Skip to main content
 

data

Results 10651 - 10675 of 11931Sort Results By: Published Date | Title | Company Name
Published By: 2dev     Published Date: Jan 29, 2007
The goal of this series of articles is to help DBA's having a basic understanding of Oracle's Application Server.
Tags : 
software development, oracle, database, database security, oracle application server, database administrator, dba, database development, 2dev
    
2dev
Published By: Avalere     Published Date: Apr 02, 2007
Sensitive documents, files and intellectual property are extracted from a central repository such as a database, records management system, or document management system to complete daily tasks, however, extracting this information can lead to a security breach.  Avalere provides the tools you need to control the proliferation of sensitive information throughout your organization.
Tags : 
security, security management, database admin, dba, records management, database management, document management, data security, document security, avalere
    
Avalere
Published By: Avalere     Published Date: Apr 02, 2007
Laptops, USB devices, and other endpoint devices foster a flexible and more productive work environment, yet also increase a company's exposure to the loss or theft of critical information. Avalere inventories, protects, and controls your company’s laptop, desktop or removable storage device information to mitigate risks of lost or stolen equipment.
Tags : 
mobile computing, lost laptop, lost equipment, mobile data systems, computer loss, equipment loss, risk management, avalere
    
Avalere
Published By: Avalere     Published Date: Apr 02, 2007
Companies struggle with cleanly separating an employee, contractor or consultant with their company and critical information.  Avalere enables companies to review how information has been used prior to an employee’s departure in order to protect the company and the employee.
Tags : 
data protection, employee performance, fired, employee departure, employee quit, employee resigned, access control, avalere
    
Avalere
Published By: XLink Technology Inc.     Published Date: Jan 15, 2007
At the wake of hurricanes and other natural disasters, Vanguard has taken steps to provide disaster data recovery for its clients.
Tags : 
servers, high availability, data protection, web hosting, backup, recovery, backup and recovery, failover, xlink, xlink technology, disaster recovery
    
XLink Technology Inc.
Published By: XLink Technology Inc.     Published Date: Jan 15, 2007
XLink ClusterReplica Enterprise software, based on CDP technology, combines conventional High Availability solutions and Microsoft DPM-like functions to create the next generation of business continuity software. ClusterReplica ENT offers real-time data replication and auto failover for MSSQL, IIS Web Server and File Servers.
Tags : 
servers, data protection, windows server, high availability, data replication, disaster recovery, business continuity, xlink, xlink technology
    
XLink Technology Inc.
Published By: Tripp Lite     Published Date: Jan 24, 2007
Voice over IP (VoIP) is exploding in popularity as an application for business data networks. As a result, a company can lower its hardware and service costs while raising productivity through the use of more customizable telephony applications.
Tags : 
voice over ip, voip, ip telephony, call center management, quality of service, network infrastructure, infrastructure, power, voip deployment, voip implementation, power supply, tripplite, tripp lite
    
Tripp Lite
Published By: BusinessObjects     Published Date: Jan 30, 2007
Download this step by step guide to learning how mid-size companies can benefit from Business Intelligence. You'll learn the benefits of BI and why mid-size companies need it for effective decision-making and improved results.
Tags : 
performance management, data quality, msrs, microsoft reporting services, cognos 8, cognos, powerplay, cognos reportnet, microstrategy, business intelligence solutions, business intelligence, mid-size, smb, reporting, query and analysis, data integration, dashboards, visualizations, business objects, businessobjects
    
BusinessObjects
Published By: Xactis     Published Date: Feb 02, 2007
Learn the 'bottom-up' approach to start Business Rules Extracting, Migrating and Auto Re-architecting your current mission-critical legacy system and their data, into an SOA.  This is a "how-to" presentation addressing how to get started and eventually establish an internal L2S Center of Excellence.
Tags : 
soa, service oriented architecture, service-oriented architecture, business rules extracting, legacy system, erp, enterprise resource planning, mainframe, citrix, xactis
    
Xactis
Published By: Xactis     Published Date: Feb 05, 2007
Learn the ‘bottom-up’ approach to start Business Rules Extracting, Migrating and Auto Re-architecting your current mission-critical legacy system and their data, into an SOA.
Tags : 
soa, service oriented architecture, service-oriented architecture, business rules extracting, software development, c++, quality assurance, legacy system, xactis
    
Xactis
Published By: DataViz     Published Date: Feb 06, 2007
Push email is in high demand for today's mobile workforce. If you have Documents To Go with InTact Technology, you can edit your files from anywhere without compromise.  Check out this white paper to find out how.
Tags : 
mobile computing, mobile workers, wireless application software, microsoft office, mobility, dataviz, document management, dataviz intact, intact technology, documents to go
    
DataViz
Published By: Onaro     Published Date: Jul 27, 2007
VPs of Infrastructure and Operations are under constant pressure to more rapidly provision infrastructure to support applications, hit cost reduction targets, and maintain or improve application availability for network attached storage. To meet these goals, they are the directors of a carefully orchestrated dance of network, server, storage and datacenter operation teams.
Tags : 
storage management, storage, san, sans, sanscreen, network management, storage provisioning, network provisioning, network management, data center, datacenter management, data center management, onaro
    
Onaro
Published By: Jumpnode Systems     Published Date: Jun 12, 2007
Network monitoring software packages require complex installation, ongoing maintenance and additional costs for servers and third-party applications. Software-as-a-Service (SaaS) network monitoring alternatives greatly simplify implementation and maintenance, but they rely on uninterrupted Internet access to function, often require complex VPNs or firewall modifications, and typically provide limited access to historical data.
Tags : 
monitoring, software as a service, saas, high availability, network management, jumpnode
    
