app data

Results 2476 - 2500 of 2530Sort Results By: Published Date | Title | Company Name
By: HP     Published Date: Jun 23, 2008
HP is increasingly demonstrating that its vision includes positioning itself as an innovator at the high end especially with respect to managing heterogeneous storage assets. HP appears to be a leading proponent of avoiding dreams of owning the entire data center storage infrastructure. Rather its aim appears to add customer value by recognizing and accommodating the diversity of installed storage assets at customer sites.
Tags : hp disaster proof, disaster proof, disaster-proof, storage, storageworks, continuous access, high availability
     HP
By: Exact Software     Published Date: Jun 22, 2008
Businesses, more than ever before, are relying on fact based decision-making and analytics to compete in this environment. This has given rise to "Business Intelligence," or simply BI, a broad category of applications and technologies for accessing, combining, computing and analyzing data to help enterprise users make better business decisions.
Tags : business intelligence, business analytics, analytical applications, make more money, exact america, exact software, exact, competitive
     Exact Software
By: IBM     Published Date: May 30, 2008
This white paper, authored by industry analyst IDC, explores the problems confronting IT organizations today as they seek to bring data together from disparate sources in order to achieve better information coherence, operational efficiency, and more effective overall governance. Specifically, the paper considers the problems posed by the complexity of "data integration" technology in terms of its configuration and maintenance. It looks at the utility of a grid computing approach in providing scalability and manageability for "data integration" and considers how an appliance approach can further reduce cost and risk for customers.
Tags : information management, data integration, blade server, ibm, leveraging information, ibm li, li campaign, data management
     IBM
By: IBM     Published Date: Apr 23, 2008
This white paper explains the why's and how's of data center transformation. It reveals the breakthrough IBM approach that supports dynamic, service oriented applications and consolidates systems, servers and networks for decreased operational costs on all fronts—freeing up funds for business innovation. Download white paper on new data center.
Tags : it management, service management, datacenter, data center, network, networking, network management, ibm, opt it, ibm opt it
     IBM
By: IBM     Published Date: Apr 22, 2008
With their increased processing power, today’s data centers can generate up to 10 times more heat than those built a decade ago. This IBM white paper helps you to understand what’s happening in an overheated system and to see if yours is at risk. It also explains how the IBM Rear Door Heat eXchanger helps to dramatically reduce data center power consumption.
Tags : ibm, ibm opt it, opt it, green, energy, environmental, cooling, datacenter, data center, power, energy, networking
     IBM
By: Vision Solutions     Published Date: Apr 11, 2008
If you need more than tape backup to protect your critical applications running on AIX operating environments, download this white paper and learn your options and strategies, including how new technologies have significantly improved the recovery time and data recovery points for AIX.
Tags : data management, disaster recovery, business continuity, ibm aix, backup, recovery, vision, vision solutions, platforms
     Vision Solutions
By: BlueArc Corporation     Published Date: Mar 31, 2008
BlueArc’s Titan 3000 Series is designed to meet the requirements of today’s sophisticated enterprise data centers and vertical applications with new levels of storage performance, scalability and reliability. Titan is the first storage solution that consolidates and manages up to 4 petabytes of data in a single storage pool.
Tags : titan, tiered storage, storage, bluearc, storage system
     BlueArc Corporation
By: ALL ICT Ltd     Published Date: Mar 26, 2008
The aim of this document is to assist organizations protecting their assets – tangible and intangible – through a Security Management Program. This program provides a holistic, hands-on, and consistent approach for securing the organization against serious security breaches, such as data leakage, while providing the organization with the required flexibility to adapt itself to the business needs and to remain competitive in the market.
Tags : allict, all ict, security management, security
     ALL ICT Ltd
By: ProofSpace     Published Date: Mar 04, 2008
The ProofMark software solution is a broadly applicable system that operates on a computer, server, network, system, or infrastructure. This system utilizes public-key cryptography to create an irrefutable record of the time-existence and exact composition of any digital data. This document, the ProofMark System Concepts, Architecture, and Planning Guide, provides you with a broad technical overview of the ProofMark system.
