A Listing of Enterprise Software, Hardware, Services, and White Papers ResourceWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
Alphabetical Index of Solutions & Research
A |  B |  C |  D |  E |  F |  G |  H |  I |  J |  K |  L |  M |  N |  O |  P |  Q |  R |  S |  T |  U |  V |  W |  X |  Y |  Z |  0-9
 
A Listings:  Result Page 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10
 

ASG's metaCMDB™ Master or "Citizen" CMDB Containing Critical Enterprise Configuration Information by  ASG Software Solutions


May 25, 2010 - The sound understanding and visibility of configuration information provided by ASG’s metaCMDB™ is critical for ITIL initiatives and business service management (BSM) implementations, service desk support, and the integration of disparate technologies. Read this paper to find out more.

 

ASG-Discovery and Dependency Mapping (ASG-DDM) by  ASG Software Solutions


February 23, 2010 - This paper explains ASG's unique, automated solution for discovery and dependency mapping for change and configuration management.

 

ASG-Discovery and Dependency Mapping (ASG-DDM)™ by  ASG Software Solutions


May 25, 2010 - Understanding which hardware and software components support which business systems is extremely difficult. For many years, the clipboard and spreadsheet appear to have been the tools of choice, with the result that many decisions were made based on outdated and inaccurate information. Read this paper to find out more.

 

ASG-Rochade the Leading Metadata Repository by  ASG Software Solutions


ASG-Rochade is a metadata management solution for large and medium-sized organizations. It is a strategic, facilitating technology that manages information about data and systems across your enterprise.

 

ASG-Total Content Integrator™(TCI) and Microsoft® Office® SharePoint Server (MOSS) by  ASG Software Solutions


February 08, 2010 - Read this paper to see how Microsoft Office SharePoint Server (MOSS) brings together collaboration and document management in a way that is extremely easy for knowledge workers to learn and use.

 

Ashurst Australia Focuses on Domestic and International Growth by  IBM


March 31, 2013 - This exclusive case study reveals how the right analytics strategy enabled the law firm Ashurst Australia to address the challenges of business growth by analyzing business performance, identifying opportunities for improvement, and more.

 

Asigra Cloud backup Newsletter featuring Gartner Research for MSPs by  Asigra


August 23, 2011 - The introduction of smart phones has blurred the line between the professional and personal uses of IT. To stay in control of your organization's corporate data footprint – from desktops to laptops to mobile devices – organizations need to find a long term sustainable data protection strategy.

 

Ask Questions Until You Get the Right Answers and the Right Network by  Cisco Systems, Inc.


December 08, 2011 - Establishing a relationship with a trusted reseller can help you turn your network into something that matches your business and fulfills the specific needs of your organization.

 

ASOS: The boardroom view of IT by  ComputerWeekly.com


September 07, 2012 - Nick Beighton , CFO of the online fashion retailer ASOS.com, draws on his experience in both IT and finance to offer tips to CIOs on building credibility with the board of directors.

 

Assemble Your Information with IBM Cognos Enterprise by  IBM


November 08, 2013 - The following webcast depicts the best way to sift through your data to find the most relevant and actionable insight. Discover the importance of mining intelligence from data and what you can do to take advantage of this ability to help drive your business forward.

 

Assess IT as a service : Enterprise Cloud Services–Virtual Private Cloud, Proof of Concept by  Hewlett-Packard Limited


August 16, 2012 - Read this white paper to learn how you can test out enterprise cloud services – specifically the virtual private cloud – and see how it performs in conjunction with your current systems.

 

Assess Virtualization Security Risk in Six Simple Steps by  Intel


August 19, 2011 - There are several critical issues every security pro must consider when evaluating risk in virtual environments. This expert tip provides six simple steps to perform a virtualization security risk assessment and highlights key points to ease security integration as your virtualization project comes together.

 

Assessing the benefits and costs of SQL Server Virtualization by  SearchSQLServer.com


June 19, 2013 - Virtualizing SQL Servers can be a costly venture. With the maturation of technology in recent years, though, it can mean increased productivity, and—overtime—less power consumption.

 

Assessing the Financial Impact of Downtime by  Vision Solutions


August 16, 2010 - This white paper will address the assessment of threats to your IT operations, inclusive of systems, applications, and data, and will guide you through the process of developing solid numbers around the potential costs they represent.

 

Assessing the TCO of Unified vs. Parallel Backup Solutions for Virtual Environments by  Symantec Corporation


February 28, 2013 - This white paper discusses what to look for in a virtualization protection solution and explores the features and benefits of both separate and unified solutions for protecting the virtual components of a modern infrastructure. Read on to discover the total cost of ownership of these two types of solutions and learn the ins and outs of each.

 

Assessing the Total Cost of Ownership for BI by  LogiXML


January 31, 2012 - This report provides mid-market organizations a framework for evaluating the total cost of ownership (TCO) of business intelligence (BI) solutions.

