ack

Results 6551 - 6575 of 6618Sort Results By: Published Date | Title | Company Name
Published By: Diskeeper Corporation     Published Date: Jun 08, 2007
With continued expansion of organizational storage allocation requirements, the time required for file-based data backup also continues to increase yet the time allotted for this data backup remains constant, exposing a critical issue. Though backup software vendors continue making advancements in technology to speed up the process, disk fragmentation will continue to remain an unresolved issue that must be addressed on the file system level to solve this bottleneck.
Tags : 
storage, storage management, backup, data backup, disk backup, defrag, defragment, defragmentation
    
Diskeeper Corporation
Published By: Campaigner     Published Date: Jun 05, 2007
Targeted and personal, no medium today is as effective at empowering marketers with the ability to reach out and connect with their customers on a real 1-to-1 level more than Email Marketing. This insightful White Paper provides 5 simple but powerful email tactics that will keep your customers coming back for more.
Tags : 
email marketing, crm, customer relationship management, customer experience management, customer satisfaction, email, got, got corp
    
Campaigner
Published By: Engine Ready     Published Date: Jun 05, 2007
In its quest to continue increasing market share, American Financial Services (AFS) began to realize the importance of a solid analytics package to help develop and track a list of targeted keywords in several pay-per-click search engines. Additionally the highly competitive nature of their most popular keywords was creating a considerable marketing challenge.
Tags : 
pay per click, search engine marketing, web analytics, online marketing, web marketing, internet marketing, ppc, sem
    
Engine Ready
Published By: Campaigner     Published Date: Jun 05, 2007
Targeted and personal, no medium today is as effective at empowering marketers with the ability to reach out and connect with their customers on a real 1-to-1 level more than Email Marketing. This insightful White Paper provides 5 simple but powerful email tactics that will keep your customers coming back for more. 
Tags : 
email marketing, crm, customer relationship management, customer experience management, customer satisfaction, email, got, got corp
    
Campaigner
Published By: Casewise Systems Inc.     Published Date: Jun 05, 2007
Read this guide, that was published in BusinessWeek, on how organizations are now beginning to tackle this problem by taking a more holistic approach to IT Portfolio Management, enabling rapid decision-making based on a company roadmap.
Tags : 
business management, architecture, alignment, align, strategy, it management, network management, casewise
    
Casewise Systems Inc.
Published By: Third Brigade     Published Date: May 25, 2007
This white paper identifies twelve critical questions that organizations need to consider when selecting a Host Intrusion Prevention System product. These questions relate to protection, manageability, integration and speed.
Tags : 
host ips, ips, hips, intrusion prevention, vendor selection, software selection, security, hacker prevention
    
Third Brigade
Published By: AirDefense     Published Date: Apr 24, 2007
This document outlines how hackers are exploiting vulnerabilities in 802.11 wireless LANs and describes the widely available hacking tools. As a collection of already published risks to wireless LANs, this white paper is written to inform IT security managers of what they are up against.
Tags : 
hackers, hacker, hacker detection, intrusion prevention, wireless security, wlan, wlans, 802.11
    
AirDefense
Published By: Quocirca     Published Date: Apr 23, 2007
The need to understand how the performance and problems within the technical infrastructure impacts the capabilities of the business is massive.  However, the majority of companies can only measure application and specific asset performance, whereas many issues within the infrastructure lie at the transport level, where packet switching presents both great opportunities and major issues.
Tags : 
networking, infrastructure, network management, tcp/ip protocol, wide area networks, wan, wans, packet switching
    
Quocirca
Published By: Decru     Published Date: Apr 23, 2007
Company data is vulnerable to threats from - insiders, unauthorized access to data, data backup, off-site mirroring - just to name a few. Encrypting data at rest, on tape or disk, significantly mitigates these threats. This document provides guidance into some of the factors a company should consider when evaluating storage security technology and solutions.
Tags : 
storage, security, encryption, key management, protecting your data, security controls, networked storage environments, audit & logging
    
Decru
Published By: OnForce     Published Date: Apr 22, 2007
“8 Ways Every Solution provider Can Profit from Rollouts Now” demonstrates how rollouts are creating strong sales opportunities for solution providers of all sizes. Importantly, it also addresses how solution providers have finally “cracked the code” of transforming this high-volume business, which is extremely service intensive, into a high-profit business via innovative on-site service delivery models that let them find the contract IT service professionals they need, right when they need them.
Tags : 
service model, roll-out, rollout, roll-outs, rollouts, customer service, var, vars
    
OnForce
Published By: Infor     Published Date: Apr 19, 2007
This paper includes a comparison between using RFID and barcoding for asset management as well as real-life examples of how RFID technology is being used by enterprising organizations today to gain significant time savings and enable better asset and maintenance management.
Tags : 
wireless, wireless hardware, wireless infrastructure, rfid, radio frequency, mobile data systems, asset management, barcode
    
Infor
Published By: Cyberoam     Published Date: Apr 19, 2007
Protecting students from the millions of sites that house pornography, adult chat rooms, violence & hacking can provide not just a safe surfing atmosphere to minors in schools and libraries, but also qualify the institutions for federal E-rate funding through compliance with CIPA - the Children's Internet Protection Act.
Tags : 
cipa, cipa compliance, cyberoam, cyberroam, chat room, hacking, childrends internet protection act
    
