Skip to main content
 

data

Results 9701 - 9725 of 11162Sort Results By: Published Date | Title | Company Name
Published By: Bocada     Published Date: Aug 21, 2009
Today, the common approach to collecting information about computing activity across the enterprise is to use software agents installed on individual clients and servers. However, when this approach is applied to data protection management in the enterprise environment, it has proven both ineffective and inefficient.
Tags : 
data protection, network security, software agent, agentless, bocata, bocada
    
Bocada
Published By: Bocada     Published Date: Aug 21, 2009
The paper then reveals a methodical, step by step process for implementing an SLA, from drawing up the initial requirements, to using the SLA to drive continuous improvements that are squarely focused on strategic business value.
Tags : 
service level, sla, service level agreement, service-level agreement, business management, business value, service management, itsm, bocada, bocata
    
Bocada
Published By: Bocada     Published Date: Aug 21, 2009
This strategic view is the proverbial "gold" that can be mined from your data protection systems; it is the asset that will enable IT management to prioritize activity to bring activities in line with business objectives and communicate policy compliance to corporate officers and data owners.
Tags : 
data consolidation, data protection, business management, business value, security policies, security policy, policy management, mission critical, mission critical data, bocata, bocada
    
Bocada
Published By: Bocada     Published Date: Aug 21, 2009
This white paper focuses on Sarbanes-Oxley Act (SOX) regulations relevant to data protection, and describes both best practices and automated tools used by today's leading storage managers and backup/recovery teams to meet the mandates of SOX.
Tags : 
sarbanes oxley act, sarbanes oxley, sarbox, sox, sox compliance, compliance, financial, finance, auditing, security audit, audit, sox audit, data protection, storage management, bocada, bocata
    
Bocada
Published By: Bocada     Published Date: Aug 21, 2009
This white paper shares the best practices for company data security used by some of today's most progressive IT leaders to help align their group's efforts with company goals and to make their data protection activities more successful.
Tags : 
data protection, best practices, business goals, business management, it management, change management, bocata, bocada
    
Bocada
Published By: ProStor Systems     Published Date: Mar 15, 2007
The need for protecting data is universal – whether a small to mid-size business, the largest enterprise data center, or an individual. The recognition of the value of information and the impact of data loss has reached the point where repeating it is no longer required. The issue now has turned to how to protect the data.
Tags : 
smb, archiving, backup, hardware, security, data management, database security, data protection, small business networks, prostor, prostor systems, backup and recovery
    
ProStor Systems
Published By: Caminosoft     Published Date: Aug 21, 2009
Companies today are faced with managing an ever-increasing amount of data. The traditional solution to this problem was to increase the amount of space on a server by adding more hard drives. This strategy would be similar to a person continually building additional rooms onto a house in order to have more space in which to store all his or her belongings, but without any thought as to where items were being stored.
Tags : 
caminosoft, database management, data center, data management, storage, data warehousing, hsm, netware, windows 2000, windows 2003
    
Caminosoft
Published By: Caminosoft     Published Date: Aug 21, 2009
This paper details CaminoSoft's vision for a disaster recovery solution that provides electronic protection of critical data at a remote location. The solution that provides this remote data protection is CaminoSoft's OFFSite Archive for NetWare.
Tags : 
disaster recovery, disaster plan, disaster planning, backup, remote storage, off-site storage, netware, data protection, data archiving, data warehousing, novell, caminosoft
    
Caminosoft
Published By: Confio     Published Date: Aug 21, 2009
Time is the only meaningful measure of IT database performance - how long do you keep your customers waiting? That is where Confio Software comes in. We built our technology and our company on application database performance management software that focuses on time.
Tags : 
oracle, java, performance management, customer satisfaction, application performance management, database management, database infrastructure, database, confio software, confio
    
Confio
Published By: Confio     Published Date: Aug 21, 2009
DBAs are constantly challenged to increase database performance while keeping costs down. This short paper discusses Resource Mapping Methodology (RMM) which defines a systematic process for performing Wait-Event analysis to optimize database performance.
Tags : 
database, oracle, oracle database, database administrator, resource mapping, resource management, rmm, database performance, performance optimization, ignite for oracle, confio ignite, confio
    
Confio
Published By: Confio     Published Date: Aug 21, 2009
When facing high wait times, dropped sessions, and application lock-ups, the typical company response is to invest in expanded server hardware capacity and additional Oracle licenses, plus the accompanying installation and project management costs. This paper documents the sources of cost savings and IT ROI calculations associated with Ignite for Oracle analysis.
Tags : 
oracle, application performance management, application performance, infrastructure, it investment, it spending, ignite for oracle, oracle ignite, confio ignite, roi, dba, database, confio software, confio
    
Confio
Published By: Creekpath     Published Date: Aug 21, 2009
An effective storage management solution must consider the role of SAN security in ensuring network and data integrity. When Direct Attached Storage (DAS) was the majority of storage, security was not an issue. By preventing access to the server you could stop access to the server-owned storage resources of disk and tape. Holes in SAN security practices can threaten data integrity and system availability.
Tags : 
storage management, som, storage operations management, direct attached storage, das, san security, high availability, data integrity, database security, data protection, backup, creekpath
    
Creekpath
Published By: Datalink     Published Date: Aug 21, 2009
This white paper provides: An objective approach to making decisions about data recovery technologies. (disk-based enhanced data recovery or traditional tape-based) The disk-based architectures for enhanced data recovery.
Tags : 
data recovery, disaster plan, data backup, disaster recovery, tape backup, disk backup, disk-based, tape-based, sla, service level, service-level, datalink
    
