HIT Consultant Insightful coverage of healthcare innovation
 

act

Results 14351 - 14375 of 14578Sort Results By: Published Date | Title | Company Name
Published By: Oracle     Published Date: Oct 20, 2017
Security has become top of mind for CIOs, and CEOs. Encryption at rest is a piece of the solution, but not a big piece. Encryption over the network is another piece, but only a small piece. These and other pieces do not fit together well; they need to unencrypt and reencrypt the data when they move through the layers, leaving clear versions that create complex operational issues to monitor and detect intrusion. Larger-scale high-value applications requiring high security often use Oracle middleware, including Java and Oracle database. Traditional security models give the data to the processors to encrypt and unencrypt, often many times. The overhead is large, and as a result encryption is used sparingly on only a few applications. The risk to enterprises is that they may have created an illusion of security, which in reality is ripe for exploitation. The modern best-practice security model is an end-to-end encryption architecture. The application deploys application-led encryption s
Tags : 
    
Oracle
Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
This Wikibon Report offers detailed insight into how Oracle SPARC M7-based servers, and systems, use advanced offload technologies for encryption of systems; have very low encryption overheads; and are an important prerequisite for implementing best-of-breed security without impacting business productivity.
Tags : 
    
Oracle PaaS/IaaS/Hardware
Published By: Oracle CX     Published Date: Oct 20, 2017
Security has become top of mind for CIOs, and CEOs. Encryption at rest is a piece of the solution, but not a big piece. Encryption over the network is another piece, but only a small piece. These and other pieces do not fit together well; they need to unencrypt and reencrypt the data when they move through the layers, leaving clear versions that create complex operational issues to monitor and detect intrusion. Larger-scale high-value applications requiring high security often use Oracle middleware, including Java and Oracle database. Traditional security models give the data to the processors to encrypt and unencrypt, often many times. The overhead is large, and as a result encryption is used sparingly on only a few applications. The risk to enterprises is that they may have created an illusion of security, which in reality is ripe for exploitation. The modern best-practice security model is an end-to-end encryption architecture. The application deploys application-led encryption s
Tags : 
    
Oracle CX
Published By: Computhink     Published Date: Dec 10, 2007
The job of a Records Management Office is to take all paper documents that need to be preserved, from all county offices, and implement a strategy to preserve them. When the law changed on January 1, 2001 to allow digitally scanned copies to be legal documents (The Illinois Electronic Records Act), the challenge to find a preservation system that would be both efficient and cost effective increased dramatically.
Tags : 
document management, records management, information, electronic document management, computhink, viewwise, viewise, government
    
Computhink
Published By: McAfee EMEA     Published Date: Mar 14, 2018
As they face numerous regulations, enterprises believe data privacy can create a competitive advantage. But are they ready for the new General Data Protection Regulation (GDPR)? Here are the concerns and strategies of 800+ senior executives from industries around the world. Data in a Turbulent World Nearly half of organizations say they will migrate data as a result of regulation or changing government policies. Data Protection as a Competitive Advantage A significant majority of respondents believe proper data protection will attract new customers. Download our full report, Beyond GDPR: Data residency insights from around the world.
Tags : 
    
McAfee EMEA
Published By: UPS Capital     Published Date: Feb 13, 2019
Transportation risk comes in many forms and can be very hard, if not impossible, to predict. These include extreme weather, theft, hijacked trailers, global crises, cargo lost at sea, catastrophic truck or rail accidents, truck fires and a whole lot more. In 2014, the University of Tennessee Global Supply Chain Institute published a white paper titled Managing Risk in the Global Supply Chain. The most surprising finding in the research was that even though 100% of supply chain executives acknowledged insurance as a highly effective risk mitigation tool, it was simply not on their radar screen, nor in their purview. Yet, the National Cargo Security Council estimates that there is an annual global financial impact from cargo loss of $50 billion.
Tags : 
    
