nis

Results 1676 - 1700 of 1916Sort Results By: Published Date | Title | Company Name
Published By: Quocirca     Published Date: Feb 23, 2009
Network Centric Operations (NCO) recognises the demand for pervasive decision-making in the modern battlespace. NCO provides the ability to leverage information networks to generate a more dynamic and agile decision-making space. An important dimension of this approach is the technological flexibility to quickly move the decision-making authority hierarchically or geographically as the situation demands. A fundamental enabler to this approach is the concept of a services orientated architecture (SOA). The use of industry-standard IT architectures provides the means of ensuring that systems can be provisioned rapidly, can be shared as appropriate, and can give the flexibility and response times required within such challenging environments.
Tags : 
quocirca, network centric operations, agile decision-making, services orientated architecture, soa, enterprise service bus, esb, non-governmental organizations, ngos, network centric warfare, ncw, standardized battlespace, common operating picture, cop, access points, networking
    
Quocirca
Published By: Quocirca     Published Date: Feb 23, 2009
Networked printers and multifunction peripherals often require a high level of support and manual intervention. Secure remote monitoring platforms reduce device downtime through automating service alerts, providing proactive toner replenishment and automatic meter reading. End users benefit through improved device uptime, and manufacturers and their service partners can build proactive service relationships which can drive greater customer loyalty.
Tags : 
quocirca, printers, networked printers, multifunction peripherals, secure remote monitoring, document output devices, remote monitoring, managed print service (mps), service portal, storage
    
Quocirca
Published By: Quocirca     Published Date: Apr 08, 2009
Monitoring, measuring and reporting on the financial health of an organisation is a basic need that requires effective tools and processes to optimise the end result. Underpinning this is the requirement for planning capabilities, utilising scenario and what if analysis with simulations and other forward looking capabilities. The new primary research presented in this report shows that most organisations still have much to do.
Tags : 
quocirca, oracle, monitoring, measuring, reporting, financial health, compliance, epm, soft-touch, governance, business intelligence, epm index, financial services authority, merger and acquisition, m&a, key performance indicators, kpis
    
Quocirca
Published By: Quocirca     Published Date: May 15, 2009
Most organisations have had to supplement their IT capability with some form of external help at one time or another. However, as financial pressures mount and technology continues to evolve and its relationship with the business becomes increasingly complex, how does this change the expectations and needs of those external relationships? Learn more today!
Tags : 
quocirca, software as a service (saas), it function, it staff, business process, customer service, it budget, it management
    
Quocirca
Published By: Quocirca     Published Date: Jul 27, 2009
With data breaches widespread, no organisation can afford to be complacent, but most data losses are avoidable. Many of the breaches making headline news are caused by the loss or theft of laptops and other portable devices. To protect themselves from financial and reputational damage, encryption technologies can reduce risks by ensuring the information on such devices is secure when users are on the move. They can also add value by allowing the secure sharing of information among authorised users and by enabling more secure remote working.
Tags : 
quocirca, encryption, security, information protection, compliance, data management
    
Quocirca
Published By: Quocirca     Published Date: Jul 27, 2009
Across the mid-market, inefficiencies are compounded by the lack of visibility into pertinent data, of processes being adequately and flexibly automated, and for the performance of the business to be monitored on a constant basis. Without such capabilities, businesses will find it difficult to survive the current financial conditions – yet creating an environment where information can be easily aggregated and viewed has never been easier. Also, business performance can be easily monitored with small proactive, and even reactive, actions ensuring effective responses to market forces and enabling organisations to compete with local and more global business threats.
Tags : 
quocirca, business intelligence, performance management
    
Quocirca
Published By: Quocirca     Published Date: Oct 17, 2009
Managed print services (MPS) offer organisations the opportunity to control costs, reduce the complexity of managing a heterogeneous infrastructure and improve business processes. With many organisations striving to do more with less, MPS can cut both capital and operational expenses. Now is the time to tackle the huge cost and productivity drain represented by an unmanaged print environment. MPS passes control of this complex infrastructure to the experts leaving an organisation to focus on its core business competencies.
Tags : 
quocirca, data loss, encryption, data security, laptops, information protection, winmagic, information sharing, remote, data loss, critical information, private information, customer information, identity management, dlp, data loss protection, mfps, it infrastructure, authentication, mps
    
