data management

Results 251 - 275 of 2488Sort Results By: Published Date | Title | Company Name
Published By: CA WA 2     Published Date: Sep 29, 2008
Forrester evaluated leading Data Center Automation (DCA) solutions across approximately 80 criteria. CA was named as a leader in this Wave evaluation. The report states: “Recently, CA introduced its Data Center Automation Manager, which is part of its dynamic and virtual systems management solution and is directed at the automation of the data center.
Tags : 
ca wa, computer associates, forrester, data center, datacenter, data center automation, dca
    
CA WA 2
Published By: CA WA 2     Published Date: Oct 01, 2008
Given the increased complexities and requirements thrust onto data center management environments over time, a more holistic management approach is necessary for efficient and cost effective delivery of IT services. Authors and analysts Judith Hurwitz and Robin Bloor bring their research and extensive experience to light in respect to the state of data center management by building the case for automation as a key strategy for efficient and cost effective management.
Tags : 
datacenter automation, data center automation, network management, ca wa, ca wa 2
    
CA WA 2
Published By: Caminosoft     Published Date: Aug 21, 2009
Companies today are faced with managing an ever-increasing amount of data. The traditional solution to this problem was to increase the amount of space on a server by adding more hard drives. This strategy would be similar to a person continually building additional rooms onto a house in order to have more space in which to store all his or her belongings, but without any thought as to where items were being stored.
Tags : 
caminosoft, database management, data center, data management, storage, data warehousing, hsm, netware, windows 2000, windows 2003
    
Caminosoft
Published By: Canon Solutions America     Published Date: Feb 28, 2019
Limiting access to confidential client files is vital. But choosing the wrong document security solution can overwhelm your staff (and your IT department) and leave your data vulnerable. Learn five important features a security solution should offer.
Tags : 
legal document management, best legal document management systems, law firm data breach, law firm security breach, law firm data security, legal document automation software
    
Canon Solutions America
Published By: Canon Solutions America     Published Date: Feb 28, 2019
Printers, scanners, mobile devices… It’s hard to imagine running a law office without them, but you should know they can expose your client data to theft or misuse. Learn why your office technology may not be as secure as you think.
Tags : 
legal document management, best legal document management systems, law firm data breach, law firm security breach, law firm data security, legal document automation software
    
Canon Solutions America
Published By: Canon Solutions America     Published Date: Feb 28, 2019
Security threats can be next to invisible, but this infographic shows exactly where your healthcare organization can be most at risk. It also gives you valuable tips for helping secure your patient data, financial documents, and medical records.
Tags : 
phi security, healthcare data privacy, data protection in healthcare, ehr solutions, ehr security, electronic health records management, hipaa breach, hipaa compliance checklist, hipaa security, how to be hipaa compliant, hipaa compliant printing, healthcare data breach, security breaches in healthcare
    
Canon Solutions America
Published By: Canon Solutions America     Published Date: Feb 28, 2019
Fully updated for 2019, this guide covers the latest technologies and best practices for print, device, document, information, and cybersecurity. Learn how you can help maintain the confidentiality, integrity, and availability of health records throughout your organization.
Tags : 
phi security, healthcare data privacy, data protection in healthcare, ehr solutions, ehr security, electronic health records management, hipaa breach, hipaa compliance checklist, hipaa security, how to be hipaa compliant, hipaa compliant printing, healthcare data breach, security breaches in healthcare
    
Canon Solutions America
Published By: Carbonite     Published Date: Oct 12, 2017
I&O leaders responsible for storage must rethink their backup procedures to realize cost savings and improve backup infrastructure resource utilization. Cloud services can help your infrastructure modernization initiative, as they alleviate the burden on the data center backup infrastructure. Asset by Gartner
Tags : 
backup, recovery, cloud services, infrastructure, data center
    
Carbonite
Published By: Cardinal Health     Published Date: Dec 28, 2017
Data driven tools and analytics can uncover a wealth of new savings opportunities for surgery centers and surgical hospitals. And you usually don’t have to search far to uncover the savings. You can immediately tap into one source of data to find these opportunities. Every Electronic Health Record (EHR) and Practice Management System offers a set of standard reports. Stored inside are at least five ways to save. Download this whitepaper to learn about these five opportunities
Tags : 
    
Cardinal Health
Published By: Cast Iron Systems     Published Date: Feb 14, 2008
Discover how to complete more application integration projects by delivering in days what used to take months of custom programming.  Find out how an appliance-based approach to application integration uses “configuration, not coding” to dramatically simplify and accelerate integration projects, while cutting costs by up to 80%.
Tags : 
erp, crm, integration, data integration, application integration, castiron, cast iron, scm, supply chain, customer relationship management
    
