as service

Results 4151 - 4175 of 4331Sort Results By: Published Date | Title | Company Name
Published By: Intermedia     Published Date: Nov 10, 2008
This WebCast introduces Osterman Research who shows and overview of Exchange 2007 and it's growth in terms to help security issues faced by Financial Services and how Exchange 2007 addresses them. Focused on the messaging, Web and collaboration industries. There are also practice areas which include archiving, security, encryption, content management, etc...download to learn more!
Tags : 
intermedia, email security, exchange 2007, archiving, encryption, content management, security, compliance, microsoft exchange
    
Intermedia
Published By: Intermedia     Published Date: Nov 10, 2008
Microsoft Exchange is the leading business email and collaboration solution for the small,up to the large, business markets, and this whitepaper compares the security of Microsoft Exchange Services deployed in-house versus a hosted model with SaaS service providers. By choosing Intermedia as their Hosted Exchange SaaS Solution Provider, businesses can achieve email and total messaging security, as well as a piece of mind, by leveraging Intermedia’s infrastructure and experience with running a secured messaging platform.
Tags : 
intermedia, email security, logical server security, software as a service, saas, microsoft exchange services, security assessment testing, security, microsoft exchange
    
Intermedia
Published By: IBM     Published Date: Nov 07, 2008
As business conditions force companies to become more and more flexible, service oriented architecture (SOA) provides a scalable, reliable way to connect with, interact with, and deliver information. This brochure shows how you can be a superhero by making WebSphere MQ the messaging backbone for your SOA, creating a common connection for the free flow of information.
Tags : 
ibm, ebf, soa, websphere, business management, business process management, service oriented architecture
    
IBM
Published By: Microsoft Office SharePoint Server     Published Date: Nov 07, 2008
Bank of Choice found that paper-based loan approval processes were standing in the way of providing the fastest and most effective customer service. Bank of Choice adopted a complete document management system based on software from Knowledge Lake, a Microsoft Gold Certified Partner. The result cuts loan processing time from days to hours, boosts customer service while cutting costs, and increases competitiveness.
Tags : 
microsoft office, sharepoint, sql, knowledgelake, platforms, server virtualization, windows server
    
Microsoft Office SharePoint Server
Published By: ASG Software Solutions     Published Date: Nov 03, 2008
The Information Technology Infrastructure Library (ITIL) provides guidance for the management of IT, and has quickly become the worldwide standard for IT Service Management (ITSM).
Tags : 
asg, sla, cmdb, bsm, metadata, itsm, metacmdb, lob, ecommerce, bpm, workflow, itil, cmdmdb, service optimization, application integration, application performance management, business activity monitoring, business process automation, business process management, analytical applications
    
ASG Software Solutions
Published By: Network Automation     Published Date: Oct 23, 2008
In good economic times, success simply means keeping pace. After all, the market is demanding your company’s products and services, and your responsibility is simple: keep up with the demand no matter what it takes. Most managers, whether they are business managers or technology managers respond to this situation the same way. They hire more people to shoulder the increased load. Sales managers seek out more sales reps. Foremen bring more assembly workers online. Customer service beefs up the call center. And IT managers hire more administrators to maintain the constant flux of demands from users, applications, systems, and networks.
Tags : 
network automation, business, process, automation, processes, tough economy, bad economy, workflow, process improvement, streamline it, strategies, networking, network management, network performance, network performance management
    
Network Automation
Published By: SyberWorks     Published Date: Oct 21, 2008
The e-Learning industry has grown tremendously since the early days of computers and the Internet. Today there are lots of products and services out in the market place from which to choose. This white paper will provide some basic information to help you as you begin your research into e-Learning and learning management systems. The document is not meant to be the complete source of information on e-Learning nor will these guidelines be suitable for every single situation. This white paper has been created as a learning aid help you get started. These findings represent the research, experience, and techniques gleaned from working in e-Learning since its infancy in the late 80’s to today. At the end of the paper, Bob Goldschneider, Director of Business Development at SyberWorks, Inc., will provide a summary and closing remarks.
Tags : 
syberworks, e-learning, internet, aicc, scorm, learning management systems, learning management system, e-learning, elearning, web based training, training management systems, training management system, online training software, web based training software, e-learning, sop automation, seminar logistics, classroom management, online survey tool, competency management
    
SyberWorks
Published By: DataMotion     Published Date: Oct 20, 2008
Almost every task one performs at work includes the exchange of information in one form or another and much of that is exchanged via email and its attachments. Yet too many enterprises view e-mail as a mature technology that simply accomplishes a rather mundane but necessary task, taking e-mail for granted. They rarely seek to leverage it beyond its most fundamental function. However, the messaging services that form the basis of e-mail are far more valuable than the e-mail itself, and can be used innovative ways to save time and money in our every day tasks. Download to learn more.
Tags : 
certifiedmail, datamotion, microsoft exchange, security, e-mail security, maintenance, email security, security management
    