 

Assessing the Value of Cloud Security Threat Intelligence Services by  Hewlett-Packard Company


April 24, 2013 - This expert E-Guide deep dives into what a global threat intelligence service is, how well the services perform and if they are worth the investment. Read on to learn more.

 

Assessing the Value of Next-Generation Firewalls (Gov) by  Dell Software


March 24, 2014 - This white paper describes the different types of network-based attacks and how they can affect your bottom line. Click through for recommendations on which security tools can help you prevent these threats.

 

Assessing VMware View's Full Value by  VMware, Inc.


May 02, 2011 - Many enterprises utilize virtualization to support desktop workloads, improve data security, enable thin clients, and simplify data backup. However, there are challenges and obstacles associated with desktop virtualization that can hinder these benefits. Learn the necessary steps to avoid and overcome these common pitfalls.

 

Assessing Your Cloud Backup Opportunity: A guide to addressing 7 key questions about your customers by  Asigra


December 30, 2011 - <p>This resource details seven questions and discussion points you should consider before integrating cloud backup into your service offerings. </p>

 

Assessing your IT infrastructure for desktop virtualization by  F5 Networks


November 17, 2011 - Virtual desktops can help your organization reduce costs and centralized applications. But to reap its benefits, your IT infrastructure must be able to fully support VDI, otherwise, you'll run into performance and stability issues. Learn best practices and how to avoid these VDI pitfalls in this e-guide.

 

Asset and service management solutions to manage government assets by  IBM


April 15, 2011 - Read this brochure and find out how IBM Maximo Asset Management helps government agencies address accountability with asset optimization.

 

Asset Management to Support Product Lifecycle Management by  IBM


October 01, 2009 - Leading-edge manufacturers are discovering that they can improve production efficiencies and manage MRO expenditures by integrating their Product Lifecycle Management (PLM) with Enterprise Asset Management (EAM) systems.

 

Asset Management to Support Product Lifecycle Management (PLM) by  IBM


December 07, 2010 - Many manufacturers are already using Product Lifecycle Management (PLM) technology to design products, test them and automate their production. This same technology can be integrated with Enterprise Asset Management (EAM) solutions, like IBM’s Maximo® Asset Management to manage manufacturing assets involved in production.

 

Asset Management: Improve Efficiency and Asset Lifecycle with Mobility by  Motorola RFID Solutions


November 30, 2007 - Whether you need to scan bar codes or read RFID tags on boxes of office supplies, Motorola's mobile asset management solutions enable the easy, accurate and cost effective tracking of asset location and status-- with minimal administrative effort.

 

Asset: Healthcare 2015 and U.S. Health Plans New Roles, New Competencies by  IBM Line of Business


February 01, 2008 - The U.S. healthcare system is on an unsustainable path that will force its transformation.

 

Assortment Optimization for Retail: Where Science Meets Analytics by  IBM


August 31, 2012 - Retailers face the huge challenge of offering customers a wide variety of products, while avoiding diminished returns and keeping store operating costs in check. To answer the question "how much variety is enough?" savvy retail organizations must develop solid strategic planning initiatives.

 

Assuaging Concerns about Public Cloud Services And APM: Expert Roadmap by  XO Communications


January 21, 2014 - In this e-guide, cloud networking expert Amy Larsen DiCarlo shares her insight on the public cloud, with emphasis on use cases, common concerns, and how to choose the right provider. Click through to also find 5 FAQs about network-based application performance management (APM) to ensure your business stays up-to-speed.

 

Assured Federated Records Management - Achieving Compliance across the Enterprise by  EMC Corporation


March 12, 2008 - Compliance is now a major issue for organizations and they're beginning to rethink their records management strategies. Read this white paper to learn about a records management solution that effectively addresses all of the needs required for this task.

 

Assuring Asset Documentation Integrity by  McLaren Software


February 01, 2008 - In this whitepaper, we will discuss best practices for assuring the integrity of your asset documentation.

 

Assuring Enterprise-Quality Agile Development by  HP Software


August 15, 2011 - This white paper provides an overview of the advantages of hybridizing agile development methods with the QA lessons learned from previous methods. Learn how this strategy provides the best of both worlds for developing flexible, secure software products.

 

Assuring Next Generation Backhaul Deployments with Performance Visibility by  InfoVista Corporation


November 22, 2011 - Read this whitepaper to discover the challenges Wireless SPs have in managing Carrier Ethernet-powered backhaul networks and how they can achieve operational excellence.

 

Assuring Regulatory Compliance in Your Mainframe Environment by  IBM


June 01, 2008 - In this webcast you will get an over of the regulatory context and the issues compliance raises for the IBM mainframe environment.

 

Assuring Software Security Through Testing by  (ISC)2 UK Ltd


February 25, 2014 - This white paper offers key recommendations for software developers to test for quality and security assurance before releasing products to the market.

 

AstraZeneca: Success Story by  SuccessFactors


April 27, 2012 - AstraZeneca was looking for a way to automate its manual duty assignment and logging training processes. Read this case study to learn how they accomplished this by implementing a learning management system to automate and streamline the assignment of all regulatory and job-specific training.

