environments

Results 1201 - 1225 of 1233Sort Results By: Published Date | Title | Company Name
Published By: Dynapar Corp.     Published Date: Jun 22, 2008
In most drilling applications encoders are used to provide position and speed feedback for proper control of equipment like top drives and pipe racking systems. However, these electronic devices require special attention when used in hazardous environments such as a drilling platform. In this paper, we discuss ways to make encoders suitable for hazardous duty.
Tags : 
dynapar, encoder, sensor, motion feedback, product design, engineer, engineering, encoder output
    
Dynapar Corp.
Published By: VMware Dell     Published Date: Jun 05, 2008
VMware solutions help customers meet their energy saving goals by enabling safe consolidation of underutilized x86 desktops and servers onto less hardware, both through initial consolidation efforts and dynamically as computing requirements change. This white paper explains how VMware virtualization provides the foundation for dramatically more energy efficient IT environments.
Tags : 
power, data center, green, environmental, environment, spend, server virtualization, virtual machine
    
VMware Dell
Published By: IBM     Published Date: May 30, 2008
Organizations with data-sharing environments, complex information and systems hinder business responsiveness and decision makers’ ability to make informed decisions. This white paper will describe how engaging in a master data management (MDM) project enables effective governance of data - specifically master data - and achieves maturity in key categories of the IBM Data Governance Maturity Model.
Tags : 
ibm, mdm, master data management, data management, data governance
    
IBM
Published By: IBM     Published Date: May 30, 2008
Organizations must adapt more rapidly than ever before - which means that they must align their IT environments with their business goals and deliver information on demand, when and where it is needed. In this white paper, the experts at IBM discuss how your company can meet this need for information on demand with Service Oriented Architecture (SOA), a business-centric approach to IT architecture that supports integration through linked, repeatable business tasks or services.
Tags : 
xml, soa, service oriented, information management, leveraging information, li campaign, ibm li, business intelligence
    
IBM
Published By: ASG Software Solutions     Published Date: Apr 30, 2008
In order to provide high quality, cost effective business services in complex, distributed environments, improved IT management strategies are required. Business Service Management (BSM) is a strategic approach to managing IT services in support of improved business performance.
Tags : 
asg, sla, cmdb, bsm, metadata, itsm, metacmdb, lob
    
ASG Software Solutions
Published By: Tripwire     Published Date: Apr 28, 2008
Learn more about the security risks and vulnerabilities faced by organizations, and the elements of a proactive security approach. Then find out how Tripwire helps organizations attain and maintain a good security posture using industry-leading configuration assessment and change auditing to harden systems against security breaches, automate compliance with security standards and policies, identify configuration changes, and resolve vulnerabilities.
Tags : 
tripwire, security, risk management, configuration management, change management, change audit, change auditing, security policies
    
Tripwire
Published By: Vision Solutions     Published Date: Apr 24, 2008
This white paper will provide a road map to the most effective strategies and technologies to protect data and provide fast recovery should data be lost or corrupted due to accident or malicious action.
Tags : 
vision, high availability, ibm, cdp, aix
    
Vision Solutions
Published By: IBM     Published Date: Apr 22, 2008
As service execution becomes increasingly important and complex, traditional job management tools aren't cutting it. With IBM Tivoli workload automation products, you can easily automate and manage simultaneous workloads across heterogeneous environments.
Tags : 
business process, automation, tivoli, ibm, opt it, ibm opt it, service management, productivity
    
IBM
Published By: Vision Solutions     Published Date: Apr 11, 2008
If you need more than tape backup to protect your critical applications running on AIX operating environments, download this white paper and learn your options and strategies, including how new technologies have significantly improved the recovery time and data recovery points for AIX.
Tags : 
data management, disaster recovery, business continuity, ibm aix, backup, recovery, vision, vision solutions
    
Vision Solutions
Published By: Clarus Systems     Published Date: Mar 18, 2008
Enterprise networks are going through massive change, and the convergence of voice and data including Communication deployments, upgrades, transformations and ongoing management remain a top priority. According industry analysts at Aberdeen Group, 61% are planning for Communications in the next two years. In order to get the most from their Unified Communications investment at the time of deployment and beyond, enterprises must leverage both active testing and configuration analysis techniques to certify and validate that environments are configured as designed.
Tags : 
itil, clarus systems, ipt, ip telephony, unified communications, cisco, callmanager, best practices
    
Clarus Systems
Published By: Clarus Systems     Published Date: Mar 18, 2008
In today’s global marketplace, you rely on your IP telephony environment to unite employees who work remotely, in a branch, or at the office headquarters by providing seamless, effective communications. Whether at the time of deployment, during an upgrade, or through an operational review, validating these environments to function properly and meet user expectations is critical.
Tags : 
itil, clarus systems, ipt, ip telephony, unified communications, cisco, callmanager, best practices
    
Clarus Systems
Published By: IBM     Published Date: Mar 17, 2008
By doing more with less, you can realize savings and reduce complexity at the same time. IBM BladeCenter is a complete, compact and integrated system designed to simplify IT in small and mid-sized offices and distributed environments. It's packed with energy-saving features that lower operating costs and it's flexible enough to grow with your business. Learn about the features and options of the IBM BladeCenter and see why it's the right choice for your diverse business needs.
Tags : 
ibm, move up, blade system, blade center, blade, blade server, bladesystem, bladecenter
    
