control

Results 376 - 400 of 2111Sort Results By: Published Date | Title | Company Name
Published By: Group M_IBM Q119     Published Date: Mar 05, 2019
In this digital world, fast and reliable movement of digital data, including massive sizes over global distances, is becoming vital to business success across virtually every industry. The Transmission Control Protocol (TCP) that has traditionally been the engine of this data movement, however, has inherent bottlenecks in performance (Figure 1), especially for networks with high, round-trip time (RTT) and packet loss, and most pronounced on high-bandwidth networks. It is well understood that these inherent “soft” bottlenecks arcaused by TCP’s AdditiveIncrease-Multiplicative-Decrease (AIMD) congestion avoidance algorithm, which slowly probes the available bandwidth of the network, increasing the transmission rate until packet loss is detected and then exponentially reducing the transmission rate. However, it is less understood that other sources of packet loss, such as losses due to the physical network media, not associated with network congestion equally reduce the transmission rate.
Tags : 
    
Group M_IBM Q119
Published By: BMC Software     Published Date: May 16, 2011
Learn more on how users can customize their cloud services - while you maintain control.
Tags : 
bmc software, custom cloud, cloud computing, modular cloud service, lilac schoenbeck, bsm, business srvice management, service level agreement, sla
    
BMC Software
Published By: iPass     Published Date: Jun 15, 2009
In this Webcast, Brownlee Thomas, Ph.D., Principal Analyst from Forrester Research, Inc., talks about current enterprise mobility trends, shows you what other companies are doing in response to these trends and gives you best practices for reducing your own mobility costs. Don't miss this timely and insightful Webcast.
Tags : 
ipass, wifi, smartphones, roaming, web portal, vpn, ethernet, connection detail records, cdrs
    
iPass
Published By: Avocent     Published Date: Aug 22, 2011
By enabling services for controlling access to the infrastructure and monitoring for activity, management decisions can be made to improve data center services.
Tags : 
avocent, data center services, infrastructure, ema, data center operations control, controlled data center infrastructure, data center
    
Avocent
Published By: Delphix     Published Date: Feb 28, 2013
Download this paper to learn how a virtual data storage solution can provide a simple and effective way to overcome obstacles and enable rapid deployment of multiple development and test databases against production systems with minimal storage use.
Tags : 
data management, virtualization, database virtualization, data warehousing
    
Delphix
Published By: Blue Coat Systems     Published Date: Jul 05, 2011
There's a reason why two leading analyst firms named us a leader in WAN Optimization Controllers. Wait, actually, there are a lot. Read the five most critical reasons now.
Tags : 
blue coat, wan optimization, secure web gateway, application performance monitoring, midsize firms, sap, oracle, efficiency
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 05, 2011
The wide-area network optimization controller market is maturing rapidly, but remains dynamic, with a high level of innovation from vendors. Organizations looking to acquire WOC capabilities should identify their specific needs and conduct real-life trials before committing to any purchase.
Tags : 
blue coat, wan optimization, secure web gateway, application performance monitoring, magic quadrant, optimization controllers
    
Blue Coat Systems
Published By: Vocia     Published Date: Aug 24, 2011
Day-to-day operations of public venues are increasingly complex. Examine common requirements and functions of a successful critical paging solution-whether for a hospital, shopping center or sports arena.
Tags : 
vocia, critical paging systems, paging solutions, public venues, communication system technologies, outputs, inputs, amplifiers, servers, controllers system integration, public safety, emergency communication, voice evacuation systems, safety paging, hospital paging, hcit
    
Vocia
Published By: RES Software     Published Date: Jul 03, 2012
Give your clinicians access to a single, secure and HIPAA compliant workspace. Using their laptop, tablet or smartphone, they can quickly access patient data on the go, while you retain control of your devices.
Tags : 
res software, healthcare, technology, healthcare it, workspace manager, scripts, clinician productivity, desktop migration, windows migration, res workspace manager
    
RES Software
Published By: RES Software     Published Date: Jul 11, 2012
In this web seminar you'll learn how RES Software will help to find the perfect balance between your needs and those of your clinicians, administrators and regulators. Healthcare professionals will be able to access applications and data in any system, via multiple devices and from wherever they need: operations rooms, wards, clinics or even at home, without putting compliance requirements at risk.
Tags : 
res software, healthcare, technology, healthcare it, workspace manager, scripts, clinician productivity, it clinicians
    
RES Software
Published By: Workday     Published Date: Mar 01, 2018
A cloud-based system for finance frees your finance team to do more than manage controls and transactions. But choosing one that supports your goals today and into the future, while helping your finance team act strategically, can be difficult. Read this whitepaper for guidance in selecting a system.
Tags : 
cloud-based system, strategically, finance
    