 

AT&T and IBM's Private Cloud Partnership:  From Competition to Coopetition by  IBM


November 30, 2012 - Access this Frost & Sullivan report for key findings on how the joint program between cloud and network providers will affect the individual providers, as well as the customers.

 

AT&T Brings Consumers Closer to Their Favorite Musicians with Red Light Management by  AT&T Corp


November 02, 2011 - This brief white paper examines the business benefits associated with promotional marketing campaigns aimed at barcode scanning via consumer mobile devices.

 

AT&T Global Network Client: Providing Secure Remote Access with the AT&T Global Network Client by  AT&T Corp


October 24, 2011 - The AT&T Global Network Client provides secure remote network access anywhere, at any time.

 

AT&T Global Network Pandemic Preparedness by  AT&T Corp


February 07, 2007 - Having a business continuity plan in place is crucial to surviving an unforeseen catastrophic event. This white paper details some important concerns and suggestions for making sure your enterprise's critical operations can withstand a crisis.

 

AT&T Mobile Remote Access Services by  AT&T Corp


October 21, 2011 - AT&T's Mobile Remote Access Services provides flexible, highly secure access to corporate assets for all users.

 

AT&T MPLS: The Platform for your Apps by  AT&T Corp


August 05, 2010 - Watch this video to learn how to maximize the capabilities of your MPLS Network. This is the first in a series of videos that will help you understand how to make your VPN more efficient.

 

AT&T Network-based IP VPN Remote Access (ANIRA) by  AT&T Corp


October 24, 2011 - AT&T Network-based IP VPN Remote Access (ANIRA) offers remote users and traveling users access to corporate information & productivity applications on the fly, whether away from or within the office.

 

AT&T Virtual Tunneling Service by  AT&T Corp


October 24, 2011 - AT&T's virtual tunneling service (AVTS) offers reliable connectivity over different access methods, including simultaneous access to the Internet with user-friendly client software that provides seamless access to your enterprise applications.

 

AT&T Business Continuity Survey: 2008 by  AT&T Corp


September 01, 2008 - The goal of this business continuity survey was to learn what these executives were doing about business continuity, and how it figured in their overall IT strategy.

 

At-a-Glance: Cisco Regional WAN Solution Overview by  Cisco Systems, Inc.


July 11, 2012 - Read this white paper to learn how to upgrade your enterprise networking solution to deliver exciting new services such as cloud computing, virtual desktops, videoconferencing, and more to your remote branch-office environments in a secure, highly scalable, tightly integrated manner.

 

Atrion Enhances Managed Services and Boosts Profit Margins with Nimsoft by  Nimsoft, Inc.


November 04, 2009 - Atrium needed help gaining end-to-end service level monitoring insights and finding a monitoring platform with a strategic vendor partnership that could help support business growth objectives. Read this case study to learn about the problems Atrion faced and how Nimsoft products helped them overcome those challenges.

 

Attachmate Customer Story: National Bank of Abu Dhabi Secures Data in Transit by  Attachmate Corporation


March 30, 2012 - This case study explores how the National Bank of Abu Dhabi ensures their data in transit remains safe and meets all security and compliance regulations with the help of a managed file transfer (MFT) solution. View now to learn more!

 

Attachment Spam - The Latest Trend by  GFI Software


March 18, 2008 - This white paper explains what makes spam such an unbearable problem and how spamming tactics are evolving daily to beat anti-spam software.

 

Attack Mitigation System by  Radware


October 10, 2011 - Radware’s Attack Mitigation System (AMS) is a real-time network and application attack mitigation solution that protects the application infrastructure against network and application downtime, application vulnerability exploitation, malware spread, information theft, web service attacks and web defacement. View now to learn more.

 

Attack of the PDF Documents: How Adobe’s PDF Format has become one of the top carriers of malware by  Sophos, Inc.


April 11, 2011 - Since PDF has become so common on the Internet, with nearly every business using it as the document format of choice for delivering forms, articles, and whitepapers, the security problems and malware potential of PDF are far too tempting for the bad guys to ignore.

 

Attacks on Point of Sales Systems by  Symantec Corporation


March 11, 2014 - Identity theft is one of the most common forms of cybercrime, and your Point of Sale (POS) system is especially vulnerable to this attack type. This in-depth guide explores how cybercriminals use malware to steal credit card information at the POS.

 

Audit Tracking & SOX Compliance by  RevSoft


September 01, 2008 - Read this whitepaper to learn how using Audit Tracking will give you greater SOX compliance. Rev Scheduler has built in audit facility and which allows for greater SOX compliance as all job definitions are audited and tracked.

 

Audits, Compliance and Security: ITPros share their experience by  Dell, Inc.


March 07, 2014 - This whitepaper talks about a solution that allows users to better track and audit malicious or unintentional changes to their Windows environment. It gives interviews with users from various industries to see how the solution worked for them.

