Whitepapers

Protecting VMware Virtual Machines, Achieve Long-Term Data Retention

Introduction

VMware is increasingly prevalent in today’s business atmosphere. VMware customers need efficient, high performing, and reliable backup systems that are easily integrated into the vSphere environment. With increasing virtual machine (VM) count, keeping backup infrastructure costs under control can be challenging. HP StoreOnce Backup systems provide a disk-based data protection platform, while addressing data growth by applying HPStoreOnce deduplication software for efficient, longer term data retention.

The HP StoreOnce B6200 Backup system, the latest deduplication appliance in the HP StoreOnce product line, provides a unique combination of features, including industry-leading performance (up to 100 TB/hr), high-availability, and highcapacity making the HP StoreOnce B6200 Backup system the industry leader in the enterprise deduplication sector. 

HP StoreOnce Catalyst software was developed to dramatically improve the performance, function, and integration of backup applications such as HP Data Protector. HP StoreOnce Catalyst delivers deduplication on an appliance server, media server, or dedicated appliance. Since it uses the same deduplication algorithm globally, data can be moved between Catalyst Stores on different platforms without rehydration. HP StoreOnce Catalyst allows better utilization of advanced, disk-based storage solutions while increasing efficiency and performance.

This document describes the benefits of using HP StoreOnce Backup systems combined with HP StoreOnce Catalyst software and HP Data Protector along with VMware vStorage APIs for Data protection (VADP) and Media agent in VM to backup VMware VMs. This document also recommends backup and recovery implementations.

Transportation Analytics: Driving Efficiency, Reducing Congestion, Getting People Where They Need To Go Faster

Transportation Analytics
Driving efficiency, reducing congestion, getting people where they need to
go faster.

Transportation—the effective movement of people and things—has long been critical to economies and qualities of life worldwide. Inefficiencies cost money, increase pollution-causing emissions and take time away from people’s lives. The problem is, the supply of transportation infrastructure grows more slowly than demand. Cars can be built more quickly than roads. Cities grow faster than highways can be expanded. Even if there were a limitless supply of money and personnel for road construction, many areas are already built out. That is why the transportation industry is turning to business analytics to find smarter ways to use the resources that exist, reduce congestion, and improve the travel experience. Just think of how monumental the impact would be if every person could get where he or she needed to go, or find a parking spot, five minutes faster each day.

Clearly, organizations that put to use their existing data are the ones that can uncover new ways to operate more efficiently and sustainably, and improve the quality of life for the people they serve.

Understanding the Trends

The transportation industry is no newcomer to the world of business analytics or the collection of data, but, until recently, the data sources were not connected. Transit executives could determine how many people took a bus or train on any given day, but didn’t know anything about the individual rider. Was this a regular route? Did he or she also drive a car on occasion? They didn’t have access to this type of information that could help improve route design or increase ridership levels. Each form of transportation operated within a standalone system, which made it difficult toachieve a big picture view.

Transforming Communications: From Information Overload to Customer Engagement

Harnessing the Power of the Data Explosion

We live in a world transformed by data. The opportunities available to businesses and their customers for increased levels of engagement and understanding are exponential but at times overwhelming. Organizations struggling to harness this deluge of data can find themselves spending unnecessarily on duplicate mailings to the same household or missing opportunities to engage more cheaply and efficiently online. Customer experience may be hurt by brand inconsistency across channels and internal silos that impede resolution of service issues. And incremental revenue is often left on the table when cross-sell and upsell opportunities are either disconnected or poorly aimed.

For businesses operating in a regulated environment, the challenges of the data explosion are even more complex. Industries like financial services, telecommunications and healthcare must comply with ever increasing regulation, along with privacy and data protection laws that vary from one geography to the next. Disparate standalone databases and fragmented processes for creating and delivering content make managing compliance across a myriad of customer touchpoints both a significant and risky undertaking.

However, for progressive organizations, the pressures of regulatory compliance coupled with the challenges of today’s data overload can actually be a springboard to more effective multichannel communications.