Quocirca
Published By: NetIQ Corporation     Published Date: Apr 05, 2007
Learn why organizations need to limit IT administrator power to ensure operational integrity and assure compliance and how to implement robust change control processes and tools with this white paper.
Tags : 
insider threat, network security, it administrator, comply with regulations, it infrastructure, compliance, change management, it management, access control, it security, netiq, net iq
    
NetIQ Corporation
Published By: NetIQ Corporation     Published Date: Sep 04, 2007
Learn about the key challenges of PCI DSS v1.1 and how NetIQ Security Management, Configuration Control and Enterprise Administration solutions can help you demonstrate PCI compliance.
Tags : 
pci, pci dss, compliance, credit card, payment card, pci compliance, customer privacy, privacy, customer data, data privacy, data protection, net iq, netiq, cardholder
    
NetIQ Corporation
Published By: NetIQ Corporation     Published Date: Nov 27, 2007
Learn how delegating administrative privileges can aid in improving administrative productivity, system availability and security, while satisfying the demands of auditors.  Read this new white paper from NetIQ today.
Tags : 
access control, security, audit, auditor, auditing, change management, net iq, netiq
    
NetIQ Corporation
Published By: 2dev     Published Date: Jan 29, 2007
The goal of this series of articles is to help DBA's having a basic understanding of Oracle's Application Server.
Tags : 
software development, oracle, database, database security, oracle application server, database administrator, dba, database development, 2dev
    
2dev
Published By: Magonaga     Published Date: Jan 17, 2007
This white paper examines how the failure to structure equitable relationships, establish ethical foundations for action and correct blinding group think led to the catastrophic death of a specific corporate organism.
Tags : 
corporate culture, team dynamics, project management, team management, people management, magonaga, it management
    
Magonaga
Published By: LANDesk     Published Date: Feb 12, 2007
As IT departments work to transition from "firefighting mode" to becoming more proactive and responsive, a key step along the path is to implement labor-saving automation tools that allow more tasks to be done more rapidly, using fewer resources and with greater predictability and reliability.
Tags : 
it management, productivity, project management, service management, groupware workflow, business process automation, bpa, it automation, automating it, security management, landesk
    
LANDesk
Published By: Indigo Rose Corporation     Published Date: Feb 14, 2007
TrueUpdate 2.0 is a comprehensive solution for software developers, network administrators and IT departments wanting to integrate automated update capabilities into their software applications and business processes. Read through a comprehensive list of features, and learn about the system requirements of TrueUpdate 2.0.
Tags : 
software development, networking, it management, indigo rose
    
Indigo Rose Corporation
Published By: Infor     Published Date: Feb 27, 2007
A fast-growing supplier, NEI's delivery performance was declining, creating a significant problem with past-due shipments, even though the company had an excess of finished goods. Access this case study to learn about how they addressed their challenges.
Tags : 
productivity, supply chain management, scm, product lifecycle management, enterprise resource planning, erp, customer service, customer satisfaction, business process management, customer experience management, best practices, manufacturing, infor
    
Infor
Published By: Infor     Published Date: Feb 27, 2007
This white paper report describes an innovative, simple and effective approach to Lean Manufacturing. Simplified Market Pull (SMP) includes a 'pull' scheduling mechanism with appropriate controls and buffers that supports dramatic reductions in production lead-time and work-in-process inventory while freeing up available capacity and improving on-time performance and reliability.
Tags : 
productivity, supply chain management, scm, enterprise resource planning, erp, pull scheduling, smp, manufacturing, infor
    
Infor
Published By: Microsoft Dynamics     Published Date: Nov 06, 2008
The Rodgers & Hammerstein Organization (R&H) manages and administers musical and theatrical licensing rights for the heirs of Richard Rodgers, Oscar Hammerstein II, and many other talented writers. The company implemented Microsoft Dynamics AX in 2006 to gain complete control and visibility over its licensing and business operations. More recently, the company wanted to give employees quick and easy access to the information they need to perform their jobs more efficiently. R&H enrolled in the Microsoft Technology Adoption Program and became one of the first companies in the world to implement Microsoft Dynamics AX 2009. Now, employees throughout the organization have almost instant access to company information tailored to their specific roles. Employees spend less time tracking tasks and more time efficiently serving customers.
Tags : 
microsoft dynamics, rodgers & hammerstein
    