UPS Capital
Published By: UPS Capital     Published Date: Feb 19, 2019
Transportation risk comes in many forms and can be very hard, if not impossible, to predict. These include extreme weather, theft, hijacked trailers, global crises, cargo lost at sea, catastrophic truck or rail accidents, truck fires and a whole lot more. In 2014, the University of Tennessee Global Supply Chain Institute published a white paper titled Managing Risk in the Global Supply Chain. The most surprising finding in the research was that even though 100% of supply chain executives acknowledged insurance as a highly effective risk mitigation tool, it was simply not on their radar screen, nor in their purview. Yet, the National Cargo Security Council estimates that there is an annual global financial impact from cargo loss of $50 billion.
Tags : 
    
UPS Capital
Published By: athenahealth     Published Date: Apr 30, 2013
Struggling to keep its independence, Wilson Stream Family Practice needed to improve financial efficiency and data management. With athenahealth's medical billing and EHR services, the practice was able to organize clinical data, make patient visits more efficient, and improve overall quality of care.
Tags : 
ehr, electronic health record, analytics, data, best practices, clinical workflow, electronic health records, meaningful use
    
athenahealth
Published By: Asentria Corporation     Published Date: Sep 04, 2007
One of the greatest challenges to any advanced wireless operation is the maintenance of continuous and economical service. Today’s networks have evolved into business-critical services that organizations rely upon every day. However, unplanned remote site downtime due to equipment and power failure, and adverse environmental conditions can severely impair network service.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures
    
Asentria Corporation
Published By: Cornerstone OnDemand     Published Date: May 15, 2015
Download this eBook to learn how companies can quickly fill open positions with the highest quality talent possible.
Tags : 
recruiting, talent, job openings, job applicants, time-to-hire
    
Cornerstone OnDemand
Published By: Commvault ABM Oct     Published Date: Nov 13, 2017
Don't let the risk or cost of ransomware storm your organization's castle. it will wreak havoc on your valuable data and impact business continuity. Instead, employ a multi-layer security strategy that not only includes anti-malware, firewall, and hard disk and file encryption, but also data loss prevention technology and standards- based data protection. Each are critical to mitigate cyber security risks and protect vital information so you can avoid business disruption without ever paying a king's ransom.
Tags : 
ransomeware, organization, data, business optimization technology, it protection, commvault
    
Commvault ABM Oct
Published By: Virgin Pulse     Published Date: Jul 28, 2017
This new guide, Winning Workplace Wellbeing: A Five-step Guide, provides a blueprint for workplace wellbeing success. Featuring actionable tips and expert advice from Dr. BJ Fogg, Dr. Ron Goetzel and other members of the Virgin Pulse Science Advisory Board, this guide will help you boost your wellbeing strategy. Download the Guide to learn: The five key steps to wellbeing success Tips from recognized experts Introduction to the Value on Investment (VOI) model
Tags : 
workplace success, wellbeing, value on investment, human resources
    
Virgin Pulse
Published By: MobileIron     Published Date: May 23, 2016
Managing your devices keeps getting more complex and your admins are juggling more complicated security and management tasks than ever before. Until now, you have needed many complex and disparate tools to secure and manage your devices. But now Windows 10 and MobileIron makes your life much simpler and streamlines many traditional PC management responsibilities. 415
Tags : 
security, mobileiron, best practices, windows, device management
    
MobileIron
Published By: Citrix Systems     Published Date: Apr 15, 2016
With faster adoption rates than any other upgrade, Windows® 10 is breaking records—and it’s poised to accelerate. In fact, Gartner predicts that 50% of businesses will be on their way to Windows 10 by early 2017—and 100% by 2019. Businesses of all sizes need an IT strategy that maintains employee productivity and business continuity without the worry of app compatibility issues or OS instability across differing end points. The time to upgrade to Windows 10 is now.
Tags : 
citrix, windows, windows 10, upgrade, productivity
    