DataMotion
Published By: LeadLife Solutions     Published Date: Oct 20, 2008
Marketing campaigns should always start with the "who?" who will you target, who has a need for your product or service? No one can optimize lead generation without specifically defining the right audience to approach. Targeting can encompass many dimensions...
Tags : 
leadlife solutions, roi, lead generation, lead optimization, crm
    
LeadLife Solutions
Published By: Dell     Published Date: Oct 20, 2008
Dell has improved PC deployment activities through patent-pending automation technology and offers an array of services from planning a Windows Vista migration to post-deployment management.
Tags : 
dell, deploying vista, dell deployment framework, dell deployment model, deployment automation toolset, optimized deployment, security, software development, platforms, windows
    
Dell
Published By: Dell     Published Date: Oct 20, 2008
Dell can help corporations to properly dispose of old PCs in a secure and cost-effective manner that is also environmentally friendly.
Tags : 
dell, hardware asset recovery, safe hardware disposal, asset recovery, environmental liability, dell asset recovery services, security, platforms, disaster recovery, windows
    
Dell
Published By: ASG Software Solutions     Published Date: Oct 16, 2008
Limited visibility has tethered CIOs' success in both IT and business. However, using federated CMDB technology, CIOs can view the complete IT infrastructure and the entire lifecycle of a business service.
Tags : 
asg, sla, cmdb, bsm, metadata, metacmdb, lob, automation, it value chain, ecommerce, bpm, workflow, itil, cmdmdb, service optimization, application performance management, business process automation, business process management, project management, application integration
    
ASG Software Solutions
Published By: MessageLabs     Published Date: Oct 15, 2008
Failure to strategically manage email can be costly for any businesses. Learn about the risks of poor email management, and how to implement a comprehensive, best practices-based email retention policy.  Enforce your policy by implementing MessageLabs Managed Email Archiving Service to minimize email risks and maximize compliance with organizational, legal, and regulatory rules.  
Tags : 
messagelabs, email retention, archiving, risk, compliance, knowledge management, data management, data protection, records management, pci compliance
    
MessageLabs
Published By: Sparta Social Networks     Published Date: Oct 10, 2008
This case-study talks about how the Packet8 broadband voice over Internet protocol (VoIP) and video communications service which lets broadband Internet users add digital voice and video communications services to their high-speed Internet connection. Videophone users now account for almost 5 percent of Packet8’s 74,000 lines, and are one of several drivers in the company's quarterly growth, up 54 percent in the most period to $6 million in revenue. Download to learn more.
Tags : 
sparta, social network, packet8, internet protocol (voip)
    
Sparta Social Networks
Published By: HP     Published Date: Oct 09, 2008
Despite its six syllables, 'virtualization' is a straight - forward concept. It can enable your organization to get more value not only from computer and storage hardware but also from the labor required to keep your systems up and running. Virtualization is an approach to pooling and sharing IT resources so the supply of resources—processing power, storage, networking and so on—can flexibly and automatically meet fluctuating business demand. Virtualization can improve the quality of your IT services, enabling more consistency and predictability of operational availability.
Tags : 
mission critical, virtualization, storage, data management, storage virtualization, database development
    
HP
Published By: HP     Published Date: Oct 09, 2008
Increase utilization, decrease energy costs with data center virtualization In the past, IT departments have responded to demands for new services and better performance by adding more hardware, resulting in underutilized technology silos and server sprawl. Today, many organizations are turning to virtualization technologies that facilitate consolidation and increased utilization. In short, virtualization brings the ability to pool, share and dynamically reallocate data center resources – and helps fulfill the promise of higher utilization and lower energy consumption and lower costs.Join us and learn why HP is well prepared to help you assess and address your needs. Find out what key virtualization partners -- such as VMware, Microsoft and Citrix – bring to the table and how HP can help you leverage their technology and expertise.
Tags : 
mission critical, virtualization, hewlett-packard company, enterprise applications, data management, server virtualization
    
HP
Published By: Trend Micro SaaS     Published Date: Oct 08, 2008
According to experts at TrendLabs, spam now makes up close to 95% of all email and continues to grow. In the first three months of 2008 spam rates almost doubled over rates observed at the end of 2007 and TrendLabs predicts that average daily spam volumes will increase by 30 to 50 billion messages per day within the year.1 As spam continues to grow at dramatic rates, traditional on-premise email security products are failing to keep up. This limitation is one of the primary reasons that IDC predicts demand for hosted security solutions -also known as SaaS (Software as a Service) solutions-will grow by more than 30% annually through 2012.2 For context, the growth rate for hosted email security is projected to be more than eight times that of the traditional software email security market, and more than 60% faster than appliance-based email security solutions.
Tags : 
saas, trend, trend micro, software as a service, trendlabs, email security, security, interscan messaging, service level agreement, sla, virus, spam, phishing, distributed denial of service, ddos, filtering, anti spam, anti virus, application security, policy based management
    
