bsp

Results 301 - 325 of 410Sort Results By: Published Date | Title | Company Name
Published By: OnForce     Published Date: Feb 19, 2008
Learn how VARs, solution providers and IT staffing firms are finding the contract IT service professionals they need to drive service revenue without adding overhead.  Get the free Ziff Davis white paper, “Strategies For Growing IT Service Revenues.”
Tags : 
crn, reseller, retailer, service, vendor selection, onforce, on force, var, var business, varbusiness, it management
    
OnForce
Published By: Orchid Technologies Engineering & Consulting     Published Date: Oct 07, 2008
As electronic product designs age, component parts become increasingly difficult to obtain.  Component buyers may experience difficulty in obtaining key parts within the design.  Component part prices may increase.  A point comes when component parts begin going end-of-life at an alarming rate.  Quick fixes are no longer sufficient.  Sometimes an OEM will procure a 'life-time' supply of problem parts – but this supply can be quickly wiped out should unforeseen demand develop.  Lack of component parts puts an end to production.There is an alternative.  Profitable, old products can be redesigned.  Either preserving the original form fit and function, or adding new features. Product redesign is a cost effective means by which to extend the life of a marketable product.
Tags : 
orchid technologies, texas instruments, original equipment manufacturers, (oem’s), software development, it management, storage
    
Orchid Technologies Engineering & Consulting
Published By: Panda Security     Published Date: Jan 16, 2008
A new white paper from Panda Security discusses the new breed of silent online threats that can bypass traditional antivirus programs and penetrate even the most highly 'protected' networks.  Additionally, the sheer volume of malware has overwhelmed the antivirus industry as a whole. Collective Intelligence is a new global security model specifically designed to combat the next evolution of malicious code.
Tags : 
malware, virus, anti-virus, spyware, anti-spyware, anti-malware, bot, botnet, trojan, dos, denial of service, hacker, phish, phishing, panda, panda security
    
Panda Security
Published By: Panda Security     Published Date: Feb 27, 2008
E-mail is the primary communication tool upon which every business and corporation depends.  This communication source is also the battleground where cybercriminals use sophisticated email infiltration-techniques to propagate malware and attack corporate networks.
Tags : 
malware, hacker, hacking, hackers, email security, e-mail security, panda, panda security, denial of service, dos, phishing, spyware
    
Panda Security
Published By: Panda Security     Published Date: Feb 27, 2008
With thousands of new malware threats being created and unleashed into the Internet daily, the End Point security model is failing.  Without additional layers of security, infiltration may be virtually impossible to stop.  This important white paper explores alternatives that eliminate dangerous traffic prior to reaching the network or server.
Tags : 
email security, e-mail security, security appliance, desktop, endpoint security, end point security, anti-spam, spam, anti spam, panda, panda security
    
Panda Security
Published By: Pardot     Published Date: Apr 29, 2009
How much time is your sales team wasting on unqualified leads? With automated scoring and grading your best prospects rise to the top, making it easy for sales representatives to prioritize prospects and take action with targeted follow-up.   
Tags : 
pardot, b2b lead generation, roi, lead gen, leads, unqualified leads, sales, sales team, sales growth, customer profile, scoring, grading, benchmark, nurturing, scoring, buying signals, tire kickers, decision makers, implicit buying signals, autoresponder
    
Pardot
Published By: Pardot     Published Date: Apr 29, 2009
B2B marketers have specific needs when it comes to email campaigns. Learn how implementing  an email system designed for B2B can bring together all of your lead generation efforts to create an integrated campaign with automated messaging personalized from your sales reps, CRM syncing and triggered nurturing emails.   
Tags : 
pardot, b2b specific, b2b email solution, email marketing, lead generation, integrated campaign, crm syncing, nurturing emails, personalization, scoring, lead gen, leads, sales, sales team, suspects, prospects, web marketing, micro-level, autoresponder, drip
    
