HIT Consultant Insightful coverage of healthcare innovation
 

2014

Results 176 - 200 of 354Sort Results By: Published Date | Title | Company Name
Published By: McAfee     Published Date: Nov 12, 2014
Gartner recognizes McAfee as a visionary in the Gartner Magic Quadrant for Secure Email Gateways, as published on July 1, 2014.
Tags : 
gartner magic quadrant, secure email gateways
    
McAfee
Published By: CDW     Published Date: Mar 18, 2016
The number of mobile devices managed by enterprises increased 72 percent from 2014 to 2015. This onslaught of technology such as notebooks, smartphones, tablets, watches and gadgets has transformed the way users work. These devices provide users in just about every sector with access to the information and tools they need to do their jobs, wherever and whenever they need them. They’re free to work at their desks, in conference rooms, while visiting clients on the road or during a child’s baseball practice. They can input data directly into a medical chart, an order form or an inspection report, rather than doubling their work by transcribing handwritten notes later in the day.
Tags : 
    
CDW
Published By: Secunia     Published Date: Sep 30, 2015
In 2014, the world saw an increased number of security breaches in high profile companies. We will take a look back at some of these cases, and why it’s not only the high profile companies that were breached. Plus we will show you steps you can take to prevent yourself from being hacked in 2015. We will focus on “getting back to the basics” going into detail on why complete patch management means a safer year for any organization.
Tags : 
managing vulnerability, security breaches, security threats, hack prevention, third party software
    
Secunia
Published By: Ayla Networks     Published Date: Feb 10, 2016
In July 2014, a Forbes business article declared: “The Internet of Things (IoT) is changing manufacturing as we know it.” From boosting efficiency, to reducing costs, and gaining a competitive edge, the IoT is widely seen as the future for manufactured products. But it’s an enormous leap for manufacturers to go from making traditional, everyday products to making connected IoT products.
Tags : 
    
Ayla Networks
Published By: McAfee     Published Date: Jan 28, 2014
Leading analyst firm Gartner has positioned McAfee as a Leader in the Gartner Magic Quadrant for Endpoint Protection Platforms for six consecutive years.
Tags : 
gartner, endpoint protection
    
McAfee
Published By: McAfee     Published Date: Jan 22, 2014
Leading analyst firm Gartner has positioned McAfee as a Leader in the Gartner Magic Quadrant for Endpoint Protection Platforms for six consecutive years.
Tags : 
mcafee, gartner, endpoint protection
    
McAfee
Published By: Kenshoo     Published Date: Oct 30, 2012
Per eMarketer, almost four billion dollars in advertising budgets were spent on Facebook ads during the past year, and that number is expected to grow to more than six billion in 2014. Read on to learn about efficient gender targeting with Facebook.
Tags : 
kenshoo, facebook, targeting, facebook ads, gender targeting, social networks, user engagement
    
Kenshoo
Published By: Dell     Published Date: May 13, 2016
Your growing business shouldn't run on aging hardware and software until it fails. Adding memory and upgrading processors will not provide the same benefits to your infrastructure as a consolidation and upgrade can. Upgrading and consolidating your IT infrastructure to the Dell PowerEdge VRTX running Microsoft Windows Server 2012 R2 and SQL Server 2014 can improve performance while adding features such as high availability.
Tags : 
    
Dell
Published By: Dell EMC     Published Date: May 11, 2016
Your growing business shouldn't run on aging hardware and software until it fails. Adding memory and upgrading processors will not provide the same benefits to your infrastructure as a consolidation and upgrade can. Upgrading and consolidating your IT infrastructure to the Dell PowerEdge VRTX running Microsoft Windows Server 2012 R2 and SQL Server 2014 can improve performance while adding features such as high availability.
Tags : 
    
Dell EMC
Published By: Cyveillance     Published Date: Jun 20, 2014
Learn about the recent trends and the 2014 outlook for the mobile security threat landscape. Find out how your organization can better prepare to prevent threats that could disrupt your business.
Tags : 
cyveillance, mobile security, cyberattacks, threats, malicious attacks
    
