enterprise organizations

Results 576 - 599 of 599Sort Results By: Published Date | Title | Company Name
By: HP Data Center     Published Date: Mar 25, 2009
Data centers are large, important investments that, when properly designed, built, and operated, are an integral part of the business strategy driving the success of any enterprise. Yet the central focus of organizations is often the acquisition and deployment of the IT architecture equipment and systems with little thought given to the structure and space in which it is to be housed, serviced, and maintained.
Tags : hp data center, data center, optimization, business strategy, hot spots, mission critical loads”, the it infrastructure, the availability, it architecture, rack power, lack of redundancy, system overloading, return on investment, roi, virtualization, going green, return on investment, scopes of work, sow, itsm assessments
     HP Data Center
By: Motorola, Inc.     Published Date: Mar 10, 2009
Enterprise mobility has emerged as a top strategic initiative among leading global organizations. To benchmark the current state of Enterprise Mobility adoption, Motorola’s Enterprise Mobility business conducted independent research among a representative sample of enterprise mobility decision-makers, the chief purchasers of enterprise mobility solutions and various mobile workers within enterprise and commercial businesses.
Tags : enterprise mobility, motorola, manufacturing industry, mobile workers, digital two-way radio, voice-over-wlan, vowlan, tdma modulation
     Motorola, Inc.
By: Quocirca     Published Date: Feb 23, 2009
Network Centric Operations (NCO) recognises the demand for pervasive decision-making in the modern battlespace. NCO provides the ability to leverage information networks to generate a more dynamic and agile decision-making space. An important dimension of this approach is the technological flexibility to quickly move the decision-making authority hierarchically or geographically as the situation demands. A fundamental enabler to this approach is the concept of a services orientated architecture (SOA). The use of industry-standard IT architectures provides the means of ensuring that systems can be provisioned rapidly, can be shared as appropriate, and can give the flexibility and response times required within such challenging environments.
Tags : quocirca, network centric operations, agile decision-making, services orientated architecture, soa, enterprise service bus, esb, non-governmental organizations, ngos, network centric warfare, ncw, standardized battlespace, common operating picture, cop, access points, networking, security
     Quocirca
By: HP Data Center     Published Date: Feb 18, 2009
Data centers are large, important investments that, when properly designed, built, and operated, are an integral part of the business strategy driving the success of any enterprise. Yet the central focus of organizations is often the acquisition and deployment of the IT architecture equipment and systems with little thought given to the structure and space in which it is to be housed, serviced, and maintained. This invariably leads to facility infrastructure problems such as thermal “hot spots”, lack of UPS (uninterruptible power supply) rack power, lack of redundancy, system overloading and other issues that threaten or prevent the realization of the return on the investment in the IT systems.
Tags : hp data center, data center, business strategy, it architecture, ups, uninterruptible power supply, rack power, lack of redundancy, system overloading, return on investment, roi, virtualization, going green, return on investment, scopes of work, sow, itsm assessments, energy assessments, it security and risk assessments, performance analysis for hp-unix
     HP Data Center
By: IBM     Published Date: Jan 29, 2009
Mid-Market CEO Study - The rate and scope of change in the business environment is unprecedented. Organizations that approach this climate as an opportunity are the ones experiencing greater financial returns. Explore the study, The Enterprise Of The Future: Implications For Midsize Organizations, to learn about the core traits shared by these successful midsize organizations.
Tags : ibm, midsize organizations, business environment, midmarket ceos, performance management processes, networking, enterprise applications, platforms
     IBM
By: F5 Networks Inc     Published Date: Jan 22, 2009
SAP®, the world’s largest business software company, provides a comprehensive range of enterprise software applications and business solutions to empower every aspect of business. Organizations deploying SAP have invested a significant amount of time and money in these powerful applications. By taking advantage of F5’s Application Ready infrastructure for SAP, tested and validated at SAP, organizations can achieve a secure, fast and available network infrastructure that reduces the total cost of operation and increases ROI. And F5’s FirePass SSL VPN, BIG-IP Local Traffi c Manager and WANJet appliance have been certified by SAP for integration with SAP ERP 6.0 based on NetWeaver 7.0.
Tags : application ready network guide, sap, enterprise software applications, network infrastructure, sap, netweaver, soa, application, portal, big-ip, enterprise applications, data management
     F5 Networks Inc
By: F5 Networks Inc     Published Date: Jan 22, 2009
F5 has designed and painstakingly tested a comprehensive Application Ready Network infrastructure for PeopleSoft Enterprise applications, ensuring your organization achieves maximum ROI with the minimum amount of work. F5 provides all of the tools to help organizations optimize, secure, and deliver PeopleSoft Enterprise applications across the LAN and WAN.
