HIT Consultant Insightful coverage of healthcare innovation
 

series

Results 476 - 488 of 488Sort Results By: Published Date | Title | Company Name
Published By: Astrocom     Published Date: Apr 23, 2008
The Domain Name System (DNS) is a hierarchical system that provides the IP addresses that correspond to a given Fully Qualified Domain Name (FQDN, often called a hostname or domain name). At the top of the tree structure are thirteen “root” Domain Name Servers that have the primary and secondary IP addresses of the DNS Authorities for all domains on the Internet.
Tags : 
dns, ip networks, networking, network management, powerlink, astrocom
    
Astrocom
Published By: Vision Solutions     Published Date: Apr 11, 2008
Until recently, System i high availability solutions were reserved mostly for large enterprises. Now that high availability is dramatically easier to use and less expensive to own and manage, the picture has changed.
Tags : 
high availability, disaster recovery, vision, vision solutions, ibm
    
Vision Solutions
Published By: BlueArc Corporation     Published Date: Mar 31, 2008
BlueArc’s Titan 3000 Series is designed to meet the requirements of today’s sophisticated enterprise data centers and vertical applications with new levels of storage performance, scalability and reliability. Titan is the first storage solution that consolidates and manages up to 4 petabytes of data in a single storage pool.
Tags : 
titan, tiered storage, storage, bluearc, storage system
    
BlueArc Corporation
Published By: IBM     Published Date: Mar 28, 2008
Ensuring that data can be exchanged between disparate systems reliably and with speed and transactional integrity is a difficult trick to pull off. And it gets even trickier when things don’t work as anticipated. Yet this is exactly the challenge IBM has addressed for over a decade: first with IBM MQSeries® and now with IBM WebSphere® MQ.
Tags : 
    
IBM
Published By: GlobalSCAPE     Published Date: Jan 08, 2008
The Payment Card Industry Data Security Standard is a detailed series of 130+ requirements that anyone who stores or transfers credit card data has to comply with.  However due to the protection it offers, the PCI DSS is fast becoming a security standard for all sensitive data that needs to be protected.  The goal of the standard is to ensure security of data in transit and at rest while ensuring compliance is maintained. 
Tags : 
pci, pci dss, pci compliance, compliance, credit card, credit cards, payment card, data protection
    
GlobalSCAPE
Published By: Vision Solutions     Published Date: Dec 31, 2007
This paper presents an overview of iSeries high availability to companies that are beginning to explore this powerful business continuity technology. The critical components of high availability solutions are detailed in this paper, including data replication engines, system monitors, role swap capabilities, and the importance of autonomic processes.
Tags : 
disaster recovery, business continuity, disk backup, tape backup, data backup, data replication, disaster, high availability
    
Vision Solutions
Published By: WebEx Communications     Published Date: Dec 14, 2007
As support centers have deployed this new generation of remote support solutions, they have developed a series of best practices for maximizing their benefits. Based on market research performed from 2004 to 2007, this white paper summarizes these best practices, illustrates the benefits, and suggests considerations for selecting the remote access solution that will be most effective for your support organization.
Tags : 
remote access, remote support, customer service, help desk, productivity, customer satisfaction, webex
    
WebEx Communications
Published By: Technolytics     Published Date: Oct 05, 2007
Recently, a series of cyber attacks on the Defense Department and Defense contractors in the United States as well as the Ministry of Defense and Parliament in the U.K. have created significant cause-for-concern by computer security experts. It is imperative you read this brief and learn how we're all vulnerable and what is being done to prevent these Cyber Attacks.
Tags : 
spy ops, spy-ops, cyber attack, hacker, hackers, government, internet security, national security
    
Technolytics
Published By: CCSS     Published Date: Jul 05, 2007
Capability breeds dependence. The more you can do, the more is asked of you. The more time you save, the more time you spend seeking out ways to save more time or money. If less really is more, how do you do more with less? Effective system monitoring could help you break free of the system shackles and use your System i (iSeries) network to save time and money.
Tags : 
ibm, system monitoring, monitoring, network monitoring, productivity, performance management, system performance, memory pool performance
    
CCSS
Published By: iDirect     Published Date: Jan 29, 2007
This article is the third and final part of a series designed to help you find a search engine optimization company that is worthy of your trust. In this installment, you will learn questions to ask search engine optimization companies in order to assess the business assurances that they have made.
Tags : 
search engine optimization, search marketing, seo, seo firm, seo firms
    
iDirect
Published By: iDirect     Published Date: Jan 29, 2007
In this article, the second of a three-part series, readers will learn key questions that can be asked to determine the competence of any search engine optimization company that they are considering. This article can serve as a valuable resource for those researching search engine optimization companies.
Tags : 
search marketing, search engine optimization, seo, seo firm, seo firms
    
iDirect
Published By: 2dev     Published Date: Jan 29, 2007
The goal of this series of articles is to help DBA's having a basic understanding of Oracle's Application Server.
Tags : 
software development, oracle, database, database security, oracle application server, database administrator, dba, database development
    
2dev
Published By: Infacta     Published Date: Jan 22, 2007
In this series, we will provide an overview on email marketing, offer tips to help make your e-mail marketing campaigns more successful, review the tools necessary for effective email marketing and expose email marketing mistakes to avoid.
Tags : 
email marketing
    
Infacta
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.