bi solutions

Results 1151 - 1175 of 1264Sort Results By: Published Date | Title | Company Name
Published By: XLink Technology Inc.     Published Date: Jan 15, 2007
XLink ClusterReplica Enterprise software, based on CDP technology, combines conventional High Availability solutions and Microsoft DPM-like functions to create the next generation of business continuity software. ClusterReplica ENT offers real-time data replication and auto failover for MSSQL, IIS Web Server and File Servers.
Tags : 
servers, data protection, windows server, high availability, data replication, disaster recovery, business continuity, xlink, xlink technology
    
XLink Technology Inc.
Published By: Infor     Published Date: Feb 27, 2007
American Dairy Brands, a $300M division of Dairy Farmers of America (DFA) which is the largest U.S. dairy cooperative marketing over 45 billion pounds of milk per year, has achieved substantial supply chain savings through Infor's Supply Chain solutions. Infor has given Dairy Farmers of America the ability to successfully manage the supply chain to drive service levels to greater than 99% for their Borden-brand cheese products.
Tags : 
productivity, supply chain management, customer service, customer satisfaction, dairy, food, infor, scm, enterprise resource management, erp, american dairy brands, borden
    
Infor
Published By: WorldTelemetry, Inc.     Published Date: Mar 26, 2007
To be successful in today's safety-conscious and efficiency-minded marketplace, companies must combine compelling new technologies to offer the most convenient and effective business services and solutions. For monitoring remote tank sites, that means combining the intelligence of General Packet Radio Service (GPRS) communication with the risk mitigation properties of intrinsic safety.
Tags : 
business analytics, business management, business metrics, business intelligence, bi software, enterprise software, world telemetry, worldtelemetry
    
WorldTelemetry, Inc.
Published By: eFax     Published Date: May 15, 2007
Organization seeking to reduce expense while improve the reliability and capacity of their business faxing are adopting Internet fax service at a record rate. Find out how Internet-based fax solutions enable you to send and receive faxes using your existing e-mail infrastructure and the Web.
Tags : 
fax, faxing, ip faxing, ip telephony, fax over ip, efax, infrastructure, ip networking, ip networks, integrated communications, communications integration, communication, communications, convergence, protus, protus ip solutions
    
eFax
Published By: Torry Harris Business Solutions     Published Date: Jul 05, 2007
This whitepaper is written as a guide to an alternative mechanism for project implementation for business owners holding responsibility to deliver IT solutions in the SOA space. It could also be of interest to those who would like to know more about how the phenomenon of offshore/onsite coordination, that emerged in the nineties, can be effectively applied towards realizing the promise of SOA.
Tags : 
service oriented, service-oriented, governance, service management, outsource, outsourcing, offshoring, offshore, architecture, software architecture, it spending, xml, torry harris, thbs
    
Torry Harris Business Solutions
Published By: Perimeter     Published Date: Jul 17, 2007
What is the difference between a risk, a threat, a vulnerability and an exploit? Which product or solution can be employed to address my institution’s information security and compliance needs? This paper provides some clarity on the first question, and in the process, it should help to offer an answer to the second question, one of aligning concerns with solutions with vulnerability management.
Tags : 
risk management, vulnerability assessment, ips, intrusion prevention, ids, intrusion detection, firewall, exploit, infrastructure, patch management, email defense, email security, perimeter, perimeter esecurity, security
    
Perimeter
Published By: Interactive Intelligence     Published Date: May 07, 2012
IT strategies in insurance have traditionally been driven by business objectives and business strategy. But with technology advancements for mobile solutions, social media, analytics, content management (ECM), and process automation, insurers can now take a conjoinment view to evaluate opportunities and drive differentiation. Read more in this paper from Mark Breading of Strategy Meets Action.
Tags : 
interactive, technology, ecm, process automation, social and mobile technology, business technology
    
Interactive Intelligence
Published By: Interactive Intelligence     Published Date: Sep 11, 2013
Cloud communications provide myriad benefits for organizations, including speed of deployment, the ability to future-proof infrastructure and applications, business continuity, predictable monthly payments, and many more. Most organizations turn to the cloud in order to cost-effectively access enhanced capabilities while eliminating the complexity of deploying and managing premises-based solutions. Cloud-based contact center solutions offer additional benefits, notably the ease of adding or removing agents as needed based on fluctuating or seasonal traffic, ease of deploying remote or at-home agents, and ease of adding multi-channel services.
Tags : 
interactive intelligence, contact centers, organizations, deployment, cloud, solutions, seasonal traffic, infrastructure
    
