bsp

Results 401 - 411 of 411Sort Results By: Published Date | Title | Company Name
Published By: Xactis     Published Date: Feb 02, 2007
Learn the 'bottom-up' approach to start Business Rules Extracting, Migrating and Auto Re-architecting your current mission-critical legacy system and their data, into an SOA.  This is a "how-to" presentation addressing how to get started and eventually establish an internal L2S Center of Excellence.
Tags : 
soa, service oriented architecture, service-oriented architecture, business rules extracting, legacy system, erp, enterprise resource planning, mainframe, citrix, xactis
    
Xactis
Published By: XaSystems     Published Date: Aug 16, 2007
This quick reference guide provides an easy to use snap shot of key ITIL version 3 practices and concepts.  In addition, it provides a visual map between ITIL Version Service Delivery and Support books to the new ITIL Version 3.
Tags : 
itil, it infrastructure library, xa systems, xasystems, best practices, infrastructure, itil v3, itil v2, itil v.3, itil v.2, education, learning, reference, guide
    
XaSystems
Published By: Xiotech     Published Date: Apr 13, 2007
Data keeps growing with no signs of stopping. An effective storage solution seamlessly scales to meet an organization’s growing appetite for capacity, while ensuring availability and fast access.  SAN storage should be designed to deliver strong top-end performance so throughput does not degrade as storage needs scale higher.
Tags : 
storage area network, storage area networks, san, storage, storage performance, high availability, migration, storage migration, xiotech, storage management
    
Xiotech
Published By: Xiotech     Published Date: Apr 13, 2007
Data keeps growing with no signs of stopping. An effective storage solution seamlessly scales to meet an organization's growing appetite for capacity, while ensuring availability and fast access.  SAN storage should be designed to deliver strong top-end performance so throughput does not degrade as storage needs scale higher.
Tags : 
storage area networks, storage area network, san, san storage, storage, storage performance, storage management, offsite storage, off-site storage, xiotech
    
Xiotech
Published By: XOsoft     Published Date: Aug 21, 2009
The primary information management concern in the enterprise today is to ensure that the knowledge necessary to drive critical business processes is available where it needs to be, when it needs to be. The costs of failure to do this are high. 
Tags : 
cost control, data loss, data protection, information management, data management, business process management, xosoft, knowledge management, storage
    
XOsoft
Published By: Yesmail     Published Date: May 13, 2008
Using Web Analytics data to trigger email messages can produce amazing results.  Find out why marketers should be jumping on this opportunity.
Tags : 
web analytics, yesmail, yes mail, a/b testing
    
Yesmail
Published By: YouSendIt     Published Date: Nov 21, 2008
In this datasheet, discover how it’s now possible to send large files in a way that’s safer and more affordable than FTP, courier services, and email attachments.  Learn how to beat the security challenges that come with global collaboration and data sharing; avoid crippling data transfer problems like partial file delivery or network delays; and know where your file is every step of the way, from sendoff to final destination. Download your copy now.
Tags : 
cost of ownership, total cost of ownership, tco, authentication, authorization, encryption, file transfer, content delivery, digital content delivery, attachment, email, ftp, security, confidentiality, data security, data integrity, tracking, auditing, visibility, report
    
YouSendIt
Published By: YouSendIt     Published Date: Dec 02, 2008
Discover why sending large e-mail attachments and other digital files is becoming increasingly problematic.  Download this informative data sheet now to learn how FTP flaws can result in exposure; why large email attachments aren’t getting through; risks of delivering files via CD-ROM; and how new digital delivery developments make it possible to send large files, fast and securely.
Tags : 
file transfer, content delivery, digital content delivery, attachment, email, ftp, security, confidentiality, data security, data integrity, tracking, auditing, visibility, report, compliance, privacy, powerpoint attachment, mp3 attachment, jpeg attachment, photoshop attachment
    
YouSendIt
Published By: YouSendIt, Inc.     Published Date: Nov 21, 2008
In this datasheet, discover how it’s now possible to send large files in a way that’s safer and more affordable than FTP, courier services, and email attachments.  Learn how to beat the security challenges that come with global collaboration and data sharing; avoid crippling data transfer problems like partial file delivery or network delays; and know where your file is every step of the way, from sendoff to final destination. Download your copy now.
Tags : 
cost of ownership, total cost of ownership, tco, authentication, authorization, encryption, file transfer, content delivery, digital content delivery, attachment, email, ftp, security, confidentiality, data security, data integrity, tracking, auditing, visibility, report
    
YouSendIt, Inc.
Published By: YouSendIt, Inc.     Published Date: Dec 02, 2008
Discover why sending large e-mail attachments and other digital files is becoming increasingly problematic.  Download this informative data sheet now to learn how FTP flaws can result in exposure; why large email attachments aren’t getting through; risks of delivering files via CD-ROM; and how new digital delivery developments make it possible to send large files, fast and securely.
Tags : 
file transfer, content delivery, digital content delivery, attachment, email, ftp, security, confidentiality, data security, data integrity, tracking, auditing, visibility, report, compliance, privacy, powerpoint attachment, mp3 attachment, jpeg attachment, photoshop attachment
    
YouSendIt, Inc.
Published By: ZSL Inc.     Published Date: Sep 25, 2008
The hotspot in the current IT world is optimized Web Services. Now the enterprises have started their vision towards next generation Web Services. This white paper gives information for the business managers and engineers in developing and deploying Web Services using Rational Application Developer (RAD) and WebSphere Application Server (WAS), respectively. This paper explains the process to:* create a Web Service and Web Server client* build security to that web service* deploy the web service in WebSphere application server
Tags : 
zsl, soap, java, wsdl, uddi, web service security, risk exposure, software development
    
ZSL Inc.
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17     Next   End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.