solutions

Results 4926 - 4950 of 5399Sort Results By: Published Date | Title | Company Name
Published By: ScriptLogic     Published Date: Nov 14, 2011
While modern backup and recovery solutions are perfectly capable of restoring permissions along with files, stuff just isn't always that simple.
Tags : 
server, migration, backup, recovery, permissions, copy, restore
    
ScriptLogic
Published By: Polystar     Published Date: Aug 31, 2010
This article describes the problems of monitoring modern 10Gbps telecom networks and some of the solutions.
Tags : 
polystar, 10gbps, network monitoring
    
Polystar
Published By: Sybase     Published Date: Aug 31, 2010
This whitepaper outlines the new challenges 4G deployments bring to mobile operators and solutions designed to address these challenges.
Tags : 
advanced ip messaging server
    
Sybase
Published By: Network Solutions     Published Date: Sep 14, 2010
This is the fourth installment of the Network Solutions® Small Business Success IndexT study first conducted in December 2008/January of 2009. For the fourth wave of the study, 500 small business ownecompliance
Tags : 
small business, capital access, marketing and innovation, workforce, customer service, computer technology and compliance
    
Network Solutions
Published By: SalesNexus     Published Date: Sep 23, 2010
Small businesses often minimize the importance of advanced CRM features. It's tempting to select very basic, simple and inexpensive CRM solutions for your small business.
Tags : 
small business crm, web based crm, hosted crm, small business marketing, crm for small business
    
SalesNexus
Published By: Greenpacket     Published Date: Sep 27, 2010
There is an assortment of solutions to combat congestion, ranging from high investment to cost-effective and short-term to long-term.
Tags : 
data offloading, saving, operator, connection manager, connection management, seamless mobility, session persistence
    
Greenpacket
Published By: e-DMZ Security LLC     Published Date: Sep 27, 2010
This white paper discusses key issues and offers innovative solutions to support granting access to production resources.
Tags : 
e-dmz security. emergency access, production access, access control, compliance, developer access, mission-critical, business-critical, datacenter security
    
e-DMZ Security LLC
Published By: Okta     Published Date: Jun 15, 2015
Microsoft made a massive push to the cloud in 2014, and as a result Office 365 is taking off. We’re seeing it in how Okta customers are using Okta to connect to Office 365 in increasing numbers. This eGuide provides some data from the Okta Application Network on the trends we are seeing around Office 365. It also describes the most important things to consider for Identity and Mobility Management during deployment. Office 365 is unlike any other cloud app in it’s complexity, and it is best for IT to plan and deploy solutions around Identity and Mobility Management in concert with their Office 365 roll-out to get maximum user adoption.
Tags : 
office 365, identity and mobility management, deployment, user adoption, adoption guide, it management
    
Okta
Published By: Okta     Published Date: Jul 01, 2015
Microsoft made a massive push to the cloud in 2014, and as a result Office 365 is taking off. We’re seeing it in how Okta customers are using Okta to connect to Office 365 in increasing numbers. This eGuide provides some data from the Okta Application Network on the trends we are seeing around Office 365. It also describes the most important things to consider for Identity and Mobility Management during deployment. Office 365 is unlike any other cloud app in it’s complexity, and it is best for IT to plan and deploy solutions around Identity and Mobility Management in concert with their Office 365 roll-out to get maximum user adoption.
Tags : 
    
Okta
Published By: vcopious     Published Date: Oct 01, 2010
This paper analyzes the current scenario facing IT departments, where they must focus on maximizing their return from existing IT investments, while also leveraging the best solutions available via a SaaS model.
Tags : 
saas, on-premise, cloud, computing, platform, platforms, virtual
    
vcopious
Published By: VMware     Published Date: May 02, 2011
The cost of downtime and/or lost data can be devastating. For this reason, business continuity and disaster recovery (BC/DR) is becoming a critical mandate. Virtualization can keep your business running through many types of planned and unplanned IT outages. Download this white paper to learn more.
Tags : 
smb, vmware, virtualization, business continuity, disaster re vsphere, downtime, it failure, vms, it managementcovery, bc/dr planning solutions, high availability, taneja group
    
VMware
Published By: Perimeter E-Security     Published Date: Oct 21, 2010
Read our guide to learn more about the popular malware methods cyber criminals are using to compromise internal systems.
Tags : 
malware, malicious website, firewalls, ids/ips, web content filtering, gateway av, network security solutions, host-based ips, mission critical systems, system av, patch management, policy management, layered security, end user security awareness training, strong policies, audited procedures
    