The same single customer view (SCV) with cross-channel integration that enables the operational control and accuracy essential for compliance is also the key to effective, data-driven marketing. The benefits for businesses that execute well can include lower cost, improved revenue and increased customer satisfaction. With increased regulation now mandating standard operating procedures for many companies, some have posed that the ability to deliver an outstanding customer experience within regulatory constraints can actually become an important differentiator.

This will certainly be true in healthcare, where a perfect storm of regulation, pressure to cut costs and the need to control prices is forcing health insurers to look for new ways to interact with their members. And forthe telecom industry, where year-over-year churn can run as high as 30%, the ability to deliver a personalized experience across the consumer lifecycle—activation, billing, problem resolution—becomes critical to decreasing churn.

Integrated Communications in Insurance: The Road to New Winning Strategies

New Winning Strategies in Insurance

Integrated communications is a key lever for success in the insurance industry. The management of all forms of communications content and information is increasingly being viewed as a strategic business issue.

In fact, recent research indicates that insurers are investing in communications and content management to help drive top line growth*. The scope of what must be integrated continues to expand well beyond paper, and includes electronic and telephone-based content being exchanged through a variety of channels. Obviously, it is still important to run efficient operations and stay compliant, but there is a new level of appreciation for how the quality, availability, accuracy, and completeness of information can significantly impact relationships with customers, prospects, agents and brokers, and third party partners. It goes beyond documents and forms. Fully integrated communications encompasses all types of interactions that an insurance company has with others, especially the customer.

Customers and others expect personalized service delivered in a customized approach with tailored information. The standards for competing have changed and continue to change. Integrated communications is a major factor for building long-term strategic strength. The changing landscape of communications and customer expectations threatens some insurers – but creates new ways to win for those willing and able to grasp the opportunities, with greater rewards for those that act now. 

Ricoh HotSpot Printer/MFP Whitepaper

Introduction

The purpose of this whitepaper to address some of the most frequently posed security and system reliability questions.

What is a HotSpot Printer?

The Ricoh HotSpot printer allows people to print simply by sending an email or submitting print requests from a webpage.

This simple and intuitive interface allows use without the need for print drivers or any extra software. This eliminates IT overhead and time used in setup and configuration for mobile or temporary users.

There are two methods for submitting print jobs:

Email – Users submit their print jobs by simply forwarding an email to the printer’s email address. This can be done from any computer or handheld device that supports email. The user will then receive an email response with a release code for the body of the email and a separate email and release code for each attachment. Simply enter this release code at the printer keypad to begin printing the document or email.

Web Submission – Documents may also be submitted through a web browser by visiting the printer’s webpage. Users simply select the browse button to identify the document they would like to submit for printing and then provide an email address before submitting the print request. They will receive a release code on the webpage as well as a copy of the code via email. When the code is entered at the printer keypad the job will begin printing. 

Fiery Security White Paper: Fiery System 10, Version 2.4

1 Document Overview

This document gives end users an overview of the Fiery® server’s architecture and functional aspects as they relate to device security in the System 10. It covers hardware, network security, access control, operating system and data security. The document’s intent is to help end users understand all the Fiery server’s security features that they can benefit from and to understand its potential vulnerabilities.

1.1 Electronics For Imaging (EFI) Security Philosophy

EFI™ understands that security is one of the top concerns for business worldwide today, so we’ve built strong security features into the Fiery servers to protect companies’ most valuable assets. We also proactively work with our global OEM partners and our cross-functional teams to determine companies’ current and future security requirements, so security doesn’t become an issue with our products. As always, we still recommend that end users combine Fiery security features with other safeguards, such as secure password and strong physical security procedures, to achieve overall system security.

1.2 Configure the Security Feature via Fiery Configure

An Administrator of a Fiery server can configure all Fiery features via Fiery Configure. Fiery Configure can be launched from Fiery Command WorkStation® or Webtools™ under the configure tab. 

Fiery Security White Paper Fiery FS100 and FS100 Pro, Version 2.6.1

1 Document Overview

This document gives end users an overview of the Fiery® server’s architecture and functional aspects as they relate to device security in Fiery FS100 Pro/FS100. Fiery server is available in two options, an embedded server option and a stand-alone server option. This document refers to the embedded server option as integrated Fiery server and refers to both options as Fiery server. It covers hardware, network security, access control, operating system and data security. The document’s intent is to help end users understand all the Fiery server’s security features that they can benefit from and to understand its potential vulnerabilities.

