users

Results 1676 - 1700 of 1806Sort Results By: Published Date | Title | Company Name
Published By: Meru Networks     Published Date: Aug 21, 2009
As wireless LAN deployments and usage has increased, coupled with the near ubiquity of embedded Wi-Fi in laptops and smart phones, many enterprises are experiencing complaints from their users of slow or even dropped connections.
Tags : 
wlan, wireless lan, wifi, wi-fi, wlan deployment, pervasive wlan, ubiquitous wlan, microcells, macrocell, macrocells, wlan reliability, virtual cell, meru, meru networks
    
Meru Networks
Published By: NitroSecurity     Published Date: Aug 21, 2009
NitroSecurity's Active Network Response is a new security model that delivers network protection closer to the users at the network edge - stopping attacks before they can propagate throughout the network. 
Tags : 
network security, intrusion prevention, hackers, hacker detection, ips, anr, nitro security, nitrosecurity
    
NitroSecurity
Published By: Objectivity     Published Date: Aug 21, 2009
As business users expand to newer types of applications, and grow older ones, their attempts to use RDBMS encounter the "Relational Wall," where RDBMS technology no longer provides the performance and functionality needed. This paper measures the wall, explains what model and architectural differences cause it, how to foresee it, and how to avoid it.
Tags : 
database, rdbmss, object, object-oriented, object oriented, database performance, database development, database architecture, database model, dba, database administration, database administrator, dba, objectivity
    
Objectivity
Published By: OpSource     Published Date: Aug 21, 2009
End users are demanding it and competitors are already providing it, but how do software companies overcome the model, code, and operational issues preventing them from bringing SaaS to market? Read this paper to learn more about the hows and whys of SaaS.
Tags : 
saas, software as a service, service management, opsource
    
OpSource
Published By: PassGo     Published Date: Aug 21, 2009
Management of user ID accounts is expensive for business, frustrating for users, and open to abuse. A user account Helpdesk in a large organization typically deals with many thousands of Helpdesk calls each year, and the costs surrounding this are significant. Any operation that requires human intervention can become a bottleneck during especially busy periods.
Tags : 
crm, customer relationship management, customer service, helpdesk, help desk, support, cost control, productivity, customer support, service management, customer, customer interaction service, passgo, pass go
    
PassGo
Published By: RuleStream     Published Date: Aug 21, 2009
Capturing product knowledge has proven to be very difficult and early attempts at building systems to capture and reuse knowledge have failed because they were too limited technically, required users to be able to develop computer codes (or programs) to embody knowledge rules and actions, and they did not work with common product design tools such as CAD and PDM systems.
Tags : 
product design, product development, product information, pim, product information management, product lifecycle management, computer aided design, computer-aided design, rulestream
    
RuleStream
Published By: Safe Software     Published Date: Aug 21, 2009
Spatial data warehouses are becoming more common as government agencies, municipalities, utilities, telcos and other spatial data users start to share their data. This paper illustrates some of the issues that arise when undertaking data replication and data sharing.
Tags : 
data warehousing, share data, data management, data distribution, data sharing, replication, safe, safe software
    
Safe Software
Published By: Safe Software     Published Date: Aug 21, 2009
One of the most powerful aspects of GML is the freedom it gives users to define their own custom application schemas. While this capability provides extraordinary flexibility to data modellers, it also creates significant challenges, particularly when the data is interpreted.
Tags : 
spatial, geographic information system, geographic information systems, geological, geography, information management, data processing, database, data transfer, safe, safe software
    
Safe Software
Published By: St Bernard Software     Published Date: Aug 21, 2009
Download this white paper from St. Bernard Software to read about a variety of contemporary, Internet-borne threats that are making it foolhardy for any business to provide unfettered Internet access for its users.
Tags : 
filtering, email security, firewall, access control, employee internet access, internet security, web security, restrictions, st bernard, st. bernard
    
St Bernard Software
Published By: XOsoft     Published Date: Aug 21, 2009
Traditional backup systems provide a critical layer of insurance, but they represent all-or-nothing strategies that do not cover the minute by minute daily data writes to the disk. Continuous data protection fills in this gap by capturing changes to data while users are working. In the event of a data interruption, administrators can automatically reconstitute the data in reverse order to a point before it was corrupted or lost.
Tags : 
disaster plan, disaster recovery, data protection, storage, backup and recovery, backup, recovery, prevent data loss, xosoft
    
