HIT Consultant Insightful coverage of healthcare innovation
 

base

Results 251 - 275 of 4500Sort Results By: Published Date | Title | Company Name
Published By: Persicope Data     Published Date: Mar 07, 2018
SQL is a critical skill for business intelligence. From accessing to transforming to reporting on data, SQL gives you the power to get the job done. It can help you discover exactly how your company is performing, what your customers are doing, or how people have reacted to your marketing campaigns. Unfortunately, while SQL can tell you what has happened, it can’t tell you what will happen. What if you have questions like: • How valuable is a lead based on company attributes and their behavior on our website? • How much MRR will we generate in the next 30 days? • Which customers are likely to churn next month?
Tags : 
    
Persicope Data
Published By: Dell EMC & Intel     Published Date: Mar 16, 2018
The pace of business is lightning fast. Technology runs faster – and customers want service even faster still. To keep up with the demands of a company in this age, you need hardware infrastructure capable of supporting large amounts of work with a more responsive experience. Our work in the Principled Technologies datacenter showed that the 14th generation Dell EMC™ PowerEdge™ R720xd could deliver just that. Intel Inside®. New Possibilities Outside.
Tags : 
    
Dell EMC & Intel
Published By: Dell EMC & Intel     Published Date: Aug 03, 2018
IDC ha intervistato organizzazioni che hanno implementato le soluzioni iperconvergenti Dell EMC VxRail e VxRack basate su processore Intel® Xeon® Platinum per supportare l'espansione delle loro operazioni IT e aziendali. I partecipanti allo studio hanno segnalato che le soluzioni HCI Dell EMC fungono da elemento fondamentale per l'innovazione nelle loro organizzazioni distribuite, fornendo una base di infrastruttura IT efficiente in termini di costo, agile e a prestazioni elevate. Il risultato è che queste organizzazioni stanno realizzando un ritorno quinquennale del 619% sugli investimenti in soluzioni HCI Dell EMC, che IDC traduce in un valore di $ 150.776 all'anno per 100 utenti, con un conseguente periodo di recupero dell'investimento di sei mesi.
Tags : 
    
Dell EMC & Intel
Published By: Dell EMC & Intel     Published Date: Aug 03, 2018
IDC realizó entrevistas en organizaciones que habían implementado las soluciones hiperconvergentes Dell EMC VxRail y VxRack con tecnología del procesador Intel® Xeon® Platinum para facilitar la expansión de sus operaciones de TI y de negocio. Los participantes en el estudio informan que las soluciones de infraestructura hiperconvergente de Dell EMC facilitan la innovación en sus organizaciones distribuidas, ya que constituye una base rentable, ágil y de alto rendimiento para la infraestructura de TI. El resultado es que dichas organizaciones están logrando, en cinco años, un retorno del 619 % de la inversión en soluciones de infraestructura hiperconvergente de Dell EMC, cuyo valor calcula IDC en US$150,776 por cada 100 usuarios al año, lo que equivale a un período de amortización de seis meses.
Tags : 
    
Dell EMC & Intel
Published By: IBM APAC     Published Date: Apr 27, 2018
While relying on x86 servers and Oracle databases to support their stock trading systems, processing rapidly increasing number of transactions fast became a huge challenge for Wanlian Securities. They shifted to IBM FlashSystem that helped them cut average response time for their Oracle Databases from 10 to less than 0.4 milliseconds and improved CPU usage by 15%. Download this case study now.
Tags : 
    
IBM APAC
Published By: Oracle     Published Date: Nov 21, 2018
Database Security Assessment Tool: Finding Your Weaknesses Before the Bad Guys Do
Tags : 
    
Oracle
Published By: Dome9     Published Date: Apr 25, 2018
At an unprecedented pace, cloud computing has simultaneously transformed business and government, and created new security challenges. The development of the cloud service model delivers business-supporting technology more efficiently than ever before. The shift from server to service-based thinking is transforming the way technology departments think about, design, and deliver computing technology and applications. Yet these advances have created new security vulnerabilities as well as amplify existing vulnerabilities, including security issues whose full impact are finally being understood. Among the most significant security risks associated with cloud computing is the tendency to bypass information technology (IT) departments and information officers. Although shifting to cloud technologies exclusively may provide cost and efficiency gains, doing so requires that business-level security policies, processes, and best practices are taken into account. In the absence of these standard
Tags : 
    
Dome9
Published By: Dome9     Published Date: Apr 25, 2018
As of May 2017, according to a report from The Depository Trust & Clearing Corporation (DTCC), which provides financial transaction and data processing services for the global financial industry, cloud computing has reached a tipping point1. Today, financial services companies can benefit from the capabilities and cost efficiencies of the cloud. In October of 2016, the Federal Deposit Insurance Corporation (FDIC), the Office of the Comptroller of Currency (OCC) and the Federal Reserve Board (FRB) jointly announced enhanced cyber risk management standards for financial institutions in an Advanced Notice of Proposed Rulemaking (ANPR)2. These proposed standards for enhanced cybersecurity are aimed at protecting the entire financial system, not just the institution. To meet these new standards, financial institutions will require the right cloud-based network security platform for comprehensive security management, verifiable compliance and governance and active protection of customer data
Tags : 
    
