Research and Reports
Software Selection Services
Stay connected with us
Featured Documents related to
Get Free ERP Systems Comparisons Now
Find the best ERP software solution for your business!
Use the software selection tool employed by IT professionals in thousands of selection projects per year. FREE software comparisons based on your organization's unique needsquickly and easily!
Register to access your free comparison reports and more!
I'm doing research for my company
I'm doing research for my client
I'm a software vendor
I'm a student
Antigua and Barbuda
British Indian Ocean Territory
Central African Republic
Cocos (Keeling) Islands
Congo (Dem. Republic)
Falkland Islands (Malvinas)
French Southern Territories
Guernsey and Alderney
Heard and McDonald Islands
Island of Man
Korea (Democratic Republic of)
Korea (Republic of)
Libyan Arab Jamahiriya
Northern Mariana Islands
Saint Kitts and Nevis
Saint Pierre and Miquelon
Saint Vincent and the Grenadines
Sao Tome and Principe
South Georgia and South Sandwich Islands
Svalbard and Jan Mayen Islands
Syrian Arab Republic
Trinidad and Tobago
Turks and Caicos Islands
United Arab Emirates
United States Minor Outlying Islands
Vatican (Holy See)
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis and Futuna Islands
District of Columbia
Send me the TEC Newsletter:
Enter security code:
Already have a TEC account?
Sign in here.
Documents related to
More Data is Going to the Cleaners
WESTBORO, Mass., November 29, 1999 - Ardent Software, Inc. (Nasdaq: ARDT) today announced a strategic partnership with Firstlogic, Inc., the developer of i.d.Centric data quality software that helps companies cleanse and consolidate data in database marketing, data warehousing, and e-business applications. Under the partnership agreement Firstlogic will develop and support a link between its customer data quality tools and Ardent's DataStage Suite.
: More Data is Going to the Cleaners More Data is Going to the Cleaners M. Reed - December 1, 1999 Read Comments Event Summary WESTBORO, Mass., November 29, 1999 - Ardent Software, Inc. (Nasdaq: ARDT), a leading global data management software company, today announced a strategic partnership with Firstlogic, Inc., the developer of i.d.Centric data quality software that helps companies cleanse and consolidate data in database marketing, data warehousing, and e-business applications. Under the partnership
Enabling Enterprise Tape Library Support for Microsoft DPM 2007
Data Protection Manager is designed to provide continuous data protection for servers. A virtual tape library solution with de-duplication complements Microsoft DPM 2007, and together they can meet the data protection and recovery challenges of both Windows and non-Windows environments. Find out how these technologies work together to provide continuous data protection and recovery for enterprises of all sizes.
: Enabling Enterprise Tape Library Support for Microsoft DPM 2007 Enabling Enterprise Tape Library Support for Microsoft DPM 2007 Source: FalconStor Software Document Type: White Paper Description: Data Protection Manager is designed to provide continuous data protection for servers. A virtual tape library solution with de-duplication complements Microsoft DPM 2007, and together they can meet the data protection and recovery challenges of both Windows and non-Windows environments. Find out how these
6/4/2008 12:07:00 PM
Using Virtualization to Achieve Affordable Disaster Recovery
Traditional disaster planning and recovery solutions, including tape backup, image capture, and clustering, fail to deliver the necessary combination of recovery speed and integrity within reasonable budgetary constraints. That’s why organizations are increasingly leveraging virtualization to achieve superior disaster planning and recovery operations. Find out how to make it work for you.
: and recovery solutions, including tape backup, image capture, and clustering, fail to deliver the necessary combination of recovery speed and integrity within reasonable budgetary constraints. That’s why organizations are increasingly leveraging virtualization to achieve superior disaster planning and recovery operations. Find out how to make it work for you. Using Virtualization to Achieve Affordable Disaster Recovery style= border-width:0px; /> comments powered by Disqus Related Topics: IT
9/14/2007 11:04:00 AM
Measuring the TCO of Tape Storage Solutions
This tutorial presents a framework and financial methodology for deciding whether an enterprise should replace its current “status quo” tape storage solution with a new “proposed” solution, and the economics related to that decision. Read this white paper for an analysis of the value drivers that contribute to the cost of the status quo and proposed tape storage solutions using an illustrative business case, and much more.
: Measuring the TCO of Tape Storage Solutions Measuring the TCO of Tape Storage Solutions Source: ZenithOptiMedia Document Type: White Paper Description: This tutorial presents a framework and financial methodology for deciding whether an enterprise should replace its current “status quo” tape storage solution with a new “proposed” solution, and the economics related to that decision. Read this white paper for an analysis of the value drivers that contribute to the cost of the status quo and
9/14/2012 5:18:00 PM
Security Breach: Now What?
When people's lives or financial transactions are at risk, proper Security Incident handling is of extreme importance.
