tier

Results 501 - 525 of 529Sort Results By: Published Date | Title | Company Name
By: Savvis     Published Date: Jul 07, 2010
The cloud services market is now directly addressing the needs of application developers, with an emerging class of services that provides fast, on-demand provisioning; instant scale up and down capabilities, and support for multi-tier application architectures, as well as workload migration capabilities and a pay-as-you go model.
Tags : savvis, software development, cloud testing, application architecture, workload migration, saas, software-as-a-service, cloud computing, virtual data center
     Savvis
By: Savvis     Published Date: Jul 07, 2010
Savvis Symphony VPDC introduces one of the industry's first enterprise-grade Virtual Private Data Center (VPDC) solutions with multi-tiered security and service profiles.
Tags : savvis symphony, virtual private data center, vpdc, security, it infrastructure, outsourcing, cloud computing
     Savvis
By: Citrix Online     Published Date: Jul 01, 2010
This new smith+co white paper explores the importance of the customer experience and the role of technology in creating, nurturing and strengthening customer relationships with every single interaction.
Tags : citrix online tech, support center, customer experience management, contact center, crm
     Citrix Online
By: Neolane, Inc.     Published Date: May 27, 2010
Today's highly mobile and engaged economy rewards businesses that deliver relevant, timely, personalized customer interactions.
Tags : neolane, distributed marketing, glocal, mobile, customer experience, crm
     Neolane, Inc.
By: BlackBerry     Published Date: Apr 13, 2010
Equipping staff with the right tools can enhance productivity, motivation and staff retention. Highly secure mobile email and data applications help mobile workers stay in touch and up-to-date with a wide range of business issues. Extending that streamlined anytime, anywhere access to mobile voice applications is the next frontier in worker empowerment.
Tags : blackberry, fixed mobile convergence, fmc, pbxvoip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
     BlackBerry
By: Vertica     Published Date: Mar 15, 2010
Revenue assurance analysts at a top-tier US-based carrier studied this every day. Primarily focused on detecting fraud, revenue sharing contract violations and incomplete revenue collections, they had the need to query and analyze call detail record (CDR) databases that grow by millions of new CDRs every day.
Tags : vertica, ec2, cdr, elastic, saas, dbms, sql, acid transactions, jdbc, odbc, etl, cloud computing, data management, ad-hoc, business intelligence, cloud, cloudbased applications, analytic, saas, dbms
     Vertica
By: TopLayer     Published Date: Aug 21, 2009
Enterprises without a sound intrusion prevention strategy across the three threat dimensions - undesired access, malicious content, and rate-based attacks - open the door to unacceptable risks and costs, especially from hybrid attacks.
Tags : intrusion prevention, network security, ips, access control, hacker, top layer, toplayer, 3-d multi-layered, multi-tiered, multi tiered
     TopLayer
By: Astaro     Published Date: Aug 10, 2009
Frontier Nursing Services (FNS, Inc.) of Hyden, Kentucky provides health care to the underserved population in rural areas of southeast Kentucky and is committed to advancing nursing through education.
Tags : frontier nursing, astaro, cisco, barracuda, pix, fns, network, it department, management, reporting, all-in-one security, vpn, firewall, email, antivirus, gateway, report manager, security
     Astaro
By: SAP Inc.     Published Date: Jul 28, 2009
Learn how core corporate processes can help your company meet financial objectives and mitigate risk in troubled economic times.
Tags : sap, lean, lean enterprise, three-tierd, operations, lehman, costs, operations, shared services level, corporate level, division level, leadership, crisis management, corporate strategy, enterprise visibility, enterprise applications, governance, united pipe, benchmark, procurement
     SAP Inc.
By: BMC Control M     Published Date: Jul 22, 2009
L’automatisation de la charge de travail (Workload Automation ou WLA) est une version aboutie de la planification des tâches qui permet d’automatiser des traitements informatiques complexes et qui accepte des charges de travail basées sur des événements, des plates-formes multiples, des services Web, des applications composites, des architectures orientées services (SOA), des systèmes virtuels, l’intégration des systèmes et des applications, l’alignement des services métier, etc.