Cyberoam
Published By: Vocalocity     Published Date: Apr 18, 2007
BLUESTREAK, Inc., a New Jersey-based promotional items manufacturer and distributor, needed to reduce telephone expenses to help maintain competitive advantage. Find out how VocalocityPBX, a hosted PBX voice communications solution helped them to achieve their goal and even exceed expectations.
Tags : 
networking, network management, pbx, phone, phone system, telecom, telecommunications, voice over ip
    
Vocalocity
Published By: Xiotech     Published Date: Apr 13, 2007
Well-publicized disasters highlight the need for an effective and timely data recovery solution. While current tape and disk backup provide some peace of mind, they do not keep up with the demands placed on your business. You cannot afford to wait hours (or days) to recover your critical applications and data.
Tags : 
disaster recovery, disaster plan, data backup, backup and recovery, data recovery, disk backup, tape backup, offsite storage
    
Xiotech
Published By: Microsoft Dynamics     Published Date: Apr 13, 2007
Read how demand planning software packages can help manufacturers to establish baseline sales forecasts, incorporating multiple inputs; perform sophisticated analysis that improves their use of human and capital resources; and better understand their markets and customers.
Tags : 
microsoft dynamics, microsoft, microsoft white papers, microsoft, dynamics, it management
    
Microsoft Dynamics
Published By: digitiliti     Published Date: Apr 02, 2007
The challenge of managing, protecting and storing digital data is a major issue for businesses of every size and category. Companies generally rank the improvement of their storage infrastructure as a top objective, and the escalation of data protection costs has become an overriding concern. According to recent research, the data storage capacity of the average North American enterprise is now 59 terabytes, and the projected annual production data growth is 20 to 30 percent.
Tags : 
data storage, software, data security, data protection, enterprise software, storage, digitiliti, backup and recovery
    
digitiliti
Published By: WorldTelemetry, Inc.     Published Date: Mar 26, 2007
To be successful in today's safety-conscious and efficiency-minded marketplace, companies must combine compelling new technologies to offer the most convenient and effective business services and solutions. For monitoring remote tank sites, that means combining the intelligence of General Packet Radio Service (GPRS) communication with the risk mitigation properties of intrinsic safety.
Tags : 
business analytics, business management, business metrics, business intelligence, bi software, enterprise software, world telemetry, worldtelemetry
    
WorldTelemetry, Inc.
Published By: VisiStat     Published Date: Mar 22, 2007
This report outlines five important "insider" secrets for measuring the effectiveness of your Website, along with tips on how to turn it into a lead generation machine.
Tags : 
website traffic, visitor tracking, web analytics, web metrics, site analysis, online marketing, site management, increase sales
    
VisiStat
Published By: VisiStat     Published Date: Mar 22, 2007
Old Log File analytics data was good – today's hosted on-demand Web analytics reporting is much better. What once was only understandable by IT personnel now has a place on the desktops of sales, marketing and business professionals. Read about the differences, and improvements, in analytics.
Tags : 
web analytics, hosted analytics, hosted solution, snippet, page snippets, snippet technology, code snippets, code tag
    
VisiStat
Published By: AKS-Labs     Published Date: Mar 20, 2007
Business professionals lack essential information about real-life metrics and information on how to build a Balanced Scorecard, which supports weights and scores, which allows calculating the performance values. This whitepaper is a Balanced Scorecard design toolkit, which contains some "how-to" ideas.
Tags : 
balanced scorecard, business analytics, business metrics, business intelligence, business integration, customer satisfaction, enterprise resource planning, scorecard
    
AKS-Labs
Published By: ProStor Systems     Published Date: Mar 15, 2007
The need for protecting data is universal – whether a small to mid-size business, the largest enterprise data center, or an individual. The recognition of the value of information and the impact of data loss has reached the point where repeating it is no longer required. The issue now has turned to how to protect the data.
Tags : 
smb, archiving, backup, hardware, security, data management, database security, data protection
    
ProStor Systems
Published By: ProStor Systems     Published Date: Mar 15, 2007
This white paper covers the need for backup and the unique challenges faced by small and medium sized businesses when addressing storage needs. He then highlights different backup options and selection criteria for choosing the best backup solution.
Tags : 
backup, smb, hardware, archiving, security, small business networks, backup and recovery, small business
    
ProStor Systems
Published By: PowerFile, Inc.     Published Date: Mar 15, 2007
After a decade and a half optical technologies in the enterprise storage market account for only a fraction of 1% of enterprise storage hardware spending. For a traditional optical-based enterprise storage supplier, these are tough facts to acknowledge. Yet there will be a dramatically different future.
Tags : 
archiving, backup, dvd, backup and recovery, disk backup, tape backup, disk-based backup, tape-based backup
    
PowerFile, Inc.
Published By: Breece Hill, LLC     Published Date: Mar 15, 2007
Once a business clears the financial hurdle and begins to plan their data protection strategy the choices can appear daunting. Do they select tape or disk? Apply differential or incremental backups? How much will a new system cost and how much time will it take to implement? What data should be included in the backup? This article attempts to address these concerns.
Tags : 
smb, storage, archiving, backup, hardware, small business networks, storage, backup and recovery
    
Breece Hill, LLC
Published By: Palm, Inc.     Published Date: Mar 15, 2007
Smartphones and other handheld devices support government continuity of operations (COOP) by enabling its central tenets: decentralization and redundancy. Read this white paper to learn all benefits of using smart phones when an emergency strikes.
Tags : 
government, disaster recovery, disaster, terrorism, terrorist attacks, smartphone, smart phone, pda
    
Palm, Inc.
Start   Previous    251 252 253 254 255 256 257 258 259 260 261 262 263 264 265    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.