Citrix Systems
Published By: Dell     Published Date: Aug 17, 2016
Windows 10 is the OS of the future and fundamentally changes how PCs and other devices will be used and supported in organizations. However, with different support periods set by Microsoft for Windows 7, each IT and procurement organization need to evaluate what hardware and software combination will best support their workforce if they are not ready to move to Windows 10 right away. Even purchasing new PCs to take advantage of performance improvements and new form factors while downgrading the OS may not be an optimal strategy going forward.
Tags : 
dell, windows 7, procurement
    
Dell
Published By: Puppet     Published Date: Jul 13, 2016
If you’re new to Puppet on Windows, one of the first things you’ll want to do is start managing users and groups. In this webinar, we’ll demonstrate how to manage both local groups and Active Directory membership. The demo will include: - Managing administrator accounts - Managing local groups - Setting up a domain controller - Managing Active Directory membership Puppet can do a lot, but we always recommend starting small and building on your success. Managing users and groups is a great way to get started. Make 2016 the year you banish manual configuration for good!
Tags : 
    
Puppet
Published By: CDW     Published Date: Jun 08, 2015
Start the transition to a modern data center. Contact your CDW account manager today.
Tags : 
server, windows 2003, infrastructure, migrate, support
    
CDW
Published By: CDW     Published Date: Jun 15, 2015
Start the transition to a modern data center. Contact your CDW account manager today.
Tags : 
server, windows 2003, infrastructure, migrate, support
    
CDW
Published By: Dell     Published Date: Jul 30, 2012
Although you may be aware of the many new features Windows Server 2008 R2 offers, you may not know which ones are the most valuable for the data center.
Tags : 
hyper-v, server core, bitlocker, microsoft, data encryption, data center, data management, active directory
    
Dell
Published By: Lenovo and Microsoft     Published Date: Aug 13, 2013
Microsoft has announced that it will end active support and “end of life” Windows XP on April 8, 2014. Now, as that date fast approaches, the highly negative consequences of continuing to use Windows XP in enterprise environments are becoming much clearer. After that date, IT security risks and compliance issues from continued use will be magnified. This white paper examines three aspects that can potentially create a “nightmare” for your organization.
Tags : 
windows xp, compliance, risk, windows upgrade, enterprise, end-user computing
    
Lenovo and Microsoft
Published By: MuleSoft     Published Date: Oct 13, 2015
News Corporation, a global multimillion dollar media company, was facing serious challenges due to digital transformation. Learn how MuleSoft's approach to enterprise integration, API-led connectivity, helped them solve the following challenges: -Changing consumer behavior impacting sales and advertising -The urgent need to deliver content through mobile and other popular digital channels -An aggressive timeline to launch new channels to gain readership and revenue
Tags : 
media disruption, consumer behavior, digital channels, mobile, readership and revenue
    
MuleSoft
Published By: CA Technologies     Published Date: Mar 06, 2015
L’application mobile est devenue l’initiative stratégique phare pour toutes les organisations numériques qui cherchent à développer leur activité.
Tags : 
    
CA Technologies
Published By: CEB     Published Date: Dec 03, 2015
The key challenge of B2B selling today: customer purchase processes are overwhelmed by an increasingly large and diverse number of customer stakeholders who can’t reach consensus on a common course of action. Learn how to overcome buyer dysfunction and guide customer to consensus.
Tags : 
marketing, sales, b2b, challenger, consensus, mobilizer, implementation, product marketing
    
CEB
Published By: SurveyMonkey     Published Date: Aug 25, 2015
SurveyMonkey Audience fielded a Direct Mail Offer Test study on four direct mail pieces to demonstrate how to successfully test marketing offers.
Tags : 
direct mail, surveymonkey, testing framework, test marketing, best practices, key performance metrics, testing surveys, crm
    
SurveyMonkey
Published By: Oracle     Published Date: Dec 13, 2011
Download this white paper to learn how you can deploy several best practices to achieve unparalleled sales success in your organization.
Tags : 
on demand, oracle on demand, instant gratification, crm, customer relationship management, deployment, saas, software-as-service
    
Oracle
Start   Previous    568 569 570 571 572 573 574 575 576 577 578 579 580 581 582    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.