HIT Consultant Insightful coverage of healthcare innovation
 

2014

Results 151 - 175 of 354Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Feb 11, 2015
Who can you trust? Learn from the IBM X-Force team in this new quarterly report how the Internet of Things and IP reputation tracking are transforming the security landscape.
Tags : 
ibm, ibm x-force, ip reputation tracking, iot, security landscape
    
IBM
Published By: GE Healthcare     Published Date: Mar 04, 2014
Why prepare now for ICD-10? While the October 1, 2014 deadline for compliance may seem to be in the distant future, an informative whitepaper by GE Healthcare describes the importance of advance planning and outlines a plan for success.
Tags : 
ge healthcare, icd-10, service delivery, billing, claims processing, reimbursement, project management, emr
    
GE Healthcare
Published By: Cisco     Published Date: Apr 10, 2015
Location-based services (LBS) show promise as a budding customer-centric mobility solution in some early adopting verticals such as retail, hospitality, and large public venues. Such services enable businesses to better understand their customer base through analytics as well as offer targeted, context-based communications including promotions and remote assistance. This IDC white paper explores the burgeoning LBS market, highlighting custom research conducted by IDC in March and April 2014; surveys were fielded to both IT and line-of-business (LOB) decision makers in select verticals and market segments. In this white paper, IDC analyzes the data and explores the attitudes surrounding LBS adoption in the context of broader technology trends.
Tags : 
cisco, lbs, it technology, wifi, analytics, wireless networks
    
Cisco
Published By: IBM     Published Date: Apr 09, 2015
IDC collected and analyzed data on 11 MSSPs within the 2014 IDC MarketScape worldwide managed security services market assessment. While the market arena for MSS is very broad and there are many suppliers that offer these services, IDC narrowed down the field of players that participate in worldwide MSS based on the following criteria: Service capability across the MSS life cycle; Revenue and Geographic presence.
Tags : 
mssp, idc, idc marketscape, global managed security services, ibm
    
IBM
Published By: IBM     Published Date: Jan 16, 2015
Read the 2014 IDC MarketScape for Worldwide B2B Integration Gateway Software to learn what’s causing so many businesses to adopt advanced integration solutions, and discover why IBM is positioned as a Leader in this vendor assessment.
Tags : 
ibm, industry solutions, b2b, b2b integration, software, integration gateway software, integration solutions
    
IBM
Published By: IBM     Published Date: Mar 18, 2015
Read the 2014 IDC MarketScape for Worldwide B2B Integration Gateway Software to learn what’s causing so many businesses to adopt advanced integration solutions, and discover why IBM is positioned as a Leader in this vendor assessment.
Tags : 
b2b integration, compliance, b2b networks, integration gap, impediment, customer satisfaction, integration initiatives, integration gateway
    
IBM
Published By: IBM     Published Date: Mar 17, 2015
This is IDC’s first MarketScape evaluating Digital Commerce Applications, and IBM was listed as a leader. It is the first ranking report from the analysts that takes a broader view of the commerce market.
Tags : 
digital commerce, ibm, vendor assessment, idc marketscape, commerce market
    
IBM
Published By: Jive     Published Date: Feb 12, 2015
Enabling a "digital business" is becoming an increasing priority for organizations; the transition to enabling a digital interaction model inside an organization is twofold. There are technologies that underpin interactions as well as the cultural and behavioral changes that support this transition. Enterprise social networks (ESNs), and more broadly, social workflow, can play a significant role in this particularly when thought of as both a platform and a social workflow embedded in business systems where users are getting work done. This study identifies several key areas of market opportunity and provides criteria by which vendors can be judged now and over the next 5 years.
Tags : 
enterprise, transition, interaction, digital business, social networks, vendor evaluations, vision, communication
    
Jive
Published By: Aruba Networks     Published Date: Nov 15, 2013
The content for this excerpt was taken directly from the IDC MarketScape: Worldwide Enterprise WLAN 2013-2014 Vendor Analysis by Rohit Mehra (Doc # 231686). All or parts of the following sections are included in this excerpt: IDC Opinion, In This Study, Situation Overview, Future Outlook, Essential Guidance, and Synopsis.
Tags : 
idc, marketscape, enterprise wlan, vendor analysis, brod, wireless lan, increase mobility, mission-critical mobility applications
    
