dam

Results 901 - 914 of 914Sort Results By: Published Date | Title | Company Name
By: BlueArc Corporation     Published Date: Apr 24, 2008
When people think of global warming and environmental damage caused by inefficient power consumption, computing may not instantly spring to mind as a culprit, but the computing industry takes a toll on the environment. Learn more about how your company can address both environmental and business initiatives in this white paper.
Tags : bluearc, green, energy efficient, energy, environmental, data center, business initiatives
     BlueArc Corporation
By: Extensis     Published Date: Apr 18, 2008
In 2006, Direct Wines Ltd identified a need for a solution that would manage the thousands of wine related images they had collected. The main use of the images, which range from images of wineries and wine makers to those of grapes, is inclusion in the company's direct mail campaigns and on the Direct Wines website.
Tags : extensis, direct wine, portfolio server, images, dam, solutions
     Extensis
By: AcquireWeb     Published Date: Apr 07, 2008
This article, published by Target Marketing in April 2008, examines principles and practices associated with acquisition e-mail, which also apply to CRM programs, that are often overlooked by marketers when building their e-mail strategies. These fundamentals serve as strategies to consider and employ to yield higher response rates and a more effective e-mail marketing effort.
Tags : acquireweb, acquisition email, email marketing, integrated marketing, e-mail, acquisition e-mail, lead generation, e-mail marketing, e-mail appending, acquirelocal, local marketing, local store marketing, restaurant marketing, franchise marketing, acquisition marketing
     AcquireWeb
By: Extensis     Published Date: Mar 07, 2008
The Photography Department at The National Gallery of London wanted to give other Gallery departments better visibility into its archived library of images and reduce the administrative workload for its photographers. Read how Portfolio Server and Portfolio SQL-Connect painted the perfect solution to this challenge.
Tags : extensis, portfolio server, sql, asa, dam, digital asset management
     Extensis
By: IBM     Published Date: Feb 08, 2008
Throughout the industrialized world, healthcare systems are in crisis. Aging populations and skyrocketing costs are putting unprecedented financial and organizational pressure on healthcare providers and payers. The result is often a decreasing level of care. In response, fundamental changes are taking place. Patient-centric systems are evolving in which the patient's well-being and the responsibility for good health are defining treatment and operational policies.
Tags : health, healthcare, medical, medical records, patient, patient records, hipaa, customer-centric, medicine, hospital, hospitals, ibm
     IBM
By: Aveksa     Published Date: Feb 04, 2008
User access-related business risk comprises a broad array of potentially damaging events that may be caused or made possible by inadequate governance of access to an enterprise’s information assets. Such events range from relatively minor policy and compliance violations to disastrous business losses.  The stakes involved in access-related risk have risen dramatically in recent years as organizations have become thoroughly operationalized by technology.
Tags : access control, user access, access, permissions, risk, risk management, compliance, governance, aveksa
     Aveksa
By: Tideway Systems     Published Date: Dec 11, 2007
Many firms are embarking on ambitious data center optimization projects to significantly reduce cost in hardware, maintenance, licensing, rack space, cooling and power – only to realize they are lacking fundamental data about their environment. Learn how you can accelerate and de-risk your data center optimization initiatives.
Tags : infrastructure, network management, configuration management, cms, cmml, cmdb, datacenter, data center, datacenters, tideway, tideway systems
     Tideway Systems
By: Trend Micro SaaS     Published Date: Dec 05, 2007
eSecurityToGo hat sich auf Sicherheitslösungen für kleine und mittlere Unternehmen (SMB) von heute spezialisiert. Einen großen Teil des Kundenstamms bilden andere IT-Berater, die das umfassende Fachwissen und die besonderen Schwerpunkte von eSecurityToGo zu schätzen wissen. Das Unternehmen ist Reseller der kompletten Produktpalette von Trend Micro Lösungen. Es sichert sich damit zufriedene Kunden, die sich auch in Zukunft für Trend Micro entscheiden.
Tags : gegensatz, unternehmen, esecuritytogo, interscan messaging, trend micro, smb
     Trend Micro SaaS
By: Quocirca     Published Date: Nov 13, 2007
Businesses across Europe are becoming increasingly reliant on web-enabled applications that are accessed over the public internet. One of the key drivers for this is to open up communications with external organizations that are fundamental to core business processes.
Tags : bpm, business process, web application, customer service, customer satisfaction, business management, order, order management, quocirca, it management, enterprise applications
     Quocirca
By: Quocirca     Published Date: Sep 13, 2007
A sound IT infrastructure is fundamental to today’s businesses and when that infrastructure fails the consequences can be far reaching. Whether it is business-to-business, business-to-consumer or public sector organizations serving citizens, applications and the services they drive increasingly need to be available all day, every day. Many organizations find it hard to achieve such service levels. This briefing looks at some possible solutions.
Tags : data center, datacenter, data centers, datacenters, data centre, data centres, infrastructure, mission critical, high availability, small business, smb, smbs, outsourcing networking, network management, symantec, quocirca
     Quocirca
By: Asentria Corporation     Published Date: Sep 04, 2007
More than ever before, IT managers need to secure equipment and facilities against a variety of intrusive conditions that could cripple critical operations, resulting in system malfunctions, loss of data or intellectual property, damage to mission critical hardware or even theft of valuable physical assets. Such conditions often include environmental events, failure of air conditioning systems, power outages, and untoward human actions.
Tags : telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures, fault management, network management, remote site monitoring, remote site alarms, environmental monitoring, network alarm monitoring, network alarm management, remote telemetry units, alarm management system, network management systems, network monitoring, protocol mediation
     Asentria Corporation
By: Secure Computing     Published Date: Feb 27, 2007
This industry white paper takes the mystery out of the key differences in the main classes of firewall architectures. It was independently written by Marcus J. Ranum, a world-renowned expert on security system design and implementation. It includes fundamental lessons about building application layer firewalls, technical examples, and concludes with predictions about the future of firewall technology.
Tags : security, firewalls, firewall, internet security, intrusion detection, intrusion prevention, application security, email security, network security, secure computing, securecomputing
     Secure Computing
By: Infor     Published Date: Feb 27, 2007
There's no place to hide and ride out the fundamental transformation underway in the automotive industry today. Ignore changes caused by this transformation and you risk your long-term survival. But with pains can come gains, and innovative automotive executives know there's a way to turn today's adversity into long-term business advantage.
Tags : supply chain management, productivity, enterprise resource planning, manufacturing, customer satisfaction, manufacturing, automotive, assembly line, infor
     Infor
By: 8e6 Technologies     Published Date: Jan 12, 2007
Add spyware to the list of urgent security concerns. With resources already stretched thin in fighting viruses and stopping spam, companies now also have to defend against a threat that strikes silently and does much of its damage before it’s even detected.
Tags : spyware, anti spyware, malware, vulnerability management, anti virus, virus, viruses, hipaa compliance, compliance, intrusion detection, 8e6, 8e6 technologies, security
     8e6 Technologies
Start   Previous    23 24 25 26 27 28 29 30 31 32 33 34 35 36 37     Next   End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com