 

Augmenting the Value of ERP to Achieve the Perfect Plant by  Apriso Corporation


September 10, 2008 - This paper reviews multiple compelling issues of establishing and maintaining connectivity to manufacturing operations to achieve the Perfect Plant through an existing ERP system.

 

Augmenting the Value of ERP with an Operations Execution System by  Apriso Corporation


June 01, 2008 - This white paper reviews the history behind ERP deployments and why today's business requirements necessitate direct, real time integration between corporate planning applications and the shop floor.

 

August Issue of Information Security magazine: On the Lookout: Countering modern threats requires hunting intruders by  Information Security Magazine


August 08, 2011 - This month's Information Security Magazine Online cover story highlights the concern surrounding self-defending networks and explores a new approach to network security – CTOps. Also, learn how to uncover hidden opportunities that could be lurking in your overflow of data and gain an indepth look of the biggest IT giants in today's security market.

 

August Technical Guide on Authentication by  SearchSecurity.com


August 06, 2012 - This white paper can help you discover why attackers can target the token vendor to take advantage of the security of the authentication system as a whole and how you can replace the ubiquitous authenticator in your business.

 

August 2011 SharePoint eZine: PRACTICAL IT STRATEGIES FOR ENTERPRISE COLLABORATION by  SearchContentManagement


June 30, 2011 - In this edition of our quarterly SharePoint e-zine, you'll find expert advice on setting up a successful SharePoint 2010 programs, avoiding user-adoption problems and using the latest administrative features to wrangle good performance.

 

Aungate Policy Management by  ZANTAZ


December 01, 2007 - Aungate Real-Time Policy Management technology automatically evaluates documents for their fiscal, legal, operational and historic value.

 

Aungate Real Time Monitoring by  ZANTAZ


December 01, 2007 - Aungate's Policy Management module sets a new benchmark in enterprise communication and regulatory monitoring.

 

Austbreak Improves Total Cost of Ownership with SYSPRO by  SYSPRO


December 31, 2013 - In this brief case study, learn how the Australia-based machinery manufacturer Austbreck eliminated operational challenges and improved the total cost of ownership by overhauling its ERP system.

 

Austin Energy – Implementing Effective BI and Data Warehousing in Weeks by  Infobright, Inc.


November 16, 2010 - This case study looks at how an Austin, TX energy company, Austin Energy, has incorporated business intelligence (BI) best practices to achieve effective data warehousing in a matter of weeks.

 

Australian consulting firm meets strong growth demands by  Dell, Inc.


October 31, 2012 - In this brief case study, you will discover how an Australia-based international consulting company supports its high virtualized environment and increases volumes of data generated through consultancy projects and replace their aging SAN.

 

Australian document process outsourcing firm realizes benefits of virtualization by  Dell and VMware


November 29, 2012 - This white paper presents a key case study of how Speedscan consolidated their disparate physical infrastructures within a single virtualized data center to improve energy efficiency by 92%.

 

Australian document process outsourcing firm realizes benefits of virtualization by  Dell, Inc.


November 30, 2012 - This short case study reveals how one company easily and affordably deployed a next-generation infrastructure connected to a storage system that keeps pace with all of their needs.

 

Authentication in the Enterprise: Current and Changing Requirements by  PistolStar, Inc.


August 25, 2009 - This white paper discusses the current state of authentication and trends that Osterman Research sees as shaping the future of authentication.

 

Authentication Management: Ensuring Security for Remote Workers by  RSA, The Security Division of EMC


December 31, 2013 - This guide explores one company's authorization management tool and how it can enable secure access to employees working from home or other off-site locations.

 

Author and deploy rules using WebSphere Decision Management by  IBM


July 07, 2011 - Learn how the WebSphere ILOG Business Rules Management System (BRMS) can automate decision making for data validation, eligibility and pricing. This demo uses an insurance industry scenario to show how the WebSphere ILOG BRMS can be used by organizations.

 

Author and deploy rules using WebSphere ILOG JRules Business Rules Management System by  IBM


December 12, 2010 - Learn how the WebSphere ILOG JRules BRMS can automate decision making for data validation, eligibility and pricing in a real-world scenario. This demo shows how JRules BRMS allows organizations to gain a competitive advantage by adapting business systems to evolve with changing business policies and decisions.

 

Authoring reports with Cognos Business Intelligence by  IBM


November 06, 2013 - The following white paper discusses how a new technology has effectively eliminated the challenges associated with report authoring and what you can do to satisfy the need of your company to maintain and communicate the best reports possible.

 

Authoritative Guide to Advanced LTE Testing by  Ixia


March 06, 2014 - Find out how to measure the critical elements of network performance under real-world conditions and extreme scale in order to take the guesswork out of determining network quality.

 

Auto-Snapshot Manager/ VMware® Edition: Automated, Integrated, And Scalable Protection Of Virtual Machines by  Dell, Inc.


November 10, 2008 - Auto-Snapshot Manager/VMware Edition (ASM/VE) is a unique and innovative data protection feature of the Dell EqualLogic™ PS Series iSCSI SAN that enables fast online backups and quick restores of VMware virtual machines and VMFS file systems.