Tags : application ready network guide, application server, maximum availability architecture, internet-enabled enterprise software, application delivery networking, peoplesoft enterprise applications, peoplesoft, networking, enterprise applications
     F5 Networks Inc
By: HP - Enterprise     Published Date: Nov 19, 2008
While investments to secure the enterprise continue to rise, breaches into company systems and data are skyrocketing. These cyber crimes are consistently debilitating organizations operations, reputations and ultimately, viability. Today’s CEOs are demanding aggressive strategies to protect their business. CIOs and CSOs are working together to employ proven Business Software Assurance approaches across the enterprise to stay ahead of constant threats.
Tags : business risk, security, application security, audit, risk, vulnerabilities, fortify, fortify software, hackers, cyber threats, application security standards, threats, assessment, remediation, ciso, cyber crime, breaches, information technology, c-level
     HP - Enterprise
By: IBM     Published Date: Aug 21, 2008
IT is becoming increasingly important in virtually every aspect of business. For enterprises to compete effectively in the marketplace, IT service management must broaden its focus and take a more holistic attitude toward IT service provision. The goal is to resolve the disconnect between IT and business within organizations in order to achieve necessary levels of resilience, control, availability and quality of service.
Tags : ibm, ibm mi, ibm grm, service management, it management, itil, itsm
     IBM
By: HP     Published Date: Jul 25, 2008
This paper outlines a ready-made solution that delivers comprehensive infrastructure optimization in accordance with Microsoft’s APO model. Using HP PolyServe software in conjunction with HP BladeSystem c-Class products and Microsoft SQL Server Enterprise Edition, organizations can attain Dynamic Infrastructure capabilities while reducing server counts by 50%, decreasing configuration and management time by up to 75%, and providing high availability to all servers and SQL Server-based applications.
Tags : sql, sql server, migration, infrastructure, server migration, apo, polyserve
     HP
By: Tripwire     Published Date: Jul 08, 2008
The Tripwire Enterprise solution provides organizations with powerful configuration control through its configuration assessment and change auditing capabilities. In this white paper, learn how with Tripwire Enterprise, organizations can quickly achieve IT configuration integrity by proactively assessing how their current configurations measure up to specifications as given in ISO 27001. This provides immediate visibility into the state of their systems, and through automating the process, saves time and effort over a manual efforts.
Tags : tripwire, iso, iso 27001, security, compliance, comply, isms, information security
     Tripwire
By: Microsoft Dynamics     Published Date: Jul 03, 2008
Microsoft Dynamics CRM 4.0 is designed to help enterprise organizations attain a 360-degree view of customers, achieve reliable user adoption, adapt quickly to business change, and accelerate project delivery and returns-all on a platform that provides enterprise levels of scalability and performance. Microsoft Dynamics CRM 4.0 addresses the stringent requirements of the enterprise in the areas of performance and scalability, application flexibility, efficient manageability, and network configurability.
Tags : microsoft, microsoft crm, microsoft dynamics
     Microsoft Dynamics
By: IBM     Published Date: Jun 17, 2008
Portals are becoming integral enablers of business and IT innovation for many organizations. From first-generation content aggregation portals to more sophisticated enterprise process portals, organizations have used portal solutions to improve productivity, streamline business processes, enable new Web-based product and service delivery models, and provide IT with a powerful platform for new and composite application development.
Tags : ibm, corporate portal, portal, portals, idc, business process automation, tco, productivity, ep campaign
     IBM
By: Quocirca     Published Date: Jun 13, 2008
Over the past decade, the internet has evolved from a technical environment into a commercial marketplace. The impact on consumers and large enterprises has been significant, but what about the small and medium sized business? With few of the skills and resources of their larger counterparts, these organizations need to get the best value from the internet and the network based services it enables, without risking day-to-day operations.
Tags : quocirca, smb, smbs, small business, medium business, mid-sized business, connectivity
     Quocirca
By: Aveksa     Published Date: Feb 04, 2008
User access-related business risk comprises a broad array of potentially damaging events that may be caused or made possible by inadequate governance of access to an enterprise’s information assets. Such events range from relatively minor policy and compliance violations to disastrous business losses.  The stakes involved in access-related risk have risen dramatically in recent years as organizations have become thoroughly operationalized by technology.
