broad

Results 601 - 625 of 636Sort Results By: Published Date | Title | Company Name
By: iPass     Published Date: Feb 12, 2009
Unlike Wi-Fi access, 3G mobile broadband is available anywhere users have a mobile phone signal-from. From taxis, to trains, to remote stretches of road - your workforce will have access to critical data. If your company is even considering about deploying mobile broadband to its workforce, read this guide now!
Tags : wifi, wi-fi, ipass, mobile, broadband, security, workforce, wireless communications
     iPass
By: IBM     Published Date: Feb 02, 2009
Sign up for the webcast and you will learn: The strategic benefits of a robust information infrastructure for performance management, How to take immediate action if your operating reporting has data latency challenges, How to drive broader adoption in the business by addressing critical data challenges, Why the combination of IBM and Cognos, an IBM company, accelerates the delivery and quality of the information needed to drive business performance.
Tags : ibm, business optimization, performance management, cognos, robust information infrastructure, data latency, data quality challenges, data fragmentation
     IBM
By: IBM     Published Date: Jan 22, 2009
This white paper demonstrates a service quality management solution from IBM. An end-to-end, integrated approach, the service quality management solution is designed to address the broad range of telecommunications providers’ requirements for managing both service quality and the customer experience.
Tags : service quality management solution, ibm, telecomunications, service quality, customer experience, it management
     IBM
By: Aprimo, Inc.     Published Date: Dec 23, 2008
Planning & Financial Management addresses this broad business issue. Planning & Financial Management is one component within the Aprimo Suite. The entire suite is based on our Enterprise Marketing Backbone that reduces total cost of ownership and connects your marketing technology with the rest of the enterprise.
Tags : aprimo, financial management, financial planning, marketing technology, marketing spend, it management
     Aprimo, Inc.
By: Vocus, Inc     Published Date: Dec 16, 2008
Identify ways to increase rankings in search engines and drive traffic to your website.  Get tips to optimize your press releases for search engines—reach a broader audience, deliver your message & drive traffic to your website.
Tags : seo press release, seo press releases, optimized press release, vocus, search engine optimization
     Vocus, Inc
By: Infoblox     Published Date: Nov 11, 2008
In August 2008, Computerworld invited IT and business leaders to participate in a core network services survey, that included specific questions about their DNS infrastructures and the costs of IP address management. The survey was fielded via targeted broadcasts to Computerworld customers, as well as through an invitation on Computerworld.com. The survey was commissioned by Infoblox, but the data was gathered and tabulated independently by Computerworld Research. The following report represents top-line results of that survey.
Tags : network services survey, ip address management, infoblox, dns infrastructures, computerworld research
     Infoblox
By: Sparta Social Networks     Published Date: Oct 10, 2008
This case-study talks about how the Packet8 broadband voice over Internet protocol (VoIP) and video communications service which lets broadband Internet users add digital voice and video communications services to their high-speed Internet connection. Videophone users now account for almost 5 percent of Packet8’s 74,000 lines, and are one of several drivers in the company's quarterly growth, up 54 percent in the most period to $6 million in revenue. Download to learn more.
Tags : sparta, social network, packet8, internet protocol (voip)
     Sparta Social Networks
By: MessageLabs     Published Date: Sep 25, 2008
The Internet has proven to be a vital communications medium for worldwide commerce, but as an open and unprotected global network it can also present a wide range of threats that can cripple any business organization. Several years ago, most Internet threats were relatively benign examples of a young adolescent’s technical expertise but over time they have evolved into increasingly sophisticated domestic and foreign attacks that are designed to capture financial, personal, or strategic business information. Threats now come in the form of deliberately malicious acts, and exploitative opportunities for hackers and/or organized crime. The impact is serious, and the landscape of victims is getting broader every day. In response, no organization can afford to have its networks remain unprotected.
Tags : messagelabs, online threats, security, small & medium businesses, email spam, viruses, trojan horses, worms
     MessageLabs
By: iPass     Published Date: Aug 28, 2008
Read this whitepaper now to learn all about 4G. New technologies, benefits and features of 4G will all be discussed in this white paper. Read now if you are considering future 4G deployment and find out how iPass can help!
Tags : ipass, mobile, broadband, wimax, iptv, fourth-generation, ip-based architecture, ofdma
     iPass
By: IBM     Published Date: Aug 21, 2008
IT is becoming increasingly important in virtually every aspect of business. For enterprises to compete effectively in the marketplace, IT service management must broaden its focus and take a more holistic attitude toward IT service provision. The goal is to resolve the disconnect between IT and business within organizations in order to achieve necessary levels of resilience, control, availability and quality of service.
Tags : ibm, ibm mi, ibm grm, service management, it management, itil, itsm
     IBM
By: Signiant     Published Date: Aug 14, 2008
Never before has the Media and Entertainment (M&E) industry seen such rapid change in business models, adoption of digital technologies, and global, distributed, collaborative workflows. New business ventures, consolidation of terrestrial-based television stations, broadband penetration, time-to-market pressures, and shifting audience viewership are some of the ingredients that are contributing to the re-definitions that are taking place in the M&E industry.
Tags : signiant, digital media, supply chain, information management
     Signiant
By: Signiant Inc.     Published Date: Aug 14, 2008
Never before has the Media and Entertainment (M&E) industry seen such rapid change in business models, adoption of digital technologies, and global, distributed, collaborative workflows. New business ventures, consolidation of terrestrial-based television stations, broadband penetration, time-to-market pressures, and shifting audience viewership are some of the ingredients that are contributing to the re-definitions that are taking place in the M&E industry.
Tags : signiant, digital media, supply chain, information management
     Signiant Inc.