Interactive Intelligence
Published By: Asentria Corporation     Published Date: Sep 04, 2007
One of the greatest challenges to any advanced wireless operation is the maintenance of continuous and economical service. Today’s networks have evolved into business-critical services that organizations rely upon every day. However, unplanned remote site downtime due to equipment and power failure, and adverse environmental conditions can severely impair network service.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures, fault management, network management, remote site monitoring, remote site alarms, environmental monitoring, network alarm monitoring, network alarm management, remote telemetry units, alarm management system, network management systems, network monitoring, protocol mediation
    
Asentria Corporation
Published By: Nevis Networks     Published Date: Sep 04, 2007
The ability to monitor, track and report usage based on actual user identity and applications provides for quicker reaction time, easier reporting for compliance, as well as more visibility into the network. Learn about a complete line of solutions for effective identity-based policy enforcement.
Tags : 
lan, lan security, network security, security policies, security policy, policy management, best practices, nevis, nevis networks, dos, infrastructure, dmz, access control, precision prospects
    
Nevis Networks
Published By: Netwrix     Published Date: Oct 10, 2007
This white paper covers account lockout management process and introduces new cost-effective workflows of account lockout resolution, describing significant ROI enterprises can achieve through the use of automated management solutions.
Tags : 
authentication, account lockout, access control, network security, lockout, user lockout, user authentication, user validation, intrusion prevention, netwrix
    
Netwrix
Published By: CopiaTECH     Published Date: Mar 18, 2008
Words like “integrated” and “centralized” have been used to describe application software solutions for some years now, often because of marketing messaging that implies more interoperability than the given technology can actually provide to the business customer. The terms are broad enough to be almost meaningless in some instances. In the field of IT security, the sheer range of tools and techniques in the hacker or virus writer’s armory that one must guard against has driven up the number of solutions required to prevent attacks.
Tags : 
copiatech, security
    
CopiaTECH
Published By: CommonTime     Published Date: Apr 02, 2008
Many companies that have already invested in IBM Lotus Domino/Notes for their business communications now look to achieve the business benefits that are delivered by mobility solutions. To address this challenge, CommonTime has partnered with Microsoft® to combine key elements our best-of-breed Lotus Domino/Notes mobility solution for Windows Mobile devices with Microsoft’s System Center Mobile Device Manager 2008 (MDM).
Tags : 
wireless device management, mobile device management, mobile workers, asset management, commontime, wireless
    
CommonTime
Published By: BlueHornet     Published Date: Apr 12, 2010
Email marketing service provider BlueHornet recently partnered with mobile marketing solutions provider SmartReply to develop an automated sign up process via mobile text messaging for email marketing communications. In this free case study, learn how Chuck E. Cheese's, a nationally recognized leader in full-service family entertainment and dining, used text messaging as a sign up method for their Chuck E-Club email program to grow their email list and increase engagement levels.
Tags : 
bluehornet, email marketing, mobile text messaging
    
BlueHornet
Published By: Signiant Inc.     Published Date: Aug 14, 2008
Moving content from raw form to finished form and delivering it to cable head-ends and Telco providers has its own unique set of challenges. How does content flow from the person or companies who are producing and post-producing the content to the companies that are hosting the content for consumption? IPTV content must be transformed in some fashion, such as various bit rates, resolutions, aspect ratios, file formats, etc.
Tags : 
signiant, information management, file transfer, ftp, large file transfer, digital media
    
Signiant Inc.
Published By: Motorola, Inc.     Published Date: Mar 10, 2009
Enterprise mobility has emerged as a top strategic initiative among leading global organizations. To benchmark the current state of Enterprise Mobility adoption, Motorola’s Enterprise Mobility business conducted independent research among a representative sample of enterprise mobility decision-makers, the chief purchasers of enterprise mobility solutions and various mobile workers within enterprise and commercial businesses.
Tags : 
enterprise mobility, motorola, manufacturing industry, mobile workers, digital two-way radio, voice-over-wlan, vowlan, tdma modulation
    
