MeriTalk - Where America Talks Government
Brian Saunders


Share
Delicious Digg StumbleUpon
View All Entries
Archive
Categories
Popular Tags
Posted: 11/16/2009 - 0 comment(s) [ Comment ] - 0 trackback(s) [ Trackback ]

Today, even the smallest organizations rely on some type of computer system to store the critical data they generate.  But if this data somehow becomes damaged, destroyed, misplaced, or stolen, the affects can be devastating.  Now with the growth of mobilized technology and increased compliance demands regarding data protection, your data must be adequately protected at all costs.  The key is to implement a data-protection strategy that mitigates business risks, increases compliance, reduces costs, and improves overall business-service levels.  Read this white paper for tips that will help you accomplish this.

Click here to view the white paper.

Posted: 11/16/2009 - 0 comment(s) [ Comment ] - 0 trackback(s) [ Trackback ]

E-mail management in the Lotus Notes environment has become increasingly difficult as the number of users and use for e-mail continues to grow. This white paper provides tips every Notes administrator needs to manage the messaging server efficiently. This white paper focuses on the growing set of demands placed on Lotus Notes enabled environments in the context of how they manage e-mail data.  This white paper discusses the available tools designed to help organizations more effectively manage their Notes-based data.

Click here to view the report.

Posted: 12/10/2008 - 0 comment(s) [ Comment ] - 0 trackback(s) [ Trackback ]
Tags: Networking

Read this white paper for a solutions to meet the demands of managing a modern IP network while reaching business goals.

Posted: 12/10/2008 - 0 comment(s) [ Comment ] - 0 trackback(s) [ Trackback ]
Tags: Networking

Read about what 802.11n will do for wireless deployment in the enterprise.

Posted: 12/1/2008 - 0 comment(s) [ Comment ] - 0 trackback(s) [ Trackback ]

Oracle Grid Solutions for the Next-Generation Data Center

Posted: 12/1/2008 - 0 comment(s) [ Comment ] - 0 trackback(s) [ Trackback ]

This white paper discusses how real-time data integration and data services can help you overcome various limitations.

Posted: 12/1/2008 - 0 comment(s) [ Comment ] - 0 trackback(s) [ Trackback ]

Read what a tool designed to handle database change management tasks can do for you.

Posted: 12/1/2008 - 0 comment(s) [ Comment ] - 0 trackback(s) [ Trackback ]

This white paper discusses how to select the right commision and incentive compensation system.

Posted: 10/17/2008 - 0 comment(s) [ Comment ] - 0 trackback(s) [ Trackback ]

We are now in a cycle where there is increasing pressure to do more with less. The keys to approaching virtualization are understanding how to unravel the complexity and planning a virtualization adoption program. This white paper demystifies virtualization as a concept and computing platform for consolidation. The keys to approaching virtualization are understanding how to unravel the complexity. planning a virtualization adoption program. This white paper demystifies virtualization as a concept and computing platform for consolidation.

Posted: 10/14/2008 - 0 comment(s) [ Comment ] - 0 trackback(s) [ Trackback ]

This White Paper focuses on ensuring applications are fast. While nearly all F5 products increase application performance this is an overview of specific F5 acceleration features across three F5 product lines.

Posted: 10/13/2008 - 0 comment(s) [ Comment ] - 0 trackback(s) [ Trackback ]

In this paper Clabby Analytics explores the market trends that are driving enterprises to transform their data centers--shifting from an operations-focused orientation to a more responsive service delivery orientation.

Posted: 10/13/2008 - 0 comment(s) [ Comment ] - 0 trackback(s) [ Trackback ]
Tags: Security

This white paper details some simple steps your organization can take to ensure its data is secure and features a QA discussion that details what you need to know to protect and retain valuable company information.

Posted: 10/2/2008 - 0 comment(s) [ Comment ] - 0 trackback(s) [ Trackback ]
Tags: Security

Many organizations are turning to real-time transaction monitoring for SAP. Designed to quickly identify high-risk financial transactions within SAP systems these automated solutions immediately confirm the validity of transactions and identify transactions needing further examination. This white paper will examine the monitoring challenges faced by finance departments and reveal the many advantages of real-time transaction monitoring for SAP.