Pardot
Published By: Platform Computing     Published Date: Dec 11, 2008
Studies show that data centers are doubling their total power consumption every 5 years.  But have most data centers optimized their energy consumption with the current available solutions? Platform Computing knows there is room in data centers to reduce energy costs by 10-30%. This paper describes strategies for dynamically managing the energy consumption to achieve similar results.
Tags : 
platform computing, high performance computing, power & cool servers, data centers, blade technology, system management, green strategies, storage, data management
    
Platform Computing
Published By: ProjectLocker     Published Date: Nov 19, 2007
Learn how you can transform your website into a marketing machine that attracts qualified prospects and converts a higher percentage of them into paying customers.  This Internet marketing whitepaper discusses 5 tips you can implement today to leverage the Internet and reach your customers more effectively.
Tags : 
website marketing, search engine, sem, seo, online marketing, blogging, adwords, google adwords, marketing, ppc, pay per click, google search, paid search, hubspot
    
ProjectLocker
Published By: ProofSpace     Published Date: Jul 31, 2007
This paper details the processes by which ProofMark tags electronic records with a self-validating cryptographic seal that acts as a "tamper indicator" based on a true and provable time-reference datum.  With this it is able to provide instantaneous and irrefutable proof of authenticity, no matter where the data resides or who has controlled it.
Tags : 
proofspace, proofmark, proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography, public key cryptography, time stamp, timestamp, time and data stamping, file authentication, x9.95, accredited standards committee x9, x9.95-compliant, transient key technology, timestamp
    
ProofSpace
Published By: ProofSpace     Published Date: Sep 10, 2007
Read this paper and learn the principles that are prerequisites to enforceable electronic agreements as required by existing legal standards and electronic signature legislation.  This paper will also specify sixteen measurement criteria that can be used as metrics to assess whether the architecture of an electronic transaction will meet the requirements of admissibility.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography, public key cryptography, time stamp, timestamp, time and data stamping, file authentication, x9.95, accredited standards committee x9, x9.95-compliant, transient key technology, electronic signatures, fda 21 cfr part 11, u.s. e-sign act
    
ProofSpace
Published By: PTC     Published Date: Aug 21, 2009
DITA is one of the most important innovations in XML publishing in recent memory.  Though DITA is an IBM invention and plenty of material has been written about it already, this paper must be read as well to clear the air about any errors, omissions, or misinterpretations, from previous publications on this topic.
Tags : 
xml, dita, darwin, ibm, ptc
    
PTC
Published By: Quocirca     Published Date: Nov 13, 2006
IT in the UK public sector is under intense scrutiny and needs to deliver better results:  much investment has been made which has too often failed to deliver. Projects have a history of being protracted and complex, offering significant challenges to all involved.
Tags : 
public sector, it management, government, project management, efficiency, productivity, quocirca
    
Quocirca
Published By: Quocirca     Published Date: Dec 04, 2006
Service Oriented Architectures (SOAs) will provide greater flexibility for those utilizing them, but will also bring greater issues for data and functional connectivity.  This paper contrasts and compares the capabilities of a point-to-point and an enterprise service bus approach.
Tags : 
soa, connectivity, service-oriented architecture, service oriented architecture, data management, enterprise, quocirca, it management, knowledge management
    
Quocirca
Published By: Quocirca     Published Date: Apr 23, 2007
The need to understand how the performance and problems within the technical infrastructure impacts the capabilities of the business is massive.  However, the majority of companies can only measure application and specific asset performance, whereas many issues within the infrastructure lie at the transport level, where packet switching presents both great opportunities and major issues.
Tags : 
networking, infrastructure, network management, tcp/ip protocol, wide area networks, wan, wans, packet switching, packets, protocol, data packet, business metrics, quocirca
    
Quocirca
Published By: Quocirca     Published Date: Apr 23, 2007
Information management, which includes both data and content management, is an essential building block for Service-Oriented Architecture (SOA).  By taking a service oriented approach to information, you can achieve much greater value from your information assets.
Tags : 
information management, service oriented architecture, service-oriented architecture, soa, data management, mdm, master data management, content management, content management system, information integration, quocirca
    