Dome9
Published By: Oracle     Published Date: Aug 01, 2018
In this white paper, IDC discusses the inherent difficulties associated with traditional backup schemes and examines how Oracle’s Zero Data Loss Recovery Appliance delivers best-of-breed Oracle Database recovery in minimal time and with no data loss exposure.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Aug 01, 2018
The Zero Data Loss Recovery Appliance’s benefits are compelling for any enterprise with a need to protect critical Oracle databases. The differences between this database recovery appliance and other approaches to data protection are stark. The Recovery Appliance leverages a combination of existing proven technologies and new developments that eliminate data loss and improve recovery. The elimination of periods between backups when database changes are not captured is also a major benefit, and the movement to a process of frequent or constant incremental backups provided by this appliance changes the game.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Aug 01, 2018
Les systèmes de sauvegarde traditionnels ne répondent pas aux besoins des entreprises modernes étant donné qu’ils sont axés sur la sauvegarde, et non sur la restauration. Ils traitent les bases de données comme des fichiers génériques à copier, au lieu de les considérer comme des charges de travail transactionnelles qui présentent des exigences spécifiques d’intégrité, de cohérence, de performance et de disponibilité des données.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Aug 01, 2018
Your enterprise runs its critical applications on Oracle Databases, and as an enterprise IT leader, maintaining the performance and availability of your databases is among your top priorities. Any degradation in performance or loss of data could result in serious business disruption and loss of revenue, so protecting this vital asset is a must. There are many causes of data loss— administration errors, system or media failures, cyberattacks, and more—but we often overlook design flaws in the very systems meant to protect data: general-purpose backup systems.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Aug 01, 2018
I sistemi di backup tradizionali non sono in grado di rispondere alle esigenze delle organizzazioni moderne perché si concentrano sul backup e non sul ripristino. Trattano i database come file generici da copiare anziché carichi di lavoro transazionali con requisiti specifici di integrità dei dati, coerenza, prestazioni e disponibilità. Inoltre, i settori altamente regolati, come i servizi finanziari, sono soggetti a obblighi normativi sempre crescenti che richiedono una protezione rigorosa dalle violazioni dei dati, la perdita di dati, il malware, il ramsomware e altri rischi. Questi rischi richiedono un recupero dati fiduciario per eliminare l’esposizione della perdita di dati garantendone integrità e conformità. Questo libro spiega le sfide per la protezione dei moderni database e il recovery (Capitolo 1), gli aspetti importanti di una soluzione di protezione e del ripristino dei database (Capitolo 2), le soluzioni di protezione e recupero dei database di Oracle (Capitolo 3), e le r
Tags : 
    
Oracle
Published By: Oracle     Published Date: Aug 02, 2018
T raditional backup systems fail to meet the needs of modern organizations by focusing on backup, not recovery. They treat databases as generic files to be copied, rather than as transactional workloads with specific data integrity, consistency, performance, and availability requirements. Additionally, highly regulated industries, such as financial services, are subject to ever?increasing regulatory mandates that require stringent protection against data breaches, data loss, malware, ransomware, and other risks. These risks require fiduciary?class data recovery to eliminate data loss exposure and ensure data integrity and compliance. This book explains modern database protection and recovery challenges (Chapter 1), the important aspects of a database protection and recovery solution (Chapter 2), Oracle’s database protection and recovery solutions (Chapter 3), and key reasons to choose Oracle for your database protection and recovery needs (Chapter 4).
Tags : 
    
Oracle
Published By: Oracle     Published Date: Aug 02, 2018
Backup is one thing, recovery is everything. You no doubt appreciate how mission-critical your Oracle database is to your organization's success. But what if you experience an outage or cyberattack? Can you be confident you can quickly recover all of your data? Traditional backup solutions leave data exposed to loss and your business at risk. Oracle’s Zero Data Loss Recovery Appliance eliminates exposure and saves you time, effort, and the stress of retrieving data. Discover how our customers are recovering their data without the drama.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Aug 02, 2018
La sauvegarde est une chose, la restauration est tout. Vous reconnaissez sans aucun doute combien votre base de données Oracle est essentielle à la réussite de votre organisation. Mais que faire en cas de panne ou de cyberattaque ? Êtes-vous certain de pouvoir restaurer rapidement toutes vos données ? Les solutions de sauvegarde traditionnelles peuvent exposer votre entreprise au risque de la perte de données. La solution Oracle Zero Data Loss Recovery Appliance réduit votre exposition à ce risque et vous permet d’économiser du temps, des efforts et le stress de la récupération des données. Découvrez comment nos clients récupèrent leurs données sans drame.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Aug 02, 2018
Oracle Database powers your business’s mission-critical applications. Their downtime and data loss can have a devastating impact on your company’s bottom line and productivity—not to mention the damage to your company’s (and your) reputation, because outages and data losses make headlines.
Tags : 
    