By: KEMP Technologies     Published Date: Aug 04, 2008
The Web experience is changing for consumers. While the National Retail Federation reports that over 90 percent of customers research products on the Web before purchasing, a single product photo and description is not enough to close the sale. Through broadband, with Flash and JPEG product images, retailers are providing information to potential customers which will improve the likelihood of closing the sale.
Tags : load balancer, load balancing, application delivery, ssl acceleration, application optimization, windows terminal services, terminal services, content switching
     KEMP Technologies
By: Exact Software     Published Date: Jun 22, 2008
Businesses, more than ever before, are relying on fact based decision-making and analytics to compete in this environment. This has given rise to "Business Intelligence," or simply BI, a broad category of applications and technologies for accessing, combining, computing and analyzing data to help enterprise users make better business decisions.
Tags : business intelligence, business analytics, analytical applications, make more money, exact america, exact software, exact, competitive
     Exact Software
By: Dell EqualLogic     Published Date: Jun 17, 2008
IT departments constantly face demands to deploy, maintain and grow a broad array of services and applications, but this has lead to server sprawl and high energy costs. Consolidation and containment solutions implemented with a virtual infrastructure meet the challenges of server sprawl and underutilization by reducing hardware and operating costs by as much as 50%.
Tags : infrastructure, server, server consolidation, servers, hardware, dell, equallogic
     Dell EqualLogic
By: VMware Dell     Published Date: Jun 05, 2008
IT departments constantly face demands to deploy, maintain and grow a broad array of services and applications, but this has lead to server sprawl and high energy costs. This brief discusses how VMware virtualization helps IT organizations increase utilization, lower energy costs, increase manageability and improve management of future growth.
Tags : servers, server consolidation, server virtualization, virtualization, virtual machine, vmware
     VMware Dell
By: BitGravity     Published Date: Apr 22, 2008
This white paper outlines the limitations of proxy cache networks, presents the attributes and benefits of an ideal solution, and suggests that BitGravity has designed a content delivery system that addresses the needs in marketplace at an affordable price.
Tags : cdn, cdns, content delivery, content delivery network, content delivery networks, akamai, limelight, panther express
     BitGravity
By: IBM     Published Date: Mar 28, 2008
In the beginning, an SOA-based approach was used for projects in individual departments, usually for those with high returns, short-term rewards, and relatively low risk, with typically a high degree of new development. But as the value of the SOA concept has become more apparent and its tools have grown in both scope and robustness, organizations are applying them more broadly, to organizational-size problems and mission critical issues, leveraging more and more existing code and production systems.
Tags : 
     IBM
By: CopiaTECH     Published Date: Mar 18, 2008
Words like “integrated” and “centralized” have been used to describe application software solutions for some years now, often because of marketing messaging that implies more interoperability than the given technology can actually provide to the business customer. The terms are broad enough to be almost meaningless in some instances. In the field of IT security, the sheer range of tools and techniques in the hacker or virus writer’s armory that one must guard against has driven up the number of solutions required to prevent attacks.
Tags : copiatech, security
     CopiaTECH
By: ProofSpace     Published Date: Mar 04, 2008
The ProofMark software solution is a broadly applicable system that operates on a computer, server, network, system, or infrastructure. This system utilizes public-key cryptography to create an irrefutable record of the time-existence and exact composition of any digital data. This document, the ProofMark System Concepts, Architecture, and Planning Guide, provides you with a broad technical overview of the ProofMark system.
Tags : public key, secure content, encryption, proofspace, proofmark
     ProofSpace
By: IBM     Published Date: Feb 25, 2008
Virtualization is no longer an “emerging” technology. Its potential to increase the efficiency of IT infrastructures has become widely recognized. But key questions are raised in the early stages of virtualization planning: should it be implemented only for new projects, or applied to existing infrastructures? Should opportunities be pursued on a case-by-case basis, or targeted as a broader goal of IT strategy?
Tags : server virtualization, servers, unix, linux, ibm
     IBM
By: Aveksa     Published Date: Feb 04, 2008
User access-related business risk comprises a broad array of potentially damaging events that may be caused or made possible by inadequate governance of access to an enterprise’s information assets. Such events range from relatively minor policy and compliance violations to disastrous business losses.  The stakes involved in access-related risk have risen dramatically in recent years as organizations have become thoroughly operationalized by technology.
Tags : access control, user access, access, permissions, risk, risk management, compliance, governance
     Aveksa
By: Supply Chain Connect     Published Date: Jan 24, 2008
Corning Cable Systems offers the broadest range of end-to-end fibre optic and copper product solutions for telecommunications networks. Corning wanted to improve their supply chain to reduce inventory levels (thereby adding to bottom line savings) and reduce overall administrative costs- all without expensive or time-consuming investments.
Tags : supply chain, scm, erp, collaborating, collaboration, collaborative commerce, communication, vendor communication
     Supply Chain Connect
By: mindSHIFT     Published Date: Nov 29, 2007
mindSHIFT has extended its service capabilities to include software-as-a-service as well as managed IT services, and is a "compelling solution" for small and medium-sized organizations seeking a strategic source to meet their IT and business needs.
Tags : saas, managed it, outsourcing, vendor selection, tco, voip, ip telephony, managed services
     mindSHIFT
By: Motorola     Published Date: Oct 30, 2007
For many wireless broadband network operators, the term "unlicensed reliability" is seen as an oxymoron. For many, the idea of building a high-speed network in the unlicensed band isn't a good one. A great deal has been said about crowded frequencies, self-interference and costly network rips. About how microwaving popcorn can cause interference. About disgruntled and perplexed customers. And ex-customers.
Tags : wireless, broadband, broadband spectrum, wireless infrastructure, wlan, wisp, cwisp, wimax
     Motorola
Start   Previous    12 13 14 15 16 17 18 19 20 21 22 23 24 25 26    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com