as service

Results 4201 - 4225 of 4260Sort Results By: Published Date | Title | Company Name
Published By: WebEx     Published Date: Dec 14, 2007
With the growing array of hardware, software, and systems necessary to support businesses, today more than ever, software-as-a-service or on-demand solutions offer feature-rich, real-time functionality without the burden associated with deploying, managing and supporting an in-house approach.  See if it’s right for you.
Tags : 
service management, saas, software as a service, customer service, smb, small business, soho, midsize, mid-size, on-demand, webex, small business networks
    
WebEx
Published By: Tideway Systems     Published Date: Dec 11, 2007
This report provided by Enterprise Management Associates (EMA) is developed around research that's focused on showing the many faces of the CMDB – as a central point for governance, asset, inventory, change and configuration control, and as a core system, in many cases for more effective service assurance. Designated for IT adopters and planners – read by executives, as well as, architects, and technical influencers.
Tags : 
cmdb, configuration management, change management, itil, service management, itsm, tideway systems, tideway, governance, infrastructure
    
Tideway Systems
Published By: Computhink     Published Date: Dec 10, 2007
The amount of paper that DUCA Financial Services had to retain for every member they dealt with was piling up. In fact, DUCA had a complete office wall dedicated to the storage of client records in thirteen large fireproof filing cabinets. "We simply ran out of space and had no more room to put anything," said Jack Vanderkooy, President & CEO. "While we have to maintain documents for our daily reference and access, the problem was made greater by the fact that legally we have to retain documents and files for the full term of each mortgage or loan."
Tags : 
paperless, document management, imaging, information management, computhink, viewwise, viewise, finserve, finserv, financial services, best practices, secure content management
    
Computhink
Published By: Computhink     Published Date: Dec 10, 2007
In the arena of corporate governance and compliance, the Sarbanes-Oxley Act (SOX) has commanded considerable attention; in the healthcare industry, it's  HIPAA; similar regulations target the financial services and energy sectors. Organizations can use technology to meet compliance demands in a cost-effective way.
Tags : 
compliance, computhink, hipaa, sox, sarbox, sarbanes oxley, content management, hipaa compliance, document management, secure content management, sarbanes oxley compliance
    
Computhink
Published By: Sanbolic     Published Date: Dec 03, 2007
A Windows-based Storage server can utilize its internal disk drives, or connect to an external storage array, which provides more flexibility for expansion and allows file services to be integrated into an existing SAN.
Tags : 
windows, storage, san, nas, sanbolic, network attached storage, storage area networks, windows server
    
Sanbolic
Published By: Thinksoft     Published Date: Dec 03, 2007
This white paper acts as a tool, for CEO's and Business and IT heads, helps reduce application deployment risks and costs. This paper attempts to establish how outsourcing test services to an independent domain-focused specialist company can substantially mitigate deployment risks. Business users are assured of receiving reliably better quality application well within cost and time budgets.
Tags : 
outsourcing, outsourced software testing, software testing, testing vendor, stages in outsourced software testing, independent software testing, thinksoft, software development, software outsourcing, quality assurance
    
Thinksoft
Published By: mindSHIFT     Published Date: Nov 29, 2007
mindSHIFT has extended its service capabilities to include software-as-a-service as well as managed IT services, and is a "compelling solution" for small and medium-sized organizations seeking a strategic source to meet their IT and business needs.
Tags : 
saas, managed it, outsourcing, vendor selection, tco, voip, ip telephony, managed services, software as a service, mindshift, it management, ip networks, total cost of ownership, voice over ip
    
mindSHIFT
Published By: NetSuite     Published Date: Nov 27, 2007
Where should mid-market companies invest valuable resource? Two out of three businesses are either buying or considering buying software via the subscription model.  This white paper will explain how Software-as-a-Service is revolutionizing the economics of growing businesses.
Tags : 
saas, software as a service, on demand, on-demand, software development, development, programming, web services, netsuite
    
NetSuite
Published By: Shunra     Published Date: Nov 27, 2007
Effective IT disaster recovery and business continuity planning is essential for every business. All businesses depend on their IT services for moment-to-moment operations. It is vital to ensure that those services are not disrupted due to any disaster. Pre-test your plans in a simulated network.
Tags : 
testing, disaster recovery, security testing, business continuity, preparedness, natural disaster, shunra, ppi, it management, auditing, high availability, security management
    
