nis

Results 1701 - 1725 of 1918Sort Results By: Published Date | Title | Company Name
Published By: AT&T     Published Date: Jun 25, 2008
Class of Service (CoS) functionality can help optimize network performance. For a successful deployment, network designers should identify all applications, understand requirements associated with each application, designate appropriate mapping for groups of applications and provide mechanisms in the underlying network to deliver CoS. CoS mapping and deployment are important; adhering to tested strategies and avoiding common misconceptions helps IT managers advance optimization across the wide area network.
Tags : 
class of service, service management, traffic management, bandwidth, at&t, att, network performance management
    
AT&T
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
The HSC network services group supports more than 2000 desktops, servers and backend systems such as e-mail, file, networking, application and storage services for general administration, dental and medical schools. HSC wanted to manage and reduce HIPAA compliance costs and processes associated with protecting PHI data within its storage infrastructure – a legacy SAN environment with evolving applications.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management, key management for enterprise, effective encryption key management, key management system, information security, protecting offsite tape storage, disaster recovery, data privacy regulations, backup tapes, security appliance, data security, secure key management, wire-speed encryption
    
Neoscale Systems, Inc.
Published By: Technolytics     Published Date: Oct 05, 2007
Recently, a series of cyber attacks on the Defense Department and Defense contractors in the United States as well as the Ministry of Defense and Parliament in the U.K. have created significant cause-for-concern by computer security experts. It is imperative you read this brief and learn how we're all vulnerable and what is being done to prevent these Cyber Attacks.
Tags : 
spy ops, spy-ops, cyber attack, hacker, hackers, government, internet security, national security, network security, intrusion, intrusion detection, intrusion prevention, trojan, risk management, cyberwarfare, cyber warfare, technolytics
    
Technolytics
Published By: Netwrix     Published Date: Apr 22, 2008
At the end of an academic year, many thousands of students may permanently leave a school or university system. Once these users graduate, discontinue their education, or perhaps simply move away, IT administrators are left with a huge number of accounts that must be marked as inactive and then dealt with according to system policies.
Tags : 
netwrix, graduate, graduation, education, college, university, school, inactive accounts, inactive account, password management, identity management, access control
    
Netwrix
Published By: Netwrix     Published Date: Apr 22, 2008
Windows’ newest technology, the User Account Control, found in the Vista operating system has been erroneously called an additional level of security by many computer security professionals. Instead, in the hope to reduce the incidence of malware, unauthorized software installation, and unintentional system changes the User Account Control separates standard user tasks from requiring administrator level password access.
Tags : 
vista, windows vista, microsoft, microsoft vista, netwrix, security breach, access control, user access control
    
Netwrix
Published By: Borer Data Systems Ltd.     Published Date: Nov 07, 2007
Clear Image was awarded a contract to supply and fit CCTV and Access control to NISA, one of the largest picking warehouses in Europe. The company runs 3 shifts per day and wanted to allocate lockers to employees. The simple solution would have been to give each employee a locker, but between Borer and Clear Image, a better solution was devised. Thanks to our technology, we can create one to many relationships between our devices. 
Tags : 
security, security management, access control, identity management, iam, authentication, nisa, physical security, tracking, workforce, workforce management, employee management, borer, nisa, clear image, borer, borer data systems, access control, muster, roll call
    
Borer Data Systems Ltd.
Published By: TeraCloud     Published Date: Dec 11, 2007
TSF delivers the first Java-enabled enterprise Storage Resource Management (SRM) solution that simplifies the administration and management of distributed and mainframe storage resources across the entire enterprise, from a single point of control. TSF helps you plan more effectively, lower administration costs, and puts you in control of your storage environment.
Tags : 
storage, srm, storage resource management, storage management, tsf, tsa, teracloud, teracloud storage, infrastructure, san, sans, storage area
    
TeraCloud
Published By: VMware Dell     Published Date: Sep 29, 2008
This technical report will discuss the installation and configuration of Site Recovery Manager with the Dell EqualLogic PS Series storage arrays. It will cover setup, testing, failover, failback and troubleshooting. This document is designed to be used in conjunction with the Administrator Guide for Site Recovery Manager and assumes a prior knowledge of VMware Virtual Infrastructure.
Tags : 
vmware, dell, equallogic, site recovery, disaster recovery, iscsi, windows server, microsoft, data protection
    
VMware Dell
Published By: Easynet     Published Date: Mar 26, 2008
From the results of recent interviews with LET organisations, IDC positions the industry in the midst of a major transition phase from legacy to next-generation services and technology. This Executive Brief highlights the major technology and business trends taking place in the LET sector, and outlines the advantages of adopting new technologies and services in comparison with other industries.
Tags : 
leisure, entertainment, travel services, technology, managed networks, easynet
    
