toward new Cisco UCS M3 Blade Servers and infrastructure.
Tags : 
servers, data, innovative, data center, architecture, performance, processors, blade, equipment
    
Cisco
Published By: Cisco     Published Date: Aug 18, 2014
Cisco continues to improve the industry's most innovative and leading data center architecture, and now makes it easy to save when you trade up to the record-setting performance of Cisco UCS M3 Blade Servers with the latest Intel® Xeon® processors. UCS Advantage* is a limited time program that allows customers with qualified Cisco UCS M1/M2 and HP servers and blade chassis to refresh legacy equipment and get credit toward new Cisco UCS M3 Blade Servers and infrastructure.
Tags : 
servers, data, innovative, data center, architecture, performance, processors, blade, equipment
    
Cisco
Published By: HP     Published Date: Apr 13, 2014
Deliver game-changing uptime. Read how Playtech, the world’s largest publicly-traded online gaming software supplier, achieves 99.999% uptime and detects and fixes issues in minutes versus hours with comprehensive IT monitoring tools.
Tags : 
bpm, bsm, business process monitor, business service management, hp it performance suite, it case study, it infrastructure, omi, operations manager i, playtech, sha, service health analyzer, business continuity, online gaming, visibility
    
HP
Published By: Intel Corporation     Published Date: Aug 25, 2014
Sponsored by: NEC and Intel® Xeon® processor Servers with the Intel® Xeon® processor E7 v2 family in a four-CPU configuration can deliver up to twice the processing performance, three times the memory capacity, and four times the I/O bandwidth of previous models. Together with their excellent transaction processing performance, these servers provide a high level of availability essential to enterprise systems via advanced RAS functions that guarantee the integrity of important data while also reducing costs and the frequency of server downtime. Intel, the Intel logo, Xeon, and Xeon Inside are trademarks or registered trademarks of Intel Corporation in the U.S. and/or other countries.
Tags : 
enterprise systems, platform, datacenter, servers, virtualization, customer value, analytics, application owners, system integrators, big data, reliability, enterprise, availability, serviceability, processor, performance testing, server virtualization
    
Intel Corporation
Published By: Semcasting     Published Date: Feb 19, 2014
This white paper will guide you through a series of third party studies that have been completed recently on the diminishing reach and effectiveness of audience targeting with cookies. The numbers are challenging and it appears it may be time for an alternative to the cookie.
Tags : 
digital targeting, ip targeting, online business marketing, online targeting, online ad targeting, internet marketing, online marketing, online marketing strategies, digital target, behavioral targeting online, targeted online advertising, ip address targeting, ip geo targeting, internet marketing business, ip zones, retail marketing, online retail marketing, retail trade area, retail marketing services, retail marketing ideas
    
Semcasting
Published By: Semcasting     Published Date: Feb 19, 2014
Despite the fact that digital advertising is experiencing explosive growth, the industry still faces two significant challenges that can impede campaign performance: reach to unique users and data verification. In order to attract brand advertisers that are still spending a large portion of their budget on traditional media, the industry must find a better targeting solution. In this white paper from Semcasting, you will learn more about the limitations of cookie-based behavioral targeting and how a new solution called IP Zones can dramatically increase both the scale and accuracy of online display campaigns.
Tags : 
digital targeting, ip targeting, online business marketing, online targeting, online ad targeting, internet marketing, online marketing, online marketing strategies, digital target, behavioral targeting online, targeted online advertising, ip address targeting, ip geo targeting, internet marketing business, ip zones, retail marketing, online retail marketing, retail trade area, retail marketing services, retail marketing ideas
    
Semcasting
Published By: CrowdCompass     Published Date: Jul 20, 2017
You know you need a mobile event app, but choosing the right one can sometimes be a tricky, painstaking process. Ranging from freemium/low-cost solutions to full capability, multi-event apps, determining what you need for your conferences, tradeshows, incentive events, meetings, and more is no easy task. Let us help. Download our free eBook: “Simple Questions for Success – The Definitive Guide to Selecting a Mobile App” and find the awesome event app of your, and your attendees, dreams.
Tags : 
mobile app, event app, easy planning, social media integration, social media, networking capabilities, mobile event app, return on investment, mobile personalization, mobile networking, mobile interaction, mobile security, data privacy
    