Tags : access control, user access, access, permissions, risk, risk management, compliance, governance, aveksa
     Aveksa
By: SAP     Published Date: Jan 28, 2008
Many CFOs and the finance organizations they lead have started to take on new strategic roles within the enterprise. Their goal is to enforce stricter control processes to ensure legal and regulatory compliance, offer strategic insights into the internal and external business environment, and connect the business strategy with daily operations through performance tracking.
Tags : apqc, spend management, cost control, cost, financial, financials, workforce, workforce management, erp, enterprise resource planning, osbc, sap, strategic finance, sap, finance function, finance organizations, performance tracking, external business environment, internal business environment, regulatory compliance
     SAP
By: netForensics     Published Date: Jan 04, 2008
To manage threats to the enterprise and successfully meet compliance challenges, organizations need a comprehensive security strategy that can successfully do battle with inside as well as outside threats. Today, companies are increasingly leveraging security information management (SIM) solutions to build a clean, concise, and manageable process for dealing with the tremendous volumes of raw security information from disparate devices, applications, and databases.
Tags : monitoring, hackers, internal threats, bad employee, identity theft, data protection, hacker, security management, sim technology, compliance, fraud, netforensics
     netForensics
By: WebEx Communications     Published Date: Dec 14, 2007
Those businesses that have actively fostered deployment of e-learning into all points of the enterprise are now in the enviable position of experiencing geometrically increasing levels of operational and strategic efficiency. And those corporate learning officers and training managers that went through the arduous process of developing a business case in support of e-learning are now key strategic players in their organizations.
Tags : e-training, etraining, e-learning, elearning, employee education, education, training, collaboration, webex, it management
     WebEx Communications
By: Infor     Published Date: Apr 19, 2007
Aberdeen's 2006 ERP in Manufacturing Benchmark Report explored how ERP strategies are evolving as enterprises strive to derive more and better business value from their implementations. That often means driving the use of ERP deeper into their organizations or broader across more of the enterprise.
Tags : buyers guide, buying guide, erp, enterprise resource planning, best practices, best of breed, best-of-breed, manufacturing, infor
     Infor
By: Vocalocity     Published Date: Apr 18, 2007
Hosted PBX phone solutions are revolutionizing how small and medium-sized businesses (SMBs) serve their customers, grow their business, and support their employees. Delivering the same enterprise level, professional phone system capabilities large businesses use at a much lower cost, hosted PBX is helping SMBs save money while putting their customer services on par with much larger organizations.
Tags : pbx, phone, phone system, ip telephony, telecom, telecommunications, voip, voice over ip, networking, network management, vocalocity
     Vocalocity
By: ColdSpark     Published Date: Feb 23, 2007
Though legacy open-source email network applications like sendmail and postfix are widely used, the escalating demands of today's enterprise environments have outpaced their capabilities. Large organizations must now look to implement a true enterprise mail transport platform to support the standards of their current and growing business. Learn how to modernize your email system now.
Tags : email, email infrastructure, sendmail, postfix, email server, email servers, email routing, email platform, email marketing, email automation, mta, mail transport, mail transport agent, email delivery, email archiving, email gateway, email backbone, email management, open source email, ironport
     ColdSpark
By: Castelle     Published Date: Nov 01, 2006
Computer-based, network fax servers offer a high quality, low maintenance enterprise fax solution, well-suited for organizations involved in fax-intensive industries. From first-rate administration and development tools to comprehensive integration with existing network resources, fax servers can accelerate document processing and turnaround time while reducing communication costs.
Tags : ip faxing, faxing, enterprise faxing, ip networks, document management, communications convergence, network management, messaging, castelle, enterprise applications
     Castelle
By: Red Hat     Published Date: Jan 01, 2002
Because of the strength of specific hypervisors, many organizations run multiple hypervisors, including Kernel-based Virtual Machine (KVM) on Red Hat Enterprise Linux. In fact, larger organizations are using different hypervisors in order to get the right solution for their needs.
Tags : hyperversity, technical, cost, strength, organizations, linux
     Red Hat
By: NetApp     Published Date: -
Enterprise data is growing rapidly - reaching multiple petabytes of data or even billions of files for many organizations. To maximize the business value of this data, enterprises need a storage infrastructure to store, manage, and retrieve a massive amount of data. This ebook shows you how to address large content repository challenges with object storage. You'll learn how to effectively address long-term retention policies, find and retrieve content quickly from long-term repositories and using object storage efficiently.
Tags : object storage, storage infrastructure
     NetApp
Start   Previous    10 11 12 13 14 15 16 17 18 19 20 21 22 23 24     Next   End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com