HIT Consultant Insightful coverage of healthcare innovation
 

ave

Results 401 - 425 of 6929Sort Results By: Published Date | Title | Company Name
Published By: Oracle CX     Published Date: Oct 19, 2017
In today’s IT infrastructure, data security can no longer be treated as an afterthought, because billions of dollars are lost each year to computer intrusions and data exposures. This issue is compounded by the aggressive build-out for cloud computing. Big data and machine learning applications that perform tasks such as fraud and intrusion detection, trend detection, and click-stream and social media analysis all require forward-thinking solutions and enough compute power to deliver the performance required in a rapidly evolving digital marketplace. Companies increasingly need to drive the speed of business up, and organizations need to support their customers with real-time data. The task of managing sensitive information while capturing, analyzing, and acting upon massive volumes of data every hour of every day has become critical. These challenges have dramatically changed the way that IT systems are architected, provisioned, and run compared to the past few decades. Most companies
Tags : 
    
Oracle CX
Published By: Oracle CX     Published Date: Oct 20, 2017
Oracle’s new cloud platform, included a new line of servers for cloud and scale-out applications: Oracle’s SPARC S7-2 and S7-2L servers. These servers are based on the breakthrough SPARC S7 processor and extend the outstanding features and capabilities of the SPARC T7 and M7 systems into scale-out form factors. With the combination of Oracle’s breakthrough Software in Silicon features and the efficiency of the SPARC S7 processor we can offer the most secure and economical enterprise clouds with the fastest infrastructure for data analytics. Here at Oracle we recognize our customers’ needs for increasing the security of their data, therefore we have taken security as one of the core values on the SPARC Servers. The new SPARC S7 processor leverages the revolutionary Security in Silicon features introduced on the SPARC T7 and M7 systems. Silicon Secured Memory is a unique hardware implementation that prevents unauthorized access to application data in memory and can prevent hacking explo
Tags : 
    
Oracle CX
Published By: Oracle CX     Published Date: Oct 20, 2017
On Thursday June 30th, we announced Oracle’s new cloud platform, including a new line of servers for cloud and scale-out applications: Oracle’s SPARC S7-2 and S7-2L servers. These servers are based on the breakthrough SPARC S7 processor and extend the outstanding features and capabilities of the SPARC T7 and M7 systems into scale-out form factors. With the combination of Oracle’s breakthrough Software in Silicon features and the efficiency of the SPARC S7 processor we can offer the most secure and economical enterprise clouds with the fastest infrastructure for data analytics. Here at Oracle we recognize our customers’ needs for increasing the security of their data, therefore we have taken security as one of the core values on the SPARC Servers. The new SPARC S7 processor leverages the revolutionary Security in Silicon features introduced on the SPARC T7 and M7 systems. Silicon Secured Memory is a unique hardware implementation that prevents unauthorized access to application data in
Tags : 
    
Oracle CX
Published By: Oracle CX     Published Date: Oct 20, 2017
With the growing size and importance of information stored in today’s databases, accessing and using the right information at the right time has become increasingly critical. Real-time access and analysis of operational data is key to making faster and better business decisions, providing enterprises with unique competitive advantages. Running analytics on operational data has been difficult because operational data is stored in row format, which is best for online transaction processing (OLTP) databases, while storing data in column format is much better for analytics processing. Therefore, companies normally have both an operational database with data in row format and a separate data warehouse with data in column format, which leads to reliance on “stale data” for business decisions. With Oracle’s Database In-Memory and Oracle servers based on the SPARC S7 and SPARC M7 processors companies can now store data in memory in both row and data formats, and run analytics on their operatio
Tags : 
    
Oracle CX
Published By: Oracle CX     Published Date: Oct 20, 2017
Databases have long served as the lifeline of the business. Therefore, it is no surprise that performance has always been top of mind. Whether it be a traditional row-formatted database to handle millions of transactions a day or a columnar database for advanced analytics to help uncover deep insights about the business, the goal is to service all requests as quickly as possible. This is especially true as organizations look to gain an edge on their competition by analyzing data from their transactional (OLTP) database to make more informed business decisions. The traditional model (see Figure 1) for doing this leverages two separate sets of resources, with an ETL being required to transfer the data from the OLTP database to a data warehouse for analysis. Two obvious problems exist with this implementation. First, I/O bottlenecks can quickly arise because the databases reside on disk and second, analysis is constantly being done on stale data. In-memory databases have helped address p
Tags : 
    
Oracle CX
Published By: Oracle CX     Published Date: Oct 20, 2017
Security has become top of mind for CIOs, and CEOs. Encryption at rest is a piece of the solution, but not a big piece. Encryption over the network is another piece, but only a small piece. These and other pieces do not fit together well; they need to unencrypt and reencrypt the data when they move through the layers, leaving clear versions that create complex operational issues to monitor and detect intrusion. Larger-scale high-value applications requiring high security often use Oracle middleware, including Java and Oracle database. Traditional security models give the data to the processors to encrypt and unencrypt, often many times. The overhead is large, and as a result encryption is used sparingly on only a few applications. The risk to enterprises is that they may have created an illusion of security, which in reality is ripe for exploitation. The modern best-practice security model is an end-to-end encryption architecture. The application deploys application-led encryption s
Tags : 
    