Oracle
Published By: Workday Spain     Published Date: Sep 19, 2018
The annual performance review is in need of a technology-based update. In this global research study, learn how to transform the performance management process from an annual chore to a continuous value driver that better engages and retains employees.
Tags : 
    
Workday Spain
Published By: Preempt     Published Date: Nov 02, 2018
Enterprises and the threats that target them have all fundamentally evolved over the past decade. In response, the security industry has generated an enormous amount of point solutions and technologies to try and keep pace. However, for all of this innovation and change, the underlying enforcement architecture has remained largely unchanged. A new modern approach to preempting threats is required. One that augments the existing architecture instead of replaces it. This new approach brings full enterprise and business context to real-time enforcement decisions. Identity, behavior, devices, anomalies, and risk all play a real-time role. Just as importantly, enforcement and access options can be graded based on the risk to the business, and policies can actively seek out and adapt to new information.
Tags : 
    
Preempt
Published By: Preempt     Published Date: Nov 02, 2018
In our 2018 Trends in Information Security report, we outlined a concept we referred to as the ‘identity-aware perimeter.’ The essential idea is that as new architectures such as cloud, containers, mobility and IoT take hold, controlling access to resources will increasingly need to rely on identity as an alternative to purely network-based approaches focused more on ‘where’ you are than ‘who’ you are. By combining identity with user and entity behavior and risk scoring to gate access, Preempt fits squarely within this trend, which we think could be one of the most interesting and powerful to hit the infosec market in years. Preempt has few direct competitors, and its initial challenge will be finding ways to distinguish itself from vendors in adjacent categories such as adaptive multi-factor authentication (MFA), advanced threat protection, user and entity behavior analytics (UEBA) and cloud access security brokers (CASB), to name a few. Forging a new security category is never easy,
Tags : 
    
Preempt
Published By: Dell DnCP     Published Date: Nov 20, 2018
Forrester Consulting conducted a Total Economic Impact™ (TEI) study to provide readers with a framework to evaluate the potential financial impact of Dell UltraSharp monitors above 27” on their organizations. To better understand the benefits, costs, and risks associated with this investment, Forrester interviewed one customer from the global financial services industry with experience deploying Dell monitors. This summary is based on a full TEI study, which can be downloaded here.
Tags : 
    
Dell DnCP
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Endpoint devices continue to be one of the favorite targets for cyberattacks. A successfully compromised laptop provides a foothold for a threat to move laterally and infect other endpoints within the organization. To address this critical vulnerability, security leaders must integrate endpoint security into their broader network security architecture. A deep connection between endpoint and network security offers key improvements to holistic enterprise protection. It provides risk-based visibility of all endpoint devices, establishes policy-based access controls, enables real-time threat intelligence sharing, and automates security responses and workflows for effective and efficient protection that conserves time and money.
Tags : 
    
Fortinet EMEA
Published By: Unit4     Published Date: Feb 18, 2019
Want to drive up your bid-to-win ratio? The top five percent of professional services organizations win more than two out of every three bids. Their sales and services teams are better aligned too. Customer Relationship management (CRM) has long played a key role in driving sales and services excellence, but it’s no longer enough – welcome to the age of opportunity management. Download this eGuide to better understand how to win more business with accurate proposals based on past project success.
Tags : 
professional services organizations, erp, crm, enterprise resource planning, bid-to-win
    
Unit4
Published By: Unit4     Published Date: Feb 18, 2019
Looking to buy a Professional Services Automation (PSA) solution? Learn how you can drive greater revenue and employee billable utilization across the whole business with this Buyer’s Guide. Providing an overview of the key trends, business processes, selection criteria, as well as the major business impact of PSA, it includes expert guidance to help project- and services-based businesses evaluate and choose PSA applications.
Tags : 
psa, productivity, professional services automation, professional services, services automation
    
Unit4
Published By: Automation Anywhere     Published Date: Feb 21, 2019
Automation Anywhere’s flagship product is Automation Anywhere Enterprise – a RPA platform offering a variety of tools to help organisations develop, operate and manage RPA bots that automate data entry, data gathering and other repetitive, routine tasks usually carried out as part of high-volume, repetitive work (for example, service fulfilment work in call centres, shared-service centres, and back-office processing environments). Automation Anywhere Enterprise bots can add value both in unattended (server-based, lights-out operation) and attended (desktop-based, interactive) deployment configurations. In this report, MWD Advisors digs deeper into the features and capabilities of Automation Anywhere’s product portfolio, analysing its fast-growth trajectory and highlighting large-scale implementations.
Tags : 
    
Automation Anywhere
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.