ngo

Results 301 - 325 of 340Sort Results By: Published Date | Title | Company Name
Published By: Quocirca     Published Date: Feb 23, 2009
Network Centric Operations (NCO) recognises the demand for pervasive decision-making in the modern battlespace. NCO provides the ability to leverage information networks to generate a more dynamic and agile decision-making space. An important dimension of this approach is the technological flexibility to quickly move the decision-making authority hierarchically or geographically as the situation demands. A fundamental enabler to this approach is the concept of a services orientated architecture (SOA). The use of industry-standard IT architectures provides the means of ensuring that systems can be provisioned rapidly, can be shared as appropriate, and can give the flexibility and response times required within such challenging environments.
Tags : 
quocirca, network centric operations, agile decision-making, services orientated architecture, soa, enterprise service bus, esb, non-governmental organizations, ngos, network centric warfare, ncw, standardized battlespace, common operating picture, cop, access points, networking
    
Quocirca
Published By: Quocirca     Published Date: Apr 08, 2009
The automation of traditional paper based processes with technology can lead to unnecessary complexity. This leads to increased costs and other challenges which can be avoided if solutions are simple and fit closely to the business task in hand.
Tags : 
quocirca, paper systems, it systems, it infrastructure, mobile technologies, functionality, capacity, cost control, cost cutting, ongoing costs, tco, total cost of ownership, anoto, automating business processes, paperless office, paper-based processes, network connection reliability, wi-fi, bluetooth, hardware choices
    
Quocirca
Published By: Customer Chemistry     Published Date: Nov 14, 2006
As part of the ongoing effort to differentiate products and services, best-in-breed organizations are now using a tool called Customer Lifetime Value (CLV). CLV is “a marketing metric that projects the value of a customer over the entire history of that customer's relationship with a company.”
Tags : 
marketing, customer lifetime, customer research, customer intelligence, customer relationship management, crm, customer value, customer chemistry
    
Customer Chemistry
Published By: Indigo Rose Corporation     Published Date: Feb 14, 2007
Software Development is the ongoing process of getting software onto end-user's systems and keeping that software up to date. Learn how each Indigo Rose development product fits into the software development cycle.
Tags : 
software development, software deployment, indigo rose
    
Indigo Rose Corporation
Published By: Jumpnode Systems     Published Date: Jun 12, 2007
Network monitoring software packages require complex installation, ongoing maintenance and additional costs for servers and third-party applications. Software-as-a-Service (SaaS) network monitoring alternatives greatly simplify implementation and maintenance, but they rely on uninterrupted Internet access to function, often require complex VPNs or firewall modifications, and typically provide limited access to historical data.
Tags : 
monitoring, software as a service, saas, high availability, network management, jumpnode
    
Jumpnode Systems
Published By: eFax     Published Date: May 15, 2007
Fax servers promise easier administration and cheaper faxing but most deployments fail to meet their goals because of unexpected, ongoing costs and unpredictable capacity needs. This paper offers information on why outsourced fax services eliminate the time, effort and cost issues associated with fax servers, but retain all of the same functionality.
Tags : 
fax, faxing, ip faxing, fax server, fax servers, ip networking, ip networks, converged communications, integrated communications, communications convergence, convergence, communication, communications, protus, protus ip solutions
    
eFax
Published By: CCSS     Published Date: Jul 05, 2007
Is a lack of availability costing your business thousands or even hundreds of thousands of dollars? Assessing the true financial impact of unplanned downtime may surprise you. Placing a dollar amount on this issue is often the first step and biggest motivator to meeting your ongoing availability requirements.
Tags : 
availability, high availability, business continuity, network monitoring, server monitoring, down time, ccss, availability monitoring, monitoring, profitability
    
CCSS
Published By: Clarus Systems     Published Date: Mar 18, 2008
Clarus Systems, Inc. answers the demands of the market by providing enterprises, systems integrators and managed service providers with scaleable IP Communications solutions that maximize ongoing operations and ensure increased end user confidence and efficiency. Learn more about Clarus Systems and how they can help your business in this data sheet.
Tags : 
itil, clarus systems, ipt, ip telephony, unified communications, cisco, callmanager, best practices, voice engineering, pdioo, strategies, deployment, operations, day 1, day 2, clarusipc, automated testing, business intelligence, performance management, configuration management
    
Clarus Systems
Published By: Clarus Systems     Published Date: Mar 18, 2008
Enterprise networks are going through massive change, and the convergence of voice and data including Communication deployments, upgrades, transformations and ongoing management remain a top priority. According industry analysts at Aberdeen Group, 61% are planning for Communications in the next two years. In order to get the most from their Unified Communications investment at the time of deployment and beyond, enterprises must leverage both active testing and configuration analysis techniques to certify and validate that environments are configured as designed.
Tags : 
itil, clarus systems, ipt, ip telephony, unified communications, cisco, callmanager, best practices, voice engineering, pdioo, strategies, deployment, operations, day 1, day 2, clarusipc, automated testing, business intelligence, performance management, configuration management
    
Clarus Systems
Published By: Ecessa Corporation     Published Date: Mar 11, 2009
Today’s Wide Area Networks (WANs) are experiencing increased saturation with the deployment of bandwidth-intensive applications, increased numbers of users, and the need for reliable security transmissions. IT personnel responsible for these issues acknowledge the increased congestion and have strived to maintain high levels of network performance. At the same time, IT departments are tasked with the job of lowering the cost of network infrastructure and ongoing operations. Network administrators continually face the challenge of balancing the increased use of critical applications on the Internet, while eliminating downtime and congestion from affecting user quality and day-to-day business operations.
Tags : 
adsl load balancing, vpn load balancing and redundancy, bandwidth aggregation, qos, bandwidth control, bandwidth management, multi-homing, bgp multihoming, broadband bonding, broadband failover, disaster recovery, business continuity, wan load balancing, wan failover, dsl failover, dsl load balancing, disaster recovery solutions, dual wan router, wan failover, isp failover
    
Ecessa Corporation
Published By: Lumension     Published Date: Jan 22, 2013
Keeping track of 10,000+ of anything is a management nightmare. With ongoing compliance and evolving attacks against vulnerable endpoint devices, getting a handle on managing endpoints becomes more important.
Tags : 
endpoint management, security, compliance, patch management, file integrity monitoring, device control
    
Lumension
Published By: Dell Storage     Published Date: Aug 14, 2012
Engagement with customers online has evolved from novelty to necessity, with an estimated $202 billion spent in 2011 and projected 10% growth to $327 billion in 2016, according to Forrester Research. Businesses are maneuvering to connect with the growing pool of online customers, but the move to eCommerce brings new security risks with the exchange of sensitive consumer information, including cardholder data and personally identifiable information that can enable identity theft. At stake is reputation of brand, ongoing access to merchant credit lines, and substantial penalties and remediation in the event of a breach. This white paper elucidates the aspects of PCI DSS (Payment Card Industry Data Security Standards) compliance that must be considered when choosing a secure environment for servers involved in eCommerce. Whether deciding to outsource or keep data hosting in-house, any company collecting, storing or transmitting customer cardholder data needs to be compliant, and this document helps pinpoint the specific concerns and standards a company should be aware of when choosing how to keep their data secure. Understanding requirements and best practices for security policies and procedures, physical safeguards, and security technologies is essential to establishing cardholder data security and meeting QSA and SAQ audit requirements.
Tags : 
pci, compliant, data, centers, engagement, connect, ecommerce, compliance, complaint, data, breach, remediation, dss, payment, card, industry, data, security, standards, qsa
    
Dell Storage
Published By: HP and Intel® Xeon® processors     Published Date: May 08, 2012
This EMA paper reviews the HP IRF approach and examines potential savings and efficiencies that it enables specific to the design, deployment, and ongoing operations management of Ethernet networks.
Tags : 
smb, networks, operations, ethernet, ema, design, ethernet networks, ip networks, sustained growth, savings, efficiencies
    
HP and Intel® Xeon® processors
Published By: Adobe     Published Date: Mar 07, 2013
This paper discusses the different attribution models available to marketers, the channels that should be included when conducting multichannel attribution modelling and recommendations for making attribution a part of your ongoing strategy.
Tags : 
budget allocation, marketing, multichannel marketing, digital marketing, adobe, attribution modelling, emerging marketing
    
Adobe
Published By: CDW     Published Date: Sep 17, 2014
We now live in a flash centric world where all active data must be on flash. This doesn’t mean, however, that all data must be on flash. The best approach is to understand your application mix and workload requirements. Some key apps, like databases, are latency intolerant and should be pinned to flash. Others apps can benefit from fully-automated storage tiering. EMC’s market leading VMAX and VNX systems are flexible choices that can deliver all-flash and hybrid services. CDW and EMC has you covered!
Tags : 
data, market, flash, systems, key apps, centric, application, tiering, latency, intolerant, storage, automated, hybrid, services, leading, active
    
CDW
Published By: IBM     Published Date: Apr 04, 2013
What is a workload-optimized system? Simply put, it is one that matches architecture to the needs it is purchased for. Systems performance is no longer defined only by the fastest processor or other leading benchmarks, but rather by the ability to deploy new services faster, with higher quality, and within financial objectives. Commoditization has led some to think that financial objectives will lead to Intel-based systems for all uses. In this Advisory, we show that this is not the case, and by way of example, we demonstrate how Power Systems can be less expensive for ongoing operational costs and initial outlay.
Tags : 
business value, processor, new services faster, higher quality, financial objectives, intel-based, commoditization
    
IBM
Published By: HireRight     Published Date: May 01, 2013
Employee screening is a critical capability for organizations today. No longer just a part of the hiring process, employee background checks, eligibility verification and even tax credit screening are increasingly part of the ongoing talent life cycle. Aberdeen Group’s latest survey on talent acquisition strategies looked at the practices of over 480 organizations for best practices used and results delivered through the use of employee screening tools and solutions.
Tags : 
employee screening strategies, human resources, hireright
    
HireRight
Published By: IBM     Published Date: Sep 27, 2013
Buy-and-hold strategies can actually add costs to the datacenter, as systems age in place. Not only do hardware maintenance and software maintenance fees rise, over time – but the aging of applications also costs the organization money. Investing in a transition from POWER5 to POWER7 resulted in a return on investment (ROI) of more than 150 percent over three years.An insightful and and compelling discussion by IDC that reviews the primary reason for maintaining current systems -- Return on Investment. IDC studied IBM Power Systems sites that remained on the POWER5 platform long after its initial introduction in 2004. When comparisons to the succeeding generation of POWER7 are made, customers have found that the increase in scalability and performance of POWER7 systems, combined with a reduction in server "footprint" size and overall electrical requirements, resulted in significant reductions in ongoing costs, or opex, per 100 end users supported.
Tags : 
    
IBM
Published By: IBM     Published Date: Oct 24, 2013
"The potential to manage assets more efficiently, replace and upgrade them, and exploit them for purposes beyond their initial role, is significant in all cities in today’s world. However, technologies that support asset management in cities are numerous, fragmented and often inadequate. For any individual city agency, the level of cost and effort required to make improvement may seem daunting. This white paper highlights how Capgemini can help cities to become ‘smarter’: It describes how to offer to city agencies a leading practice asset management technical solution provided as-a-Service. This accelerates implementation, substantially removes funding hurdles, ensures an ongoing quality solution and incentivizes cities to migrate from a fragmented, costly and inadequate model to a common leading-edge solution."
Tags : 
city assets, asset managemnet, efficiency, smart city, work management, architecture, real estate management, facilities management, as-a-service, asset investment planning
    
IBM
Published By: Symantec     Published Date: Oct 07, 2014
An ongoing cyberespionage campaign against a range of targets, mainly in the energy sector, gave attackers the ability to mount sabotage operations against their victims. The attackers, known to Symantec as Dragonfly, managed to compromise a number of strategically important organizations for spying purposes and, if they had used the sabotage capabilities open to them, could have caused damage or disruption to energy supplies in affected countries. Read more into the research on these attacks in this Symantec Security Response special report.
Tags : 
cyberespionage attacks, range of targets, security, spying, damage or disruption
    
Symantec
Published By: IBM     Published Date: Aug 06, 2014
How customer-centric transformation can lead to deeper relationships, increased revenue and streamlined operations. Though the global economy is still sluggishly shaking off the effects of the near meltdown in 2008 and the ongoing sovereign debt crisis, banks in both the emerging and developed economies have as opportunity to manage enormous capital growth and wealth creation. But to regain customer confidence and earn their slice of the increasingly competitive market, banks must transform themselves. They must jettison decades-old, product-oriented operating models and become fully client-centric.
Tags : 
ibm, banking, customer centric, revenue, customer confidence, competitive market
    
IBM
Published By: AdRoll     Published Date: Dec 20, 2017
There is a great misconception that the purpose of attribution modelling is to arrive at a singular, concrete truth; however, the reality is much more nuanced. Attribution modeling is actually an ongoing process of improving how we measure marketing’s impact in order to improve our decision making over time. There are a number of attribution principles that still confuse marketers: Why is attribution a process and not an end state? Why is making small steps forward really better than doing nothing? Why does the perfect attribution model not exist? What makes attribution an ROI investment and not a cost center? With the many attribution myths, challenges, and philosophies in mind, AdRoll and Econsultancy have partnered for a second year in a row to produce The State of Marketing Attribution 2017. This time around we’ve broaden our focus beyond Europe to include content that also covers North America and Asia-Pacific.
Tags : 
marketing attribution, attribution modeling, roi, attribution
    
AdRoll
Published By: MarkLogic     Published Date: Dec 03, 2014
So many people are realising that yesterday’s technology can’t support today’s fast-changing data and are turning to a new generation of database: NoSQL. NoSQL makes it easy to consolidate your heterogeneous data and consolidate disparate data silos because you don’t need to make data conform to the row-and-column restrictions of relational technology. Get a head start and download Enterprise NoSQL for Dummies and discover: • The NoSQL lingo • What it does and how it works • How it can be used • Tips for what to look for in an Enterprise NoSQL database Go beyond relational and learn how NoSQL allows you to build applications with greater ease and speed! http://info.marklogic.com/nosql-for-dummies.html
Tags : 
enterprise, nosql, relational, databases, data storage, management system, application, scalable
    
MarkLogic
Published By: MobileIron     Published Date: Apr 13, 2015
Enterprises around the world have been searching for a way to securely enable Android™ devices for work, but have shied away from the platform due to ongoing security and fragmentation concerns. Delayed or non-existent Android security patches, malicious app store activity, and other security gaps have led organizations to distrust the platform, particularly those in industries with tight security and compliance requirements. This white paper is intended to help CISOs understand how Lollipop and Android for Work can meet critical security and compliance requirements, even in high-security organizations. It also provides recommendations for implementing Lollipop and Android for Work as part of a BYOD program.
Tags : 
    
MobileIron
Published By: VMware AirWatch     Published Date: Oct 02, 2015
Nonostante la massiccia adozione delle piattaforme mobili, degli smartphone e dei tablet, le applicazioni e i desktop Windows mantengono un ruolo centrale nelle aziende di oggi. Tuttavia, a differenza di quanto avvenuto per le tecnologie mobili, le architetture desktop non si sono evolute nel corso degli anni. È giunto il momento di una trasformazione del desktop.
Tags : 
byod, emm, mobility
    
VMware AirWatch
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.