XOsoft
Published By: XOsoft     Published Date: Aug 21, 2009
Creating business value is the ultimate goal of investing in new IT technologies. This paper offers recommendations for both IT users and vendors that are vital to ensure that this goal is met.
Tags : 
storage management, productivity, business management, added value, it spending, tco, total cost of ownership, it management, xosoft
    
XOsoft
Published By: McAfee Inc     Published Date: Aug 19, 2009
Anti-virus by itself is no longer enough to protect endpoints, especially in this age of mobile devices and business users on the go. This brief explains the key benefits of implementing an endpoint security solution with McAfee. Read more.
Tags : 
mcafee, security, malware, compliance, cyber criminals, midmarket, encryption, security tools, sans, data protection, security center, total security, dlp, midmarket, compliance, availability, email security
    
McAfee Inc
Published By: Astaro     Published Date: Aug 10, 2009
Previously, the network at the City of Lake Wales didn't possess any firewalls, intrusion protection or web filtering solutions. As a result the network, which is spread out to multiple locations (including law enforcement), was left wide open to security breaches and caused system performance problems as users unwittingly picked up spyware and malware.
Tags : 
astaro, security, gateway, cisco pix, web filtering, intrusion protection, firewall, firewalls, network, spyware, malware, astaro, integrated security solution, surfcontrol, pix, cisco, firewall, internet security, devine lake wales, failover
    
Astaro
Published By: Electric Cloud     Published Date: Aug 07, 2009
Drive quality earlier in the development process with continuous testing. Large development organizations have increasingly been adopting select agile practices to enable faster development, create more reliable software, and reduce costs. Chief among these practices is providing developers early and frequent feedback from users, from other developers, and especially from the programming, build, and test tools. In the latter category, continuous integration and continuous testing are emerging as valuable techniques for identifying errors early so they can be corrected immediately by the developer who made the code changes.
Tags : 
software development, electriccommander, electric cloud, continuous testing, development, coding, testing, production, errors, ci cycle, intuit, defect tracking, integrated solution
    
Electric Cloud
Published By: SAP Inc.     Published Date: Jul 28, 2009
Learn from today's sales leaders who have benefited from building a sales strategy based on a position of deep customer knowledge.
Tags : 
sap, sales organization, best-run, sales opportunity, sales strategy, customer database, crm, customer relationship management, actionable intelligence, business intelligence, sales cycle, americas’ sap users’ group, asug, talent, price and margin management, pmm
    
SAP Inc.
Published By: Quocirca     Published Date: Jul 27, 2009
With data breaches widespread, no organisation can afford to be complacent, but most data losses are avoidable. Many of the breaches making headline news are caused by the loss or theft of laptops and other portable devices. To protect themselves from financial and reputational damage, encryption technologies can reduce risks by ensuring the information on such devices is secure when users are on the move. They can also add value by allowing the secure sharing of information among authorised users and by enabling more secure remote working.
Tags : 
quocirca, encryption, security, information protection, compliance, data management
    
Quocirca
Published By: Visible Technologies     Published Date: Jul 24, 2009
The impact of the social conversations has dramatically increased. More than 133 million blogs have been indexed since 2002. Twitter has doubled in size this year alone to roughly 30 million users, who create 1,500 new "Tweets" every second. Facebook's 35-year-old-plus demographic grew to 12 million users in the first quarter of 2009. But that's only part of the story. The results from search engines are even more important. 2,300 searches are performed every second of every day.
Tags : 
social networking, digital age, reputation, social networking, visible technologies, facebook, twitter, youtube, blog, blogs, wiki, communication, control conversations, reputation management, web 2.0, media channels, collaboration, collaborative, alerts, saas
    
Visible Technologies
Published By: Sun Microsystems     Published Date: Jul 20, 2009
This free white paper from the experts at IDC reveals the profound impact of social technologies-also known as Web 2.0-on enterprise IT. Users are demanding capabilities including collaboratively working across regions, knowledge capture, and community and brand building outside the firewall. But you can meet those demands-if you're ready.
Tags : 
web 2.0, sun, social technologies, enterprise it, collaboration, virtualization, sun microsystems, power, cooling
    