Perimeter E-Security
Published By: iCims     Published Date: Jan 17, 2013
iCIMS has compiled the Top 13 HR Tips for 2013 in order to assist your team in achieving smart, successful recruitment in the upcoming year. Download this educational document now to get a jump-start on updating your recruitment goals.
Tags : 
social recruiting, human resources, recruiting, icims, hr solutions
    
iCims
Published By: iCims     Published Date: Jan 17, 2013
Are you interested in growing your passive talent pools? Bring potential candidates in through a fully branded Social Connect Portal.
Tags : 
recruiting, recruiting solutions, social recruiting, human resources, talent management
    
iCims
Published By: CSC     Published Date: Oct 25, 2010
The whitepaper provides a means to visualize the complexity of cybersecuirty and a way to achieve effective solutions.
Tags : 
cybersecurity, model of cybersecurity, security architecture, cyber, cybersecurity methodology, ict, security integration
    
CSC
Published By: Anthem Marketing Solutions     Published Date: Oct 28, 2010
The third installment of a bi-annual study produced by Anthem Marketing Solutions reveals that the competition between physical stores and online retailers is rapidly shifting across a range of prices and item categories. While common wisdom dictates that better deals will be found more frequently online, the analysis concludes that shopping in stores can yield much higher savings when shoppers are looking for the lowest price.
Tags : 
online vs. offline, in-store pricing, online pricing, pricing trends
    
Anthem Marketing Solutions
Published By: Revinetix, Inc.     Published Date: Nov 12, 2010
Juan Diego Catholic High School, with 500+ networked Apple Mac computers, needed to replace their poor performing tape backup system. They evaluated disk backup appliance solutions and select the Revinetix Sentio.
Tags : 
revinetix, disk backup, tape backup, backup appliance, deduplication, education, netwotk backup, backup solutions, school district, mac backup, apple backup, mac network
    
Revinetix, Inc.
Published By: Lumension     Published Date: Jan 22, 2013
Keeping track of 10,000+ of anything is a management nightmare. With ongoing compliance and evolving attacks against vulnerable endpoint devices, getting a handle on managing endpoints becomes more important.
Tags : 
endpoint management, security, compliance, patch management, file integrity monitoring, device control
    
Lumension
Published By: Raghu     Published Date: Nov 25, 2010
Cloud Design Services, Cloud Management Services and Cloud Infrastructure, Application Support Services and Cloud Tools & Platforms
Tags : 
cloud computing, cloud solution, css corp, cloud services, automation and testing, support services, cloud platform
    
Raghu
Published By: EMC Corporation     Published Date: May 27, 2011
This ESG paper describes how through consistent individual product innovation and integration EMC backup and recovery solutions tackle the issues that prevent customers from transforming data protection.
Tags : 
esg analyst report, emc, data protection, backup, brian babineau, david a. chapa, data growth, infrastructure, deduplication
    
EMC Corporation
Published By: EMC Corporation     Published Date: May 27, 2011
In this paper, IDC examines solutions from EMC and explains how they can help to speed the benefits of virtualization while modernizing the backup and recovery process. Read this white paper to learn more today!
Tags : 
emc, idc analyst report, virtualization, backup and recovery, vm sprawl, vmware, disaster recovery, infrastructure, avamar
    
EMC Corporation
Published By: EMC Corporation     Published Date: May 27, 2011
In this brief, IDC discusses the challenges of using tape and the benefits of disk-based data protection solutions with data deduplication, especially if a business is experiencing unabated data growth, a lack of recovery performance, and increased costs associated with physical tape.
Tags : 
emc, idc, backup and recovery, data protection solutions, data deduplication, data growth, recovery performance
    
EMC Corporation
Published By: EMC Corporation     Published Date: Mar 08, 2012
Data deduplication is not just altering how backup targets are used; it dramatically affects operating efficiencies, simplifies remote office data protection, and makes disaster recovery significantly more affordable and realistic. Read on.
Tags : 
leveraging, emc, deduplication, solutions, backup, recover, long-term information, retention, information retention
    
EMC Corporation
Published By: EMC Corporation     Published Date: Mar 08, 2012
This white paper highlights several new features within EMC ®Avamar ® 6.0 that specifically target and greatly advance the capabilities and performance of VMware data protection.
Tags : 
leveraging, emc, deduplication, solutions, backup, recover, long-term information, retention, information retention
    
EMC Corporation
Published By: EMC Corporation     Published Date: Mar 08, 2012
In this brief, IDC discusses the challenges of using tape and the benefits of disk-based data protection solutions with data deduplication, especially if a business is experiencing unabated data growth, a lack of recovery performance. Find out more.
Tags : 
idc, disk based, data protection, unabated, data growth, recovery, backup
    
EMC Corporation
Start   Previous    191 192 193 194 195 196 197 198 199 200 201 202 203 204 205    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com