Oracle CX
Published By: Justworks     Published Date: Sep 27, 2017
Business owners and entrepreneurs create their businesses for a number of reasons: to grow an idea, build and inspire a team, make a difference. And all too quickly, those business owners can face the other side of running a business: paying employees, negotiating the best benefits for your teams, keeping up with myriad government regulations. Workplaces are getting even more complicated - for good reasons. Teams have more flexibility to work remotely. And the gig economy is exploding; in fact, about a third of the U.S. workforce works on something other than a full-time basis.
Tags : 
    
Justworks
Published By: Dell and Nutanix     Published Date: Oct 26, 2017
Negli ultimi dieci anni, le soluzioni di converged infrastructure (CI) sono state utilizzate per implementare l'infrastruttura virtualizzata su una configurazione a tre tier, assemblata, venduta e supportata come un'unica soluzione. Anziché avere tre diversi vendor che forniscono e supportano i tre tier, con la CI i clienti ottengono maggiore rapidità per gli ordini, un'implementazione meno soggetta a problemi e un carico amministrativo ridotto.
Tags : 
    
Dell and Nutanix
Published By: Dell and Nutanix     Published Date: Oct 26, 2017
Over the last decade, converged infrastructure (CI) solutions have been used to implement virtualized infrastructure over a three-tier configuration that is packaged, sold and supported as a single entity. In place of three separate vendors supplying and supporting the three tiers, with CI, customers gain faster ordering, less problem-prone deployment and less administrator burden.
Tags : 
    
Dell and Nutanix
Published By: Dell and Nutanix     Published Date: Jan 16, 2018
Organizations increasingly require IT infrastructures that support the speed at which their businesses must operate through simplicity, efficiencies, agility, and strong performance. Hyperconverged infrastructure solutions, which enable organizations to minimize or nearly eliminate inefficiencies and complexity associated with maintaining storage and compute silos, have emerged as a strong potential solution for such organizations. IDC’s research demonstrates that organizations running workloads on Nutanix solutions such as Dell XC are benefiting are benefiting from cost and staff efficiencies, the ability to scale their infrastructure incrementally, very high resiliency, and strong application performance. This is helping interviewed Nutanix solutions customers better meet business challenges and has led many of them to establish plans for expanding their hyperconverged workload environment with Nutanix solutions.
Tags : 
technologies, infrastructure, data, social, mobile, cloud, nutanix
    
Dell and Nutanix
Published By: DocuSign UK     Published Date: Nov 06, 2018
"In today’s intensely competitive marketplace, the business world is moving rapidly to online transactions from inefficient, costly, paper-based processes. Furthermore, consumers expect to be able to interact digitally anytime, anyplace, so providing easily accessible digital touchpoints is also critical to successfully keeping and retaining your customers. No matter the size or type of business you’re in, you want to save money and increase revenue. And you want to make it all easy. Electronic signatures are a powerful way to accomplish all that. Read the report to learn how leading companies across industries are improving critical business processes using eSignatures to achieve: - Greater customer satisfaction - Higher close rates and productivity - Lower costs, greater efficiency - Improved time to revenue - Compliance and security-risk mitigation"
Tags : 
    
DocuSign UK
Published By: DocuSign UK     Published Date: Nov 06, 2018
"Technology has made it possible for small businesses to reach more customers in new ways, resulting in some of the most high-growth businesses today. This new Age of the Customer brings a world of opportunities, as well as a few challenges. You can reach more potential customers than ever before, but you also have more competition for their attention and dollars. The good news is that in this high-competition, high-reward environment, businesses that are part of the Salesforce ecosystem are at the center of this new economy. Read on to learn more."
Tags : 
    
DocuSign UK
Published By: DocuSign UK     Published Date: Nov 06, 2018
"One of the simplest steps that yields the biggest impact is changing the way employees and customers work with documents. Improving document workflow, removing unnecessary paper-based processes, and reducing errors can be a game changer. In this eBook, we will explore five key areas where a far-reaching digital strategy can help you save money, increase productivity, and ultimately be more profitable. "
Tags : 
    
DocuSign UK
Published By: DocuSign UK     Published Date: Nov 06, 2018
"In this eBook, you’ll find four best practices that reflect recent thinking about Customer Experience (CX). As you consider these best practices, we urge you to broaden your definition of customers beyond buyers to include employees, suppliers, and vendors. All have opinions about their experiences with your company, and many will share them via word of mouth or online. For better or worse. According to the experts, CX is your key to competitive advantage and growth. Read on to find out what you can do to deliver stellar CX."
Tags : 
    
