run time

Results 126 - 150 of 189Sort Results By: Published Date | Title | Company Name
Published By: Time Warner Cable Business Class     Published Date: May 18, 2010
Time Warner Cable Business Class delivers all the communication services your business needs with scalable Internet, Phone and Cable TV services supported by our reliable wholly-owned network. Meet with our local, dedicated account representatives for a free evaluation so they can tailor a solution that's right for your business. For a free communications evaluation, contact us to learn more!
Tags : 
broadband for business, broadband internet for business, bundles for businesses, business adsl, business broadband, business bundle, business bundles, business cable, business class, business dsl, business high speed internet, business internet, business ip phone, business isp, business isps, business local service, business long distance, business phone, business telephone, business voip
    
Time Warner Cable Business Class
Published By: Time Warner Cable Business Class     Published Date: May 18, 2010
Time Warner Cable Business Class delivers all the communication services your business needs with scalable Internet, Phone and Cable TV services supported by our reliable wholly-owned network. Meet with our local, dedicated account representatives for a free evaluation so they can tailor a solution that's right for your business. For a free communications evaluation, contact us to learn more!
Tags : 
broadband for business, broadband internet for business, bundles for businesses, business adsl, business broadband, business bundle, business bundles, business cable, business class, business dsl, business high speed internet, business internet, business ip phone, business isp, business isps, business local service, business long distance, business phone, business telephone, business voip
    
Time Warner Cable Business Class
Published By: IBM     Published Date: Mar 28, 2008
For service-oriented architecture (SOA) to succeed, it needs to begin before run-time, with a strong SOA-based development and delivery environment. This paper discusses some of the challenges around SOA governance in the context of a lifecycle of services, and introduces IBM Rational Asset Manager software as a solution to those challenges.
Tags : 
software development, governance, service oriented architecture
    
IBM
Published By: Microsoft Dynamics     Published Date: Jul 03, 2008
Microsoft, together with Unisys Corporation, completed benchmark testing of Microsoft Dynamics CRM 4.0 running on the Microsoft Windows Server 2008 operating system with Microsoft SQL Server 2008 database software. Benchmark results demonstrate that Microsoft Dynamics CRM can scale to meet the needs of an enterprise-level, mission-critical workload of 24,000 concurrent users while maintaining performance at sub-second response times.
Tags : 
microsoft crm, microsoft, microsoft dynamics, network architecture, network performance
    
Microsoft Dynamics
Published By: Dell Storage     Published Date: Jan 16, 2009
Although hardware storage prices have come down, storage administration and software expenses still run about seven times the cost of storage hardware. Storage consolidation provides a partial solution by expanding device connectivity and reducing points of management. However, once storage is consolidated, the job is only half done. You still need a centralized, flexible method of management that masks the complexity of the storage environment and reduces administrative overhead. That’s where virtualization fits in.
Tags : 
dell, storage virtualization, hardware storage, storage administration, software expenses, storage consolidation, storage environment, virtualization, it management, storage, storage management, server virtualization
    
Dell Storage
Published By: StorageCraft® Technology Corporation     Published Date: Jun 21, 2011
Save time, money, and storage space with ShadowProtect® disk-based backup and disaster recovery software - backup everything and recover anywhere
Tags : 
shadowprotect, storagecraft, storage, backup, disk-based, tape, operating system, windows, running in minutes, save time, recovery, protection, information, it administrators, backup and recovery, disaster recovery, data protection, virtualization, infrastructure
    
StorageCraft® Technology Corporation
Published By: Mindtree     Published Date: Nov 01, 2016
Learn how to cut costs so you can self-fund growth initiatives. An expert Managed Services guide can help you map a smart path to streamlining processes, outsourcing services and rearchitecting systems. With a customized plan in place, your Managed Services provider can begin to optimize IT and increase efficiencies through continuous improvements. Discover how Managed Services providers: Guarantee savings every year so you can invest in growth opportunities such as digital and analytics Optimize the run-the-business side of IT to accelerate innovation Deliver continuous improvements to productivity, quality and time to market
Tags : 
mindtree, growth initiatives, managed services guide, managed services, analytics, knowledge management, enterprise applications
    
