HIT Consultant Insightful coverage of healthcare innovation
 

building

Results 1426 - 1450 of 1457Sort Results By: Published Date | Title | Company Name
Published By: Tail-f Systems     Published Date: Sep 16, 2008
The NETCONF protocol is a modern building block for device management automation, offering a unified approach to network configuration, rather than a device-specific methodology. To equipment vendors, NETCONF is a way to standardize the management interface of network elements. To service providers, NETCONF is a way to optimize the administrative workflow, by moving management intelligence out of the device under management, and consolidating this management into higher-level applications.
Tags : 
netconf, netconf standard, device management automation, network standard, ietf standard, tail-f, tailf
    
Tail-f Systems
Published By: Tail-f Systems     Published Date: Sep 16, 2008
This paper reviews the business cost of major outages. It also details some of the reasons that network architecture has become so complex, discusses current approaches to the problem and finally presents NETCONF as a powerful building block solution to the network management problem.
Tags : 
network management, netconf, network architecture, ietf standard, tail-f, tailf
    
Tail-f Systems
Published By: Integration New Media     Published Date: Aug 29, 2008
Corporate librarians are faced with many challenges today. They are not only asked to be knowledge experts, they also need to be information providers, technology consultants and project managers. Building an eLibrary involves more than simply assembling a collection of resources.
Tags : 
inm, integration new media, information management, content management, elibrary, research, ediscovery
    
Integration New Media
Published By: Clearswift     Published Date: Jun 09, 2008
In this white paper Clearswift address the question "Is it possible to build a leak free enterprise?" In addition to a Gartner research note on "Understand Data Leakage" we answer the question by describing 15 of the most common mistakes of web and email security and the associated risks and solutions.
Tags : 
data protection, clearswift, data management
    
Clearswift
Published By: CheetahMail     Published Date: May 19, 2008
This white paper provides a number of well-tested, organic methods for email acquisition – giving marketers actionable insight to attract and retain a loyal, profitable subscriber base. Download it now.
Tags : 
cheetah mail, email acquisition, list building, email marketing, cheetah, cheetahmail, experian
    
CheetahMail
Published By: Tealeaf     Published Date: May 12, 2008
While many companies believe they are delivering adequate online experiences, their customers are in pain. Why do most organizations miss the mark? Improving online customer experience requires organizations to have one view of the online customer and to utilize a common language when discussing customer experience.  Tealeaf gives you insights via their new guide, "Building an Online Customer Experience Competency: Five Steps".
Tags : 
tealeaf, customer experience, website development, web development
    
Tealeaf
Published By: IBM     Published Date: Apr 22, 2008
This InformationWeek article delves into the details of some of today’s most innovative data centers. You’ll read about data centers that cool with winter air, run on solar power, provision services without human involvement, and are virtually impenetrable. Any one of the tips – and there are dozens – could be a major breakthrough for your company.
Tags : 
green, environmental, energy, energy efficient, security, data center, datacenter, best practices
    
IBM
Published By: Burton Group     Published Date: Apr 08, 2008
Increasing power demands and space limitations in the data center have begun to transition server virtualization technologies from luxuries to necessities. Server virtualization provides a path toward server consolidation that results in significant power and space savings, while also offering high availability and system portability. Today, vendors are building hardware and software platforms that can deliver virtualization solutions at near-native performance.
Tags : 
burton group, virtual server, virtual machine, virtualization, server virtualization, virtual architecture, virtualization architecture, virtual
    
Burton Group
Published By: AcquireWeb     Published Date: Apr 07, 2008
This article, published by Target Marketing in April 2008, examines principles and practices associated with acquisition e-mail, which also apply to CRM programs, that are often overlooked by marketers when building their e-mail strategies. These fundamentals serve as strategies to consider and employ to yield higher response rates and a more effective e-mail marketing effort.
Tags : 
acquireweb, acquisition email, email marketing, integrated marketing, e-mail, acquisition e-mail, lead generation, e-mail marketing
    
AcquireWeb
Published By: Integration New Media     Published Date: Apr 01, 2008
Librarians looking to build electronic libraries face numerous challenges. This new white paper by Integration New Media provides a summary of best practices for building an eLibrary. From defining your audience and content requirements, through to choosing a technology solution that makes sense for your use cases, this paper will provide a strong checklist of items to consider. The paper also looks at the three types of users and the key elements of designing the user experience for your eLibrary.
Tags : 
inm, integration new media, online library, elibrary
    
Integration New Media
Published By: TRIRIGA     Published Date: Mar 31, 2008
Investments in green building strategies consistently result in significant benefits for organizations today.  Green buildings not only reduce the environmental impacts of natural resource consumption and green house gas emissions, but they also provide economical benefits such as reduced costs, improved bottom-line performance and higher shareholder value.
Tags : 
green building, tririga, environmental sustainability, dr. romm, tririga, environmental impact, green house gas emissions, emissions
    
TRIRIGA
Published By: Easynet     Published Date: Mar 26, 2008
This Executive Brief will show how transactional networks and IT networking services can successfully promote internal integration of company workflows while improving external collaborative processes in order to coordinate activities with third-party stakeholders and agents around construction projects.
Tags : 
collaboration, vpn, managed networks, construction, mobility, easynet, building
    