Easynet
Published By: Linx Technologies     Published Date: Jun 23, 2008
While actual RF design is quite difficult, understanding basic RF concepts is amazingly straightforward. For those of you delving into the world of RF for the first time, when you finish this article, you will have a clearer understanding of how signals are transmitted and received in an RF environment.
Tags : 
rfid, radio frequency, plm, product lifecycle, identification, linx, linx technologies
    
Linx Technologies
Published By: NLB Corp.     Published Date: Jun 23, 2008
Paint booth cleaning has evolved into a critical step in assuring customers of a high-quality finished product. Manufacturers must deliver this quality while meeting demanding production schedules and tight operating budgets. This has led to significant growth in the use of high-pressure water jetting as an alternative to the traditional methods of chemical stripping and incineration, or burn-off.
Tags : 
paint stripping, paint, cleaning, jet, water jet, jetting, nlb, nlb corp.
    
NLB Corp.
Published By: Signiant Inc.     Published Date: Aug 14, 2008
Moving content from raw form to finished form and delivering it to cable head-ends and Telco providers has its own unique set of challenges. How does content flow from the person or companies who are producing and post-producing the content to the companies that are hosting the content for consumption? IPTV content must be transformed in some fashion, such as various bit rates, resolutions, aspect ratios, file formats, etc.
Tags : 
signiant, information management, file transfer, ftp, large file transfer, digital media
    
Signiant Inc.
Published By: Tail-f Systems     Published Date: Sep 16, 2008
The NETCONF protocol is a modern building block for device management automation, offering a unified approach to network configuration, rather than a device-specific methodology. To equipment vendors, NETCONF is a way to standardize the management interface of network elements. To service providers, NETCONF is a way to optimize the administrative workflow, by moving management intelligence out of the device under management, and consolidating this management into higher-level applications.
Tags : 
netconf, netconf standard, device management automation, network standard, ietf standard, tail-f, tailf, networking
    
Tail-f Systems
Published By: YouSendIt     Published Date: Jul 18, 2011
This whitepaper illustrates how, by using YouSendit and replacing FTP, Cisco has dramatically cut video administration costs by 90%. The Flip video file delivery process for Cisco Networking Academy's global operations is now much simpler, less costly and more efficient.
Tags : 
cisco networking academy, online file sharing, ftp replacement, send large files, secure file transfer, managed file transfer, file transfer, online file storage, large email attachment, upload, upload files, send it on, yousendit, file sharing, yousendit file sharing
    
YouSendIt
Published By: LogRhythm     Published Date: Sep 26, 2008
Find out more about how LogRhythm can help organizations fulfill The Federal Information Security Management Act (FISMA) requirements in documentation and implementation of controls for IT systems that support operations and assets.
Tags : 
fisma, nist compliance, comply, security, information technology, information security management, log management, log analysis, log collection, log analyzer, log tool, logrhythm, security event management, web logs, log collection, regulatory, regulations, event management solution
    
LogRhythm
Published By: Alt-N Technologies     Published Date: Sep 26, 2008
Selecting an email system to fulfill the needs of a small-to-medium business (SMB) with 5-500 employees can be easy to do by following some practical and straightforward guidelines. Choosing a productive system involves finding the best combination of security, mobility, collaboration and ease-of-use, in addition to the basic functions of sending and receiving electronic messages.
Tags : 
alt-n technologies, email server, email, security, mobility, collaboration, administration
    
Alt-N Technologies
Published By: Network Automation     Published Date: Oct 23, 2008
In good economic times, success simply means keeping pace. After all, the market is demanding your company’s products and services, and your responsibility is simple: keep up with the demand no matter what it takes. Most managers, whether they are business managers or technology managers respond to this situation the same way. They hire more people to shoulder the increased load. Sales managers seek out more sales reps. Foremen bring more assembly workers online. Customer service beefs up the call center. And IT managers hire more administrators to maintain the constant flux of demands from users, applications, systems, and networks.
Tags : 
network automation, business, process, automation, processes, tough economy, bad economy, workflow, process improvement, streamline it, strategies, networking
    
Network Automation
Published By: Network Automation     Published Date: Dec 08, 2008
Before turning to AutoMate, nightly processes were performed by running a mish-mash of batch processes manually after work hours. Even though banks typically close at 4 or 5pm, there is a lot that happens at night to get ready for the next business day. A typical night consisted of 1 or 2 persons staying until 10 or 11pm to make sure all the nightly operations, backups, file transmissions, etc. were finished and validated.
Tags : 
network automation, automate, process automation, elimination of manual process, networking, it management
    