Mindtree
Published By: CloudEndure     Published Date: Oct 12, 2018
Maintaining business continuity is your highest priority. In today’s commercial landscape, business continuity depends on the efficient, uninterrupted flow of data across the organization – from operations to sales to fulfillment. Even a brief lapse in workload continuity can mean thousands of lost sales opportunities, disruption to production, and compromised customer trust. The causes of those lapses can range from natural disasters to mechanical failure or human error. You need a data platform and a proactive disaster recovery (DR) strategy that will help you stay up and running in the event that your physical infrastructure is unavailable for any length of time. BUSINESS CONTINUITY Fulfilling orders, providing a high level of customer service, and keeping consumers engaged all depend on the efficient, uninterrupted flow of data throughout your organization. CUSTOMER TRUST Above all, protecting customer data—especially personally identifiable information (PII) —is critical
Tags : 
    
CloudEndure
Published By: AWS     Published Date: Nov 28, 2018
Financial institutions run on data: collecting it, analyzing it, delivering meaningful insights, and taking action in real time. As data volumes increase, organizations demand a scalable analytics platform that can meet the needs of data scientists and business users alike. However, managing an on-premises analytics environment for a large and diverse user base can become time-consuming, costly, and unwieldy. Tableau Server on Amazon Web Services (AWS) is helping major Financial Services organizations shift data visualization and analytics workloads to the cloud. The result is fewer hours spent on manual work and more time to ask deeper questions and launch new data analyses, with easily-scalable support for large numbers of users. In this webinar, you’ll hear how one major asset management company made the shift to cloud data visualization with Tableau Server on AWS. Discover lessons learned, best practices tailored to Financial Services organizations, and starting tactics for scalable analytics on the cloud.
Tags : 
    
AWS
Published By: McAfee     Published Date: Mar 31, 2017
The Adwind Remote Administration Tool is a backdoor Trojan written in Java language that targets various platforms that support Java files. Adwind does not exploit any vulnerabilities. In most cases, for an infection to succeed, the user must run the malware by double-clicking the .jar file that is usually distributed as an attachment, or opening an infected Microsoft Word document. The infection spreads if the Java Runtime Environment is installed on the user's computer. After the malicious .jar file is executed on the target system, the malware installs silently and connects to a remote server via a preconfigured port to receive commands from a remote attacker and perform other illegal operations.
Tags : 
backdoor trojans, trojan protection, malware, malware protection
    
McAfee
Published By: Qualys     Published Date: Nov 05, 2013
Automated Vulnerability Management (VM) solutions help you discover devices running in your network, determine whether they are vulnerable to attack, find fixes to the underlying problems, and protect yourself while those fixes are being implemented. This checklist of best practices will save you time and help you understand what to look for when selecting a VM, whether you have a dozen systems or a million.
Tags : 
vulnerability management solution, best practices, architecture, scanning, automation, continuity, reporting, cyber security, internet security, intrusion detection, intrusion prevention, security management, vulnerability management
    
Qualys
Published By: Qualys     Published Date: Nov 05, 2013
Automated Web Application Scanning (WAS) solutions help you discover web apps running in your network, determine whether they are vulnerable to attack, understand how to fix them, and protect your business. This checklist of best practices will save you time and help you understand what to look for when selecting a WAS solution, whether you have a handful of apps or thousands.
Tags : 
vulnerability management solution, best practices, architecture, scanning, automation, continuity, reporting, cyber security, internet security, intrusion detection, intrusion prevention, policy based management, security management, vulnerability management
    
Qualys
Published By: Marketo, INC.     Published Date: Sep 25, 2008
In this free marketing Webcast, learn how two very different companies used lead management technology to significantly increase conversion rates—by as much as 500 percent!  Discover: key criteria for selecting a lead management solution... how to get up and running quickly, while avoiding needless costs... how to achieve the marketing results you want—and make it easy to access those numbers anytime.  Find out what lead management can do for your company. View this free Webcast now.
Tags : 
lead management, marketo, conversion, knowledge management, contact management
    
