40 results on '"Enterprise networks -- Information management"'
Search Results
2. Enterprise storage needs influence metro networks
3. Enemy at the gate: threats to information security
4. Analyzing security costs: quantification tools, if applied prudently, can assist in the anticipation, budgeting, and control of direct and indirect computer security costs
5. The bugs stop here: don't blame Microsoft. Don't blame the hackers. Blame yourself for insecure software
6. Real solutions: best practices for protecting the enterprise inside and out
7. Portfolio management: how to do it right
8. The data protection agenda: a guide to knowing what to secure -- and how -- across the enterprise
9. Enterprise integration with ERP and EAI
10. Linux kernel debugging. (Tools)
11. Peak performance: NAS, SAN offer options for maximizing storage
12. Policy-based e-business networks maximize ROI: the IT and networking staff must understand the business impact of their technology rollouts
13. VPN services for site-to-site connectivity: service providers are rolling out IPSec, MPLS and virtual router-based VPN services. Is one of them right for you?
14. Building for mobility: handheld app developers aim for harmony with the enterprise
15. Agencies keep track of IT assets; wide-scale asset management solutions are still best, but even small rollouts can pay off
16. Getting the message
17. Mastering storage management: be proactive, not reactive to storage demands
18. Strategies for collaborating in an interdependent impermanent world
19. Managing remote users; IT administrators agree that centralized servers and thin clients ease the task of supporting off-site employees
20. Enterprises Living On the Edge
21. Buy And Extend
22. Managing Processes Key to Reaping Tech Benefits
23. IBM Juggles IT Resources On The Fly
24. Demo 2003 Takes Aim at the Enterprise
25. Yankee Group report shows search technology is a critical component of enterprise information management
26. It's time to take control
27. Protection for your business systems: common sense--do you have it installed?
28. Small business accounting
29. What price security? It's up to the company, not the CIO, to decide how much trust is too much
30. Where's the next killer app coming from?
31. Strategy paper: the virtual network operator model is on the rise, becoming one of the few successes in the troubled telecoms sector. We look at the potential benefits for users.
32. Real-time reality check: the Real-Time Enterprise is the next hyped thing. Don't get swept away
33. Enterprise content management revisited. (Business Rules)
34. Rethinking enterprise storage strategies
35. Protecting customer information: compliance with the PCI Data Standard is a safeguard for protection, says Barak Engel
36. Spam-buting your business
37. Divided we stand: cost vs innovation
38. Search firms seek enterprise customers. (Tech Trends)
39. Assessing the costs of records management. (Information Life Cycle)
40. SenSage solves compliance worries
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.