DocuSign UK
Published By: DocuSign UK     Published Date: Nov 06, 2018
"Microsoft has teamed up with DocuSign to make our industry-leading eSignature apps available to businesses and consumers within Microsoft applications, making it easier than ever to stay productive. Robust apps for Outlook, Word, SharePoint, Dynamics CRM, Windows and Windows Phone are making it easier for organisations of every size, industry, and geography to quickly and securely transact business anytime, anywhere, on any device. Read this white paper to learn how you can use DocuSign for Office 365 to: - Go digital: Send and manage your documents work flow more efficiently - Save time: Eliminate paper-based processes like printing, scanning, and faxing - Increase productivity: With DocuSign for Office 365, transactions are done quickly and securely"
Tags : 
    
DocuSign UK
Published By: SAP EMEA Global     Published Date: Dec 13, 2017
This IDC white paper examines the drivers behind the adoption of IoT technologies by public services organizations and why the IoT is becoming a key investment priority. Public services are comprised of a diverse set of organizations, including federal, regional and local governments and healthcare and social services providers. These all have mandates to improve the safety, health and quality of life of their constituents across a broad range of programs. This paper also provides market insights and describes examples of IoT implementations that highlight the diversity of scenarios in the public service sector. These diverse scenarios illustrate the impact IoT solutions can have across many citizen-centric services.
Tags : 
    
SAP EMEA Global
Published By: Codility     Published Date: Dec 08, 2017
Flatiron wanted to create a structured process to recruit quickly and give all candidates a fair shot at advancing through each stage. Engineering leadership wanted to build a diverse team, and while they’d like to thoroughly vet every candidate for team fit, they’re limited by how much time they can devote to recruiting.
Tags : 
    
Codility
Published By: Infosys     Published Date: May 30, 2018
In the wake of data hacks and privacy concerns, enterprises are working extra hard to make sure they secure customer data from external threats. But what about securing data internally? Organizations unknowingly leave a big security hole in their own systems when they fail to have structured internal processes to handle access requests for employees, which could have disastrous implications for data security. A leading US bank sought to move its internal applications to a secure system for a standard and consistent access rights experience. See how Infosys helped and the five key takeaways from the project.
Tags : 
internal, applications, data, hacks, privacy, enterprises
    
Infosys
Published By: Infosys     Published Date: May 30, 2018
Customers today are far more concerned about the contents and origin of a product than ever before. in such a scenario, granting them easy access to product information, via digital initiatives such as SmartLabel™, goes a long way in strengthening customer trust in a brand. But it also means expending several man-hours of effort processing unstructured data, with the possibility of human error. Intelligent automation can help save effort and time, with virtually error-free results. A consumer products conglomerate wanted a smart solution to implement SmartLabel™ compliance. See how Infosys helped and the five key takeaways from the project.
Tags : 
automation, brand, information, digital, customer
    
Infosys
Published By: Infosys     Published Date: May 30, 2018
While mainframes have dominated computing across industries for several decades, the need for speed and However, modernizing these systems is every enterprise’s nightmare, considering the complexities and high costs involved, besides the fear of business disruption. The need for a trusted partner has never been more. A leading global brokerage firm was looking to simplify and speed up the mainframe systems powering their trading platforms that supported billions of transactions each day. See how Infosys helped and the five key takeaways from the project.
Tags : 
mainframes, speed, trading, system, modernize
    
Infosys
Published By: Tricentis     Published Date: Jan 08, 2018
In this guide you'll learn how to select and integrate the right test management solution for your team: • Why test management software? • How to buy: some general considerations • The 5 must-have features • Tips for evaluating & integrating your new solution • Where to get additional help BUT IT’S NOT ENOUGH. That’s because trends like agility, mobile and cloud computing have QA teams bursting at the seams. As a software development leader, you are under the gun to deliver higher-quality software at an accelerating cadence – and still find time to provide solid evidence of testing at any given moment. Test case management systems are – and have been – a clear value driver in development organizations. But many of these systems do not support today’s unique testing requirements. Potential cost of software defects to U.S. economy: $60B per year 35% of senior IT executives can’t deliver the quality they need to within their allocated budget
Tags : 
    
Tricentis
Published By: Riverbed     Published Date: Jan 25, 2018
"Visibility into the live mix of network and application activity being hosted and delivered by the IT infrastructure has always is a 'must-have' for many aspects of IT planning and operations. But the greatest value and impact is achieved when those two viewpoints are blended together into one unified view. This paper reviews the primary challenges that IT teams face in establishing unified visibility, the key requirements that management solutions must meet to address those challenges, and examines a Riverbed solution that has been specifically designed to offer a path to success."
Tags : 
    
Riverbed
Start   Previous    10 11 12 13 14 15 16 17 18 19 20 21 22 23 24    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.