Datalink
Published By: Datalink     Published Date: Aug 21, 2009
In this paper we look at how these two challenges must be addressed together, and in fact how the definition of storage management must be expanded to consider the business driven lifecycle demands placed on stored information.
Tags : 
information management, enterprise resource planning, enterprise software, storage management, project life cycle, ilm, erp, integration, datalink
    
Datalink
Published By: Datalink     Published Date: Aug 21, 2009
Read this white paper to learn how email storage management and email archiving technologies can help optimize resources and reduce risk and cost for your company.
Tags : 
email archiving, content management, cms, content management system, email archive, email storage, email inbox, datalink
    
Datalink
Published By: DataSynapse     Published Date: Feb 26, 2007
Today's business drives application use, but it is how these applications are deployed and managed that can deliver differentiation value to the business. Whether your challenge is one of scale, optimization, heterogeneity or complexity – learn how flexibility can be built in at the application layer.  Download this analyst bulletin today!
Tags : 
application integration, desktop management, analytical applications, enterprise applications, application performance management, datasynapse, data synapse, application layer
    
DataSynapse
Published By: DataSynapse     Published Date: Feb 26, 2007
Business continuity and disaster recovery are made more difficult by the pace of business change.  Adapting to market changes requires proactive IT. For the first time, you can consolidate business continuity and disaster recovery (DR) planning in a heterogeneous IT environment with a single, central automated solution. 
Tags : 
disaster recovery, backup and recovery, business continuity, business process automation, server virtualization, server automation, datasynapse, data synapse, enterprise applications, application integration
    
DataSynapse
Published By: DataSynapse     Published Date: Feb 26, 2007
High availability (HA) configurations seek to bring downtime to zero - but can increase complexity across the IT organization, often in the form of excess technology, financial, and human capital investments.  Learn how application virtualization can reduce planned and unplanned downtime, and deliver greater flexibility.
Tags : 
high availability, it management, productivity, total cost of ownership, return on investment, configuration management, flexibility, data synapse, datasynapse
    
DataSynapse
Published By: DataSynapse     Published Date: Feb 26, 2007
This brief examines how application virtualization can compress the development and test cycle, accelerating time-to-market, while reducing risk and complexity.  This brief highlights the impact of centralized command and control of application deployment and execution.
Tags : 
software development, quality assurance, software testing, return on investment, project management, data synapse, datasynapse
    
DataSynapse
Published By: DataSynapse     Published Date: Feb 26, 2007
This technical white paper reviews the principal tenets of application virtualization; freeing application configurations from OS and infrastructure; gaining centralized command and control over system resources; and dynamically allocating resources to applications based on demand. 
Tags : 
infrastructure, interoperability, load balancing, utility computing, business continuity, enterprise applications, application integration, data synapse, datasynapse
    
DataSynapse
Published By: Data Guard Systems     Published Date: Aug 21, 2009
Customer Resource Management (CRM) and marketing are essential parts of today's cellular/wireless retail business. Given the ever-increasing competition for every consumer dollar, being able to develop effective and directed marketing programs can define the longevity of a cellular retailer's success.
Tags : 
customer resource management, cell phone, telecom, telecommunications, cellular retailer, telecom marketing, crm, customer relationship management, customer loyalty, retention, data guard, data guard systems
    
Data Guard Systems
Published By: Data Guard Systems     Published Date: Aug 21, 2009
The best way to take control of employee management is to automate human resource (HR) processes, including time tracking, schedules, and payroll calculation. This document addresses the key points that cellular retailers, wholesalers, and master agents need to know about implementing and using CellularManager's centralized web-based HR management system.
Tags : 
human resource, cell phone, cellular retailer, human resources, cellularmanager, cellular manager, data guard, data guard systems
    
Data Guard Systems
Published By: Data Guard Systems     Published Date: Aug 21, 2009
Making the sale just doesn't do it anymore for success in the cellular retail business. Constantly, retailers are forced to create new streams of revenue. This document addresses the key points and benefits that cellular retailers need to know about accepting bill payments using CellularManager's All-in-One Bill Pay Suite.
Tags : 
collaborative commerce, cellular retailer, business management, ebusiness, sales & marketing software, online bill pay, telecom, telecommunications, cell phone, cellular manager, ecommerce, ebusiness, data guard, data guard systems
    
Data Guard Systems
Published By: Data Guard Systems     Published Date: Aug 21, 2009
Web-based software automation is an essential part in managing business processes in today's cellular/wireless retail environment. An effective solution must have the ability to manage all of a company's operations simultaneously with virtually no interaction by an administrator. This document addresses key points that cellular retailers, wholesalers, and master agents need to know.
Tags : 
cellular retailer, business process management, bpm, software automation, data guard, data guard systems
    
Data Guard Systems
Published By: FRx Software     Published Date: Aug 21, 2009
Ultimately, it all adds up to one thing: lack of control. You need more control over the amount of time it takes to put the budget together, more control over how long it takes to make a change in the budget whenever it's needed, more control over the accuracy of the data, and more control over who can access that data.
Tags : 
budgeting, budget, excel, accounting, finance, frx software, enterprise resource planning, erp, frx
    
FRx Software
Start   Previous    382 383 384 385 386 387 388 389 390 391 392 393 394 395 396    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.