Trend Micro SaaS
Published By: Trend Micro SaaS     Published Date: Oct 08, 2008
Businesses are experiencing a dramatic increase in spam and email-based attacks. These assaults not only hurt employee productivity, they consume valuable IT staff time and infrastructure resources. These threats can also expose organizations to data leaks, compliance issues and legal risks. Trend Micro's SaaS email security solution blocks spam, viruses, phishing, and other email threats before they touch your network, helping you reclaim IT staff time, end-user productivity, bandwidth, mail server storage and cpu capacity. Optional content filtering enforces compliance and helps prevent data leaks.
Tags : 
saas, trend, trend micro, software as a service, email threats, mail server, productivity, bandwidth, trendlabs, email security, security, interscan messaging, service level agreement, sla, virus, spam, phishing, distributed denial of service, ddos, filtering
    
Trend Micro SaaS
Published By: Quocirca     Published Date: Oct 01, 2008
The internet has grown rapidly from a random collection of mainly academic networks and military control and routing protocols into a global, integrated and sophisticated commercial utility. No longer simply an 'Information Superhighway', it has extended to embrace voice telephony, video and mobile communications as part of a converged network. Connection options and services have expanded, with opportunities for internet service providers (ISPs) to add value beyond simply forwarding bit and bytes.
Tags : 
quocirca, isp, isps, internet service provider, convergence, ip telephony, voip, networking
    
Quocirca
Published By: CA WA 2     Published Date: Oct 01, 2008
Given the increased complexities and requirements thrust onto data center management environments over time, a more holistic management approach is necessary for efficient and cost effective delivery of IT services. Authors and analysts Judith Hurwitz and Robin Bloor bring their research and extensive experience to light in respect to the state of data center management by building the case for automation as a key strategy for efficient and cost effective management.
Tags : 
datacenter automation, data center automation, network management, ca wa, ca wa 2, it management, network architecture, business process automation, data center design and management
    
CA WA 2
Published By: Stratus Technologies     Published Date: Sep 30, 2008
The Choices from many reputable suppliers of IT managed services can appear very much alike. Yet when you have a mission-critical business process whose function must not be interrupted, you know your requirements call for something above and beyond. This paper serves as a field guide to help you identify key characteristics that set a critical managed IT service apart from even highly capable general-purpose offerings.
Tags : 
stratus technologies, it services, business impact analysis (bia), recovery point (rpo), recovery time objectives (rto), business continuity (bc), disaster recovery (dr) protection, service level agreement (sla), software development, it management, itil
    
Stratus Technologies
Published By: Mimecast     Published Date: Sep 30, 2008
Infrastructures of potentially dozens of servers have built up around corporate email systems to provide better governance, reduced risk and improved legislative compliance - anti-virus, anti-spam, attachment handling, encryption, disclaimers, archiving and hot-standby mail servers to name a few.
Tags : 
mimecast, saas, software as a service, email archive, cpr, email evidence, ediscovery, medium-size business, esg, storage, storage management, ebusiness, service management, email archiving
    
Mimecast
Published By: VMware Dell     Published Date: Sep 29, 2008
As a growing law firm, Sills Cummis found itself presented with several classic IT challenges. It had to contend with server proliferation within its data center, implement a cost-effective disaster recovery system, and ensure high availability of key applications and services for its attorneys. Through its purchase of the VMware Infrastructure 3 suite, Sills Cummis was able to tackle all of these problems.
Tags : 
vmware, dell, sills cummis epstein, gross p.c., servers, sql server, disaster recovery, high availability
    
VMware Dell
Published By: Microsoft Office SharePoint Server     Published Date: Sep 29, 2008
Enterprise search has been a service in one form or another on the Microsoft intranet for more than a decade. With the release of Microsoft® Office SharePoint® Portal Server 2003, the landscape for enterprise search at Microsoft began to change. This became the foundation for the current solution, the Enterprise Search feature provided in Microsoft Office SharePoint Server 2007. Read more about the enhancements of this feature in this technical white paper.
Tags : 
microsoft, sharepoint, microsoft office, search, database search, dba, database, data management, database development, search and retrieval
    
Microsoft Office SharePoint Server
Published By: ZSL Inc.     Published Date: Sep 25, 2008
The hotspot in the current IT world is optimized Web Services. Now the enterprises have started their vision towards next generation Web Services. This white paper gives information for the business managers and engineers in developing and deploying Web Services using Rational Application Developer (RAD) and WebSphere Application Server (WAS), respectively. This paper explains the process to:* create a Web Service and Web Server client* build security to that web service* deploy the web service in WebSphere application server
Tags : 
zsl, soap, java, wsdl, uddi, web service security, risk exposure, security, software development
    
ZSL Inc.
Start   Previous    160 161 162 163 164 165 166 167 168 169 170 171 172 173 174    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.