HIT Consultant Insightful coverage of healthcare innovation
 

aps

Results 501 - 525 of 591Sort Results By: Published Date | Title | Company Name
Published By: Eaton     Published Date: Feb 08, 2017
Hyperconvergence collapses the physical components of IT with its virtual aspects into a single appliance form factor. Servers, storage and virtualization layers are bundled into one scalable pool of resources and completely integrated for easier, faster and more costeffective management.
Tags : 
    
Eaton
Published By: Symantec     Published Date: Apr 02, 2015
Gaining the trust of online customers is vital for the success of any company that requires sensitive data to be transmitted over the Web. Most consumers are concerned that their sensitive information will be intercepted in-transit, or perhaps the destination web site is manned by imposters with malicious intent. Read this white paper and learn how to best implement a security strategy that keeps consumers' information secure and instills the confidence they need to proceed with transactions.
Tags : 
online customer trust, sensitive data, data interception, malicious intent
    
Symantec
Published By: Bronto     Published Date: Mar 30, 2012
With consumers practically attached to mobile devices and beginning to accept marketing messages on Facebook and Twitter, marketing efforts are less about driving to a specific channel and more about having a promotional presence in all of them and keeping the person engaged throughout the customer lifecycle. The reasons for disengaging from a purchase decision are nearly infinite, and the means to disengage are just a few taps away on a smartphone.
Tags : 
bronto, marketing, emerging marketing, digital marketing, online, digital, e-commerce
    
Bronto
Published By: Bronto     Published Date: Aug 14, 2014
Sleigh bells ring, are you listening? Though the holidays might seem far away, leading retailers will start preparing for the holidays now. Whether you’ve kicked off your planning or you haven’t even started, there are several ways to ensure that the 2014 holiday season is stellar. To help you and your team have a successful holiday season, this white paper offers some helpful tips for the holiday season, to ensure you make changes well ahead of the chaotic blizzard of activity that wraps up the end of the year.
Tags : 
marketing tips, holiday marketing, email production, holiday promotions
    
Bronto
Published By: Flashmaps     Published Date: Aug 16, 2011
Convert your databases into useful geospatial information in a snap! Interactive area maps of the world, USA, Canada, states, counties and more!
Tags : 
flash maps, interactive maps, real-estate maps, world map, city map, street map, us map, state map
    
Flashmaps
Published By: Quantcast     Published Date: Jan 07, 2015
This white paper, published in partnership with the Interactive Advertising Bureau, will explore and present a snapshot of how publishers, marketers and technologists are “going global” in their practice of programmatic audience development across each of 12 markets. Conclusions are derived through a combination of survey and interview data— encompassing feedback from more than 200 executive-level leaders in the Americas, Europe, Africa, Asia, Australia and the Middle East.
Tags : 
programmatic audience development, marketing solutions, global marketing, audience culture, global branding
    
Quantcast
Published By: NAVEX Global     Published Date: Dec 22, 2017
Assessment is part of your compliance programme’s necessary life cycle for improvement. We work in an ever-evolving landscape of risk that requires compliance professionals to identify the gaps their programmes have today, and may have tomorrow. Your programme effectiveness as a whole is based on the effectiveness of each one of its parts. So, ensure your assessment is broad as well as in-depth. Programme assessment is not a tick-the-box exercise. It is just as important as creating a company culture and mitigating risk. Remember, if your assessment is thorough and effective, you will have identified weaknesses in your programme and vulnerabilities for risk. Don’t be discouraged by your work to highlight these areas for improvement. Your programme and your organisation will be better for it once you make the necessary adjustments for a robust and effective ethics and compliance programme.
Tags : 
compliance programme, compliance, programme assessment, definitive guide, improving compliance, ethics and compliance, programme awareness, anti-bribery awareness
    
