Home
 > search for

Featured Documents related to »  network ice

Engage AudienceNet Brings Users the Ads They Want To See
Engage has introduced a new product that delivers ads to users who are most likely to be receptive to them. AudienceNet relies on data collecting, proprietary

network ice  Any member of the network can add additional categories to the mix; so, if a site wanted to serve ads to people based on their favorite ice cream flavors, it could do so. Once these ice cream flavor categories have been added to the profile, other sites could also use them. The process of choosing an ad uses a proprietary algorithm that takes into account recency of each data point, the frequency with which the user has shown interest in the variety of categories, and the duration of the users' relevant Read More...
Outsourcing, IT Infrastructure
The IT Infrastructure Outsourcing knowledge base focuses on the selection of companies who provide outsource services in the areas of information technology (IT) infrastructure. The typical type...
Start evaluating software now
Country:

 Security code
Already have a TEC account? Sign in here.
 
Don't have a TEC account? Register here.

Documents related to » network ice


6 Days After Advisory Posted, AboveNet Gets Hit
Once a security advisory gets posted, vendors need to work quickly to rectify the problem. Security engineers are not the only ones reading the advisories

network ice  AboveNet suffered a crippling network attack when someone compromised their network, and disabled several critical backbone switches by logging on and exploiting this bug. Though Cisco offers free software upgrades to remedy this vulnerability, system and network engineers often get caught up in the day-to-day flurry of new provisioning and on-going support. Applying security patches and keeping up with advisories gets last priority. Regardless of whether they should be doing this or not, AboveNet Read More...
e-Procurement Is Not Electronic Purchasing
This is the transcript of an Audio Conference on e-procurement conducted by TEC during which brief case studies of how companies have improved inventory turns

network ice  a technology element. Enterprise Network Management and Data Warehouse are Technology Projects with significant Business Involvement. e-Procurement is, at this time a 60-40% proposition with a heavy emphasis on Technology. This is due to the maturity of the application and is constantly shifting to more of a business project as technologies and suppliers mature. Rapid changes force us to conduct a thorough review of candidates each time we embark on a selection to avoid working from bad data and to avoid Read More...
TEC Industry Watch: Enterprise Software News for the Week of May 21st, 2012
SOFTWARE SELECTED, IMPLEMENTED, AND PUT TO GOOD USEHorticultural tools distribution business goes live with Sage ERP X3Industry tags: wholesale and retail

network ice  customers use both Ariba Network and Ariba’s procurement, sourcing, contract management, e-invoicing, etc. software (in fact, in the early 2000s, the name Ariba was taboo at SAP’s Waldorf HQ, and Ariba was a competitor that SAP loved to hate). --Principal TEC Analyst P.J. Jakovljevic Read the full story on the TEC Blog: SAP to Acquire Ariba, Expand Cloud Presence - First Impressions Oracle buys Vitrue Industry tags: Cloud computing/social media Oracle has just entered into an agreement to acquire Read More...
The Wizardry of Business Process Management: Part 5
Part 1 of this blog series started a lengthy discussion about the value proposition and parts-and-parcels of business process management (BPM), with an ensuing

network ice  through third-party logistics (3PL) networks or the company’s own fleet, through a third-party service network, etc. As seen in TEC ’s previous article Retailing Trends—Shopping Anyway and Everywhere , Internet-based technological advancements have caused consumers to expect interchangeable multichannel (e.g., retail store, catalog, call center, commercial contractor, Web site, kiosk) inquiry, shopping, and goods return. In fact nowadays, a consumer expects a true cross-channel experience, and Read More...
Next-Generation VoIP Network Architecture
With network operators facing eventual equipment obsolescence in their existing narrowband public switched telephone networks (PSTNs), the Multiservice

network ice  Generation VoIP Network Architecture With network operators facing eventual equipment obsolescence in their existing narrowband public switched telephone networks (PSTNs), the Multiservice Switching Forum (MSF) expects that end-to-end voice over Internet protocol (VoIP) solutions will necessarily replace PSTNs in the medium term. What are the primary issues that must be addressed to define a large-scale VoIP network capable of supporting full PSTN equivalence? Read More...
Business Value of Network and Application Visibility
Find out in Achieving Business Value with Network and Application Visibility.

network ice  Value of Network and Application Visibility Business Value of Network and Application Visibility Networks have become central to a company's ability to create new products and services, enter new markets, and develop new partnerships. But what are the business drivers and challenges facing network administrators? And how are companies leveraging their networks for competitive advantage? Find out in Achieving Business Value with Network and Application Visibility . In this IDC report based on a Read More...
Network Protection with Open Space Security
Today’s information technologies present businesses with countless ways to communicate and collaborate, creating a new global work environment that does not

network ice  about an approach to network security that extends your protection beyond the workplace to reach remote users and an increasingly mobile workforce. Read More...
The Insider’s Guide to Network Automation
The network, once only a component of the business, is now the fundamental backbone by which business is conducted. Most organizations cannot maintain

network ice  Insider’s Guide to Network Automation The network, once only a component of the business, is now the fundamental backbone by which business is conducted. Most organizations cannot maintain productivity if their network is unstable. But cost-effective network management is an elusive goal. This paper defines network automation, outlines how to select a network automation solution, and identifies the benefits of good network automation Read More...
One Network


network ice  Network Read More...
The Role of Network Behavior Analysis and Response Systems in the Enterprise
Your operations and assets are under multiple points of attack, both inside and outside your network. Organizations face escalating security risks and network

network ice  Role of Network Behavior Analysis and Response Systems in the Enterprise Your operations and assets are under multiple points of attack, both inside and outside your network. Organizations face escalating security risks and network availability requirements as they open their networks for communications and transactions with key customers, business partners, and employees. That’s why you need to ensure efficient monitoring and enhancement of your network security posture and operations. Read More...
Network Appliance to Ship Sub-$10K Caching Hardware
Network Appliance, the current Web caching market leader, announced its first under-$10,000 caching appliance.

network ice  Ship Sub-$10K Caching Hardware Network Appliance to Ship Sub-$10K Caching Hardware R. Krause - June 6, 2000 Event Summary May 01, 2000 [Network Appliance et al.] Network Appliance announced it will start shipping its first Internet caching device priced below $10,000. The company expects to start shipping them later this month. Network Appliance's new system, the rack-mountable NetCache C1100, is due to ship in the U.S., Europe and Asia by the end of May, priced from $5,950. The lower price and smaller Read More...
Network Associates Hopes to Rekindle the Flame
Though the security market has been exploding, Network Associates, Inc. (NAI) will likely post a loss for FY'99. However, don't expect the security monolith to

network ice  re-brand itself as a Network Tools company. As year 2000 gets underway, with a new concentrical ASPish focus, NAI expects to take the Network Tools story, throw in some management, and evolve into a Distributed Systems Management company. Today NAI is trying to brand itself as The World-leader in Security and Availability for E-Business. Since it is common knowledge in the world of information security that security is often contrary to availability, it is clear that NAI hopes to dispel this myth Read More...
Network Security Management
In the converging network and security infrastructure, relating what is reported from security products to what is observed on the network is critical. Q1 Labs’

network ice  Management In the converging network and security infrastructure, relating what is reported from security products to what is observed on the network is critical. Q1 Labs’ network security management product, QRadar, combines network behavioral analysis with vulnerability assessment and security event correlation into one platform. Ultimately, this convergence reduces IT acquisition and operations costs, and enhances responses to network security incidents. Read More...

Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others