Tags : wla, ema, bmc control-m, soa
     BMC Control M
By: BMC Control M     Published Date: Jul 16, 2009
L’automatisation de la charge de travail (Workload Automation ou WLA) est une version aboutie de la planification des tâches qui permet d’automatiser des traitements informatiques complexes et qui accepte des charges de travail basées sur des événements, des plates-formes multiples, des services Web, des applications composites, des architectures orientées services (SOA), des systèmes virtuels, l’intégration des systèmes et des applications, l’alignement des services métier, etc.
Tags : wla, ema, bmc control-m, soa
     BMC Control M
By: HP Data Center     Published Date: Mar 25, 2009
To accommodate increasingly dense technology environments, increasingly critical business applications, and increasingly stringent service level demands, data centers are typically engineered to deliver the highest-affordable availability levels facility-wide. Within this monolithic design approach, the same levels of mechanical, electrical, and IT infrastructure are installed to support systems and applications regardless of their criticality or business risk if unplanned downtime occurs. Typically, high redundancy designs are deployed in order to provide for all eventualities. The result, in many instances, is to unnecessarily drive up both upfront construction or retro-fitting costs and ongoing operating expenses.
Tags : hp data center, hybrid data center, dense technology environments, hybrid data center, critical business applications, it infrastructure, high redundancy designs, pods, right sizes, computer networks and subsystems, uninterruptible power supplies, ups, telecommunications equipment, data center dilemma, total cost of ownership, tco, always-on applications, redundant mep, multi-tiered (pod), monolithic tier
     HP Data Center
By: InMage     Published Date: Feb 18, 2009
Replication has become a catchall phrase that while gaining in allure is also gaining in confusion – especially in the mid-tier where data is just as important as the high-end, but IT staffing and budgets are far more limited. IT people as well as vendors have a tendency to lump all data movement functions together as replication, regardless of the method or the reason.
Tags : inmage, esg, replication methodologies, replication applications, disaster recovery, recovery time objectives, rto, recovery point objectives, rpo, akamai model, remote backup consolidation, host based software, array based software, network based, hybrid methodologies, enterprise applications, data management
     InMage
By: F5 Networks Inc     Published Date: Jan 22, 2009
F5 and Data Domain have joined their respective solutions, forming a partnership designed to assist customers in deploying and realizing the benefits of tiered storage. By combining F5’s tiered storage policy engine with Data Domain deduplication storage systems, mutual customers can realize the benefits of deploying tiered storage and, importantly, see dramatic reductions in the costs of storage.
Tags : data domain, curb storage costs, file servers, tiered storage, deduplication storage systems, storage
     F5 Networks Inc
By: NetApp Backup & Recovery     Published Date: Dec 31, 2008
Download this exclusive report to learn how NetApp deduplication can be applied to all storage tiers, including primary application data.
Tags : netapp backup recovery, dedupication, data deduplication, raid, storage
     NetApp Backup & Recovery
By: HP - Enterprise     Published Date: Oct 16, 2008
The hacking community has shifted its effort toward a new frontier:  the application layer.  How are companies responding?  Business Software Assurance – the capability to address the problem of application risk within an enterprise.  This whitepaper provides an overview of the severity of the problem along with everything needed to develop Business Software Assurance in your organization. 
Tags : business risk, security, application security, audit, risk, vulnerabilities, fortify, fortify software, hackers, cyber threats, application security standards, threats, assessment, remediation
     HP - Enterprise
By: Oco, Inc.     Published Date: Jun 24, 2008
As a Services Executive are you struggling with questions regarding what to measure, how to effectively engage with your customers, and what information should be leveraged and shared with service-chain partners and customers? Leading edge organizations are making tools and data available to their suppliers and customers with aggregated information from multiple data systems. Service-chain partners and customer personnel can now see the same views of service performance and activity. This is the next frontier to creating customer "stickiness" and business growth.
Tags : business analytics, oco, service management, analytical applications, dashboard, analytic, growth, data management
     Oco, Inc.