Cast Iron Systems
Published By: CDW     Published Date: Nov 12, 2012
This white paper will explain DCIM as well as provide technology advice on teh tools and practices for its implementation and use, and how to take advantage of DCIM to improve energy efficiency and effectiveness in the data center.
Tags : 
data center, infrastructure
    
CDW
Published By: CDW     Published Date: Nov 12, 2012
Data center priorities have been consistent for some time: Improve efficiency, increase uptime and meet compliance regulations are IT mantras.
Tags : 
data centers, infrastructure, it infrastructure, data center convergence
    
CDW
Published By: CDW     Published Date: Aug 07, 2013
In the spring of 2012, IBM® introduced its PureSystems family of intelligent, integrated, powerful and flexible computing systems. At that time, IBM committed to a continuing process of improvement and additions to these systems as technology and innovation evolved.
Tags : 
cdw, ibm, pureflex, datacenter, datacenter management, puresystems
    
CDW
Published By: CDW     Published Date: Sep 10, 2014
Enterprise-critical applications—those which drive the core of an organization—require the highest availability infrastructure to support the most stringent service levels. EMC meets this need with a high performing, functionally capable, and competitively priced high-end networked storage system—the EMC® Symmetrix® VMAX® 20K system with the Enginuity™ operating environment. The VMAX 20K scale-out architecture helps organizations exceed the performance and capacity demands of hyper-consolidation, cloud deployments, and all-virtual Software Defined Data Centers (SDDCs), while simplifying the costs of data management.
Tags : 
    
CDW
Published By: CDW     Published Date: Sep 15, 2014
WHEN IT COMES TO DATA CENTER OPTIMIZATION, IT’S NOT JUST WHAT YOU KNOW. IT’S WHO YOU KNOW. That’s why we partner with leading vendors like EMC. They offer a wide range of devices for primary storage, archiving, backup, recovery and data center management. And with years of experience in EMC deployments, CDW has the experts and the expertise to make them work for you. Together, we give our customers access to the latest technologies that help optimize their data centers to keep their organizations running smoothly.
Tags : 
data, optimization, experts, backup, recovery, technologies, organizations, vendor, experience, deployment, management, storage, archiving, technologies, recovery
    
CDW
Published By: CDW     Published Date: Feb 27, 2015
CDW’s Technology Insights guides provide a high-level, informative take on today’s most pressing IT solution areas and related issues. Speaking to the interests and concerns of IT managers and their staff, as well as their enterprise counterparts, the guides provide up-to-date summaries, strategic guidance and best practice tips on the technologies driving IT operations forward.
Tags : 
software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security, internet security, network security appliance, security management, best practices, business management, data protection, mobile device management
    
CDW
Published By: CDW     Published Date: Feb 27, 2015
Man Investments is one of the world’s largest independent alternative asset managers. With a fast moving and diverse IT infrastructure, Man needed to be able to automate software license compliance reporting in conjunction with optimizing license usage and sourcing.
Tags : 
software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security, internet security, network security appliance, security management, best practices, business management, data protection, mobile device management, snow, man investments, asset, softcat
    
CDW
Published By: CDW     Published Date: Feb 27, 2015
The real test of any SAM system goes beyond creating a one-time Effective Licensing Position (ELP) for a given software publisher. To be truly valuable, the SAM solution has to have the ability to manage change. Being able to work from a dependable list of software that has been approved by, and which also serves the business, means that finite IT & SAM resources are not wasted through the support of legacy software that might be deemed redundant, and should keep a company on track technically by not becoming dependent on aging software. This 10 –Minute Guide from SAM experts at Snow Software will show how to establish and maintain a Software Catalog for the purpose of ensuring that your software estate remains relevant and fit for its business purpose.
Tags : 
software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security, internet security, network security appliance, security management, best practices, business management, data protection, mobile device management, snow, bank of ireland, assets
    
CDW
Published By: CDW     Published Date: Feb 27, 2015
In a perfect world, managing the discovery of software assets, the capture of license entitlements and optimization of an organization’s software usage and compliance situation would be a single-click operation. Unfortunately, the world is not perfect and those charged with managing an organization’s software compliance, availability and expenditure face a number of challenges that can easily derail a Software Asset Management (SAM) program. This paper from the SAM experts at Snow Software investigates some of the major challenges facing SAM managers and IT executives and highlights how to build a successful strategy to overcome them, ensuring the SAM program delivers true value to the business.
Tags : 
software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security, internet security, network security appliance, security management, best practices, business management, data protection, mobile device management, snow, bank of ireland, assets
    
CDW
Published By: CDW     Published Date: Jul 08, 2015
Your data is at risk. The threat of data breaches has grown larger than ever before, as attackers become more numerous and sophisticated. And as data becomes more precious, the damage that can be done by a data breach has increased greatly.
Tags : 
security, data protection, dlp, data breach, vulnerability management
    
CDW
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search Offers      
Get your company's offers in the hands of targeted business professionals.