Skip to main content
 

nic

Results 3901 - 3925 of 4353Sort Results By: Published Date | Title | Company Name
Published By: Internet Security Systems     Published Date: Aug 21, 2009
Use of instant messaging applications-like AOL Instant Messenger, Yahoo! Messenger, MSN Messenger and ICQ-and peer-to-peer applications has grown significantly. Although the benefits of real-time communication offer a productivity benefit to corporate environments, instant messaging and peer-to-peer applications add significant vulnerabilities and risks to an enterprise's security posture.
Tags : 
instant messaging, instant messenger, icq, internet security, web security, virus, anti virus, anti-virus, antivirus, worms, vulnerability management, internet security systems
    
Internet Security Systems
Published By: MBG     Published Date: Aug 21, 2009
Telecommunications expenses are among the largest cost items on the corporate income statement. According to leading industry analysts, many companies can lower their telecommunications costs by 15 percent or more without damaging their service quality. In this white paper, MBG outlines five steps that can lead to these savings.
Tags : 
phone, telecom, telecommunications, phone bill, it spending, cost control, voip, voice over ip, communications, mbg, mgb
    
MBG
Published By: MBG     Published Date: Aug 21, 2009
While overall costs for telecommunications services have been going down, the consumption of these services by corporations is on the rise. This white paper explores how corporations can manage the consumption of telecom services by implementing polices designed to impact behavior that can lead to lower costs.
Tags : 
phone, telecom, telecommunications, communications, it spending, cost control, phone bill, voip, voice over ip, mbg, mgb
    
MBG
Published By: Meru Networks     Published Date: Aug 21, 2009
This paper explains the numerous places where VoWLAN can go to work, why most offerings fail to make it work, and how only Meru Networks' standard-based solution puts the power of VoWLAN to work at enterprise-scale.
Tags : 
voip, voice over ip, wlan, wlans, vowlan, enterprise software, communications, wireless communications, wireless voip, meru, meru networks
    
Meru Networks
Published By: PassGo     Published Date: Aug 21, 2009
The law in the United Kingdom has various influences on organizational information security policy. As well as protecting the rights of individuals and organizations, it also imposes many duties and responsibilities. For organizations to meet their legal obligations a number of technical controls can be put in place.
Tags : 
information security, europe, security policies, policy based management, compliance, united kingdom, european, database security, data security, passgo, pass go
    
PassGo
Published By: PKWARE     Published Date: Aug 21, 2009
Any organization that stores or transfers health or insurance records electronically must comply with HIPAA, from health care facilities to HR departments. PKWARE offers straightforward strategies for managing protected health information.
Tags : 
compliance, hipaa compliance, hipaa, healthcare, privacy, health, health information management, him, database security, data protection, pkware
    
PKWARE
Published By: PKWARE     Published Date: Aug 21, 2009
Regulatory and business requirements are driving the need for protecting information stored and transferred electronically. PKWARE provides an introduction to protecting your most valuable asset - your data.
Tags : 
regulatory compliance, compliance, information management, data security, data protection, secure content management, pki, pkware
    
PKWARE
Published By: Pointsec     Published Date: Aug 21, 2009
Strong security policy, procedures and technology are major requirements, especially for protecting the remote systems used for telework and the sensitive information stored on those devices.
Tags : 
network security, security policy, government, security policies, policy based security, information security, data security, telecom, secure communications, pointsec
    
Pointsec
Published By: Preventsys     Published Date: Aug 21, 2009
This paper is a synopsis of the presentations given at the Preventsys "CISO Breakfast Series," a succession of seminars given across North America in January and February 2005. The speakers for each breakfast consisted of security professionals and executives who provided their views on how to more effectively align information security with business initiatives.
Tags : 
network security, intrusion prevention, security management, business management, information management, data security, preventsys
    
Preventsys
Published By: PTC     Published Date: Aug 21, 2009
An ECM solution can give you lasting differentiation from your competitors by improving the quality and availability of your publications. Download this white paper to learn why you can't afford to overlook an ECM solution for your technical publications process.
Tags : 
content management, competitive edge, content delivery, cms, ecm, enterprise content, ptc
    
PTC
Published By: PTC     Published Date: Aug 21, 2009
How many times has your product gone to prototype, test or assembly and not worked quite right? How can you address all dependencies before testing and assembly? Find out in this free white paper.
Tags : 
product lifecycle, product lifecycle management, plm, product development, productivity, electromechanical, product testing, quality assurance, quality control, ptc
    
PTC
Published By: PTC     Published Date: Aug 21, 2009
In February 2004, the FDA issued a Draft Guidance requiring the electronic submission of labeling content to be provided in an XML-based format called Structured Product Labeling (SPL). The purpose of this white paper is for the reader to gain an understanding and prepare for the FDA's new electronic labeling submission standard.
Tags : 
best practices, enterprise software, product lifecycle management, plm, product information, product information management, pim, catalog, catalogging, ptc
    
PTC
Published By: PTC     Published Date: Aug 21, 2009
Download this report on how to implement a successful environmental compliance strategy for the long term. Learn about new strategies for complying with upcoming environmental regulations, as well as the compliance shortcomings common to many companies in a new research report by AberdeenGroup.
Tags : 
compliance, environmentalism, epa, manufacturing, responsibility, consumer electronics, ptc
    