Tags : public key, secure content, encryption, proofspace, proofmark
     ProofSpace
By: HP VMware     Published Date: Mar 03, 2008
There are probably as many approaches to data protection and disaster recovery as there are types of disasters that might befall your datacenter. Figuring out which approach is best for your datacenter—from a technical, operational and financial outlook—is enough to keep a responsible manager like you up at night. Download this paper to learn about the proven, flexible solution that prepares your data to survive and recover from almost any calamity, from HP and VMware.
Tags : vmware, disaster recovery, sim, data protection, cdp, esx server, bladesystem, data replication, replication, hp vmware
     HP VMware
By: PolarLake USA     Published Date: Feb 23, 2008
A paper that looks at the promise of XML, Web Services and the Enterprise Service Bus as well as the various XML standards being developed for and used in the Financial Services industry.
Tags : polarlake, enterprise application integration, eai, reference data management, reference data distribution, xml based integration, financial integrations
     PolarLake USA
By: SAP     Published Date: Feb 21, 2008
Many significant business initiatives and large IT projects depend upon a successful data migration. Your goal is to minimize as much risk as possible through effective planning and scoping. This paper will provide insight into what issues are unique to data migration projects and offer advice on how to best approach them.
Tags : sap, data architect, data migration, business objects, information management software, bloor, sap r/3, application, enterprise applications, data quality management, master data management, mdm, extraction, transformation load, etl
     SAP
By: Cast Iron Systems     Published Date: Feb 14, 2008
Discover why traditional software and custom coding solutions are obsolete when solving integration problems in a SaaS environment and how they’re rapidly being replaced by Integration Appliances that use “configuration, not coding” to quickly integrate your SaaS applications with your business-critical data.
Tags : saas, software as a service, erp, scm, crm, data integration, application integration, marketing automation, sales automation, castiron, cast iron
     Cast Iron Systems
By: Cast Iron Systems     Published Date: Feb 14, 2008
Midsized companies face the challenge of integrating key applications while keeping risks low, costs down, and schedules short.  Explore three approaches to application integration and discover a quick and cost-effective way to get your critical applications to work together without custom code or burdening specialist resources, ensuring rapid ROI for your application investment.
Tags : application integration, data integration, crm, erp, customer relationship, castiron, cast iron, eai
     Cast Iron Systems
By: Motorola     Published Date: Feb 06, 2008
Mobile Messaging—a standards-based, wireless messaging application and management system that connects mobile workers to enterprise e-mail, contacts, calendar, notes and more. All with a messaging architecture that incorporates end-to-end encryption of all data.
Tags : mobile, wireless, mobile messaging, wireless messaging, motorola, motorola good
     Motorola
By: netForensics     Published Date: Jan 04, 2008
To manage threats to the enterprise and successfully meet compliance challenges, organizations need a comprehensive security strategy that can successfully do battle with inside as well as outside threats. Today, companies are increasingly leveraging security information management (SIM) solutions to build a clean, concise, and manageable process for dealing with the tremendous volumes of raw security information from disparate devices, applications, and databases.
Tags : monitoring, hackers, internal threats, bad employee, identity theft, data protection, hacker, security management, sim technology, compliance, fraud, netforensics
     netForensics
By: WebEx Communications     Published Date: Dec 14, 2007
Health services organizations around the world are discovering that they can optimize business strategies while protecting patient records. These companies use WebEx online applications to reach and support a growing number of employees and customers. They also follow HIPAA mandates using WebEx secure connections that encrypt all content. This content is never uploaded to any WebEx server, ensuring the highest level of data security and confidentiality.
Tags : online presentations, online training, staff training, interactive selling, system management, remote support, web meetings, online meetings, webinars, hipaa compliance, ensure compliance, system rollout, community education, community programs, webex
     WebEx Communications
By: Astrocom     Published Date: Dec 13, 2007
Enterprises with mission critical applications are exploring the benefits of disaster recovery sites for their data centers to ensure business continuity. Special network technology is needed to ensure that site failover and failback occurs reliably and predictably. An ideal solution should provide reliable network connections, manage inbound and outbound traffic over multiple WAN links, failover to a secondary data center if all links at the primary data center are down, and eliminate deployment barriers and costs of multi-homing with BGP (Border Gateway Protocol).