 

Auto-Snapshot Manager/ VMware® Edition: Automated, Integrated, And Scalable Protection Of Virtual Machines by  Dell | EqualLogic


November 01, 2008 - Auto-Snapshot Manager/VMware Edition (ASM/VE) is a unique and innovative data protection feature of the Dell EqualLogic™ PS Series iSCSI SAN that enables fast online backups and quick restores of VMware virtual machines and VMFS file systems.

 

Auto-Snapshot Manager/Microsoft Edition for Hyper-V by  Dell, Inc.


March 25, 2009 - Dell's Auto-Snapshot Manager / Microsoft Edition is an innovative bundled data protection feature of the Dell EqualLogic PS Series iSCSI SAN. It's designed to help deliver high-performance, redundant, highly-available storage platforms for Hyper-V deployments - supporting departmental to mission-critical Windows server applications.

 

Auto-Snapshot Manager/Vmware Edition Automated, Integrated, and Scalable Protection of Virtual Machines by  Dell, Inc.


June 24, 2009 - This paper will discuss High performance, space-efficient hypervisor-aware SAN-based snapshot and replication support, backup and recovery, IT infrastructure, as well as virtual security.

 

Auto-Snapshot Manager/VMware Edition in Action by  Dell, Inc.


September 01, 2008 - Auto-Snapshot Manager/VMware Edition is a new feature of the Dell EqualLogic PS Series iSCSI SAN that enables fast online backup and quick restores of Virtual Machines.

 

Auto-Snapshot Manager/VMware® Edition: Automated, Integrated, and Scalable Protection of Virtual Machines by  Dell, Inc.


September 01, 2008 - Auto-Snapshot Manager/VMware Edition (ASM/VE) is a unique and innovative data protection feature of the Dell EqualLogic™ PS Series iSCSI SAN that enables fast online backups and quick restores of VMware virtual machines.

 

Automate Fax and E-mail Orders into Your SAP Systems by  Esker Inc.


July 10, 2013 - If your company is looking to overcome the challenges of fax and e-mail customer orders while gaining the efficiencies of automated, electronic processing of transactions into your SAP system, then read this white paper as it outlines essential factors you must consider first.

 

Automate Orders and Invoices for Increased Business Efficiency by  Esker Inc.


August 22, 2013 - Check out this informative resource to learn how driving automation into every aspect of your business processes can create even more value from the SAP® Business One system. You'll learn how one such automation technology streamlines your current processes and optimizes ROI.

 

Automate Spending Controls for Big Savings, a Case Study by  ExpenseWatch.com


February 01, 2008 - In this case study, learn how one company automated company expense reporting, saving thousands of dollars a year and accelerating the review and approval process.

 

Automate Storage Tiering Simply and Efficiently with Dell EqualLogic PS Series Virtualized iSCSI SANs by  Dell, Inc.


December 01, 2011 - Tiered storage is a smart storage solution that directs application workloads to a specific storage location (or "tier") based on performance and cost characteristics. This white paper provides an introduction to tiered storage; learn exactly how tiered storage functions, and how to determine which data should be sent to which tier.

 

Automate storage tiering simply and efficiently with Dell EqualLogic PS Series virtualized iSCSI SANs by  Dell, Inc.


August 03, 2010 - Automated Storage Tiering features provided standard on Dell™ EqualLogic™ PS Series SANs are designed to help organizations to reduce costs, improve performance, optimize SAN storage, and much more. Read this solution brief to learn more about the features and business benefits.

 

Automate to Thrive: Driving Business Agility with Effective Release Management by  SERENA Software, Inc.


April 03, 2012 - This white paper gives an overview of the challenges release management presents, three tips for improving your software release strategies, and insight on how effective release management is poised to become a driver of competitive advantage.

 

Automate Your Business Processes with the Digital Mailroom by  Kofax, Inc.


December 31, 2013 - Check out this exclusive white paper to uncover the tool capable of transforming documentation reception and processing into a more efficient "digital mailroom", so you can improve customer service, reduce costs and more.

 

Automate Your Cloud-based Services: HP Business Cloud for SAP Landscape by  HP & Intel®


December 20, 2010 - Enterprises depend on SAP applications to support their mission-critical business processes today more than ever before. Read this solution brief to discover how your organization can take advantage of the speed, agility and unsurpassed automation of cloud-based services.

 

Automated Business Intelligence: Delivering Real Business Value, Quickly, Easily, and Affordably by  Birst


June 19, 2009 - This White Paper explores how traditional approaches fall short, what the automated solution and its benefits look like, how the on-demand delivery model best represents the integrated stack necessary for automation, and how the automated, on-demand model brings the benefits of BI to a far broader audience than ever before.

 

Automated Compliance: Making the Case and Reaping the Rewards by  Tripwire, Inc.


March 30, 2009 - Regulatory compliance is a priority that never goes away for banking institutions. In this podcast, learn about the core competencies of regulatory compliance and the regulatory compliance trends to watch for in 2009.