Microsoft Dynamics
Published By: Decru     Published Date: Apr 23, 2007
Company data is vulnerable to threats from - insiders, unauthorized access to data, data backup, off-site mirroring - just to name a few. Encrypting data at rest, on tape or disk, significantly mitigates these threats. This document provides guidance into some of the factors a company should consider when evaluating storage security technology and solutions.
Tags : 
storage, security, encryption, key management, protecting your data, security controls, networked storage environments, audit & logging, role based administration, secure access controls, enterprise security, data security, network security, storage management, authentication, standards compliance, security & privacy, security appliances, decru
    
Decru
Published By: eFax     Published Date: May 15, 2007
Fax servers promise easier administration and cheaper faxing but most deployments fail to meet their goals because of unexpected, ongoing costs and unpredictable capacity needs. This paper offers information on why outsourced fax services eliminate the time, effort and cost issues associated with fax servers, but retain all of the same functionality.
Tags : 
fax, faxing, ip faxing, fax server, fax servers, ip networking, ip networks, converged communications, integrated communications, communications convergence, convergence, communication, communications, protus, protus ip solutions
    
eFax
Published By: GFI     Published Date: Jan 11, 2008
2008 brings with it new challenges and issues that network and systems administrators should be aware of, particularly vulnerabilities brought on by users. This white paper examines the top concerns which network security professionals should be prepared to face in 2008, and how they can be mitigated.
Tags : 
gfi, employees, employee vulnerability, vulnerability management, vulnerability, vulnerabilities, security concerns, internal threats, internal, spam, gullibility, security holes, human error, pebcac, network security, access control
    
GFI
Published By: Torry Harris Business Solutions     Published Date: Jul 05, 2007
This whitepaper is written as a guide to an alternative mechanism for project implementation for business owners holding responsibility to deliver IT solutions in the SOA space. It could also be of interest to those who would like to know more about how the phenomenon of offshore/onsite coordination, that emerged in the nineties, can be effectively applied towards realizing the promise of SOA.
Tags : 
service oriented, service-oriented, governance, service management, outsource, outsourcing, offshoring, offshore, architecture, software architecture, it spending, xml, torry harris, thbs
    
Torry Harris Business Solutions
Published By: TRIRIGA     Published Date: Jul 27, 2007
In this white paper, we discuss industry standards, the range of disciplines IWMS spans, external systems (e.g., CAD, ERP, human resources) that interact with a solid IWMS, and the costs avoided when innovators enforce data templates and processes throughout the enterprise.
Tags : 
facilities management, iwms, real estate management, facilities, iwms, integrated workplace management, maintenance and operations, project management, workplace management, tririga, triraga, lease administration, retail, capital assets, corporate real estate, store openings, user moves, on-boarding, off-boarding
    
TRIRIGA
Published By: ProofSpace     Published Date: Aug 08, 2007
Digital signatures aren't enough. This paper posits that data integrity needs to be redefined within the context of a time-sensitive mechanism.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, time stamp, timestamp, time and data stamping, file authentication, x9.95, timestamping, ediscovery, discovery, admissibility, email archiving, surety, authentidate, timecertain
    
ProofSpace
Published By: AT&T     Published Date: Jun 25, 2008
Class of Service (CoS) functionality can help optimize network performance. For a successful deployment, network designers should identify all applications, understand requirements associated with each application, designate appropriate mapping for groups of applications and provide mechanisms in the underlying network to deliver CoS. CoS mapping and deployment are important; adhering to tested strategies and avoiding common misconceptions helps IT managers advance optimization across the wide area network.
Tags : 
class of service, service management, traffic management, bandwidth, at&t, att, network performance management
    
AT&T
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
The HSC network services group supports more than 2000 desktops, servers and backend systems such as e-mail, file, networking, application and storage services for general administration, dental and medical schools. HSC wanted to manage and reduce HIPAA compliance costs and processes associated with protecting PHI data within its storage infrastructure – a legacy SAN environment with evolving applications.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management, key management for enterprise, effective encryption key management, key management system, information security, protecting offsite tape storage, disaster recovery, data privacy regulations, backup tapes, security appliance, data security, secure key management, wire-speed encryption
    
Neoscale Systems, Inc.
Start   Previous    61 62 63 64 65 66 67 68 69 70 71 72 73 74 75    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.