Network Automation
Published By: VMware     Published Date: Feb 20, 2009
According to the National Archives and Records Administration, 93 percent of companies that lost their data center for 10 days or more due to a disaster filed for bankruptcy within one year of the disaster. Don't let that happen to you, learn more today!
Tags : 
vmware, vmware virtualization, business continuity, it infrastructure, vmware esx platform, distributed resource scheduler, drs, recovery infrastructure, server failures, vmwarehigh availability, overloaded servers, vmware vmotion, rapid recovery, network and storage interface failures, affordable recovery, networking, storage
    
VMware
Published By: Ecessa Corporation     Published Date: Mar 11, 2009
Today’s Wide Area Networks (WANs) are experiencing increased saturation with the deployment of bandwidth-intensive applications, increased numbers of users, and the need for reliable security transmissions. IT personnel responsible for these issues acknowledge the increased congestion and have strived to maintain high levels of network performance. At the same time, IT departments are tasked with the job of lowering the cost of network infrastructure and ongoing operations. Network administrators continually face the challenge of balancing the increased use of critical applications on the Internet, while eliminating downtime and congestion from affecting user quality and day-to-day business operations.
Tags : 
adsl load balancing, vpn load balancing and redundancy, bandwidth aggregation, qos, bandwidth control, bandwidth management, multi-homing, bgp multihoming, broadband bonding, broadband failover, disaster recovery, business continuity, wan load balancing, wan failover, dsl failover, dsl load balancing, disaster recovery solutions, dual wan router, wan failover, isp failover
    
Ecessa Corporation
Published By: Kaplan, Inc.     Published Date: Mar 26, 2009
Expand your career options with Kaplan Continuing Education’s online certificate programs. We offer a wide range of specialized professional certificates in Business and Finance, Health Care, and Information Technology designed to help you expand your career opportunities. You’ll find the online courses in each program are comprehensive, and that our educators are practicing experts in their field, each one a professional qualified to teach the real-world knowledge you need to excel.
Tags : 
kaplan university, kce, certifications, online education programs, professional certificates, cisco certified design professional, it career advancement
    
Kaplan, Inc.
Published By: Kaplan, Inc.     Published Date: Mar 26, 2009
Expand your career options with Kaplan Continuing Education’s online certificate programs. We offer a wide range of specialized professional certificates in Business and Finance, Health Care, and Information Technology designed to help you expand your career opportunities. You’ll find the online courses in each program are comprehensive, and that our educators are practicing experts in their field, each one a professional qualified to teach the real-world knowledge you need to excel.
Tags : 
kaplan university, kce, certifications, online education programs, professional certificates, cisco certified design professional, it career advancement
    
Kaplan, Inc.
Published By: Ping Identity     Published Date: May 05, 2009
Web Services are emerging as the preeminent method for program-to-program communication across corporate networks as well as the Internet. Securing web Services has been a challenge until recently, as typical Web authentication and authorization techniques employed browser-to-server architectures (not program-to-program). This resulted in user identity ending at the Web Application Server, forcing the Web Services Provider to trust blindly that the Web Services Requester had established identity and trust with the end user.
Tags : 
pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml, security assertion markup language, pki, public key infrastructure, soa, oasis, ws-trust, sso, single sign-on, service oriented architecture, rest, user identity mapping, ldap
    
Ping Identity
Published By: BMC Control M     Published Date: Jul 22, 2009
Workload Automation (WLA) ist eine moderne Entwicklungsstufe des Job-Scheduling und dient zum Automatisieren von komplexen Verarbeitungsabläufen in der IT. Es unterstützt ereignisgesteuerte Workloads, unterschiedliche Plattformen, Webservices, komponentenbasierte Anwendungen (Composite Applications), SOAs, virtuelle Systeme, System- und Anwendungsintegration, Business Alignment (Abstimmung mit den Geschäftsprozessen) und vieles mehr.
Tags : 
workload, automation, smart, bmc, wla, ema, itil, soa, bmc conrol-m
    
BMC Control M
Published By: BMC ESM     Published Date: Mar 01, 2009
Free utility finds the fragmentation that's crippling your network! New Disk Performance Analyzer for Networks 2.0 takes the guesswork out of tracking networked system performance. This revolutionary utility scans networked systems' performance from one single access point. It equips administrators with an arsenal of performance data, so they can zero in on systems' fragmentation and slows. This second edition comes with a series of improvements which afford users more control and flexibility. Systems can be selected from the Active Directory or IP Address. And this cutting-edge tool supports custom grouping. So, repeated scans are easy to set up and run. Performance reports can also be scheduled for off-peak hours. Results will be automatically sent to your e-mail address. Performance reports are now exported to a MicrosoftT SQL database for easy sorting and querying. Don't let low-functioning systems go unnoticed. Get Disk Performance Analyzer for Networks 2.0 free now!
Tags : 
it management
    
BMC ESM
Start   Previous    61 62 63 64 65 66 67 68 69 70 71 72 73 74 75    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.