Marketo, INC.
Published By: SubscriberMail     Published Date: Dec 12, 2008
Your email subscribers are likely feeling the economic crunch as much as—if not more than—your business. With that in mind, now is definitely the right time to keep your audience informed of any savings or promotional offers that are available. Even if business has been strong enough in the past that you were able to avoid offering special incentives, marketing in a time of economic uncertainty needs to be performed with an eye toward the future. Fostering customer loyalty now via special offers can pay dividends down the road when the economy rights itself.
Tags : 
subscribermail, email marketing, online marketing, e-marketing
    
SubscriberMail
Published By: White Horse     Published Date: Mar 24, 2010
Poorly run Web site redesign RFPs are costing B2B companies significant time and budget. Get your RFP process off to the right start using proven framework that provides critical insight on a vendor's core capabilities and creativity relative to your business needs.
Tags : 
white horse, b2b, redesign, rfps, b3b, scope, purpose, template
    
White Horse
Published By: VMware AirWatch     Published Date: Dec 08, 2016
Deploying virtual desktops and applications can be a rigorous process if organizations are not using the appropriate tools. Even amongst the best run IT organizations, setting up a complete VDI environment can take several days and sometimes weeks to install and configure. This leads to long maintenance windows and a lot of time needs to be set aside to design and scale the environments equaling higher costs in the long run. Download this solution brief to discover a new approach to building, delivering and managing virtual workspaces.
Tags : 
    
VMware AirWatch
Published By: AstuteIT_ABM_EMEA     Published Date: Feb 28, 2018
In modernen Unternehmen ist es üblich, dass Unternehmen über 80 % ihrer Workloads in einer virtuellen Infrastruktur bereitstellen, die Hunderte bis Hunderttausende virtuelle Maschinen umfassen kann. Während IT-Unternehmen und Produktionsteams beträchtliche Vorteile durch die Virtualisierung erzielt haben, bringt diese jedoch auch erhebliche Komplexität und Unsicherheit bei der Sicherung wichtiger Daten mit sich. Die Bereitstellung mehrerer Einzelprodukte zur Datensicherung verursacht Probleme bei der Interoperabilität, was zu Lücken bei der Datensicherung, Nichteinhaltung von Recovery Time Objectives und Recovery Point Objectives sowie zusätzlichen Gemeinkosten für Support und Wartung führen kann.
Tags : 
netbackup, microsoft, herausholen, plattform, astute
    
AstuteIT_ABM_EMEA
Published By: Astute IT DACH     Published Date: Feb 28, 2018
In modernen Unternehmen ist es üblich, dass Unternehmen über 80 % ihrer Workloads in einer virtuellen Infrastruktur bereitstellen, die Hunderte bis Hunderttausende virtuelle Maschinen umfassen kann. Während IT-Unternehmen und Produktionsteams beträchtliche Vorteile durch die Virtualisierung erzielt haben, bringt diese jedoch auch erhebliche Komplexität und Unsicherheit bei der Sicherung wichtiger Daten mit sich. Die Bereitstellung mehrerer Einzelprodukte zur Datensicherung verursacht Probleme bei der Interoperabilität, was zu Lücken bei der Datensicherung, Nichteinhaltung von Recovery Time Objectives und Recovery Point Objectives sowie zusätzlichen Gemeinkosten für Support und Wartung führen kann.
Tags : 
netbackup, microsoft, herausholen, plattform, astute
    
Astute IT DACH
Published By: 123Together     Published Date: Sep 10, 2008
You understand the value Microsoft Exchange Server can bring to your company but the internal deployment delays, administrative complexity and cost of Exchange just isn't practical. Business and technical executives strive to find time to focus on running their business and avoid the distractions of managing a 24X7 application such as Exchange. The time and expense of running a Microsoft Exchange Server in-house may simply be too much for a company your size.
Tags : 
123together, it strategies, contact management, email, economy, stability, collaboration, green it, outsourcing, outsource, outsourcing, microsoft exchange, hosted exchange, mobile services, eprocurement, it spending, collaborative commerce, colocation and web hosting, content management
    