NAVEX Global
Published By: AlienVault     Published Date: Mar 30, 2016
The CIS Critical Security Controls (CSCs) provide 20 controls that organizations of any size can use to improve their security posture and reduce the risk of cyber threats to critical assets, data, and network infrastructure. The AlienVault USM platform, with its built-in essential security capabilities and integrated threat intelligence, can help organizations implement these controls quickly and effectively. This document describes how the AlienVault USM platform maps to each of the CIS CSCs.
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Mar 30, 2016
The public demands accountability for data breaches involving systems that include personally identifiable information (PII) and expects that all educational institutions will have the same levels of security that Fortune 500 companies do. However, most educational institutions have fewer IT security resources than their larger enterprise counterparts, yet they face the same threats from attackers. Fortunately, there are solutions. This whitepaper by SANS instructor Jake Williams walks through an example of a typical breach in an education organization, highlighting common ways attackers gain access to a network and practical steps to reduce risk. Download this whitepaper to learn: • Common security gaps that make educational institutions vulnerable to attack • Practical security controls that won't break the bank • Key questions to evaluate security vendors • A checklist summarizing steps you should take now to improve security
Tags : 
    
AlienVault
Published By: IBM     Published Date: Jan 09, 2015
This research report by Reliabiltyweb.com captures insight that attempts to predict and even guide the future of asset management practices, investments and challenges from a snapshot taken from approximately 1,000 participants from a wide variety of industries around the world.
Tags : 
asset management, asset management practices, asset management challenges, risk management
    
IBM
Published By: Jobvite     Published Date: May 15, 2017
If you’re ready to invest in a recruiting platform, then you know you’re in for countless weeks, or maybe months of due diligence—tireless research, vendor comparisons, wading through user testimonials, and reviews. But perhaps just as important as finding the right recruiting platform is getting executive buy-in for investing in your platform of choice. It pays to rally support and start the buy-in process early.
Tags : 
    
Jobvite
Published By: DataSynapse     Published Date: Feb 26, 2007
Today's business drives application use, but it is how these applications are deployed and managed that can deliver differentiation value to the business. Whether your challenge is one of scale, optimization, heterogeneity or complexity – learn how flexibility can be built in at the application layer.  Download this analyst bulletin today!
Tags : 
application integration, desktop management, analytical applications, enterprise applications, application performance management, datasynapse, data synapse, application layer
    
DataSynapse
Published By: DataSynapse     Published Date: Feb 26, 2007
Business continuity and disaster recovery are made more difficult by the pace of business change.  Adapting to market changes requires proactive IT. For the first time, you can consolidate business continuity and disaster recovery (DR) planning in a heterogeneous IT environment with a single, central automated solution. 
Tags : 
disaster recovery, backup and recovery, business continuity, business process automation, server virtualization, server automation, datasynapse, data synapse
    
DataSynapse
Published By: DataSynapse     Published Date: Feb 26, 2007
High availability (HA) configurations seek to bring downtime to zero - but can increase complexity across the IT organization, often in the form of excess technology, financial, and human capital investments.  Learn how application virtualization can reduce planned and unplanned downtime, and deliver greater flexibility.
Tags : 
high availability, it management, productivity, total cost of ownership, return on investment, configuration management, flexibility, data synapse
    
DataSynapse
Published By: DataSynapse     Published Date: Feb 26, 2007
This brief examines how application virtualization can compress the development and test cycle, accelerating time-to-market, while reducing risk and complexity.  This brief highlights the impact of centralized command and control of application deployment and execution.
Tags : 
software development, quality assurance, software testing, return on investment, project management, data synapse, datasynapse
    
DataSynapse
Published By: DataSynapse     Published Date: Feb 26, 2007
This technical white paper reviews the principal tenets of application virtualization; freeing application configurations from OS and infrastructure; gaining centralized command and control over system resources; and dynamically allocating resources to applications based on demand. 
Tags : 
infrastructure, interoperability, load balancing, utility computing, business continuity, enterprise applications, application integration, data synapse
    