PTC
Published By: Reactivity     Published Date: Aug 21, 2009
Businesses are rapidly adopting Web services to provide new levels of integration between applications. By comparison with earlier data communications techniques, Web services are faster and cheaper to develop, quicker to deploy, and easier to adapt to emerging business needs. This paper discusses the special security challenges posed by the use of Web services, and how to secure networks against them.
Tags : 
web services, web service management, web service deployment, web service, web service security, network security, secure networks, reactivity
    
Reactivity
Published By: RuleStream     Published Date: Aug 21, 2009
Capturing product knowledge has proven to be very difficult and early attempts at building systems to capture and reuse knowledge have failed because they were too limited technically, required users to be able to develop computer codes (or programs) to embody knowledge rules and actions, and they did not work with common product design tools such as CAD and PDM systems.
Tags : 
product design, product development, product information, pim, product information management, product lifecycle management, computer aided design, computer-aided design, rulestream
    
RuleStream
Published By: Safe Software     Published Date: Aug 21, 2009
Spatial data warehouses are becoming more common as government agencies, municipalities, utilities, telcos and other spatial data users start to share their data. This paper illustrates some of the issues that arise when undertaking data replication and data sharing.
Tags : 
data warehousing, share data, data management, data distribution, data sharing, replication, safe, safe software
    
Safe Software
Published By: Sigaba     Published Date: Aug 21, 2009
This white paper reviews the five most common current approaches to messaging security. While the five approaches discussed here are not the comprehensive list of available solutions, they are the basis for most variations of messaging security solutions available today.
Tags : 
email security, security management, security policies, secure instant messaging, intranets, messaging, sigaba
    
Sigaba
Published By: Sigaba     Published Date: Aug 21, 2009
This document details the mandated and proposed rules generally referred to as the "HIPAA requirements" and how they affect healthcare organizations and their business partners transmit medical information electronically.
Tags : 
compliance, policy based management, business management, hipaa compliance, health, hipaa, privacy, sigaba
    
Sigaba
Published By: Soffront     Published Date: Aug 21, 2009
Companies are discovering that a Knowledge Management System (KMS) has grown from a nice to have concept, to a must-have asset in customer facing departments. Providing immediate answers to customers requires easy access to the important product and business knowledge of an organization. KMS makes that possible.
Tags : 
knowledge management, information management, knowledge base, product information management, pim, product knowledge, customer service, customer support, call center management, soffront
    
Soffront
Published By: Spectra Logic     Published Date: Aug 21, 2009
Read how Spectra Logic Corporation's BlueScale Encryption integrates hardware encryption directly into the electronics of a tape library, offering a practical, affordable, & scalable option.
Tags : 
backup, database security, data security, encryption, tape-based backup, tape backup, data encryption, spectralogic, spectra logic
    
Spectra Logic
Published By: Texas Instruments     Published Date: Aug 21, 2009
Download this whitepaper now and read how WLAN technology embedded in CE devices offers consumers a glimmer of hope that someday soon they will be free to experience their media content on their terms.
Tags : 
wireless, wlan, ce device, consumer electronics, electronics, digital media, vcr, tivo, home networking, texas intruments
    
Texas Instruments
Published By: Texas Instruments     Published Date: Aug 21, 2009
Designing wireless local area networking (WLAN) capabilities into stationary customer electronics (CE) systems is most successful when certain design issues are considered early in the development cycle.
Tags : 
wireless lan, wlan, wlans, consumer electronics, ce systems, vcr, consumer electronic, ce design, digital media, product development, texas instruments
    
Texas Instruments
Published By: Tridion     Published Date: Aug 21, 2009
Organizations have been implementing intranets for a number of years, expecting to gain efficiencies and improve information exchange among their employees. Based on an organization's objectives, an intranet can take many different forms, ranging from a corporate information and communication platform to a pragmatic approach to Knowledge Management. This White Paper specifically focuses on the lifeblood of intranets: content.
Tags : 
collaboration, content, intranet, corporate communication, workforce management, internal communication, team management, web site management, intranet management, tridion
    
Tridion
Published By: Mentor Graphics     Published Date: Aug 20, 2009
Interest in DO-254 first occurred in Europe and has since spread to the US commercial aircraft industry. If you are being asked about your company's DO-254 direction and compliance, but have been overwhelmed with information on the subject, then this article is for you.
Tags : 
demystifying do-254, mentor graphics, airborne electronic hardware, hardware design assurance strategy, configuration management process, eda tools
    
Mentor Graphics
Published By: Mimecast     Published Date: Aug 19, 2009
Businesses over the past ten years have used email archiving solutions in order to meet record retention compliance, facilitate electronic discovery, and control message-related storage costs. Despite these benefits, many organizations still have not adopted an archiving solution and still simply enforce mailbox quotas or message deletion policies as the best way to manage messaging environments.
Tags : 
mimecast, saas, software as a service, email archive, medium-size business, esg, storage
    
Mimecast
Start   Previous    150 151 152 153 154 155 156 157 158 159 160 161 162 163 164    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.