Sun Microsystems
Published By: HP     Published Date: Jul 08, 2009
In these days of rampant data growth, a technology that can increase the effective capacity of a disk-based backup system by a ratio of up to 50:1 is big news. Data deduplication allows you to store up to 50 times more backup data into the same disk footprint — giving you a better chance of restoring your users' lost data from exactly the point they need it. This white paper explains how this innovative data deduplication solution works and also establishes how a 50:1 deduplication ratio may be achieved.
Tags : 
dynamic deduplication, 50:1, disk based backup, data, storage, rack, dedupe, data deduplication, hp storageworks, d2d backup systems, backup, data change
    
HP
Published By: SERENA Software, Inc     Published Date: Jun 23, 2009
Lean BPM is focused on radically simplifying how business processes and management are delivered. Processes are designed quickly and easily by the business user closest to the problem. Working solutions are delivered incrementally to your users in record time. Serena delivers the easiest business process development. No coding. No consultants. No kidding.
Tags : 
serena, serena software, lean bpm, serena, serena software, working solutions, workflow, application, office, interfaces, mashup, saas, soa, business process management, it investment, business mashups, crm, customer relationship management, erp, enterprise resource planning
    
SERENA Software, Inc
Published By: IBM     Published Date: Jun 16, 2009
As products go to market quicker, employees, customers, and business partners need the ability to collaborate and access business data—when, where, and how ever they choose. Watch this illustrated demo to see how IBM offers a smarter, business-driven approach to Identity and Access Management. And how IBM’s extensive integration capabilities can enhance productivity without compromising security.
Tags : 
identity, access management, secure, ibm, mmdg, enterprise single sign on, user data, security, threats, vulnerabilities, silo data, business processes, business users, security, swg
    
IBM
Published By: Stratus Technologies     Published Date: Jun 16, 2009
"Time is money. You can't do business if you can't access your applications. I won't settle for anything less than 99.99% application availability." Steven Sommer, veteran CIO/CTO There is no aspect more critical to a business than the ability of its end users, customers, business partners and suppliers to have high availability access the corporate applications. If applications are unavailable, business ceases. And corporations know it.
Tags : 
c-level, stratus, itic, end users, customers, partners, high availability, corporate applications, service oriented architecture, soa, web based applications, afcom, uptime, continuous availability, servers, downtime, big iron, return on investment, roi, slas
    
Stratus Technologies
Published By: SAP Inc.     Published Date: Jun 16, 2009
As the sheer amount of information available for Business Intelligence (BI) applications has grown, and the sophistication of BI capabilities has accelerated, organizations are striving to improve time-to-information for business users.
Tags : 
sap, data management, business intelligence, data storage, laggards, best-in-class, time-to-information, data management infrastructure costs
    
SAP Inc.
Published By: IBM     Published Date: Jun 15, 2009
Read the white paper to see how IBM Lotus Notes and Domino software empowers users to take action, create and share knowledge and collaborate with teams. And discover how this new kind of desktop application, leveraged from 20 years of leadership can help deliver an enhanced user experience, drive greater business value and boost IT performance.
Tags : 
ibm, lotus, lotus notes, lotus domino, it performance, collaboration, connect, desktop application, connect, socialize, communicate, user experience, eclipse, alloy, developers, client, sap, it performance, green, optimize
    
IBM
Published By: IBM     Published Date: Jun 15, 2009
In this white paper, you'll see how Lotus Notes 8.5 boosts bandwidth by storing one copy of attachments, rather than allowing duplicate via threads. You'll also discover how upgrading lets you elevate collaboration and enhance efficiency with tools that empower users to take action, create and share knowledge, and collaborate with teams.
Tags : 
ibm lotus, domino, 8.5, collaboration, green, empower, access, connect, domino, notes, ibm, 8.5, server, enterprise-class messaging, collaborative capabilities, lotus, lotus notes, lotus domino, it performance, collaboration
    
IBM
Start   Previous    59 60 61 62 63 64 65 66 67 68 69 70 71 72 73    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.