DataSynapse
Published By: IBM     Published Date: Apr 23, 2008
The IBM Active Energy Manager is a unique software tool that gives you the detailed information you need to closely and accurately monitor power consumption in your data center. Watch this IBM demo to see the extensive capabilities of Active Energy Manager, from setting automatic caps on energy usage to tracking trends over any time period you specify.
Tags : 
energy, energy efficient, power, data center, datacenter, ibm, ibm opt it, opt it
    
IBM
Published By: IBM     Published Date: Mar 17, 2009
CPDA’s Product Lifecycle Management (PLM) research programs target the critical decisions in Product Lifecycle Management challenging Design, Engineering, Manufacturing, and Information Technology managers and executives. CPDA’s PLM collaborative research programs provide indepth analysis of strategies, products, issues, processes, technologies, trends, case studies, and surveys for assessing technology, business goals and objectives, and implementation road maps.
Tags : 
ibm, telelogic, addressing future automotive needs, model-driven systems, product value management, plm, computer-aided design, cad
    
IBM
Published By: IBM     Published Date: Sep 02, 2009
With the MDD techniques supported by IBM Rational Rhapsody, you can analyze trade studies more rigorously than is possible with a document-driven approach.
Tags : 
system engineering, trade studies, ibm, design space, life cycle, traditional document-driven techniques, webcast, model-driven development (mdd)
    
IBM
Published By: IBM     Published Date: Sep 02, 2009
This presentation will highlight the latest advances in applying SysML and UML to product line engineering, illustratinig best practices and commercial experiences using SysML, UML and the Rhapsody/Gears Bridge, an integration of Rhapsody into the Gears software product line lifecycle framework.
Tags : 
sysml, uml and the rhapsody/gears bridge, ibm, sysml, uml, rhapsody/gears bridge, product line engineering
    
IBM
Published By: SBE     Published Date: Nov 17, 2006
This white paper covers the use of new growth-oriented file systems with snapshot capabilities, iSCSI for network layer independence, and a collection of other technologies provided by various vendors and open source projects to create a multi-tiered storage solution with self-service data restoration, long term growth, and disaster recovery.
Tags : 
iscsi, storage management, storage scalability, scalable storage, scalability, multi tiered, multitiered, sbe
    
SBE
Published By: Diskeeper Corporation     Published Date: Oct 30, 2008
Virtualization does have its dangers, as it incurs greater stress on physical resources. While under utilization of CPU may be a driving factor to virtualize servers, other hardware resources may become overtaxed. Given that a host system has limited ability (depends on application) to page memory used by the guest systems, the most recognized bottleneck to address is physical memory (RAM). Options to programmatically alleviate memory bottlenecks incur performance issues when the disk is re-introduced. Another major component and perhaps less acknowledged is the disk subsystem. In many cases, depending the purpose and application of the guest/virtual systems, the disk bottleneck will be the most significant barrier to performance. Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4
Tags : 
diskeeper corporation, virtualize servers, virtualizations, divergence, convergence
    
Diskeeper Corporation
Published By: Asentria Corporation     Published Date: Sep 04, 2007
One of the greatest challenges to any advanced wireless operation is the maintenance of continuous and economical service. Today’s networks have evolved into business-critical services that organizations rely upon every day. However, unplanned remote site downtime due to equipment and power failure, and adverse environmental conditions can severely impair network service.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures
    
Asentria Corporation
Published By: Asentria Corporation     Published Date: Sep 04, 2007
Today’s service providers face more pressure than ever to keep remote equipment up and running as customers continue to demand higher levels of reliable service while keeping costs competitive. Thus, there is a growing need for remote site management solutions that can help service providers monitor, access and control telecom equipment located at customer sites.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures
    
Asentria Corporation
Published By: Asentria Corporation     Published Date: Sep 04, 2007
SNMP (Simple Network Management Protocol) is an industry standard network management protocol for managing wide area and local area networks. It is easy to use, cost-effective, and is built into most networking devices. One of SNMP’s best assets is its use of in-band management, yet, this is also its biggest weakness.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures
    
Asentria Corporation
Start   Previous    10 11 12 13 14 15 16 17 18 19 20 21 22 23 24    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.