HIT Consultant Insightful coverage of healthcare innovation
 

here

Results 5076 - 5100 of 5421Sort Results By: Published Date | Title | Company Name
Published By: ClearNova     Published Date: Aug 21, 2009
In the 1990s, client/server was the predominant architecture used to build business applications. The applications had rich functionality, were responsive, and satisfied users' needs. Client/server worked in a time where the only networks were the ones owned and controlled by the enterprise and the only user base was internal.
Tags : 
internet apps, web applications, web application, web application development, j2ee, open source, ajax, web architecture, clearnova, clear nova
    
ClearNova
Published By: Confio     Published Date: Aug 21, 2009
Time is the only meaningful measure of IT database performance - how long do you keep your customers waiting? That is where Confio Software comes in. We built our technology and our company on application database performance management software that focuses on time.
Tags : 
oracle, java, performance management, customer satisfaction, application performance management, database management, database infrastructure, database, confio software, confio
    
Confio
Published By: Creekpath     Published Date: Aug 21, 2009
There is an impression today that Information Lifecycle Management is a new concept. Management of the information lifecycle has been with us since the dawn of the computer age. While recent legislation and shifts in media cost have spawned a mini-boom in replication start-ups and new storage technologies, the fundamentals of information management have not changed.
Tags : 
information lifecycle, project life cycle, information lifecycle management, ilm, storage, information management, creekpath
    
Creekpath
Published By: Creekpath     Published Date: Aug 21, 2009
Imagine a world where storage management is simplified; everything works together; there are no configuration issues when upgrading, and vendors all cooperate to allow information to be easily stored and retrieved seamlessly. This was a reality in the mainframe world, but the deployment of open systems shattered these concepts.
Tags : 
virtualization, storage virtualization, storage management, storage array, storage arrays, creekpath
    
Creekpath
Published By: Creekpath     Published Date: Aug 21, 2009
There is a holistic storage-management trend taking place in companies today. IT groups are acknowledging that storage should become part of the network. What businesses are finally seeing is that storage is not an isolated island, or a group of isolated islands, but part of a holistic management domain.
Tags : 
holistic, storage management, storage, storage operations management, som, it management, systems management, creekpath
    
Creekpath
Published By: HP     Published Date: Aug 21, 2009
When deploying Microsoft Exchange Server 2003, there are a number of factors that must be addressed to ensure a successful application deployment. Click here to receive a guide to design and configuration of the EVA8000 for Exchange Server 2003 deployments.
Tags : 
best practices, microsoft exchange, servers, network management, server deployment, application deployment.
    
HP
Published By: HP     Published Date: Aug 21, 2009
Virtualizing IT resources is an essential step towards becoming an Adaptive Enterprise, where business and IT are synchronized to capitalize on change.
Tags : 
servers, server hardware, server virtualization, virtual server environment, vse, it spending
    
HP
Published By: IDFocus     Published Date: Aug 21, 2009
In the Identity Management space, there are 3 leading applications: Web access control, single sign-on, and password management. The document also describes two alternative approaches to combining these solutions.
Tags : 
password management, identity management, access management, iam, identity and access management, single sign on, single sign-on, access control, idfocus
    
IDFocus
Published By: Meru Networks     Published Date: Aug 21, 2009
This paper explains the numerous places where VoWLAN can go to work, why most offerings fail to make it work, and how only Meru Networks' standard-based solution puts the power of VoWLAN to work at enterprise-scale.
Tags : 
voip, voice over ip, wlan, wlans, vowlan, enterprise software, communications, wireless communications, wireless voip, meru, meru networks
    
Meru Networks
Published By: Metafuse     Published Date: Aug 21, 2009
Looking for project management software can often be confusing. There are so many choices in the market, how do you narrow your search? This white paper gives you 10 tips to guide your solution search.
Tags : 
project management, pmp, project planning, project scheduling, scheduling, schedule, it management, pm solution, pm software, project management software, metafuse
    
Metafuse
Published By: netVigilance     Published Date: Aug 21, 2009
Managing network vulnerabilities will be the biggest challenge for C-Level executives in the coming years. Intrusions are more frequent and more malicious, so the security of corporate networks, and therefore the security of the entire corporation are dependent on the ability to quickly identify, prioritize and remediate vulnerabilities in the network.
Tags : 
cost control, it spending, network security, budget, ids, intrusion prevention, vulnerability management, net vigilance, netvigilance
    
netVigilance
Published By: netVigilance     Published Date: Aug 21, 2009
This white paper explains the evolving needs for vulnerability assessment, the special requirements inherent within large enterprises, and how SecureScout SP from netVigilance meets those needs.
Tags : 
vulnerability management, ips, intrusion prevention, security management, hackers, hacker, hacker detection, network security, net vigilance, netvigilance
    
netVigilance
Published By: Objectivity     Published Date: Aug 21, 2009
There is often a great deal of confusion in determining whether an object database management system (ODBMS) is right for you. Most of this confusion can be resolved by focusing on your application's requirements. In those situations where the application requires the very clear advantages of an ODBMS, choosing which ODBMS becomes a continuation of the exercise of analyzing those application requirements.
Tags : 
database performance, object-oriented, database development, objectivity
    