Aruba Networks
Published By: Exablox     Published Date: Jan 27, 2015
Object-based storage (referred to as OBS throughout this document) platforms continue to perpetuate cloud and enterprise IT infrastructure. As businesses move toward petabyte-scale data storage, OBS solutions are turning out to be the right choice for balancing scale, complexity, and costs. By way of their core design principles, OBS platforms deliver unprecedented scale at reduced complexity and reduced costs over the long term. Early OBS platforms suffered from "necessity crisis," were too cumbersome to deploy and, in some cases, caused a platform lock-in because of their proprietary access mechanisms. In spite of their from-the-ground-up design, a departure from how traditional SAN and NAS arrays are deployed and, more importantly, a lack of standard interfaces made it difficult for IT organizations to deploy OBS solutions in the infrastructure. Thanks to Amazon S3 and OpenStack Swift becoming de facto access interfaces, this situation has changed.
Tags : 
network attached storage, nas arrays, storage efficiency, idc storage marketscape, storage data resiliency, storage platform scalability, exablox, oneblox
    
Exablox
Published By: VMware     Published Date: Feb 24, 2017
The enterprise mobility management (EMM) software market continues to grow, and VMware AirWatch® accounts for 16.5 percent of the total EMM software market, the largest market share of any vendor today. IDC calls AirWatch a “top-tier vendor” with a “phenomenal growth rate,” increasing market share from 11.4 percent in 2014 to 16.5 percent in 2015.
Tags : 
    
VMware
Published By: EMC Corporation     Published Date: Feb 13, 2015
This IDC study provides detailed insights into the rapidly growing market for enterprise storage systems that leverage flash storage media. This study segments this market into the following two technology segments: AFAs and HFAs. Insights into these two market segments are provided historically. Market shares and IDC analysis are provided for each of the top vendors in these two segments along with detailed market-level analysis.
Tags : 
all-flash-array, enterprise storage systems, flash storage, market-level analysis, hybrid flash array
    
EMC Corporation
Published By: Dell EMC     Published Date: May 15, 2015
This IDC study provides detailed insights into the rapidly growing market for enterprise storage systems that leverage flash storage media. This study segments this market into the following two technology segments: AFAs and HFAs. Insights into these two market segments are provided historically. Market shares and IDC analysis are provided for each of the top vendors in these two segments along with detailed market-level analysis.
Tags : 
emc, storage all-flash, architectures, workload, data center, scale, storage, hybrid
    
Dell EMC
Published By: Imprivata     Published Date: Sep 23, 2014
The Imprivata 2014 Desktop Virtualization Trends in Healthcare report is the company’s fourth-annual study to identify desktop virtualization adoption trends in healthcare.
Tags : 
imprivata, desktop virtualization, healthcare, trends, us healthcare industry, hipaa, phi, sso
    
Imprivata
Published By: F5 Networks Singapore Pte Ltd     Published Date: May 27, 2019
What you can’t see will hurt you The situation is critical, because the percentage of encrypted user traffic has more than doubled since 2014, exceeding 80 percent, according to F5 Labs' 2017 TLS Telemetry report. So, of course, now there are SSL visibility solutions that provide decryption services allowing those security controls to see what they’re doing. But visibility, by itself, isn’t enough. Security teams and network operations have found that setting up decryption zones is not easy. Security teams often have to resort to manual daisy-chaining or tedious configuration to manage decryption/encryption across the entire security stack. And then they find that exceptions abound. And lastly, you need to scan your inbound and outbound traffic for tomorrow’s threats, and SSL Orchestrator is the tool that lets your security controls keep your organization’s name out of the papers and away from those pesky GDPR fines. Download the eBook to find out how you can gain visibility into e
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: SilverSky     Published Date: Dec 11, 2014
Forrester's 26-criteria evaluation of managed security service providers (MSSPs) included the 13 most significant vendors in the North American market that security and risk professionals can turn to for solving some of their most important security challenges. Forrester’s assessment evaluates MSS offerings based on current offering, market presence and strategy. SilverSky was named a “leader” in the report, with highest marks for delivery capabilities and services and its market presence in North America. Forrester states in the report that, “SilverSky capabilities rival those of larger companies."
Tags : 
mssps, managed security service, security challenges, security professionals
    
SilverSky
Published By: Intralinks     Published Date: Apr 13, 2015
The truth is that they can get a lot worse – and no one is immune. Your company’s data has never been at greater risk. There is no doubt that 2014 was a dire year for many organizations, as they failed to properly protect their computer systems and the data held upon them. As if it wasn’t bad enough keeping on top of new zero-day vulnerabilities, targeted attacks, and revelations of state-sponsored espionage, users are potentially exposing companies’ most important data by not following best practices and using consumer-grade cloud services that aren’t built with enterprise needs in mind. An ever more mobile workforce wants to work on their files remotely but may be taking dangerous risks with sensitive corporate data at the same time. In this white paper, we detail some of the biggest computer security threats of the last year and offer some predictions on what we can expect to see in 2015.
Tags : 
    