Shunra
Published By: NetSupport     Published Date: Nov 14, 2007
A majority of organizations do not have efficient ways of keeping track of their IT assets. That opens them up to dangers like system downtime from improperly implemented upgrades, potential licensing violations, poor customer service, overpaying on license fees and improper usage of software and the Internet by employees.
Tags : 
itam, asset management, spend management, cost savings, cost control, risk management, it management, software compliance, net support, netsupport, network management, it spending
    
NetSupport
Published By: Quocirca     Published Date: Nov 13, 2007
The evolution of Blade Computing has moved from mere server consolidation to a way of managing IT assets which brings significant business benefits. This paper aims to explain those benefits to the business and IT manager, and show how blade computing can be implemented to save money and improve the way IT serves the business needs.
Tags : 
infrastructure, infrastructure, soa, service oriented architecture, blade computing, blade, blade server, blade servers, servers, storage, utility computing, quocirca, spend management
    
Quocirca
Published By: Kinetic Data     Published Date: Oct 15, 2007
Properly implemented, service catalogs can help IT run as a business - not just "like" a business. They improve communication, provide users with easier access to IT services, and enable measurement-driven continuous process improvement. This white paper shows you how to achieve a successful service catalog implementation on BMC Remedy and extend the benefits of service catalogs across functional areas.
Tags : 
itsm, service management, service, service catalog, service catalogs, bsdm, delivery management, service level agreement, sla, slas, service level agreements, catalog trends, kinetic, kinetic data, it management, best practices, business management
    
Kinetic Data
Published By: WiChorus     Published Date: Oct 12, 2007
Wireless technologies are migrating from complex hierarchical voice-oriented architectures to flatter, low latency, all-IP based designs – reducing cost and complexity for service providers while efficiently supporting real time IP services. Coupled with this trend is the migration to higher performance OFDMA air links with MIMO and AAS, providing much greater bandwidth with improved interference characteristics.
Tags : 
wimax, access controller, asn-gw, gateway, base station, ofdma, edge router, farpoint group, controller, wichorus, wireless, wifi, wireless communications, wireless infrastructure, wireless service providers
    
WiChorus
Published By: eGain     Published Date: Oct 12, 2007
Repeat business from your existing customer base is the best kind of business you can have. And the best way to ensure repeat business is to treat your customers right. In this white paper we introduce the notion of Customer Centered Service, a new and exciting way to increase customer loyalty and, with it, profitability.
Tags : 
customer service, customer satisfaction, repeat, repeat business, client service, client services, satisfied customers, profitability, maximizing profit, egain
    
eGain
Published By: 6th Sense Analytics     Published Date: Oct 11, 2007
This whitepaper asserts that moving to the next generation of software development and sourcing requires moving from art to science. Given how dependent we are on software as a foundation for every product and service, anything less creates a climate of risk, uncertainty, and unjustifiable costs that undermines our ability to compete in a global marketplace.
Tags : 
development, software development, offshore, offshoring, outsource, outsourcing, programming, 6th sense, 6th sense analytics, enterprise resource planning, risk management, software outsourcing
    
6th Sense Analytics
Published By: Actimize     Published Date: Oct 10, 2007
According to the results of Actimize's 2007 Employee Fraud survey, which was managed by Infosurv, an independent research company, financial services institutions know that they have a significant and growing problem with employee fraud and are not fully prepared to handle the threat as attacks from organized crime, dissatisfied staff and financially distressed employees become more sophisticated.
Tags : 
auditing, audit, finserve, finserv, financial services, data theft, identity theft, data protection, id theft, employee, ex-employee, ex employee, fraud, employee fraud, actimize, security, access control, authentication, intrusion prevention, security management
    
Actimize
Published By: Trend Micro SaaS     Published Date: Oct 07, 2007
Der umfassende Hosted-Service wehrt Bedrohungen ab, ehe sie das Netzwerk erreichen, und kombiniert dazu leistungsfähige Anti-Spam- und Anti-Phishing-Funktionen mit mehrfach ausgezeichnetemViren- und Spyware-Schutz. Trend Micro, einer der Marktführer im Bereich der Sicherheits-Software, aktualisiert und optimiert die Lösung, um das Netzwerk des Kunden zuverlässig zu schützen und gleichzeitig wertvolle IT-Ressourcen einzusparen.
Tags : 
trend, messaging hosted security, e-mail, netzwerk, mx-datensatzes, spyware-schutz
    