Easynet
Published By: APC     Published Date: Feb 07, 2008
Voice Over IP (VoIP) deployments can cause unexpected or unplanned power and cooling requirements in wiring closets and wiring rooms. Most wiring closets do not have uninterruptible power available, and they do not provide the ventilation or cooling required to prevent equipment overheating. Understanding the unique cooling and powering needs of VoIP equipment allows planning for a successful and cost effective VoIP deployment. This paper explains how to plan for VoIP power and cooling needs, and describes simple, fast, reliable, and cost effective strategies for upgrading old facilities and building new facilities.
Tags : 
apc, voip, power, cooling, pbx, communication, wiring, heating
    
APC
Published By: ESET     Published Date: Feb 01, 2008
It is important for businesses to have a plan in place that addresses the changing threat landscape.  This podcast discusses various items for businesses to consider when developing an IT threat model.
Tags : 
threat planning, testing, penetration testing, defense in depth, multilayered, firewall, filtering, white listing
    
ESET
Published By: Axway     Published Date: Jan 03, 2008
In a world where only the fittest survive, Axway can help. Our Managed File Transfer Survival Guide gives you a step-by-step plan for building a business case to ensure your success in managing the integrity of your data infrastructure. Download your complimentary survival guide today!
Tags : 
mft, ftp, managed file transfer, file transfer, data integrity, axway
    
Axway
Published By: Vision Solutions     Published Date: Dec 31, 2007
This white paper provides a basic understanding of the building blocks of IT and business continuity—from understanding the concepts of disaster recovery and information availability to calculating the business impact of downtime and selecting the right software solution.
Tags : 
disaster recovery, business continuity, disk backup, tape backup, data backup, data replication, disaster, high availability
    
Vision Solutions
Published By: Borer Data Systems Ltd.     Published Date: Nov 07, 2007
Swiping a card to gain access to a company building is now a perfectly accepted feature of everyday corporate life. Over the years, we have all grown familiar with the routine and the advantages it brings to access control. But where cards were once used exclusively to open doors, controlling who went where and when in a building, now they can be used for a wide variety of extra functions.
Tags : 
security, security management, access control, identity management, iam, authentication, tracking, workforce
    
Borer Data Systems Ltd.
Published By: Motorola     Published Date: Oct 30, 2007
For many wireless broadband network operators, the term "unlicensed reliability" is seen as an oxymoron. For many, the idea of building a high-speed network in the unlicensed band isn't a good one. A great deal has been said about crowded frequencies, self-interference and costly network rips. About how microwaving popcorn can cause interference. About disgruntled and perplexed customers. And ex-customers.
Tags : 
wireless, broadband, broadband spectrum, wireless infrastructure, wlan, wisp, cwisp, wimax
    
Motorola
Published By: 6th Sense Analytics     Published Date: Sep 19, 2007
Offshore development has been embraced by the vast majority of commercial software vendors and enterprise application development groups. Why? Because a world flattened by globalization makes it possible to improve competitiveness by taking advantage of the easy exchange of low-cost, high-quality technical skills.
Tags : 
offshore, offshoring, outsource, outsourcing, software, productivity, workforce, workforce management
    
6th Sense Analytics
Published By: OneNeck IT Services     Published Date: Aug 24, 2007
In November 2002, Skanska embarked on the construction industry’s largest consolidation effort. Having acquired numerous companies in the previous 12 years — ranging in size from $100 million to $1 billion and comprising the $3.9 billion Skanska of today — CIO Chris Stockley was charged with migrating all the companies onto the J.D. Edwards application platform already in use by a few of the organizations.
Tags : 
skanska, building, construction, case study, oneneck, erp hosting, erp outsourcing, it outsourcing
    
OneNeck IT Services
Published By: CCSS     Published Date: Jul 05, 2007
Is a lack of availability costing your business thousands or even hundreds of thousands of dollars? Assessing the true financial impact of unplanned downtime may surprise you. Placing a dollar amount on this issue is often the first step and biggest motivator to meeting your ongoing availability requirements.
Tags : 
availability, high availability, business continuity, network monitoring, server monitoring, down time, ccss, availability monitoring
    
CCSS
Published By: Proto Software     Published Date: Jun 14, 2007
This paper explores trends past, current, and future in the mashup space and surveys the types of tools used to build and distribute mashups. The goal is to develop a set of criteria for the reader to use when evaluating mashup platforms for the development of business applications. Where appropriate, analogies to existing technologies and methodologies are employed.
Tags : 
mashup, mashups, mash-up, mash-ups, data integration, application integration, business integration, integration
    
Proto Software
Published By: Quocirca     Published Date: Apr 23, 2007
Information management, which includes both data and content management, is an essential building block for Service-Oriented Architecture (SOA).  By taking a service oriented approach to information, you can achieve much greater value from your information assets.
Tags : 
information management, service oriented architecture, service-oriented architecture, soa, data management, mdm, master data management, content management
    
Quocirca
Published By: Siperian     Published Date: Mar 29, 2007
Master Data Management (MDM) has made the CIO's technology short-list.  This paper addresses issues related to data governance, the business master, building on proven success, and ROI.  
Tags : 
mdm, master data management, it management, return on investment, roi, rdi, reference data management, governance
    
Siperian
Published By: Secure Computing     Published Date: Feb 27, 2007
This industry white paper takes the mystery out of the key differences in the main classes of firewall architectures. It was independently written by Marcus J. Ranum, a world-renowned expert on security system design and implementation. It includes fundamental lessons about building application layer firewalls, technical examples, and concludes with predictions about the future of firewall technology.
Tags : 
security, firewalls, firewall, internet security, intrusion detection, intrusion prevention, application security, email security
    
Secure Computing
Start   Previous    45 46 47 48 49 50 51 52 53 54 55 56 57 58 59    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.