Tags : data center, datacenter, data centers, business continuity, disaster recovery, backup, recovery, failover, redundancy, high availability, astrocom
     Astrocom
By: Paymetric     Published Date: Dec 13, 2007
This paper describes a new approach to managing encrypted data that significantly strengthens an organization's security posture, while minimizing the cost and effort of PCI compliance. Read this white paper and find out more about how to comply with PCI compliance requirements.
Tags : erp, pci, pci compliance, erp, pci, ompliance, sap, sap, encryption, credit cards, tokens, tokenization, token, credit card, payment card, payment cards, regulation, regulatory, paymetric, paymetrics
     Paymetric
By: TeraCloud     Published Date: Dec 11, 2007
Storage spawns where it is needed. This leaves IT to manage many islands of storage devices scattered across the enterprise. Compliance requirements, multimedia-rich applications, unstructured content and a proliferation of databases are pushing IT departments to increase the size and complexity of their storage networks. All of this is occurring at a time when the need for centralized storage management has never been greater.
Tags : storage, storage management, infrastructure, compliance, tsa, teracloud, teracloud storage analytics, san, storage area networks
     TeraCloud
By: ElcomSoft     Published Date: Dec 06, 2007
These days we’re always hearing about the "information age," "information technology," and how "information rules the world." We have come to feel that information is everything. But what does that mean, and is information in itself so important? Not completely. We need information to make decisions – that's what is truly important. A proper decision lights the way to success in any situation. That's why having access to information is a competitive advantage in any business environment.
Tags : passwords, password, password protected, password management, access control, data protection, information management, elcomsoft
     ElcomSoft
By: WiChorus     Published Date: Nov 05, 2007
Rising demand for multimedia applications and mobile usage requires new paradigm to shift voice-oriented cellular architecture into data-oriented networks in order to serve bandwidth hungry packet based applications which include but not limited to multimedia gaming, mobiTV, streaming media, P2P, etc. Data oriented network requires 20-fold fatter air link and backhaul as compared to typical voice communication.
Tags : wimax, access controller, asn-gw, gateway, base station, ofdma, edge router, farpoint group, controller, wichorus
     WiChorus
By: Aventail     Published Date: Oct 26, 2007
The goal of pervasive BI applications is to take the data that produced the back office ROI of more than 400% and deliver it to front-line employees in a form appropriate to their job functions – with similar results. There are thousands of business process steps in a typical enterprise where pervasive BI insights can be added. What are leading companies doing with pervasive BI?
Tags : business intelligence, database, enterprise data warehouse, data mart, data warehouse, data mining, active data warehousing, active data warehouse, informatica
     Aventail
By: Informatica     Published Date: Oct 26, 2007
The goal of pervasive BI applications is to take the data that produced the back office ROI of more than 400% and deliver it to front-line employees in a form appropriate to their job functions – with similar results. There are thousands of business process steps in a typical enterprise where pervasive BI insights can be added. What are leading companies doing with pervasive BI?
Tags : business intelligence, database, enterprise data warehouse, data mart, data warehouse, data mining, active data warehousing, active data warehouse, informatica, data management
     Informatica
By: Informatica     Published Date: Sep 28, 2007
On-demand computing is apparently in demand, at least in the eyes of data integration specialist Informatica Corp. The Switzerland of data integration, as some have called it, just announced availability of its first on-demand offering, which is specifically designed to handle data from Software-as-a-Service (SaaS) stalwart, Salesforce.com.
Tags : salesforce, crm tools, crm, customer relationship management, salesforce.com, crm tool, on-demand, ondemand, on demand, podcast, informatica, data management
     Informatica
Start   Previous    88 89 90 91 92 93 94 95 96 97 98 99 100 101 102    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com