Cyveillance
Published By: NEC     Published Date: Aug 12, 2014
NEC has introduced the Express5800/A2000 Series Servers to accommodate enterprise application demands with peak server reliability, availability, and serviceability. The new server architecture and NEC engineering functionality align well with many of the most important IT priorities in 2014, including virtualization, big data and advanced data analytics. With the Express5800/A2000 Servers, NEC has the opportunity to educate application owners and work with system integrators to drive awareness and ultimately investment in its new server platform, which will help drive customer value. In this white paper, you will learn how these next-generation servers from NEC are ready to accommodate some of today’s demanding workloads.
Tags : 
servers, virtualization, customer value, analytics, application owners, system integrators, big data, reliability, enterprise, availability, serviceability, processor, architecture, express, stress
    
NEC
Published By: Windstream     Published Date: Aug 12, 2015
Discover top trends and best practices for moving UC to the cloud in this Nemertes Report.
Tags : 
windstream, solutions, smart, personalized, service, enterprise technology, cloud, computing, data center, innovation, strategy, expansion, customer service, agility, migration, performance, complexity, system, value, roi
    
Windstream
Published By: Windstream     Published Date: Oct 30, 2015
Discover top trends and best practices for moving UC to the cloud in this Nemertes Report.
Tags : 
    
Windstream
Published By: Windstream     Published Date: Oct 30, 2015
Discover top trends and best practices for moving UC to the cloud in this Nemertes Report.
Tags : 
    
Windstream
Published By: Windstream     Published Date: Oct 30, 2015
Discover top trends and best practices for moving UC to the cloud in this Nemertes Report.
Tags : 
    
Windstream
Published By: Windstream     Published Date: Oct 30, 2015
Discover top trends and best practices for moving UC to the cloud in this Nemertes Report.
Tags : 
    
Windstream
Published By: Windstream     Published Date: Oct 30, 2015
Discover top trends and best practices for moving UC to the cloud in this Nemertes Report.
Tags : 
    
Windstream
Published By: Windstream     Published Date: Oct 30, 2015
Discover top trends and best practices for moving UC to the cloud in this Nemertes Report.
Tags : 
    
Windstream
Published By: Windstream     Published Date: Oct 30, 2015
Discover top trends and best practices for moving UC to the cloud in this Nemertes Report.
Tags : 
    
Windstream
Published By: Workforce Software     Published Date: Dec 16, 2015
Do you want to know how other organizations design, execute, and measure workforce management programs? Here’s your chance.
Tags : 
workforce software, software, automation, budgets, costs, compliance, visibility, labor, productivity, risk, attendance, work ours, pay rate, absence, alerts, support, policies, integration, cloud, enterprise
    
Workforce Software
Published By: JBoss Developer     Published Date: Oct 21, 2016
In April 2014, Nissan opened a new production plant in Rio de Janeiro, Brazil with an annual production capacity of 200,000 vehicles and 200,000 engines. Along with a target of reaching 5% market share in Brazil by 2016, the plant’s opening was aligned with Nissan’s efforts to achieve 8% global market share, part of the “NISSAN POWER 88” five-year mid-term management plan initiated in 2011. To help align their strategic and business goals with their use of technology, Nissan chose Red Hat JBoss BRMS to replace their legacy system.
Tags : 
nissan, production, it optimization, strategic partners, data
    
JBoss Developer
Published By: IBM     Published Date: Apr 07, 2015
This 2H-2014 Value Matrix by Nucleus Research evaluates all major BI vendors and their ability to deliver value based on usability, functionality and projects 6-month trends for each vendor to identify best-of-breed capabilities in various dimensions that have evolved in the marketplace.
Tags : 
ibm, nucleus research, market analysis, business intelligence, anallytics market
    
IBM
Published By: Okta     Published Date: Oct 30, 2015
Microsoft made a massive push to the cloud in 2014, and as a result Office 365 is taking off. However, Office 365 is unlike any other cloud app in it's complexity. Read this eGuide to learn how IT can eliminate the identity and mobility management that accompany an office 365 migration.
Tags : 
microsoft, cloud, office 365, cloud app, identity and mobility management
    
Okta
Published By: Okta     Published Date: Nov 09, 2015
Microsoft made a massive push to the cloud in 2014, and as a result Office 365 is taking off. However, Office 365 is unlike any other cloud app in its complexity. Read this eGuide to learn how IT can eliminate the identity and mobility management that accompany an Office 365 migration.
Tags : 
okta, office 365, microsoft, cloud services, mobility management, identity management, office 365 migration
    
Okta
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.