 

Automated Data Backup: Protect Distributed Data with a Robust, Security-Rich Backup and Recovery System by  IBM


August 04, 2011 - Your business depends on consistent access to vital data. Without an automated data backup system, your organization can be vulnerable if your storage systems are compromised. This data sheet discusses how IBM can help with a professionally managed, cloud-based data protection service.

 

Automated Disaster Recovery with VMware SRM and Dell EqualLogic iSCSI SANs by  Dell, Inc.


September 01, 2008 - Dell EqualLogic™ PS Series arrays and VMware® Site Recovery Manager (SRM) software provide integrated, cost-effective, automated site recovery and testing for enterprise data centers.

 

Automated Energy Efficiency for the Intelligent Business by  Intel Corporation


April 20, 2009 - By replacing aging single-core processor-based servers with new, more energy-efficient servers, you can gain capacity to grow and to increase IT performance using fewer servers. The estimated cost savings from energy and other operating cost efficiencies can pay for new servers in a an estimated 8 months.

 

Automated Energy Efficiency for the Intelligent Business - Intel® Xeon® Processor 5500 Series Delivers Energy Efficiency Without Compromising Performance by  Insight & Intel


October 06, 2009 - The Intel Xeon processor 5500 series with Intel® Intelligent Power Technology, delivers up to 50 percent lower idle power. By replacing aging single-core processor-based servers with new, more energy-efficient servers, you can gain capacity to grow and to increase IT performance using fewer servers.

 

Automated Invoice Processing into Oracle E-Business Suite by  ReadSoft


August 19, 2009 - Document automation will add to the company's bottom line, save time, better business processes, and increased control. This paper will demonstrate how to automate the AP process within Oracle E-Business Suite, and what type of investment will need to be made and what kind of benefits can be expected.

 

Automated Life-Cycle Management: A Critical Enabler for Cloud-Ready Datacenters by  IBM


May 01, 2013 - This whitepaper explores the role that standards, automation, orchestration and advanced analytics play in optimizing the full datacenter operations life cycle across today’s dynamic datacenter environments.

 

Automated Log Analytics Critical For Security and Compliance Management by  VMware, Inc.


June 01, 2013 - Access this resource to uncover a new category of log analytics tools to accommodate the trend in virtual and cloud infrastructures for efficient troubleshooting, security, and compliance management.

 

Automated Log Management for Hybrid Cloud Environments by  VMware, Inc.


May 13, 2013 - In this white paper, discover a log management tool that addresses the needs of today's dynamic environment by providing quality of service, operational efficiency, and compliance features for optimum infrastructure and application service levels.

 

Automated Network Lifecycle Management-- Unifying Fault, Performance, and Configuration Management to Increase Uptime, Reduce Costs, and Minimize Human Error by  Hewlett-Packard Company


December 12, 2008 - Learn about the benefits of state-of-the-art network fault management, performance management, and configuration management systems and the integration that brings them together.

 

Automated Sales Order Processing with SAP Solutions by  Esker Inc.


February 27, 2008 - Don't miss this opportunity to see how document process automation for customer orders can help your company improve key performance indicators.

 

Automated SAN Storage Tiering: Four Use Cases by  Dell, Inc.


August 24, 2010 - Check out this webcast to learn how SAN tiering can improve both performance and efficiency and how Dell's PS Series' intelligent, virtualized storage technologies can help simplify tiering design, implementation and management.

 

Automated Storage Optimization for z/OS Mainframes by  CA Technologies.


February 11, 2010 - Unifying and optimizing mainframe storage management practices under a single storage resource management (SRM) system delivers reductions in cost and administrative complexity. Read this paper to learn more about the benefits of the CA Automated Storage Optimization Mainframe Suite.

 

Automated Storage Optimization for z/OS Mainframes by  CA Technologies.


August 01, 2007 - In this paper learn about how the CA Automated Storage Optimization Mainframe Suite is flexible and modular so there is no need to "rip and replace" as processes, applications and users are added while the value of information evolves.

 

Automated Tiered Storage Claims its Space in the Storage Market by  Dell Compellent


October 03, 2011 - This SearchStorage.com E-Guide outlines how vendors are implementing this technology, and in particular what automated tiered storage approach they’re taking for solid-state drive.

 

Automated Tiered Storage: Tracking a Page by  Dell, Inc.


March 02, 2012 - Automated tiered storage and continuous snapshot technologies bring storage efficiency and performance to a new level. Watch now to see how combining the two features optimizes data placement and hear best practices for configuring tiering profiles and snapshot schedules for long-term results.

 

Automated, centralized management for enterprise servers by  IBM


August 28, 2013 - As today’s workforce becomes increasingly distributed, effective endpoint management is becoming critical, and IT needs visibility into disparate endpoints in order to handle whatever problems might arise without causing major disruption. This exclusive paper examines an IBM endpoint manager solution.

 

Automated, Repeatable Testing with TestPartner by  Compuware Corporation


June 01, 2004 - TestPartner is an automated testing tool that accelerates the functional testing of business-critical applications. With TestPartner, you can validate your applications before going live.