IBM
Published By: Tripwire     Published Date: Feb 25, 2008
Find out how to maintain the same level of stability and security across both virtual and physical environments, using the same software and approach.
Tags : 
virtual machine, virtual, virtualize, virtualized, virtualization, virtual server, configuration, configuration management
    
Tripwire
Published By: Secure Computing     Published Date: Feb 20, 2008
Reputation systems add a critical first line of advanced protection to help organizations accurately detect and block all types of threats to their messaging, web, and network environments.  In simplest terms, deploying a reputation service at the network edge is analogous to having a peephole in the front door of your house.  You let in people you know and trust, question the ones you don’t know and shun the ones who look suspicious.  Just by taking these simple measures you reduce your risk.
Tags : 
it spending, whitelist, whitelisting, email security, spam, antispam, cast iron, castiron
    
Secure Computing
Published By: VMware Dell     Published Date: Jan 31, 2008
Aternity, Inc. is the leader in Frontline Performance Intelligence for Global 1000 enterprises. Two of the biggest challenges Aternity faces as a software developer are: 1) testing its software in different IT environments; and 2) deploying its software at customer sites.  Fortunately, VMware software was able to address both these challenges.
Tags : 
vmware, software testing, virtual, virtualization, virtualize, virtual server, server, servers
    
VMware Dell
Published By: Solidcore     Published Date: Jan 07, 2008
This IT audit checklist guide includes advice on assessing the effectiveness of change management in a variety of areas.   As companies grow more dependent on interdependent IT systems, the risks associated with untested changes in development and production environments have increased proportionately.
Tags : 
audit, auditing, security audit, vulnerabilities, vulnerability, vulnerability management, security management, auditor
    
Solidcore
Published By: Vision Solutions     Published Date: Dec 31, 2007
For AIX IT departments looking to take the next step in data protection strategies, CDP is an essential consideration. Analysts agree that businesses will be incorporating this strategy in the next few years as part of an integrated solution. CDP enables you to reverse data corruption in a fraction of the time and labor required for recovery from tape.
Tags : 
aix, data protection, continuous data protection, cdp, high availability, disaster recovery, disk backup, tape backup
    
Vision Solutions
Published By: Vision Solutions     Published Date: Dec 31, 2007
This white paper provides a basic understanding of the building blocks of IT and business continuity—from understanding the concepts of disaster recovery and information availability to calculating the business impact of downtime and selecting the right software solution.
Tags : 
disaster recovery, business continuity, disk backup, tape backup, data backup, data replication, disaster, high availability
    
Vision Solutions
Published By: Vision Solutions     Published Date: Dec 31, 2007
Downtime and data loss pose intolerable risks to every business today. From IT departments to the Board Room, managers have seen the importance of business uptime and data protection to continued success, productivity and profitability.
Tags : 
aix, data protection, continuous data protection, cdp, high availability, disaster recovery, disk backup, tape backup
    
Vision Solutions
Published By: Sanbolic     Published Date: Dec 03, 2007
Clustered volume manager enables administrators to centrally configure and assign storage assets in a SAN storage environment in Microsoft System Management Server 2003 and Microsoft Operations Manager 2005 environments.
Tags : 
windows, storage, san, nas, sanbolic
    
Sanbolic
Published By: Imprivata     Published Date: Nov 27, 2007
Increased pressure for cost-efficient administration, productive work environments and an array of strict government regulations are driving increased demand for integrated user Provisioning/SSO solutions that are affordable, easy to maintain and secure.
Tags : 
sso, single sign on, user management, authentication, identity management, imprivata, ppi
    
Imprivata
Published By: SPAMfighter     Published Date: Nov 27, 2007
This paper will discuss the shortcomings of some established filtering methods and outline how SPAMfighter's community-based approach to filtering can result in it performing much better than competing products and delivering a far superior return on investment.
Tags : 
spam, anti spam, anti-spam, spamfighter, spam fighter, exchange, productivity, costs
    
SPAMfighter
Published By: VMware/Intel Server Refresh and Cost Savings     Published Date: Oct 23, 2007
Today's use of virtualization technology allows IT professionals to automatically manage the resources of the physical server to efficiently support multiple operating systems, each supporting different applications. This IDC Technology Assessment presents IDC's view of how virtualization technologies are impacting and will continue to impact operating environments and the operating environment market near- and long-term.
Tags : 
vmware, operating environments, virtualization, x86, server virtualization, data center, fc san, fibre
    
VMware/Intel Server Refresh and Cost Savings
Published By: Appistry     Published Date: Oct 11, 2007
This white paper describes how software-based, real-time grid environments -- i.e. application fabrics -- are successfully meeting the requirements of today's most demanding applications, delivering scalability, manageability and affordability.
Tags : 
application, application performance, application performance management, application fabric, application fabrics, grid computing, appistry
    
Appistry
Published By: Blue Lane     Published Date: Oct 01, 2007
The healthcare industry has benefited from the breakneck pace of digitization - spanning everything from payments to patient records to X-ray film - but it has also been increasingly exposed to greater risk. Efforts to increase healthcare provider productivity via increased digitization and system interconnectivity have to be counterbalanced against the growing concerns for patient privacy and a backdrop of increasing liability.
Tags : 
healthcare, health care, patient privacy, privacy, patch management, patch, patch server, hipaa
    
Blue Lane
Start   Previous    36 37 38 39 40 41 42 43 44 45 46 47 48 49 50    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.