123Together
Published By: Group M_IBM Q418     Published Date: Sep 10, 2018
LinuxONE from IBM is an example of a secure data-serving infrastructure platform that is designed to meet the requirements of current-gen as well as next-gen apps. IBM LinuxONE is ideal for firms that want the following: ? Extreme security: Firms that put data privacy and regulatory concerns at the top of their requirements list will find that LinuxONE comes built in with best-in-class security features such as EAL5+ isolation, crypto key protection, and a Secure Service Container framework. ? Uncompromised data-serving capabilities: LinuxONE is designed for structured and unstructured data consolidation and optimized for running modern relational and nonrelational databases. Firms can gain deep and timely insights from a "single source of truth." ? Unique balanced system architecture: The nondegrading performance and scaling capabilities of LinuxONE — thanks to a unique shared memory and vertical scale architecture — make it suitable for workloads such as databases and systems of reco
Tags : 
    
Group M_IBM Q418
Published By: Symantec     Published Date: Sep 14, 2015
In the running battle with cyberthreats, your first line of defense is your IT staff: the system and network administrators, SOC and NOC operators, incident response and forensics analysts, and application development and QA teams. Are these IT professionals ready to take on an ever-growing army of innovative, persistent cybercriminals and hackers? Probably not, if you expect them to acquire the knowledge and skills they need through self-directed study and on-the-job training. There is too much to learn, and few members of the IT staff have the time to research every new threat. And you can’t afford to suffer through APTs, breaches and data leakages just to provide “teachable moments” for IT personnel. There is another solution. Security simulation immerses IT professionals in a realistic online environment and challenges them to fill the roles of cyberattackers and cyberdefenders. It borrows from education theory and online gaming to present knowledge in ways that motivate learning a
Tags : 
on-the-job training, it professionals, cyber security services, security programs, security
    
Symantec
Published By: Epicor     Published Date: Oct 06, 2016
In the face of growing competition and a challenging business climate, many job shops and manufacturers are looking for ways to reduce costs, streamline operations, and improve the bottom line. Implementing enterprise resource planning (ERP) software is a proven solution for running a business efficiently and effectively. Yet, a large percentage of job shops and manufacturers have held back from implementing an ERP system due to high initial costs, long implementation times, and competing demands for time and resources. Download this white paper to learn more!
Tags : 
    
Epicor
Published By: Eaton     Published Date: Mar 07, 2016
In their search for top-of-the-class uninterruptible power systems (UPSs) for their demanding data center environment, WUSD wanted a system that would keep everything backed up with enough runtime for a graceful shutdown, but was also easily scalable. Equally important, the district wanted seamless integration with their virtual environment. Find out how the Eaton 9390 UPS and the Eaton Intelligent Power Software (IPS) Suite made the grade.
Tags : 
upss, uninterruptible power systems, data center environment, backup, shutdown, scalability, integration, it management, enterprise applications
    
Eaton
Published By: Cisco     Published Date: Jul 11, 2016
As Microsoft Windows Server 2003 nears its end-of-support date in July 2015, businesses still running the aging OS are facing a number of vital considerations. The computing landscape has changed drastically since the release of Windows Server 2003 more than a decade ago. Although the Windows Server 2003 platform worked well in its time, after Microsoft support expires, it will become both a liability and a limitation for organizations still running it. In this document, you’ll learn some of the important reasons why your company needs to migrate important workloads and services away from Windows Server 2003. You’ll learn about some of the biggest concerns about Windows Server 2003’s end of life, as well as some essential considerations to keep in mind while planning your migration.
Tags : 
    
Cisco
Published By: Vision Solutions     Published Date: Apr 11, 2008
If you need more than tape backup to protect your critical applications running on AIX operating environments, download this white paper and learn your options and strategies, including how new technologies have significantly improved the recovery time and data recovery points for AIX.
Tags : 
data management, disaster recovery, business continuity, ibm aix, backup, recovery, vision, vision solutions, platforms, backup and recovery, as/400, unix
    
Vision Solutions
Start   Previous    1 2 3 4 5 6 7 8    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.