1.1 Electronics For Imaging (EFI) Security Philosophy

EFI™ understands that security is one of the top concerns for business worldwide today, so we’ve built strong security features into the Fiery servers to protect companies’ most valuable assets. We also proactively work with our global partners and our cross-functional teams to determine companies’ current and future security requirements, so security is never an issue with our products. As always, we still recommend that end users combine Fiery security features with other safeguards, such as secure password and strong physical security procedures, to achieve overall system security.

1.2 Configure the Security Feature via Fiery Configure

An Administrator of a Fiery server can configure all Fiery features via Fiery Configure. Fiery Configure can be launched from Fiery Command WorkStation® or Webtools™ under the configure tab. 

Protect Enterprise Data, Achieve Long-Term Data Retention

Introduction

In today’s business environment, customers rely on the most efficient, high- performing, and reliable backup systems to protect critical business information. Customers need to protect increasing levels of data while keeping costs under control. HP StoreOnce Backup systems provide a disk-based data protection platform while addressing data growth by applying HP StoreOnce deduplication software for efficient, long-term data retention.

The HP StoreOnce B6200 Backup system, the latest deduplication appliance in the HP StoreOnce product line, provides a unique combination of features, including industry-leading performance (up to 100 TB per hour), high availability, and high capacity making the HP StoreOnce B6200 Backup system the industry leader in the enterprise deduplication sector. 

HP StoreOnce Catalyst software was developed to dramatically improve the performance, function, and integration of backup applications such as Symantec NetBackup. HP StoreOnce Catalyst delivers deduplication on an appliance server, media server, or dedicated appliance. Since it uses the same deduplication algorithm globally, data can be moved between platforms without rehydration. HP StoreOnce Catalyst allows better utilization of advanced, disk-based storage solutions while increasing efficiency and performance.

This document describes the benefits of using HP StoreOnce B6200 Backup systems combined with HP StoreOnce Catalyst software and Symantec NetBackup to back up important enterprise data. This document also recommends backup and recovery implementations.

Integrated Communications in Insurance: The Road to New Winning Strategies

New Winning Strategies in Insurance

In fact, recent research indicates that insurers are investing in communications and content management to help drive top line growth*. The scope of what must be integrated continues to expand well beyond paper, and includes electronic and telephone-based content being exchanged through a variety of channels. Obviously, it is still important to run efficient operations and stay compliant, but there is a new level of appreciation for how the quality, availability, accuracy, and completeness of information can significantly impact relationships with customers, prospects, agents and brokers, and third party partners. It goes beyond documents and forms. Fully integrated communications encompasses all types of interactions that an insurance company has with others, especially the customer.

Customers and others expect personalized service delivered in a customized approach with tailored information. The standards for competing have changed and continue to change. Integrated communications is a major factor for building long-term strategic strength. The changing landscape of communications and customer expectations threatens some insurers – but creates new ways to win for those willing and able to grasp the opportunities, with greater rewards for those that act now.

What VoIP Requires From a Data Network

Introduction

Here is a very common story. A customer has a data network based on TCP/IP that is working well. He can transfer files and run networked database applications among several locations with adequate speed and efficiency. He can also browse the Web and download files from the Internet.

He installs VOIP devices at each of his sites and connects them to the data network. The voice technology works very poorly. He has intermittent problems with sketchy voice quality, dropouts in conversation, even dropped or incomplete calls. His sturdy data network, which works fine for all kinds of data applications, barely works at all for voice applications.

The difficulty lies in the fact that voice applications require the network to provide some features that are not very important to data applications. File downloads and database programs require every byte to be delivered correctly, but they are flexible with regard to how long it takes to get the bytes from one location to another. Voice, on the other hand, requires the bytes to arrive in a very timely manner, although it is more flexible about losing a few bytes here and there.

In this document, we will address the issues that cause this situation and describe what is necessary to avoid it. These issues are network quality, available bandwidth, and packet competition. We will try to provide the reader with an understanding of what should be considered in planning a VOIP installation so that there will not be any unpleasant surprises.

Pages