HIT Consultant Insightful coverage of healthcare innovation
 

2015

Results 351 - 375 of 558Sort Results By: Published Date | Title | Company Name
Published By: WePow     Published Date: Sep 02, 2015
Online video use has grown by huge numbers over the past few years and isn't showing any signs of slowing down. Beyond personal lives, the impact it is having on the way we do business and more specifically talent management can't be argued. Check out WePow's latest infographic on video trends in 2015.
Tags : 
video interview, hr technology, recruitment, recruiting, candidate screening, talent acquisition, digital interviewing, interview tips
    
WePow
Published By: HP     Published Date: Sep 02, 2015
Service virtualization enables development and test teams to simulate and model the dependencies of unavailable or limited services and data. Voke conducted a survey of 505 participants from technology and non-technology companies to explore their use of service virtualization and its results. Organizations using service virtualization experienced fewer defects, reduced software cycles, and increased customer satisfaction. The 2015 Service Virtualization Market Snapshot™ REPORT by Voke Research provides real-world data to help you justify the investment in service virtualization.
Tags : 
analytics software, application management, application performance, cloud applications, cloud virtualization, service virtualization
    
HP
Published By: HP Ecommerce     Published Date: Aug 31, 2015
This July 2015 Forrester Research report is provided compliments of HP. Modern application delivery leaders realize that their primary goal is to deliver value to the business and its customers, faster. For many, this is a significant shift from the past, when they primarily focused on cost control and efficiency. Today, they must connect the work they do and the results they produce to business outcomes. To do this, application development and delivery (AD&D) leaders use a new set of metrics that help them monitor and improve the value they deliver, based on feedback from business partners and customers. In this report, we highlight these new metrics that connect business outcomes to app delivery performance — as well as the practices and tools that modern application delivery teams and their AD&D leaders use to collect and report them.
Tags : 
    
HP Ecommerce
Published By: Intralinks     Published Date: Aug 28, 2015
In this white paper, we detail some of the biggest computer security threats of the last year and offer some predictions on what we can expect to see in 2015.
Tags : 
    
Intralinks
Published By: Cisco     Published Date: Aug 27, 2015
Magic Quadrant report looking specifically at on-premises unified communications requirements for midsize organizations with 100 to 999 employees.
Tags : 
unified communications, midsize enterprise, uc solutions, productivity, business process, enterprise communications methods, integrated application, collaboration application
    
Cisco
Published By: Cisco     Published Date: Aug 27, 2015
Gartner's evaluation of 16 contact center infrastructure (CCI) vendors in its 2015 CCI Magic Quadrant report.
Tags : 
contact center infrastructure, unified communication, infrastructure management, crm, customer relationship management, cci solutions, enterprise software management
    
Cisco
Published By: Webroot Inc     Published Date: Aug 27, 2015
In the past year, Webroot encountered tens of millions of instances of malware and potentially unwanted applications (PUAs), monitored billions of IP addresses and URLs, analyzed millions of new and updated mobile apps for malicious behavior, and studied major malware trends based on data from millions of endpoints. This report contains insights, analysis, and information on how collective threat intelligence can protect organizations from sophisticated attacks.
Tags : 
malware, unwanted applications, malicious behavior, threat intelligence
    
Webroot Inc
Published By: AppDynamics     Published Date: Aug 26, 2015
Strategies to energize your digital business.
Tags : 
business technology, digital, customer service, efficiency, operations, infrastructure
    
AppDynamics
Published By: AppDynamics     Published Date: Aug 25, 2015
In collaboration with Enterprise Management Associates (EMA), AppDynamics has conducted a survey of application management professionals and managers to determine exactly what IT organizations want and need from APM providers. Here are some key findings from the research: • Only 30% of companies currently have application-specific solutions to monitor apps • 50% or fewer of the tools companies have purchased are actively being used to monitor apps • 27% of application-related problems are detected by monitoring tools • A “unified monitoring platform” is the top choice in a feature of an APM solution Download the full report to review the findings and understand the key challenges and “must haves” associated with APM solutions voiced by IT professionals themselves.
Tags : 
business technology, digital, customer service, efficiency, operations, infrastructure, business intelligence, business management
    
AppDynamics
Published By: Altiscale     Published Date: Aug 25, 2015
Weren't able to attend Hadoop Summit 2015? No sweat. Learn more about the latest Big Data technologies in these technical presentations at this recent leading industry event. The Big Data experts at Altiscale - the leader in Big Data as a Service - have been busy at conferences. To see all four presentations (in slides and youtube video), click here. https://www.altiscale.com/educational-slide-kit-2015-big-data-conferences-nf/ • Managing Growth in Production Hadoop Deployments • Running Spark & MapReduce Together in Production • YARN and the Docker Ecosystem • 5 Tips for Building a Data Science Platform
Tags : 
hadoop, hadoop technologies, hadoop information
    
Altiscale
Published By: Okta     Published Date: Aug 24, 2015
Gartner has named Okta as the only leader in its 2015 Identity & Access Management as a Service (IDaaS) Magic Quadrant. Access your complimentary Gartner report today.
Tags : 
    
Okta
Published By: SumTotal, a Skillsoft Company     Published Date: Aug 24, 2015
Read this report for details on the current state of succession management.
Tags : 
succession management, leadership continuity, automation, investment
    