Intralinks
Published By: Cyveillance     Published Date: Apr 03, 2015
In this white paper, we recap notable trends and events in information security from 2014 and look forward to what information security professionals should expect in 2015. The past year was a landmark one in the information security field, with massive data breaches capturing the public’s attention, powerful bugs causing headaches for IT teams and end users, DDoS attacks breaking records, and phishing remaining a general annoyance – or worse – for all Internet users. In this whitepaper, we discuss these trends as well as key areas of concern for 2015, including: - The impact of the Internet of Things - The growing importance of threat intelligence - The increasing influence of BRICS nations - The evolution of encryption standards - The changing role of the CISO
Tags : 
information security threat, information security, protection, security breach, internet security
    
Cyveillance
Published By: Absolute Software     Published Date: May 31, 2016
With companies embracing mobility to maintain competitive advantage in the digital era, information security threats have increased exponentially. Userfriendly technologies such as mobile devices, mobile apps, and cloud storage are often hacker-friendly too, creating opportunities for cybercriminals to covertly infiltrate company data. This opens the door to data loss, reputational damage, loss of proprietary information – not to mention the associated regulatory penalties and potential legal fees. IT bears the brunt of responsibility for information security, yet according to Forrester, internal incidents top the list of security breach causes in 2014.
Tags : 
mobility, competitive advantage, best practices, mobile devices, mobile applications
    
Absolute Software
Published By: Symantec     Published Date: Jan 15, 2014
This year’s ISTR once again covers the wide-ranging threat landscape, with data collected and analyzed by Symantec’s security experts. In this summary, we call out seven areas that deserve special attention.
Tags : 
symantec, cyberespionage, mobile security, mobile device security, threat report, cyberattacks, cyber attacks, data protection
    
Symantec
Published By: HP     Published Date: Oct 01, 2014
If your company is using cloud computing services today, it’s highly likely you are already in a hybrid cloud configuration. The key question is whether you are actively managing this reality. In January 2014, HP commissioned Forrester Consulting to evaluate the state of enterprise hybrid cloud environments and how they are being managed. Forrester developed a hypothesis that tested the assertion that enterprise IT operations teams struggle to recognize and manage this hybrid state — a hypothesis that was proven out.
Tags : 
hybrid, cloud, world, state, company, managing, reality, enterprise
    
HP
Published By: TIBCO Software     Published Date: May 31, 2018
Since it first started providing air passenger services in 2000, JetBlue has been innovating. It was the first airline to embrace dot.com transactions and electronic ticketing, and continues to churn out industry-leading inventions as described here. When business needs changed in 2014, JetBlue embarked on very robust digital transformation based on TIBCO integration and analytics technology—and the company was recognized with the first-ever TIBCO Trailblazer Impact award for the incredible effect this project was having on its strategic differentiation. In this case study, Director of Shared Development Services Andi Azzolina describes the objectives, initiatives, capabilities, and achievements making up JetBlue’s journey towards becoming the most caring travel provider in the world.
Tags : 
    
TIBCO Software
Published By: hightail     Published Date: Jan 17, 2014
Learn 5 ways the cloud will enhance your professional life in 2014 and how understanding the technology will improve how organizations store and share files.
Tags : 
    
hightail
Published By: Olapic     Published Date: Sep 09, 2014
When the numbers get this big, we tend to think of them only in the abstract: 500 million photos were shared per day in 2013 and 1.8 billion photos are being shared per day in 2014. That’s 75 million per hour, 1.25 million per minute and 20,833 per second. Olapic’s new visual commerce white paper places this content explosion in context. We filled it with data that matters, insights from our experience with over 150 brands and retailers, and strategic guidance for companies ready to plan their approach to the visual commerce opportunity. Download From Ripple to Wave: The Ascent of Authentic Visual Content now.
Tags : 
user generated content, visual commerce, visual marketing, visual content
    
Olapic
Published By: Interactive Intelligence     Published Date: Jan 17, 2014
Learn about how the expanding guidelines for compliance have changed and how compliance has never been more relevant within the Accounts Receivable Management (ARM) industry.
Tags : 
compliance, cloud solutions, interactive intelligence, customer support, workforce management, data solution, customer experience
    
Interactive Intelligence
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.