 

Automated, Standardized, and Private Cloud Management by  Novell, Inc.


October 21, 2010 - This iView describes the types of operational changes IT teams need to make in order to benefit from the promise of private-cloud architectures, and identifies a key set of capabilities and attributes to look for when considering management tools to help implement, automate, and operate these environments.

 

Automatic Failover for DR 101: Who Needs It and How It Works by  FalconStor Software


July 29, 2011 - In this presentation transcript, Andrew Burton, senior editor of SearchDisasterRecovery.com and Jeff Boles, senior analyst with the Taneja Group, discuss who should consider automatic failover, the vendors that offer products in this space, how the technology works, and the challenges associated with automatic failover.

 

Automatic Load Balancing Relieves Administrative Burden by  Dell, Inc.


December 01, 2008 - Storage consolidation enables organizations to improve operational efficiency, reduce costs, and simplify management. But how does an organization ensure that consolidation does not cause performance issues? To avoid performance utilization problems administrators should provision storage so that loads are balanced across resources evenly.

 

Automatically Dictate Progress Notes Directly into the EHR by  Nuance


December 31, 2013 - This white paper features a solution that allows clinicians to dictate their progress notes, which are later sent to the EHR, to eliminate incomprehensive and inaccuracies from handwritten notes.

 

Automating a Unified Physical Infrastructure by  Panduit


August 20, 2010 - Read our fourth newsletter featuring research from Gartner to learn how to support business requirements and customer demands in the datacenter while reducing capital and operational expenses.

 

Automating business processes in Oracle environments by  UC4 Software, Inc


November 09, 2011 - In this latter part of a two-part e-guide series, readers will discover how batch jobs are connected to business processes, and will examine business process automation in Oracle-specific environments. In addition, find out when batch is appropriate for managing business processes, and when a more manual approach might work best.

 

Automating Closed-Loop Marketing by  Neolane Inc.


October 14, 2008 - Aberdeen research reveals closed-loop marketing practices and processes are fundamental drivers of superior performance for Best-in-Class companies; making closed-loop marketing as important today as it ever was in the past.

 

Automating Complete PO Document Packages by  Esker Inc.


July 01, 2008 - Esker DeliveryWare offers a comprehensive solution that streamlines document processes by eliminating inefficient steps, automating information exchange regardless of source or delivery type.

 

Automating DBA Processes for Microsoft SQL Server by  Dell Software


June 22, 2011 - At a recent PASS Summit, SQL Server experts discussed best practices for automating database administration processes and activities. This Quest white paper highlights the discussion’s best parts

 

Automating Extended Business Processes by  SAP America, Inc.


April 12, 2010 - Download now to learn the degree to which extended processes have been automated throughout the enterprise; business behaviors and efficacy associated with automating ad-hoc and paper-based business processes and benefits that have been derived from automating manual business processes.

 

Automating Fax and Email Orders into SAP to Complete Your E-Vision by  Esker Inc.


December 20, 2010 - This paper gives an overview of key considerations for implementing a solution to automate fax and email orders into your SAP system. Highlighting the advantages of an all-in-one platform approach vs. maintaining a mix of different applications, this paper outlines how to eliminate the time, cost and errors of manual order processing.

 

Automating Group Policy Management by  SDM Software


March 01, 2008 - Group policy objects (GPOs) are used to secure and lockdown your Windows environment. Learn how you can ensure that GPOs are available, manageable and automated.

 

Automating High Volume Delivery of financial Document and Reducing Costs with Fax Over IP (FoIP) by  OpenText


October 26, 2010 - This case study explains how Graydon turned to Open Text to replace their manual and outdated methods with automated fax over IP. Read on to learn how Graydon implemented Open Text Fax Server, RightFax Edition. Continue reading to learn more about the benefits they experienced by switching to Open Text.

 

Automating Inbound and Outbound Document Processes for Additional ERP Value with Your SAP Solution by  Esker Inc.


April 01, 2008 - Learn about a document delivery platform for SAP solutions that will help automate inbound and outbound documents for the enterprise.

 

Automating Incentive Compensation: Increase Productivity and Reduce Costs by  Varicent Software Incorporated


June 21, 2012 - Read this white paper to learn what your options are when it comes to automated incentive compensation and how you can make it faster, more accurate, and easier than ever before.

 

Automating Industrial Supply Chains by  Intermec


March 04, 2009 - Read this white paper to learn what total automation can do for an industrial/manufacturing enterprise, how it can dramatically improve operations by providing real-time data to all the interdependent parts of the supply chain.

 

Automating IT Configuration Controls with Oracle Enterprise Manager Configuration Change Console by  Oracle Corporation


October 16, 2008 - This whitepaper discusses how to define, track and enforce IT policies; automate IT compliance processes; and reduce the effort and cost of managing business applications.

 

Automating IT Security Audits to Demonstrate Compliance and Protect Data by  NetIQ Europe


May 18, 2011 - This white paper will tell you why IT security auditing is so important, the problems with the current approach to it, and how this product can help you automate your IT security audits.