SumTotal, a Skillsoft Company
Published By: Cisco     Published Date: Aug 24, 2015
The Cisco 2015 Midyear Security Report examines these intersecting challenges while also providing updates on some of the most compelling threats. Using research by our experts, it provides an overview of the major threats observed in the first half of 2015. This report also explores likely future trends and offers advice for small, midsize, and enterprise organizations that seek security solutions and services.
Tags : 
malware, network defenses, detection, security gaps, threat defenses, trends
    
Cisco
Published By: AlienVault     Published Date: Aug 13, 2015
AlienVault is on a mission to change how organizations detect & mitigate threats - affordably & simply. Our USM solution delivers complete security visibility in a fraction of the time of traditional SIEM.
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Aug 13, 2015
The 2015 Magic Quadrant summarizes Gartner’s yearly analysis of the SIEM market and compares the positions of leading competitors like AlienVault. Get Gartner's complete analysis of each SIEM vendor, and learn what makes AlienVault a Visionary. Download the 2015 report.
Tags : 
alienvault, security, siem, hacking, threat detection
    
AlienVault
Published By: Okta     Published Date: Aug 12, 2015
Gartner has named Okta as the only leader in its 2015 Identity & Access Management as a Service (IDaaS) Magic Quadrant. Access your complimentary Gartner report today.
Tags : 
    
Okta
Published By: Okta     Published Date: Aug 12, 2015
The Forrester Wave report identifies the six most significant identity solution providers in the market, evaluating the strengths and weaknesses of each vendor against 15 criteria, including current offering, strategy and market presence. Access your complimentary Forrester Wave report and learn why Okta is named a leader in the space.
Tags : 
    
Okta
Published By: AlienVault     Published Date: Aug 11, 2015
This report talks about Gartner's Magic Quadrant for SIEM in 2015
Tags : 
security information, event management, magic quadrant, gartner report, siem technology, event data, correlations, user activity monitoring
    
AlienVault
Published By: Dell     Published Date: Aug 11, 2015
As organizations prepare for the 2015 budget cycle, security and risk (S&R) professionals should use this annual report to help benchmark their organization’s spending patterns against those of their peers — while keeping an eye on current trends affecting endpoint security — in order to strategize their endpoint security adoption decisions. Read this report for more information.
Tags : 
    
Dell
Published By: HP Ecommerce     Published Date: Aug 05, 2015
This July 2015 Forrester Research report is provided compliments of HP. Modern application delivery leaders realize that their primary goal is to deliver value to the business and its customers, faster. For many, this is a significant shift from the past, when they primarily focused on cost control and efficiency. Today, they must connect the work they do and the results they produce to business outcomes. To do this, application development and delivery (AD&D) leaders use a new set of metrics that help them monitor and improve the value they deliver, based on feedback from business partners and customers. In this report, we highlight these new metrics that connect business outcomes to app delivery performance — as well as the practices and tools that modern application delivery teams and their AD&D leaders use to collect and report them.
Tags : 
    
HP Ecommerce
Published By: SolarWinds     Published Date: Aug 04, 2015
By vExperts David Davis & Scott D. Lowe
Tags : 
data centers, virtualization, storage management, hyper-converged infrastructure, hybrid cloud
    
SolarWinds
Published By: Vectra Networks     Published Date: Aug 03, 2015
The data in this report is based on metadata from Vectra customers and prospects who opted to share detection metrics from their production network environments.
Tags : 
post intrusion report, metadata, network threats, network security management, it security, botnet monetization, data exfiltration, security management
    
Vectra Networks
Published By: Webroot Inc     Published Date: Aug 01, 2015
PassMark Software® conducted objective performance testing on eight (8) security software products, on Windows 8.1 (64-bit) during July and August 2015. This report presents our results and findings as a result of performance benchmark testing conducted for these endpoint security products. The aim of this benchmark was to compare the performance impact of Webroot’s SecureAnywhere Business Endpoint Protection product with seven (7) competitor products. Testing was performed on all products using 13 performance metrics, including: installation time, boot time, CPU Usage, Memory Usage, Browse Time and many others. Does your endpoint security measure up?
Tags : 
endpoint performance, software security, endpoint security products, performance metrics
    
Webroot Inc
Published By: Crownpeak     Published Date: Jul 31, 2015
With today's ever-increasing demand for a seamless customer experience, the website has become a primary influencer for buyers. The Gartner Magic Quadrant for Web Content Management provides an in-depth analysis of leading vendors, guiding companies that are in the process of evaluating a Web Content Management solution for their business.
Tags : 
crownpeak, gartner, gartner magic quadrant, web content management, wcm, saas, cloud
    
Crownpeak
Published By: MobileIron     Published Date: Jul 31, 2015
This whitepaper takes the findings from the 2015 Trust Gap Survey and translates them into actionable recommendations for employers in the form of privacy-centric mobile device policies. This white paper also reviews the privacy enhancements that Apple, Google, and Microsoft have made to their operating systems. When used with an enterprise mobility management (EMM) platform, these enhancements enable a more powerful set of privacy protections than was available even two years ago.
Tags : 
    
MobileIron
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.