assets

Results 451 - 475 of 538Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jan 13, 2009
In business, no two challenges are the same. To be effective now and in the future, organizations must be able to adapt with speed and agility. Read this white paper to learn how enterprise mashups can help you use existing IT assets and projects to solve situational problems and take advantage of business opportunities.
Tags : 
ibm, enterprise mashups, it assets, situational applications, information mashing, governance, supply chain management, networking, it management, enterprise applications
    
IBM
Published By: IBM     Published Date: Mar 04, 2009
As a small to midsize business owner, you understand that in order to grow, you need to be able to communicate and collaborate with people, quickly and easily. But you have limited budgets and IT resources. You want security-rich solutions that will extend your assets, improve operating efficiencies and grow as your company grows. IBM offers you reliable solutions that can help you compete with your larger counterparts.
Tags : 
ibm, lotus, lotus complete messaging, communication and collaboration, security-rich solutions, business-grade instant messaging, ibm lotus domino, web conferencing, voip, lotus sametime, security, enterprise applications
    
IBM
Published By: Sanbolic     Published Date: Dec 03, 2007
Clustered volume manager enables administrators to centrally configure and assign storage assets in a SAN storage environment in Microsoft System Management Server 2003 and Microsoft Operations Manager 2005 environments.
Tags : 
windows, storage, san, nas, sanbolic
    
Sanbolic
Published By: Secure Computing     Published Date: Feb 27, 2007
Driven by increasing regulatory scrutiny and the need to protect key corporate assets, concerns about compliance and data leakage have risen to the top of the priority list for today's corporate executives. This paper discusses multiple policies, procedures and processes corporations must consider to remain secure and compliant.
Tags : 
security, security management, compliance, security policies, hipaa compliance, data protection, database security, corporate governance, california sb-1386, california state bill 1386, authentication, secure computing, securecomputing
    
Secure Computing
Published By: Third Brigade     Published Date: Aug 21, 2009
Businesses today are under intense pressure to open up their networks, comply with increasingly rigorous regulatory requirements, AND ensure their IT assets are protected from attacks. This white paper explores these security challenges and explains how host-based Intrusion Prevention Systems  play a critical role in an organization's overall security strategy.
Tags : 
intrusion prevention, security, network security, compliance, security compliance, attacks, hacker detection, ips, intrusion prevention system, security strategy, security management, third brigade
    
Third Brigade
Published By: webMethods     Published Date: Aug 21, 2009
One of the most significant IT initiatives underway is the adoption of service-oriented architecture (SOA), where IT assets are aligned to business services in a standard, flexible and architected fashion. The concept is often discussed in conjunction with Web services, though the two are not synonymous.
Tags : 
soa, service-oriented architecture, service oriented architecture, service management, alignment, web service, web methods, webmethods, software development, it management
    
webMethods
Published By: webMethods     Published Date: Aug 21, 2009
The goal of Business Process Productivity is to enable enterprises to become both highly agile and highly efficient, allowing them to more easily leverage their existing information technology (IT) assets to address market opportunities and pressures, and to create competitive differentiation through their business processes. This white paper describes how webMethods Fabric helps companies increase Business Process Productivity.
Tags : 
business process, bpm, bpa, productivity, competitive, business management, efficiency, web methods, webmethods, enterprise applications
    
webMethods
Published By: Winward     Published Date: Aug 21, 2009
To succeed in today's business environment, the enterprise must manage the effects of three realities: the recent, massive investment in technology has significantly increased IT complexity; the Internet has altered customers' expectations of availability, cost, and service; and the new economic climate highlights the need to leverage existing assets and improve the return on investment for new initiatives.
Tags : 
business management, cost control, it spending, analytical applications, report design, it investment, technology spending, roi, return on investment, winward
    