Trend Micro SaaS
Published By: Informatica     Published Date: Sep 28, 2007
On-demand computing is apparently in demand, at least in the eyes of data integration specialist Informatica Corp. The Switzerland of data integration, as some have called it, just announced availability of its first on-demand offering, which is specifically designed to handle data from Software-as-a-Service (SaaS) stalwart, Salesforce.com.
Tags : 
salesforce, crm tools, crm, customer relationship management, salesforce.com, crm tool, on-demand, ondemand, on demand, podcast, informatica, data management, sales & marketing software, sales automation, data integration
    
Informatica
Published By: Imprivata     Published Date: Sep 17, 2007
Single Sign-On technology has been around for many years. Although skepticism and risk worries were associated with the service, SSO has gone through technological changes. Through these changes it has become an ROI Solution for many corporations. Learn and explore first hand through five different companies how SSO has helped achieve their goals.
Tags : 
password management, enterprise single sign on, enterprise single sign-on, single sign on, single sign-on, esso, sso, authentication, imprivata
    
Imprivata
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
The HSC network services group supports more than 2000 desktops, servers and backend systems such as e-mail, file, networking, application and storage services for general administration, dental and medical schools. HSC wanted to manage and reduce HIPAA compliance costs and processes associated with protecting PHI data within its storage infrastructure – a legacy SAN environment with evolving applications.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management, key management for enterprise, effective encryption key management, key management system, information security, protecting offsite tape storage, disaster recovery, data privacy regulations, backup tapes, security appliance, data security, secure key management, wire-speed encryption
    
Neoscale Systems, Inc.
Published By: Quocirca     Published Date: Sep 13, 2007
A sound IT infrastructure is fundamental to today’s businesses and when that infrastructure fails the consequences can be far reaching. Whether it is business-to-business, business-to-consumer or public sector organizations serving citizens, applications and the services they drive increasingly need to be available all day, every day. Many organizations find it hard to achieve such service levels. This briefing looks at some possible solutions.
Tags : 
data center, datacenter, data centers, datacenters, data centre, data centres, infrastructure, mission critical, high availability, small business, smb, smbs, outsourcing networking, network management, symantec, quocirca, small business networks
    
Quocirca
Published By: Quocirca     Published Date: Sep 07, 2007
Companies are faced with increasing pressures on the communications capabilities they offer their employees.  More employees are mobile, working from home or in other remote locations with a growing need to talk and share information with their colleagues.  This cuts across fixed and mobile communications, but businesses still want the flexibility of mobile, and the costs, predictability, quality and service models of fixed.
Tags : 
telecom, quocirca, mobility, soho, voip, ip telephony, convergence, small business, wi-fi, wifi, united kingdom, mobile, ip networks, small business networks, mobile workers, wireless communications, wireless service providers
    
Quocirca
Published By: Axeda Corporation     Published Date: Sep 06, 2007
Enabling IT equipment vendors to perform remote service on your data centers helps maximize uptime and lower TCO—but at what risk? Dial-up modems and VPNs introduce security vulnerabilities and lack sufficient auditing capabilities—making it virtually impossible to track external access and maintain data center security. Download this white paper to learn how you can manage security risks, lower service-related costs, achieve regulatory and internal compliance, and more.
Tags : 
remote, remote access, remote network, network management, network security, data center, datacenter, data center management, datacenter management, axeda, high availability, spend management, security, remote network management, vpn, auditing, compliance, firewalls, ipsec, policy based management
    
Axeda Corporation
Published By: Asentria Corporation     Published Date: Sep 04, 2007
Today’s service providers face more pressure than ever to keep remote equipment up and running as customers continue to demand higher levels of reliable service while keeping costs competitive. Thus, there is a growing need for remote site management solutions that can help service providers monitor, access and control telecom equipment located at customer sites.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures, fault management, network management, remote site monitoring, remote site alarms, environmental monitoring, network alarm monitoring, network alarm management, remote telemetry units, alarm management system, network management systems, network monitoring, protocol mediation
    
Asentria Corporation
Published By: Asentria Corporation     Published Date: Sep 04, 2007
The use of pollable remote access units enable integration of phone systems with telecommunications management, plus system-wide access, monitoring and alarm notification that includes unmanned remote sites. Few telephone networks connect a user base that is involved in such a multitude of vital services as local government.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures, fault management, network management, remote site monitoring, remote site alarms, environmental monitoring, network alarm monitoring, network alarm management, remote telemetry units, alarm management system, network management systems, network monitoring, protocol mediation
    
Asentria Corporation
Start   Previous    157 158 159 160 161 162 163 164 165 166 167 168 169 170 171    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.