Quocirca
Published By: Quocirca     Published Date: Jul 11, 2007
SOA enables composite applications or collections of services that have been assembled to support a company’s business processes.  Portal and collaboration software delivers the essential people-focused capabilities of the SOA strategy to provide significant value to the organisation.
Tags : 
productivity, soa, service oriented, service-oriented, collaboration, bpm, business process management, portals, workforce management, team management, quocirca, it management
    
Quocirca
Published By: Quocirca     Published Date: Sep 07, 2007
Companies are faced with increasing pressures on the communications capabilities they offer their employees.  More employees are mobile, working from home or in other remote locations with a growing need to talk and share information with their colleagues.  This cuts across fixed and mobile communications, but businesses still want the flexibility of mobile, and the costs, predictability, quality and service models of fixed.
Tags : 
telecom, quocirca, mobility, soho, voip, ip telephony, convergence, small business, wi-fi, wifi, united kingdom, mobile
    
Quocirca
Published By: Quocirca     Published Date: Sep 07, 2007
Mid-sized organizations have similar issues to large organizations when it comes to the storage and management of information and data, yet they often have limited capability to attract, retain and maintain the skills that large organizations will use in managing their data assets.  There is a strong need for more effective tools that will enable mid-sized organizations to manage their data assets and gain the greatest value from them.
Tags : 
smb, smbs, storage, data management, information management, storage management, san, sans, storage area network, quocirca
    
Quocirca
Published By: Quocirca     Published Date: Sep 07, 2007
Social Networking tools have proliferated in the recent past, and many individuals are now utilizing such tools as a core part of their day-to-day lives.  If these tools can be harnessed as a means of interaction by the public sector, constituency involvement will rise, while costs can be minimized.
Tags : 
social networking, blog, blogging, blog marketing, wiki, wikis, wiki marketing, emerging marketing, mashup, mashups, survey, online survey, online panel, quocirca, it management
    
Quocirca
Published By: Quocirca     Published Date: Oct 05, 2007
Knowledge of the location of customers, property, products or any other asset is invaluable intelligence for improving competitive advantage and operational efficiency.  However, despite the proliferation of data that businesses generate today, the potential value of this location dimension is often overlooked in the business intelligence process.
Tags : 
business intelligence, business analytics, historical data, data analysis, gis, geospacial, geographic information system, geocoding, geocode, location, quocirca
    
Quocirca
Published By: Quocirca     Published Date: Feb 05, 2008
The financial services industry deals with a commodity that is primarily electronic — money. Consequently it spends more per employee on IT than any other industry.  Despite this, there is a worrying tendency for information that should be confidential to end up in the public domain. Why is this and what can be done?
Tags : 
quocirca, bank, banks, financial services, finserve, finserv, network security, customer data, data protection, intrusion prevention, data security, database security
    
Quocirca
Published By: Quocirca     Published Date: May 14, 2008
Virtual private networks (VPNs) are the technologies most widely used by organizations today in the provision of remote access to their networks for employees, business partners and suppliers. Of the VPNs available, IPSec (Internet Protocol Security) VPNs provide the most complete remote access solution, although they have traditionally been seen as costly and difficult to deploy. 
Tags : 
vpn, ipsec, remote access quocirca
    
Quocirca
Published By: Quocirca     Published Date: Jul 03, 2008
Small and medium sized organizations have similar issues to large companies when it comes to the processing and storage of information and data, yet often have little capability to attract, retain and maintain the skills for managing their data assets compared to large organizations.  Blade systems offer an effective way to address the specific challenges faced by smaller organizations in managing their IT assets, and allows then to gain greater value from them.
Tags : 
storage, blade, blade systems, small business, smb, smbs, mid-sized business, quocirca
    
Quocirca
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.