Winward
Published By: Quocirca     Published Date: Dec 04, 2006
Service Oriented Architectures (SOAs) will provide greater flexibility for those utilizing them, but will also bring greater issues for data and functional connectivity.  This paper contrasts and compares the capabilities of a point-to-point and an enterprise service bus approach.
Tags : 
soa, connectivity, service-oriented architecture, service oriented architecture, data management, enterprise, quocirca, it management, knowledge management
    
Quocirca
Published By: Quocirca     Published Date: Mar 06, 2007
Arguably IP is the most successful open standard ever, but as network communications converge under a single standard used for an increasing number of applications, we need to understand how effectively these critical assets are being managed. Read more in this white paper now.
Tags : 
networking, ip networks, ip telephony, voip, convergence, voice over ip, network management, telecommunications, ip convergence, communications convergence, quocirca
    
Quocirca
Published By: Quocirca     Published Date: Apr 23, 2007
Information management, which includes both data and content management, is an essential building block for Service-Oriented Architecture (SOA).  By taking a service oriented approach to information, you can achieve much greater value from your information assets.
Tags : 
information management, service oriented architecture, service-oriented architecture, soa, data management, mdm, master data management, content management, content management system, information integration, quocirca
    
Quocirca
Published By: Quocirca     Published Date: Sep 07, 2007
Mid-sized organizations have similar issues to large organizations when it comes to the storage and management of information and data, yet they often have limited capability to attract, retain and maintain the skills that large organizations will use in managing their data assets.  There is a strong need for more effective tools that will enable mid-sized organizations to manage their data assets and gain the greatest value from them.
Tags : 
smb, smbs, storage, data management, information management, storage management, san, sans, storage area network, quocirca
    
Quocirca
Published By: Quocirca     Published Date: Nov 13, 2007
The evolution of Blade Computing has moved from mere server consolidation to a way of managing IT assets which brings significant business benefits. This paper aims to explain those benefits to the business and IT manager, and show how blade computing can be implemented to save money and improve the way IT serves the business needs.
Tags : 
infrastructure, infrastructure, soa, service oriented architecture, blade computing, blade, blade server, blade servers, servers, storage, utility computing, quocirca
    
Quocirca
Published By: Quocirca     Published Date: Jan 11, 2008
Small and medium-sized businesses (SMBs) can benefit from the expansive use of information technology (IT) just as much as their larger counterparts. Indeed, in many cases they have to, because to trade they need to interact with business partners of all sizes and IT failure affects not just internal users but those of third parties.
Tags : 
insight report, quocirca, smb, small business, soho, mid-sized business, smbs, data security, network security, small business it, it networks, securing data, networking, security, data management
    
Quocirca
Published By: Quocirca     Published Date: Jul 03, 2008
Small and medium sized organizations have similar issues to large companies when it comes to the processing and storage of information and data, yet often have little capability to attract, retain and maintain the skills for managing their data assets compared to large organizations.  Blade systems offer an effective way to address the specific challenges faced by smaller organizations in managing their IT assets, and allows then to gain greater value from them.
Tags : 
storage, blade, blade systems, small business, smb, smbs, mid-sized business, quocirca
    
Quocirca
Published By: Quocirca     Published Date: Jan 13, 2009
Given today’s economic climate, businesses are, more than ever, looking to create additional value through the reduction of risk and by saving costs. For many, the economic downturn is seen as the best time to optimise the infrastructure that they already have in place, to look at ways to trim unnecessary expenditure and to use existing resources more effectively. As organisations are increasingly reliant on data networks that encompass an ever-growing range and number of internet protocol (IP) enabled devices and applications, they need to more effectively administer and manage these assets—they can no longer take the management of their IP networks for granted.
Tags : 
quocirca, ipam, dynamic host configuration protocol, domain name system, radio frequency identification, voice over ip, enterprise applications
    
Quocirca
Published By: Quocirca     Published Date: Dec 03, 2009
Taking steps towards meeting the legal challenge of carbon reduction within data centres in a sensible, cost effective and sustainable manner.
Tags : 
quocirca, carbon reduction management, data centre asset, energy saving incentive, roi, carbon footprint
    