 

Automating IT Workloads to Accelerate the Delivery of a Business Driven Infrastructure by  CA Technologies.


April 01, 2009 - This white paper explores the role of workload automation in today's IT environments. Find out where many existing tools fall short as well as why an end-to-end process is recommended.

 

Automating IT Workloads to Accelerate the Delivery of a Business Driven Infrastructure by  CA Technologies.


April 01, 2009 - Read this paper to learn more about the benefits of workload automation, including shortened business delivery times, increased workload visibility and accuracy, and strengthened connection between business and IT.

 

Automating Job Card Generation for Maintenance, Repair and Overhaul by  Enigma, Inc.


March 01, 2008 - Manual job card generation processes significantly hamper maintenance efficiency and accuracy for A, B, C, and D checks alike, directly resulting in lost time, errors, and flight delays.

 

Automating Processes to Optimize a Windows 7 Deployment by  Dell, Inc. and Microsoft Windows 7


March 09, 2011 - IDC estimates that the average cost of deployment activities is $527 per PC, but can go as high as $700 or more depending on the time spent by IT staff and users. Reducing the cost of deployment will significantly reduce the total cost of ownership—especially in combination with cost-saving features in Microsoft Windows 7.

 

Automating Resource Monitoring with Robot/CONSOLE by  Help/Systems


April 28, 2010 - Using Robot/CONSOLE, we’ll show you how you can streamline your run book, eliminate manual tasks, and make your operations team more responsive to your critical business processes. Watch this FREE 30-minute Webcast and learn how Robot/CONSOLE can solve the headaches of resource monitoring.

 

Automating Sales Order Management with SaaS by  Esker Inc.


July 10, 2013 - Automated order management software can be expensive and complex to implement. Read this white paper to learn how leveraging SaaS for order processing automation can save you time and money.

 

Automating SAP System Copy by  UC4 Software, Inc


September 16, 2010 - This document explains how a considerable portion of the total process can be automated using the UC4 platform. This helps companies be more flexible, save time and money, while producing audit-compliant documentation

 

Automating Stimulus Fund Reporting: How New Technologies Simplify Federal Reporting by  SAP


November 19, 2009 - This paper explores the reporting challenges faced by organizations and examines the many benefits of automated U.S. American Recovery and Reinvestment Act (ARRA) reporting systems.

 

Automating System i Message and Resource Management by  Help/Systems


May 25, 2010 - Automated, centralized message control and resource monitoring can help you manage your System i more easily and with fewer staff. This white paper describes some of the tasks you’ll face, some tips to help you get started, and the benefits of automating your system management with Robot/CONSOLE.

 

Automating the SANS 20 Critical Security Controls by  Qualys


March 31, 2013 - This guide explores security automation and how you can ensure system security with 4 main strategies.

 

Automating User Provisioning: A User’s Perspective by  Oracle Corporation


April 12, 2011 - Catch this FREE webcast to find out how Educational Testing Service (ETS), a private nonprofit organization devoted to educational measurement and research, is leveraging Oracle Identity Manager to meet its user administration needs.

 

Automating Your Call Center Feedback by  Mindshare Technologies


March 05, 2008 - The most successful contact centers are turning to leading-edge automated feedback solutions and developing processes to incorporate feedback into daily operations.

 

Automating Your Code Review: Moving to a SaaS Model for Application Security by  Veracode, Inc.


February 10, 2009 - Today’s application has become the enterprise’s ‘‘new perimeter’’. With better network‐level security technology hardening the network perimeter, malicious attackers are now focusing their efforts to strike at the least defended points ‐ the application. Read on to learn about automating code review for greater application security.

 

Automating your Microsoft World: Application Efficiencies by  N-able Technologies


October 01, 2013 - Watch this exclusive video to learn how to leverage an automation manager tool to streamline the performance of key Microsoft applications.

 

Automating your Microsoft World: Operating System Efficiencies by  N-able Technologies


October 01, 2013 - This informative video examines how you can leverage an automation manager to automate your cloud efficiencies, allowing you to streamline your application performance and delivery.

 

Automating Your SOA Center of Excellence by  WebLayers


May 01, 2008 - This white paper discusses the steps necessary for implementing an effective SOA Center of Excellence. Explore how to automate and apply the appropriate levels of SOA governance.

 

Automation in Agile ALM: Interview with author Michael Hüttermann -- Part 1 by  IBM


November 07, 2011 - Automation is often touted as a key in successful application development efforts, but it comes in many different flavors. This tip guide describes the variety of automation techniques and benefits of using automation throughout the application development lifecycle.

 

Automation in ALM: The Changing World of Test, Thanks to Automation by  Hewlett-Packard Company


February 27, 2012 - Read this e-book to discover a series of expert articles covering: six tips for selecting automated test tools for Agile development; when it's appropriate to automate testing and best practices for implementation; the important role of automated UI testing in exploratory testing; and how automation is changing the role of the software tester.

 
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts