users

Results 1526 - 1550 of 1761Sort Results By: Published Date | Title | Company Name
Published By: Alacritech     Published Date: Aug 21, 2009
Growth challenges in Microsoft Exchange environments can be solved with the deployment of iSCSI storage. Microsoft favors block storage such as iSCSI for Exchange deployments. Attaching iSCSI storage to a network provides the server with headroom for adding Exchange users, since the storage can grow without being restrained by the server's ability to add storage.
Tags : 
microsoft exchange, iscsi, iscsi storage, storage, windows server, windows exchange server, alacritech
    
Alacritech
Published By: Schneider Electric     Published Date: Jun 07, 2019
New digital technology now makes it feasible to integrate process control and SIF within a common automation infrastructure. While this can provide productivity and asset management benefits, if not done correctly, it can also compromise the safety and security of an industrial operation. Cybersecurity and sabotage vulnerability further accentuate the need for securing the safety instrumented system (SIS). Certainly, a common platform approach using similar hardware and software dedicated for control and safety functions, respectively, can provide the potential for cost savings. However, it is widely acknowledged that utilizing separate, independent, and diverse hardware/software for safety and control is the optimal way to protect against potentially catastrophic common cause and systematic design and application errors. Different vendors offer varied degrees of integration and solutions. The question is: how to provide an integrated control and safety solution with advanced functionality and productivity without compromising safety and security? And, where do users draw the line? A third-party (e.g., T‹V) certification of the hardware/software systems to IEC 61508 specifications carries significant advantages, but should this be the only criterion? How does a third-party certificate extend to the plantís overall assignment of risk reduction credits for all independent protection layers (IPL)? Control system embedded safety logic solvers may actually increase the SIL requirements of the SIF if no credit is allowed for the distributed control system (DCS) as an IPL. Download the white paper to learn more.
Tags : 
smart control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability, ecostruxure plant, process automation, profitable safety, defence in depth, industrial automation, process control, process systems
    
Schneider Electric
Published By: Aventail     Published Date: Aug 21, 2009
This white paper summarizes the capabilities of Aventail End Point Control and explains the range of features that increase IT control and data protection by giving users access that's finely tuned to the risks of their environment.
Tags : 
vpn, access control, ssl, network security, data protection, wireless security, aventail
    
Aventail
Published By: Aventail     Published Date: Aug 21, 2009
Today's office is now anywhere that a user can get an Internet connection, a PC on a business partner's network, a handheld at a WiFi hotspot, an airport kiosk, or a computer on a home WiFi network. But secure access is not the only driving business factor remote access must be easy to use and administer as well.
Tags : 
secure remote access, remote access, wireless security, secure wifi, wifi security, wi-fi security, wifi, wi-fi, ssl, vpn, secure access, aventail
    
Aventail
Published By: Aventail     Published Date: Aug 21, 2009
Network Access Control (NAC) solutions has arrived, with the support of some of the largest vendors in the IT/networking world, its own consortium, the excitement of users at organizations of all types and sizes, real available solutions, and significant revenue generated. Learn more in this white paper.
Tags : 
vpn, ssl, nac, network access control, access control, remote access, remote access security, aventail, ssl vpn
    
Aventail
Published By: Aventail     Published Date: Aug 21, 2009
In this white paper mobility expert Peter Rysavy discusses how Aventail SSL VPNs provide one secure gateway for access from any device, ensuring only authorized users get access to resources. And, with access that's optimized for specific device types, users only see information that's relevant to them at the time of access.
Tags : 
ssl, vpn, encryption, secure remote access, ssl vpn, secure mobile, mobile workers, secure mobile device, network security, aventail
    
Aventail
Published By: Clearvale by BroadVision     Published Date: Aug 21, 2009
The move towards self-service is clearly about mitigating costs. But self-service models can also deliver significant benefits to users when they combine the best of online convenience with the insight and personal touch of an experienced sales or service rep.
Tags : 
self service, customer service, customer relationship management, crm, live support, online help, online support, cost control, self-service, call center, call center management, broadvision
    
Clearvale by BroadVision
Published By: ClearNova     Published Date: Aug 21, 2009
In the 1990s, client/server was the predominant architecture used to build business applications. The applications had rich functionality, were responsive, and satisfied users' needs. Client/server worked in a time where the only networks were the ones owned and controlled by the enterprise and the only user base was internal.
Tags : 
internet apps, web applications, web application, web application development, j2ee, open source, ajax, web architecture, clearnova, clear nova
    
ClearNova
Published By: HP     Published Date: Aug 21, 2009
Read this guide to learn how HP works closely with organizations throughout the entire consolidation process which results in reduced costs, improved database administration, enhanced service levels to end users, and improved communication/collaboration.
Tags : 
data management, database development, dba, database administration, collaboration, service levels, database consolidation
    
HP
Published By: HP     Published Date: Jul 08, 2009
In these days of rampant data growth, a technology that can increase the effective capacity of a disk-based backup system by a ratio of up to 50:1 is big news. Data deduplication allows you to store up to 50 times more backup data into the same disk footprint — giving you a better chance of restoring your users' lost data from exactly the point they need it. This white paper explains how this innovative data deduplication solution works and also establishes how a 50:1 deduplication ratio may be achieved.
Tags : 
dynamic deduplication, 50:1, disk based backup, data, storage, rack, dedupe, data deduplication, hp storageworks, d2d backup systems, backup, data change
    
HP
Published By: IBM     Published Date: Feb 25, 2008
It has become clear that storage virtualization has become a core element of the storage strategy of forward-thinking end users and that the technology is finally delivering the value that it had promised earlier this decade. In this paper by Taneja Group, you'll learn about IBM SAN Volume Controller, its architecture and features, and about 5 tangible benefits of storage virtualization.
Tags : 
storage virtualization, storage, san, ibm, san volume controller, svc, ibm svc
    
IBM
Published By: IBM     Published Date: Apr 23, 2008
Imagine using your personal desktop on any computer. You can, with the IBM Virtual Client Solution. This demo explains the backend process of server-hosted services, shows how a user’s desktop is delivered through a remote connection, and demonstrates how an administrator can shift servers for IT simplification without interrupting users.  Watch the demo now.
Tags : 
ibm, ibm opt it, opt it, remote desktop, vnc, virtual client, virtual machine, virtual desktop, remote access
    
IBM
Published By: IBM     Published Date: May 30, 2008
Collaboration. It is the critical element to success and IBM Lotus software is at the forefront. With collaborative innovations that enable users to work the way they want to, Lotus software offers a compelling portfolio that is based on open, integrated and secure solutions.
Tags : 
collaboration, web 2.0, ibm, ibm ep, ep campaign
    
IBM
Published By: IBM     Published Date: May 30, 2008
In the age of Web 2.0, Internet users are rewriting the rules of social interaction, using blogs, forums, and social bookmarking for sharing information and sustaining relationships across borders. This IBM white paper looks at how organizations can achieve tangible business benefits through embracing these technologies.
Tags : 
ibm, collaboration, ibm ep, ep campaign, ibm
    
IBM
Published By: IBM     Published Date: May 30, 2008
Unified communications and collaboration strategies can help organizations deliver a user experience that brings together communications and collaboration silos across and beyond traditional business boundaries. This paper reviews how by providing users with a single, integrated experience across both business applications and communications and collaboration tools, organizations can cultivate more dynamic and flexible business systems.
Tags : 
unified communication, unified communications, collaboration, lotus, lotus notes, ibm ep, ep campaign, ibm
    
IBM
Published By: iDirect     Published Date: Aug 21, 2009
With developments in IP networking in general and the Internet in particular, the ability to transmit voice calls which have been traditionally handled by the public switched telephone network (PSTN) over a lower cost IP infrastructure has become a reality. More and more users are researching VoIP capability when purchasing a connection to the Internet or simply expanding their private intranet.
Tags : 
voice over ip, ip telephony, voip, ip networking, ip networks, pstn, telephone, phone, telecom, telecommunications, ip infrastructure, infrastucture, idirect
    
iDirect
Published By: Internet Security Systems     Published Date: Aug 21, 2009
Voice over Internet Protocol (Voice over IP or VoIP) allows users to make phone calls over the Internet, or any other IP network, using the packet switched network as a transmission medium rather than the traditional circuit transmissions of the PSTN. As the technology has become more reliable in recent years, companies have been moving to VoIP for a number of reasons.
Tags : 
voip, voice over ip, ip telephony, voip security, secure voip, pstn, network security, internet security, internet security systems
    