By: IBM     Published Date: May 30, 2008
Not all data is created equal, however, and deriving business value from information dispersed over many different sources means integrating, analyzing and optimizing heterogeneous types and sources of information throughout its lifecycle. Find out how, when deployed together in the same environment, IBM TotalStorage Productivity Center, IBM System Storage SAN Volume Controller and IBM Tivoli Storage Manager deliver the core technologies need to help customers tier their storage based on classes of service.
Tags : information lifecycle, information management, tivoli, storage management, leveraging information, ibm, ibm li, li campaign, storage
     IBM
By: CA WA     Published Date: May 12, 2008
Emerging information technologies like composite and multi-tier applications, service oriented architectures (SOA), virtualization, grid and cluster computing, and Web Service-based application delivery create an extraordinary opportunity for IT managers. With these dynamic technologies, they can provide business owners with IT services that are extremely flexible and agile, driving a more dynamic and competitive business.
Tags : ca wa, workload automation, roi
     CA WA
By: BlueArc Corporation     Published Date: Apr 24, 2008
BlueArc’s Titan Architecture creates a revolutionary step in file servers by creating a hardware-based file system that can scale throughput, IOPS and capacity well beyond conventional software-based file servers. With its ability to virtualize a massive storage pool of up to 4 petabytes of usable, tiered storage, Titan can scale with growing data requirements and provide a competitive advantage for business processes by consolidating applications while ensuring optimal performance.
Tags : bluearc, storage, titan
     BlueArc Corporation
By: BlueArc Corporation     Published Date: Mar 31, 2008
The Titan 3000 family of high performance network storage hardware from BlueArc is yet another example of the company's innovative abilities, with enhanced and eye-popping capacity and performance specifications matched to its strong, familiar—and growing—feature and management capabilities. With perfect timing, it looks as if this product is a good match for emerging market needs.
Tags : tiered storage, storage, hardware, storage hardware, appliance, titan, titan 3000, bluearc
     BlueArc Corporation
By: BlueArc Corporation     Published Date: Mar 31, 2008
BlueArc’s Titan 3000 Series is designed to meet the requirements of today’s sophisticated enterprise data centers and vertical applications with new levels of storage performance, scalability and reliability. Titan is the first storage solution that consolidates and manages up to 4 petabytes of data in a single storage pool.
Tags : titan, tiered storage, storage, bluearc, storage system
     BlueArc Corporation
By: Pivotal CRM     Published Date: Dec 21, 2007
Most businesses today are under increasing pressure to respond to change expeditiously—to adapt to the ongoing needs and demands of their customers, the changing competitive landscape, and the evolution of the marketplace. An organization’s CRM system can either effectively support or hinder their business agility and capacity to respond to change, affecting overall corporate performance and customer satisfaction.
Tags : pivotal, crm, customer relationship management, sfa, sales force automation, salesforce, flexibility, architecture, technical architecture, 3-tier, three-tier, structure, integration, adaptability, customization, configuration, pivotal, pivotal crm, quinstreet
     Pivotal CRM
By: Pivotal CRM     Published Date: Dec 21, 2007
For more than a decade, Pivotal CRM has been the choice of Microsoft-centric organizations that want the flexibility to model their specific business practices within their customer relationship management system. The Pivotal CRM product line leverages the Microsoft technology stack to provide usability and productivity advantages through integration to Microsoft Office, and more.
Tags : pivotal, crm, customer relationship management, microsoft, partner, partnership, alliance, product, direction, sedna, 6.0, .net, web services, soa, service oriented arthitecture, architecture, tier, flexibility, usability, future
     Pivotal CRM
By: Trend Micro SaaS     Published Date: Dec 07, 2007
Um mit dem Wachstum Schritt zu halten und allen Schlern eine Umgebung zu bieten, in der sie optimal lernen und sich entfalten knnen, setzen die Shakopee-Schulen im Netzwerk eine vielschichtige Sicherheitslsung ein, die alle Standorte im Bezirk verbindet. Die IT-Abteilung muss stndig Funktionalitt und Kosten gegeneinander abwgen, um mit der Installation ein Hchstma an Qualitt und Nutzen zu gewhrleisten.
Tags : trend micro, schutz, kosten-nutzen, shakopee-schulbezirks, funktionalitt, interscan, officescan, pc-cillin, control manager
     Trend Micro SaaS
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com