Similar Articles |
|
InternetNews February 10, 2011 Sean Michael Kerner |
LogRhythm Pattern Tech Targets Network Security LogRhythm, a security information and event manager vendor, unveils its Advanced Intelligence Engine, using pattern recognition technology to shore up networks. |
InternetNews August 20, 2010 |
LogLogic Preps New Approach to Log Wrangling LogLogic bets its solution for collecting WAN log file data is headed for standardization. Not everyone agrees, however. |
Wall Street & Technology September 20, 2007 Melanie Rodier |
Study Shows Most Enterprises Lack a Strategic Security Vendor A report shows though most enterprises across industries do not have a strategic security vendor, nearly all plan to invest more in security solutions in the next 12 to 18 months. |
InternetNews December 15, 2008 Richard Adhikari |
Intelligent Log Analysis May Beef up Security Security logs could help detect and prevent security breaches, but analyzing their reports is so boring that they're underutilized. |
Linux Journal April 2000 Gaelyne R. Gasson |
Web Analysis Using Analog Every web site needs a way to get accurate statistics--here's a freely available program to give you that information. |
CRM September 2010 Daniel Hong |
Hosted Contact Center Implementations Understanding how to make incremental changes in contact center operations to optimize customer care and control long-term costs without disrupting service delivery is the key determinant to success for implementing a hosted contact center. |
InternetNews December 19, 2005 Paul Shread |
Storage Analysts See Solid 2006 Analysts from Robert W. Baird & Co. are predicting a solid year ahead for the storage market. Among the surprises: tape is alive and well. |
InternetNews November 9, 2010 |
Enterprise 2.0: A Surprise Social Media Convert Even the Luddites at the State Department have adopted social media. So what can enterprises learn from that experience? |