CrowdCompass
Published By: Act-On     Published Date: Aug 18, 2014
A Gleansight Deep Dive assessing the benefits and tradeoffs for the small-and-medium-size business. Should you consider transitioning from using a stand-alone email marketing solution to a full-blown marketing automation platform? What are the tradeoffs between the two technologies?
Tags : 
    
Act-On
Published By: TDI Transistor Devices     Published Date: Feb 06, 2009
Modern Electronic Systems are quite often powered from a three-phase power source. While utilizing power modules that operate directly from three-phase power might seem to provide optimal simplicity and flexibility, the added complexity required to realize three-phase power factor corrected circuitry usually negates any potential savings.
Tags : 
tdi, transistor devices, electronic power systems, single phase power, three phase power, power transfer maximization, component count, three phase circuits
    
TDI Transistor Devices
Published By: Schneider Electric     Published Date: Nov 11, 2016
There is an increasing trend towards N+1 UPS architectures – rather than 2N – as IT fault tolerance through software continues to improve.
Tags : 
    
Schneider Electric
Published By: IBM     Published Date: Dec 03, 2008
With the IBM® System Storage™ DS3400 storage server, SAP customers can increase the efficiency of their storage infrastructure while reducing costs at the same time. This white paper describes the advantages of using the DS3400 storage server in an SAP® environment, and how to get the performance you need with the right layout for your SAP system.
Tags : 
ibm, express seller, sap performance, ds3400 storage server, storage efficiency, ibm system storage
    
IBM
Published By: IBM     Published Date: Sep 02, 2009
The real question is how to properly value the products and make the decisions that will deliver the most value to the business.
Tags : 
product portfolio trade-offs, focal point, ibm, webcast, strategic decisions, tough times, tough choices, business roi, product lifecycle, telelogic focal point
    
IBM
Published By: IBM     Published Date: Sep 02, 2009
With the MDD techniques supported by IBM Rational Rhapsody, you can analyze trade studies more rigorously than is possible with a document-driven approach.
Tags : 
system engineering, trade studies, ibm, design space, life cycle, traditional document-driven techniques, webcast, model-driven development (mdd), telelogic® rhapsody®, trade study analysis, system engineering process
    
IBM
Published By: Sigaba     Published Date: Aug 21, 2009
This white paper reviews the five most common current approaches to messaging security. While the five approaches discussed here are not the comprehensive list of available solutions, they are the basis for most variations of messaging security solutions available today.
Tags : 
email security, security management, security policies, secure instant messaging, intranets, messaging, sigaba
    
Sigaba
Published By: Trusted Network Tech     Published Date: Nov 06, 2006
This paper addresses several issues organizations should consider when analyzing the efficacy and costs of NAC solutions and looks at a complementary alternative technology based on TNT’s Identity™, which helps address and overcome some limitations of NAC solutions.
Tags : 
access control, nac, network, identity management, network access control, security, internet security, trusted network tech
    
Trusted Network Tech
Published By: IAG Consulting     Published Date: Aug 23, 2010
Find the path to success in business requirements definition and management. Technology pervades almost every aspect of corporate competitiveness from customer experience to the products and services offered. Companies that do a poor job at requirements definition and management have trouble communicating needs between the business and technology operations. This inability to clearly and efficiently communicate business needs will eventually show up in the fiscal results of even the largest publicly traded companies.
Tags : 
iag, project management, project management, maturity, benchmark, microcast, consulting, business requirements
    