Motorola, Inc.
Published By: Ecessa Corporation     Published Date: Mar 11, 2009
Download this white paper to learn how to avoid network failures and evaluate the options available to ensure high-availability, network uptime and optimal network performance. It also shows you solutions that are affordable, and when deployed, are operationally cost-effective.
Tags : 
adsl load balancing, vpn load balancing and redundancy, bandwidth aggregation, qos, bandwidth control, bandwidth management, multi-homing, bgp multihoming, broadband bonding, broadband failover, disaster recovery, business continuity, wan load balancing, wan failover, dsl failover, dsl load balancing, disaster recovery solutions, dual wan router, wan failover, isp failover
    
Ecessa Corporation
Published By: PC Mall     Published Date: Jun 22, 2011
This PC Mall webinar addresses the types of cloud services available, provides real world examples of cloud services and defines the economic benefits of working with the cloud.
Tags : 
cloud services, webinar, public cloud, private cloud, hybrid cloud, pc mall, cloud computing, solutions
    
PC Mall
Published By: Sybase     Published Date: Aug 31, 2010
This whitepaper outlines the new challenges 4G deployments bring to mobile operators and solutions designed to address these challenges.
Tags : 
advanced ip messaging server
    
Sybase
Published By: Okta     Published Date: Jun 15, 2015
Microsoft made a massive push to the cloud in 2014, and as a result Office 365 is taking off. Were seeing it in how Okta customers are using Okta to connect to Office 365 in increasing numbers. This eGuide provides some data from the Okta Application Network on the trends we are seeing around Office 365. It also describes the most important things to consider for Identity and Mobility Management during deployment. Office 365 is unlike any other cloud app in its complexity, and it is best for IT to plan and deploy solutions around Identity and Mobility Management in concert with their Office 365 roll-out to get maximum user adoption.
Tags : 
office 365, identity and mobility management, deployment, user adoption, adoption guide, it management
    
Okta
Published By: Okta     Published Date: Jul 01, 2015
Microsoft made a massive push to the cloud in 2014, and as a result Office 365 is taking off. Were seeing it in how Okta customers are using Okta to connect to Office 365 in increasing numbers. This eGuide provides some data from the Okta Application Network on the trends we are seeing around Office 365. It also describes the most important things to consider for Identity and Mobility Management during deployment. Office 365 is unlike any other cloud app in its complexity, and it is best for IT to plan and deploy solutions around Identity and Mobility Management in concert with their Office 365 roll-out to get maximum user adoption.
Tags : 
    
Okta
Published By: Anthem Marketing Solutions     Published Date: Oct 28, 2010
The third installment of a bi-annual study produced by Anthem Marketing Solutions reveals that the competition between physical stores and online retailers is rapidly shifting across a range of prices and item categories. While common wisdom dictates that better deals will be found more frequently online, the analysis concludes that shopping in stores can yield much higher savings when shoppers are looking for the lowest price.
Tags : 
online vs. offline, in-store pricing, online pricing, pricing trends
    
Anthem Marketing Solutions
Published By: HP and Intel Xeon processors     Published Date: Feb 10, 2012
3cV is the combination of HP 3PAR Utility Storage with HP BladeSystem both powered by Intel Xeon processors and VMware virtualization solutions. Find out more now!
Tags : 
storage
    
HP and Intel Xeon processors
Published By: HP and Intel Xeon processors     Published Date: Aug 01, 2012
An increasingly global and mobile workforce is changing the way IT needs to support the business. Worker demographics are also changing, resulting in different expectations on how IT delivers data and applications. HP and VMware make this important move to Client Virtualization safe and easy by testing and developing the most popular solutions. On its sixth generation Client Virtualization reference architecture, HP tests many combinations of storage, networking, and blades to best handle the Client Virtualization workloads.
Tags : 
client virtualization, reference architecture, core design, client virtualization, active directory, local users, vdi, user data, outsourcing, work from home, branch, endpoint devices, firewall, vpn, stacking links, storage, data management
    
HP and Intel Xeon processors
Start   Previous    37 38 39 40 41 42 43 44 45 46 47 48 49 50 51    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com