Jumpnode Systems
Published By: Infor     Published Date: Feb 27, 2007
Infor Discrete Manufacturing Essentials are built exclusively for discrete manufacturers, with specific functionality that addresses the industry's essential challenges. The result? For one typical Infor customer, a 50 percent reduction in data processing costs and fully automated management of more than 11,000 items and 200 suppliers.
Tags : 
supply chain management, enterprise resource planning, erp, scm, enterprise performance management, supplier relationship, customer relationship management, infor
    
Infor
Published By: Infor     Published Date: Apr 19, 2007
This paper includes a comparison between using RFID and barcoding for asset management as well as real-life examples of how RFID technology is being used by enterprising organizations today to gain significant time savings and enable better asset and maintenance management.
Tags : 
wireless, wireless hardware, wireless infrastructure, rfid, radio frequency, mobile data systems, asset management, barcode, barcoding, infor, erp
    
Infor
Published By: PEAK Technologies, Inc.     Published Date: Jul 05, 2007
Today's competitive, agile business demands anytime/anywhere connectivity and access to real time data. Outdated technology, security concerns and compliance requirements are forcing companies throughout industries to consider migrating to advanced wireless systems for supply chain operations.
Tags : 
scm, supply chain management, mobile computing, mobile data systems, real-time data, wireless systems, supply chain productivity, supply chain compliance, supply chain technology, wireless technology, wireless technologies, peak, peak technologies
    
PEAK Technologies, Inc.
Published By: GAO RFID Inc.     Published Date: Feb 28, 2007
Institutional (academic) libraries and public libraries face growing challenges in managing the assets of their collection and maintaining or improving service levels to patrons. Learn how libraries can leverage RFID solutions to save time, reduce cost, and increase productivity.
Tags : 
mobile data systems, rfid, rfid tags, libraries, library, mobile data systems, gao, gao rfid, gao group
    
GAO RFID Inc.
Published By: GAO RFID Inc.     Published Date: Feb 28, 2007
Barcodes, magnetic stripes, and proximity readers all rely on the user to either make contact or place the badge very close to the reader. In addition, bar codes can only be read one at a time and the respective embedded information cannot be updated. Find out how an RFID access control system can provide an easy and efficient solution.
Tags : 
rfid, rfid tags, mobile data systems, access control, identity management, gao, gao group, gao rfid, access control system, barcodes, smart cards
    
GAO RFID Inc.
Published By: GAO RFID Inc.     Published Date: Feb 28, 2007
The applications for the healthcare industry are multiple, including asset tracking, patient tracking, staff location, baby monitoring, blood bank distribution, and more. Learn more in this overview by GAO RFID.
Tags : 
rfid, rfid tags, healthcare, wireless infrastructure, wireless data systems, wireless hardware, gao group, gao, gao rfid
    
GAO RFID Inc.
Published By: GAO RFID Inc.     Published Date: Feb 28, 2007
Efficient fleet maintenance is absolutely necessary given today's high equipment costs and climbing operating expenses. Whether you are involved in LTL, cartage, courier, direct store delivery (DSD) or field service operations, an integrated and cost effective fleet maintenance program is a prerequisite to increased profitability.
Tags : 
rfid, rfid tags, automotive, trucking, fleet management, fleet maintenance, wireless data systems, wireless hardware, gao, gao group, gao rfid
    
GAO RFID Inc.
Published By: GAO RFID Inc.     Published Date: Feb 28, 2007
Railroads face a complex set of economic and operational challenges like competitive freight pricing, asset utilization and competition with trucking, capital expenditure levels, industry consolidation and debt management. Learn how RFID technology can help railroad professionals address these challenges.
Tags : 
rfid, rfid tags, mobile data systems, wireless hardware, gao, gao group, gao rfid, railroad, locomotive, automotive, transportation
    
GAO RFID Inc.
Published By: C2C Systems, Inc.     Published Date: Mar 15, 2007
This paper provides information which will help you to plan a solution for your mailbox size. Planning Modification to any email system takes just four easy steps.
Tags : 
email security, email archiving, data management, c2c, mailbox, email, personal email, enterprise email
    
C2C Systems, Inc.
Published By: C2C Systems, Inc.     Published Date: Mar 15, 2007
As the need to retain corporate data has increased to meet regulatory requirements-- and best practice may dictate email meeting certain internal policies-- the very existence of PSTs is putting email more and more "at risk. So what can you do about PSTs?
Tags : 
im and email archiving, im archive, email archive, email security, data management, enterprise email, personal email, email archiving, c2c, pst, outlook, mailbox
    
C2C Systems, Inc.
Published By: C2C Systems, Inc.     Published Date: Mar 15, 2007
This paper considers the use of email archives for compliance. It will also review how archives are trusted and look at what has to be done to ensure that integrity is maintained throughout the chain of events that take place within an email archive environment.
Tags : 
compliance, email archiving, data quality, records management, personal email, enterprise email, email security, c2c
    
C2C Systems, Inc.
Published By: Breece Hill, LLC     Published Date: Mar 15, 2007
Once a business clears the financial hurdle and begins to plan their data protection strategy the choices can appear daunting. Do they select tape or disk? Apply differential or incremental backups? How much will a new system cost and how much time will it take to implement? What data should be included in the backup? This article attempts to address these concerns.
Tags : 
smb, storage, archiving, backup, hardware, small business networks, storage, backup and recovery, data protection, data management, breece hill
    
Breece Hill, LLC
Start   Previous    420 421 422 423 424 425 426 427 428 429 430 431 432 433 434    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.