Objectivity
Published By: Objectivity     Published Date: Aug 21, 2009
As business users expand to newer types of applications, and grow older ones, their attempts to use RDBMS encounter the "Relational Wall," where RDBMS technology no longer provides the performance and functionality needed. This paper measures the wall, explains what model and architectural differences cause it, how to foresee it, and how to avoid it.
Tags : 
database, rdbmss, object, object-oriented, object oriented, database performance, database development, database architecture, database model, dba, database administration, database administrator, dba, objectivity
    
Objectivity
Published By: Okiok     Published Date: Aug 21, 2009
To successfully deploy Single Sign-On today, most organizations have a set of key requirements that must be met. Here are some tips on how focal Point can help organizations seeking Single Sign-On meet those requirements.
Tags : 
single sign on, sso, sso deployment, single sign on deployment, authentication, identity management, okiok
    
Okiok
Published By: PerformanceIT     Published Date: Aug 21, 2009
The phrase "Best Practices" has become so overused, it has become practically meaningless for IT managers. Improvement is necessary, but where do you start, what tools are appropriate, where do I find actionable information, and how do I do this with minimal cost? If these questions apply to you, this paper provides a plan of attack.
Tags : 
it management, best practice, network management, systems management, improvement, streamline, streamlining, efficiency, efficiencies, productivity, performance management, performance it, performanceit
    
PerformanceIT
Published By: Preventsys     Published Date: Aug 21, 2009
Much has been written and discussed about Enterprise Risk Management (ERM) as it relates to compliance, corporate governance, financial controls and the Sarbanes-Oxley Act of 2002 (SOX). Until now, there was very little available to the risk manager on how to apply ERM to day-to-day operations.
Tags : 
sarbox, sox, sarbanes oxley, sarbanes-oxley, risk management, finance, compliance, regulatory compliance, security management, preventsys
    
Preventsys
Published By: PTC     Published Date: Aug 21, 2009
This paper is designed to help CEOs, CFOs, and senior Engineering executives understand how and where to leverage the growing phenomenon known as Global Product Development as a means to gain a dramatic increase in productivity within their product development operation.
Tags : 
product lifecycle, product lifecycle management, plm, product development, productivity, ptc
    
PTC
Published By: Secure Computing     Published Date: Aug 21, 2009
Spyware presents a daily threat to organizations. It can even lead to networks being exposed to malicious attacks. Find out about the specific types of spyware threats that are out there and how you can combat these threats today.
Tags : 
security, internet security, anti spyware, intrusion prevention, intrusion detection, malware, anti virus, secure computing, securecomputing
    
Secure Computing
Published By: Secure Computing     Published Date: Aug 21, 2009
This white paper discusses how HTTPS filtering (SSL scanning) from Secure Computing provides companies with the means to counter these threats by fully extending their Internet usage policies to HTTPS traffic, and thereby proactively closing that last known major network security hole.
Tags : 
ssl, vpn, secure socket layer, virtual private network, traffic management, security management, https, internet security, secure computing, securecomputing
    
Secure Computing
Published By: Sigaba     Published Date: Aug 21, 2009
This white paper reviews the five most common current approaches to messaging security. While the five approaches discussed here are not the comprehensive list of available solutions, they are the basis for most variations of messaging security solutions available today.
Tags : 
email security, security management, security policies, secure instant messaging, intranets, messaging, sigaba
    
Sigaba
Published By: Texas Instruments     Published Date: Aug 21, 2009
Download this whitepaper now and read how WLAN technology embedded in CE devices offers consumers a glimmer of hope that someday soon they will be free to experience their media content on their terms.
Tags : 
wireless, wlan, ce device, consumer electronics, electronics, digital media, vcr, tivo, home networking, texas intruments
    
Texas Instruments
Published By: Tridion     Published Date: Aug 21, 2009
Organizations have been implementing intranets for a number of years, expecting to gain efficiencies and improve information exchange among their employees. Based on an organization's objectives, an intranet can take many different forms, ranging from a corporate information and communication platform to a pragmatic approach to Knowledge Management. This White Paper specifically focuses on the lifeblood of intranets: content.
Tags : 
collaboration, content, intranet, corporate communication, workforce management, internal communication, team management, web site management, intranet management, tridion
    
Tridion
Published By: webMethods     Published Date: Aug 21, 2009
One of the most significant IT initiatives underway is the adoption of service-oriented architecture (SOA), where IT assets are aligned to business services in a standard, flexible and architected fashion. The concept is often discussed in conjunction with Web services, though the two are not synonymous.
Tags : 
soa, service-oriented architecture, service oriented architecture, service management, alignment, web service, web methods, webmethods
    
webMethods
Published By: XOsoft     Published Date: Aug 21, 2009
The primary information management concern in the enterprise today is to ensure that the knowledge necessary to drive critical business processes is available where it needs to be, when it needs to be. The costs of failure to do this are high. 
Tags : 
cost control, data loss, data protection, information management, data management, business process management, xosoft
    
XOsoft
Start   Previous    197 198 199 200 201 202 203 204 205 206 207 208 209 210 211    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.