Quocirca
Published By: SpringCM     Published Date: Dec 06, 2006
If you realize the importance of managing those assets better, on-demand may be a more effective and lower cost alternative to installed software. But is it right for you?
Tags : 
document management, on demand, real time, real-time, on-demand, document management software, cms, content management software, spring cm, springcm, knowledge management
    
SpringCM
Published By: RiskWatch     Published Date: Jan 17, 2007
Risk assessment is the cornerstone of security.  The risk assessment process includes gathering information about the assets of the organizations, including all information assets, and all physical assets.
Tags : 
risk assessment, compliance assessment, risk management, security, it management, security management, infrastructure, vulnerability, intrusion detection, ids, risk, riskwatch
    
RiskWatch
Published By: GAO RFID Inc.     Published Date: Feb 28, 2007
Institutional (academic) libraries and public libraries face growing challenges in managing the assets of their collection and maintaining or improving service levels to patrons. Learn how libraries can leverage RFID solutions to save time, reduce cost, and increase productivity.
Tags : 
mobile data systems, rfid, rfid tags, libraries, library, mobile data systems, gao, gao rfid, gao group
    
GAO RFID Inc.
Published By: TRIRIGA     Published Date: Jul 27, 2007
In this white paper, we discuss industry standards, the range of disciplines IWMS spans, external systems (e.g., CAD, ERP, human resources) that interact with a solid IWMS, and the costs avoided when innovators enforce data templates and processes throughout the enterprise.
Tags : 
facilities management, iwms, real estate management, facilities, iwms, integrated workplace management, maintenance and operations, project management, workplace management, tririga, triraga, lease administration, retail, capital assets, corporate real estate, store openings, user moves, on-boarding, off-boarding, human resource technology
    
TRIRIGA
Published By: TRIRIGA     Published Date: Apr 15, 2008
Workplace Performance Management: A strategic framework and system to align, measure and deliver greater shareholder value from workplace assets and operations. Corporations need to align workplace operations and assets to business strategies.  Workplace assets and operations must be measured and linked directly to stakeholder expectations to expose the true contributions of real estate to the organization.
Tags : 
workplace, performance, real estate, facility management, wpm, tririga, performance metrics, workplace strategy, tririga, human resource technology
    
TRIRIGA
Published By: Asentria Corporation     Published Date: Sep 04, 2007
SNMP (Simple Network Management Protocol) is an industry standard network management protocol for managing wide area and local area networks. It is easy to use, cost-effective, and is built into most networking devices. One of SNMP’s best assets is its use of in-band management, yet, this is also its biggest weakness.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures, fault management, network management, remote site monitoring, remote site alarms, environmental monitoring, network alarm monitoring, network alarm management, remote telemetry units, alarm management system, network management systems, network monitoring, protocol mediation
    
Asentria Corporation
Published By: Asentria Corporation     Published Date: Sep 04, 2007
More than ever before, IT managers need to secure equipment and facilities against a variety of intrusive conditions that could cripple critical operations, resulting in system malfunctions, loss of data or intellectual property, damage to mission critical hardware or even theft of valuable physical assets. Such conditions often include environmental events, failure of air conditioning systems, power outages, and untoward human actions.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures, fault management, network management, remote site monitoring, remote site alarms, environmental monitoring, network alarm monitoring, network alarm management, remote telemetry units, alarm management system, network management systems, network monitoring, protocol mediation
    
Asentria Corporation
Published By: Netwrix     Published Date: Aug 01, 2013
Netwrix Auditor takes a holistic approach to IT infrastructure auditing, providing the visibility, intelligence, security and control you need to keep your business up and running, minimize troubleshooting, meet regulatory compliance standards and make sure your critical IT assets are secure - and stay that way
Tags : 
netwrix, free trial, netwrix auditor, it infrastructure, configuration, it systems, configuration auditing, active directory auditing, systems monitoring, software development, it management
    
Netwrix
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com