Posted: 10/2/2008 - 0 comment(s) [ Comment ] - 0 trackback(s) [ Trackback ]

For many companies backing up and restoring data is becoming a slow complicated expensive process. The volume of data to be protected is growing 30-60 annually while the amount of time available to complete backups is staying the same or shrinking. At the same time end-users are more dependent on continuous access to data for business critical operations than ever. Failed backups - which happen in 20 of tape backups - and delayed file restores drive down productivity and directly affect the bottom line. Deduplication technology is changing the economics of data protection by enabling companies to backup and restore petabytes of data without adding capacity--making the cost of backing up to a VTL comparable to physical tape.

Posted: 10/1/2008 - 0 comment(s) [ Comment ] - 0 trackback(s) [ Trackback ]

SaaS is trending upwards. Business owners who want to reduce cost and focus on the core competencies that drive their business are supporting it. Venture capital is showing up in force and CIOs no longer seem too concerned about issues that plagued ASPs during the early days. Unfortunately, no one possesses the crystal ball that will allow the subscriber to see into the future. It only takes one instance of a disaster in the news to cause a shift in demand. Therefore, the only way to ensure that demand for SaaS will remain healthy is to have a SaaS escrow in place as a contingency plan that responsibly addresses disaster recovery and business continuity concerns.

Posted: 10/1/2008 - 0 comment(s) [ Comment ] - 0 trackback(s) [ Trackback ]
Tags: Green IT

As the cost of power and cooling of data centers continues to rise and the availability of energy sources becomes more scarce, companies are increasingly looking to green storage solutions to reduce their energy costs and conserve power. This SearchStorage Tech Report, "Green Storage Explained" helps identify the methods and ways to measure ROI upon installing green storage systems. This Tech Report discusses how to implement green storage in an existing storage environment, which technologies make sense for you to use, and provides case studies to demonstrate how other companies have gone "green". This Tech Report also reviews the next generation of green technologies and where green storage is headed for Storage professionals who are looking to make the green jump.

Posted: 9/29/2008 - 0 comment(s) [ Comment ] - 0 trackback(s) [ Trackback ]

Achieving and maintaining regulatory compliance with a minimum impact on resources and business operations is challenging. Often, it's not an issue of whether companies comply with regulatory requirements, but how they can achieve and maintain compliance with a minimum impact on resources and business operations. This white paper shows you how network behavior analysis (NBA) systems give you the continuous global visibility you need to implement a programmatic approach to regulatory compliance by enabling you to: Develop network inventory with dependencies and usage Protect regulated systems from unauthorized access Respond to auditor requests Develop and enforce policy Discover how NBA systems can continuously monitor network activity, giving you the information you need to reduce the burden of regulatory compliance.

Posted: 9/29/2008 - 0 comment(s) [ Comment ] - 0 trackback(s) [ Trackback ]

Compliance with the Federal Rules of Civil Procedure (FRCP) demand routine, good-faith efforts to identify and notify custodians, preserve, collect and produce all potentially relevant electronically stored information. In today's global marketplace, that includes email in multiple languages as well as voice and video content. Is your company able to comply?

Posted: 9/29/2008 - 0 comment(s) [ Comment ] - 0 trackback(s) [ Trackback ]

Today's service firms must be able to balance comprehensive management of the fundamental processes with the demand for greater transparency and value-added delivery, all within a framework of continued cost containment. Businesses require a specialized tool that combines best practices in process automation and management: enterprise service automation. Read this white paper to learn how enterprise service automation can help you streamline administrative efficiency, reduce non-billable hours and improve business processes. Achieve key performance indicators and discover how you can: Manage strategic workforce planning and sourcing. Drive performance and portfolio management. Improve efficiency and profits. Improve project accounting and finances.

Posted: 9/26/2008 - 0 comment(s) [ Comment ] - 0 trackback(s) [ Trackback ]

The successful configuration and management of a distributed NAS solution throughout an organization with multiple remote locations requires careful consideration and a thorough understanding of the disparate needs of each location, as well as how they fit with the overall needs of the organization. Building a storage network of NAS systems that have the capability to communicate with one another, be managed remotely from a central seat, and securely replicate their business-critical data back to the central office or to other remote locations, is fundamental to the success of a remote storage solution with minimal IT resources.


« Last Page  |  viewing results 1-20 of 145  |  Next Page »