Workday
Published By: Workday     Published Date: May 09, 2018
A cloud-based system for finance frees your finance team to do more than manage controls and transactions. But choosing one that supports your goals today and into the future, while helping your finance team act strategically, can be difficult. Read this whitepaper for guidance in selecting a system.
Tags : 
    
Workday
Published By: Damballa     Published Date: Nov 13, 2012
Frost & Sullivan is proud to present the 2011 North American New Product Innovation Award in Cyber Threat Protection to Damballa Inc.
Tags : 
advanced threats, apt, advanced persistent threats, targeted attacks, advanced malware, command-and-control, c&c, dropper, call-back, virtual analysis, zero-day threats, tdl4, stuxnet, spyeye, zeus, malware detection, cyber attacks, cybersecurity, cyber threats, cyber espionage
    
Damballa
Published By: CDW     Published Date: Nov 12, 2012
Your server room's climate is burning through your budget, we get it. CDW has helped many organizations get control of their data centers with an energy-efficient power and cooling strategy.
Tags : 
power and cooling, data centers, server room, cooling strategy, business technology, data center
    
CDW
Published By: EMC     Published Date: Apr 18, 2013
See how RSA Archer Risk Management enables you to proactively address risks to your organization with a central GRC management system for identifying risks, evaluating their impact, relating them to mitigating controls, and tracking their resolution.
Tags : 
risk assessment, risk management, it infrastructure, governance, tracking resolution, compliance, grc
    
EMC
Published By: BMC Software     Published Date: Jul 24, 2014
With the average cost of a data breach reaching $3.5 million, the pressure is intense to maintain the security and compliance of your data center. Discover how your organization may be at risk and how you can protect your data center from costly and highly visible breaches. Read the whitepaper today to put the trust back into your data center.
Tags : 
intelligent, compliance, breach, security, data center, control
    
BMC Software
Published By: Aon Hewitt     Published Date: Oct 13, 2014
Are you struggling to predict and manage the rising cost of health care at your organization, while still trying to offer your employees and their families quality, affordable health coverage? Private health exchanges have emerged as a strategy employers are using to help curb this cost trend while offering employees more choice and control over their health care. Download XChanges Today to learn about this changing marketplace and how private exchanges are realigning incentives to benefit everyone in the value chain: employers, insurance carriers, employees, and providers.
Tags : 
aon, health coverage, private health exchanges, insurance, xchanges, affordable health coverage
    
Aon Hewitt
Published By: Oracle     Published Date: Apr 29, 2014
This white paper examines how advanced controls can substantially improve the bottom line, the scope of the issues addressed by advanced controls, and the reasons why leading companies and experts who monitor cash leakage are increasingly looking to advanced control solutions.
Tags : 
oracle, cash leakage, cash management, improve the bottom line, vendor payments, advanced controls, knowledge management
    
Oracle
Published By: McAfee     Published Date: Sep 15, 2014
This report presents the results of ESG Lab’s validation testing of the McAfee Next Generation Firewall. Integrating application control, intrusion detection, and evasion prevention, the product is designed to provide next generation firewall services, leveraging a unified software core to enable the deployment of multiple security services when and where they are needed.
Tags : 
application control, network security, firewall, firewall services, it security
    
McAfee
Published By: McAfee     Published Date: Sep 15, 2014
Attacks today incorporate increasingly sophisticated methods of social engineering and client-side software manipulation to exfiltrate data without detection. Some attackers leverage so-called spearphishing to entice employees to give up access information and spread their attacks to other enterprise systems; others use password crackers against compromised applications in order to gain further access rights to the network. The attackers might also set up channels for command and control communications with the compromised systems, as in the case of the Zeus or SpyEye bot infections.
Tags : 
network protection, it security, firewall, hacker detection, security management
    
McAfee
Published By: McAfee     Published Date: Jan 20, 2015
Network availability and survivability in the face of an attack requires specific tools and processes. Are you using RBAC, hierarchical policy management and individual domain control? Find out which eight features you must deploy now.
Tags : 
network security, network management, firewall management, enterprise firewall, ngfw, next generation firewall, firewall automation, networking
    
McAfee
Published By: Echelon     Published Date: Feb 19, 2015
Parking lot, area, and pathway lighting that burns all night represents a significant source of energy waste and contributes to needless sky glow and light pollution. Learn how that can be avoided with this whitepaper.
Tags : 
outdoor lighting, commercial lighting, wireless outdoor lighting, rf outdoor lighting, lighting controls, outdoor lighting controls, outdoor lighting solutions, lumewave, echelon, public safety, energy savings, light pollution, energy savings, pole spacing, sensor coverage, safety, public safety
    
Echelon
Start   Previous    9 10 11 12 13 14 15 16 17 18 19 20 21 22 23    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.