IAG Consulting
Published By: Symantec     Published Date: Nov 17, 2006
The latest release of Backup Exec allows you to eliminate backup windows and recover individual Exchange messages, folders, and mailboxes - without mailbox backups. Learn more about how Symantec Backup Exec™ 11d for Windows® Servers provides continuous, cost-effective, and high-performance disk-to-disk-to-tape backup and recovery for Windows server data.
Tags : 
disaster recovery, backup and recovery, storage management, network management, network performance, network performance management, business continuity, windows server, servers, symantec
    
Symantec
Published By: Quocirca     Published Date: Jan 11, 2008
Small and medium-sized businesses (SMBs) can benefit from the expansive use of information technology (IT) just as much as their larger counterparts. Indeed, in many cases they have to, because to trade they need to interact with business partners of all sizes and IT failure affects not just internal users but those of third parties.
Tags : 
insight report, quocirca, smb, small business, soho, mid-sized business, smbs, data security, network security, small business it, it networks, securing data
    
Quocirca
Published By: Quocirca     Published Date: Aug 05, 2008
As the EU continues to expand, European businesses must look to how they can trade across increasing numbers of regional boundaries, languages, cultures and laws, both within the EU and across the greater Europe. The opportunities are huge – but the problems will daunt many who wish to enter into a pan-European trading environment.
Tags : 
quocirca
    
Quocirca
Published By: LANDesk     Published Date: Feb 12, 2007
White paper discussing how the LANDesk® Management Gateway in LANDesk® management solutions 8.6, along with LANDesk® Trusted Access™, help organizations extend the enterprise management of remote devices across the Internet without having to "punch holes" in the firewall or compromise the security of such devices or the corporate infrastructure.
Tags : 
network security, remote access, security, mobile workers, mobile workforce, remote user, remote workers, trusted access, web service security, internet security, landesk
    
LANDesk
Published By: LANDesk     Published Date: Feb 12, 2007
This white paper discusses how the network access control capabilities of LANDesk® Trusted Access™ available within LANDesk Security Suite 8.6 help organizations protect and secure their enterprise networks at their endpoints to reduce malicious attacks and the resulting downtime, lost productivity, and lost revenues.
Tags : 
network security, access control, nac, network access control, intrusion prevention, landesk
    
LANDesk
Published By: Trapeze Networks     Published Date: Apr 16, 2007
This paper identifies the requirements for next-generation WLANs, examines the limitations of existing approaches, and describes an innovative WLAN architecture from Trapeze Networks called Smart Mobile™, which overcomes those limitations.
Tags : 
802.11n, wireless, wi-fi, wireless local area network, wlan, wireless network, mobile, voice over ip, voip, voice over wlan, vowlanm, network access points, infrastructure, controllers, switches, network management, trapeze networks, cisco, aruba
    
Trapeze Networks
Published By: ProofSpace     Published Date: Sep 10, 2007
Read this paper and learn the principles that are prerequisites to enforceable electronic agreements as required by existing legal standards and electronic signature legislation.  This paper will also specify sixteen measurement criteria that can be used as metrics to assess whether the architecture of an electronic transaction will meet the requirements of admissibility.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography, public key cryptography, time stamp, timestamp, time and data stamping, file authentication, x9.95, accredited standards committee x9, x9.95-compliant, transient key technology, electronic signatures, fda 21 cfr part 11, u.s. e-sign act
    
ProofSpace
Published By: Ecora Software     Published Date: Aug 16, 2007
This paper offers the industry's only solution for automating detailed reporting that ensures Enterprise Configuration Visibility™ – reducing the time and cost associated with IT control, compliance, and security, and ensuring the highest levels of availability and performance for your organization.
Tags : 
configuration management, compliance, security management, audit, auditing, regulatory compliance, monitoring, itil, change management, ecora
    
Ecora Software
Published By: InvestBrite     Published Date: May 05, 2008
Learn how Trade Center needed to reach highly qualified individual investors while educating them on the benefits of their products and services. Read how InvestBrite can help your investment firm get qualified investing sales leads. Read this paper today.
Tags : 
investor, investing, investbrite, stocks, bonds, trading, trade, stock
    
InvestBrite
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.