OPTIMA IT Consulting Image Map

WHITE PAPERS

Networking
Networking
 

Critical Steps for a Successful VOIP Deployment

Deploying IPSec Virtual Private Networks

Guide To Network Security

iSeries High Availability-Why it Has Become so Affordable and Easy to Use

Reduce Costs, Minimize Risk and Improve Network Performance with Managed Services

Testing Challenges for 10Gbs Ethernet over Twisted Pair Cabling

VoIP Implementation Guide for Network Performance Management

VoIP Implementation Guide for Network Performance
 
Infrastructure, Compliance, Management, Monitoring,
Servers, WAN, Optical Networks, Best Practices, Clustering
 
Wireless
Hardware, Messaging, Security, Infrastructure, Service Providers
 
Software Development
.NET, C/C++, Java, XML,
 
Web Services
 

An Agile Framework For Fast Flexible Low-Risk Service Deployments

Enabling Convergence- Taking Advantage of Services Over IP

Maximizing the Business Value of IT

Maximizing B2B and SCM Integration In Network

Troubleshooting .NET Applications- Knowing Which Tools to Use and When
 
Open Source, Middleware
 
Enterprise Applications
Application Integration, Best Practices,
 
Business Intelligence
 
Planning for CMDB Design and Adoption
Basic Content Management
Business Analytics
Customer Centric Breakthroughs
Enterprise Content Management- What You Need to Know
   
Windows, Linux, Oracle, Exchange Server,Business Process Management, Call Center Management, Call Center Software, Corporate Governance, s
 
CRM
 

3 Easy Ways to Get More From Your Investment in CRM

Making Smart Choices in Evaluating CRM Software

Successful CRM: Turning Customer Loyalty into Profitability

The Insider’s Guide to Great Customer Service on the Web
   
Customer Interaction Services, Customer Satisfaction, Supply Chain Management, Management
Security
Security
 

A Buyers Guide to Spam Filtering

Protecting Your Network From Wireless Attacks

Putting Anti Spam Solution to the Test Before You Buy

Ten Remote Access Tips in 10 Minutes

The Spyware Epidemic- Dealing with legal malicious code

Using SSL VPNs to Secure Microsoft Terminal Services and Citrix Metaframe Environments
 
Access Control, Authentication, Continuity, Digital Certificates, Disaster Recovery, Encryption, Firewalls, Identity Management, Intrustion Detection/Prevention
 
Data Management
Hardware, Messaging, Security, Infrastructure, Service Providers
 
Business Intelligence
 
Planning for CMDB Design and Adoption
Basic Content Management
Business Analytics
Customer Centric Breakthroughs
Enterprise Content Management- What You Need to Know
   
Data Integration, Data Warehousing, Analytical Applications, Data Protection, Database
 
Storage
Storage
   
Managing Storage as Part of the Business
   
Backup & Recovery, RAID, Storage Area Networks
 
Platform & OS

Windows, Linux, Oracle, Exchange Server,