: in Need of Duct Tape | More Marketplace Success For Manugistics? | Deutsche Telekom to Acquire VoiceStream Wireless | Study Shows: FBI Alienates Industry Security Experts | Firewall Cowboyz Set the Stage to Free Innocent Convict | Lasership.com Looks To Descartes For Same-Day Delivery Help | Symantec Swallows AXENT; Takes on Network Associates | Novatel Wireless and Diversinet Team Up to Provide Security for Wireless Modems | Concur Gives Up The Boast | Red Hat Releases Clustering Software | Windows 2000
Great Product: Too Bad The Architecture Doesn’t Fit
During the process of product selection a great deal of attention is given to the functional capabilities of the software being evaluated. While this aspect is obviously important, ignoring the technical mechanisms by which the software actually operates can be fatal to a project. In this document we explain how to avoid the pitfalls.
: Great Product: Too Bad The Architecture Doesn’t Fit Great Product: Too Bad The Architecture Doesn’t Fit M. Reed - November 29, 2003 Read Comments M. Reed - November 29, 2003 Introduction Most potential customers understand that detailed scripted scenarios should be performed with software vendors who are on the short list of candidates, in order to evaluate the functional abilities of products being considered. Unfortunately, many companies neglect to investigate the technological underpinnings of
Los Alamos Loses Top-Secret Information, Again!
Another security compromise occurred at Los Alamos National Laboratories last month when two hard drives containing top-secret nuclear information disappeared. The security mistakes that are being made at Los Alamos are sloppy and unacceptable.
: in Need of Duct Tape | Deutsche Telekom to Acquire VoiceStream Wireless | Study Shows: FBI Alienates Industry Security Experts | Firewall Cowboyz Set the Stage to Free Innocent Convict | Symantec Swallows AXENT; Takes on Network Associates | Novatel Wireless and Diversinet Team Up to Provide Security for Wireless Modems | Windows 2000 Bug Fixes Posted | Baltimore Technologies Doubles Revenues, Offers World-Class PKI Hosting | The Whys and Hows of a Security Vulnerability Assessment | Earthlink Leads the
E-mail Archiving: A Business-critical Application
E-mail Archiving: a Business-critical Application.Secure Documents and Other Package to Use In Your Complex System of E-mail Archiving: a Business-critical Application. Small and medium businesses are especially vulnerable to disruptions caused by e-mail loss, compliance demands, and the threat of e-discovery. Yet these companies may not have adequate resources to deal with these risks on their own. Learn how your business can benefit from e-mail archiving, and in particular a hosted e-mail archiving service, to combat data loss, and realize greater productivity and competitiveness.
9/3/2009 4:36:00 PM
Oracle Database 11g High Availability
Oracle Database 11g High Availability. Find Out IT Solutions and Other Applications for Your Judgment Related to Oracle Database. A highly available IT infrastructure is a critical success factor for businesses in today’s fast moving and “always on” economy. But the traditional approach to building high availability infrastructure is expensive to implement and rarely meets user’s service level expectations. Learn how technologies available in the Oracle Database 11g can help you avoid costly downtime and recover quickly from unavoidable failures.
: Oracle provides centralized tape backup management for entire Oracle environments including databases and file systems. Oracle Secure Backup offers customers a highly secure, cost effective and high performance tape backup solution. Thanks to its tight integration with Oracle Database, Oracle Secure Backup can back up an Oracle Database up to 25% faster than the leading competition. This is accomplished by leveraging direct calls into the database engine and through efficient algorithms that skip unused
4/20/2009 3:12:00 PM
Next-generation Data Protection for Midsized Companies
Just because your company isn’t a major corporation with hundreds of offices and thousands of employees doesn’t mean you’re not under the same pressures to maintain access to critical information. But buying the same solutions as the major players in your industry can be expensive and unnecessary. Learn about next-generation data protection and recovery options specifically for small and midsized businesses (SMBs).
: vtl backup, vtl tape, cdp data protection, data protection systems, data protection and recovery, restore data protection, corporate data protection Source: IBM Learn more about IBM Readers who downloaded this white paper also read these popular documents! Best Practices for ERP Implementation Databases and ERP Selection: Oracle vs. SQL Server TEC 2012 Business Intelligence and Data Management Buyer s Guide 3 Key Areas to Reduce Costs with Lean Techniques The Ten Commandments of BYOD Acr
4/9/2010 1:18:00 PM
SecureVTL: Solutions for Securing Vulnerabilities in Disk-based Backup
Enterprises are becoming increasingly aware of their fiduciary duty and legal obligation to protect confidential and personal information. As such their IT departments must find a way to effectively secure storage tiers from unauthorized access and viewing. Discover why today’s storage security technology with integrated encryption processing is the type of solution that many IT professionals are turning to.
2/28/2008 9:20:00 AM
White Paper Newsletters