Internet Security Systems
Published By: Meru Networks     Published Date: Aug 21, 2009
As wireless LAN deployments and usage has increased, coupled with the near ubiquity of embedded Wi-Fi in laptops and smart phones, many enterprises are experiencing complaints from their users of slow or even dropped connections.
Tags : 
wlan, wireless lan, wifi, wi-fi, wlan deployment, pervasive wlan, ubiquitous wlan, microcells, macrocell, macrocells, wlan reliability, virtual cell, meru, meru networks
    
Meru Networks
Published By: NitroSecurity     Published Date: Aug 21, 2009
NitroSecurity's Active Network Response is a new security model that delivers network protection closer to the users at the network edge - stopping attacks before they can propagate throughout the network. 
Tags : 
network security, intrusion prevention, hackers, hacker detection, ips, anr, nitro security, nitrosecurity
    
NitroSecurity
Published By: Objectivity     Published Date: Aug 21, 2009
As business users expand to newer types of applications, and grow older ones, their attempts to use RDBMS encounter the "Relational Wall," where RDBMS technology no longer provides the performance and functionality needed. This paper measures the wall, explains what model and architectural differences cause it, how to foresee it, and how to avoid it.
Tags : 
database, rdbmss, object, object-oriented, object oriented, database performance, database development, database architecture, database model, dba, database administration, database administrator, dba, objectivity
    
Objectivity
Published By: OpSource     Published Date: Aug 21, 2009
End users are demanding it and competitors are already providing it, but how do software companies overcome the model, code, and operational issues preventing them from bringing SaaS to market? Read this paper to learn more about the hows and whys of SaaS.
Tags : 
saas, software as a service, service management, opsource
    
OpSource
Published By: PassGo     Published Date: Aug 21, 2009
Management of user ID accounts is expensive for business, frustrating for users, and open to abuse. A user account Helpdesk in a large organization typically deals with many thousands of Helpdesk calls each year, and the costs surrounding this are significant. Any operation that requires human intervention can become a bottleneck during especially busy periods.
Tags : 
crm, customer relationship management, customer service, helpdesk, help desk, support, cost control, productivity, customer support, service management, customer, customer interaction service, passgo, pass go
    
PassGo
Published By: RuleStream     Published Date: Aug 21, 2009
Capturing product knowledge has proven to be very difficult and early attempts at building systems to capture and reuse knowledge have failed because they were too limited technically, required users to be able to develop computer codes (or programs) to embody knowledge rules and actions, and they did not work with common product design tools such as CAD and PDM systems.
Tags : 
product design, product development, product information, pim, product information management, product lifecycle management, computer aided design, computer-aided design, rulestream
    
RuleStream
Published By: Safe Software     Published Date: Aug 21, 2009
Spatial data warehouses are becoming more common as government agencies, municipalities, utilities, telcos and other spatial data users start to share their data. This paper illustrates some of the issues that arise when undertaking data replication and data sharing.
Tags : 
data warehousing, share data, data management, data distribution, data sharing, replication, safe, safe software
    
Safe Software
Published By: Safe Software     Published Date: Aug 21, 2009
One of the most powerful aspects of GML is the freedom it gives users to define their own custom application schemas. While this capability provides extraordinary flexibility to data modellers, it also creates significant challenges, particularly when the data is interpreted.
Tags : 
spatial, geographic information system, geographic information systems, geological, geography, information management, data processing, database, data transfer, safe, safe software
    
Safe Software
Start   Previous    55 56 57 58 59 60 61 62 63 64 65 66 67 68 69    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.