HIT Consultant Insightful coverage of healthcare innovation
 

building

Results 351 - 375 of 1487Sort Results By: Published Date | Title | Company Name
Published By: HPE APAC     Published Date: Jun 20, 2017
Enterprise IT is in the throes of a fundamental transformation from a careful builder of infrastructure that supports core enterprise applications to a lean and lively developer of business-enabling applications powered by infrastructure. But why is this change happening now at all, and why now? Read this paper to find out more.
Tags : 
infrastructure, devops, agile, hpe, it transformation, enterprise
    
HPE APAC
Published By: IBM     Published Date: Feb 02, 2015
Learn more about the benefits of Bluemix. This webcast focuses on building an Android application using the MobileData service. Walk-through the real process and workflow used to build and link the MobileData service within your application.
Tags : 
mobile data, android application, mobiledata service, business processes, business technology
    
IBM
Published By: PernixData     Published Date: Jun 01, 2015
Flash is the savior of the virtualized datacenter. It provides incredible performance increases along with tremendous latency reduction, but maximizing its potential can be challenging. Learn how you can architect your storage platform to focus on application performance utilizing server-side resources in conjunction with storage acceleration software.
Tags : 
pernixdata, application-centric, storage, virtualization, storage
    
PernixData
Published By: HP Enterprise Business     Published Date: Jan 27, 2017
Watch this webinar to learn how to build an autonomous IT Operations using HPE Operations Bridge
Tags : 
    
HP Enterprise Business
Published By: CDW     Published Date: Jan 15, 2016
A growing number of organizations are realizing the benefits of mobile devices, including increased productivity, enhanced efficiency and speedier response times. Yet while the use of mobile devices typically leads to lower costs and additional revenue opportunities, it also brings challenges associated with device and application procurement, data connections, service costs, content management and — most important — security.
Tags : 
cdw, effective mobile policy, mobile devices, revenue opportunities, application procurement
    
CDW
Published By: CDW-Apple     Published Date: Dec 12, 2012
The ultimate reference guide to taking your business mobile.
Tags : 
mobile, mobile integration, byod, it policy, business mobile integration, mobile it
    
CDW-Apple
Published By: IBM     Published Date: Jul 07, 2016
With SUSE Linux Enterprise Server on IBM Power Systems, you gain the benefits of the latest generation of Enterprise Linux OS with the power and reliability of IBM hardware. This combination provides the performance and flexibility to run the most demanding business-critical workloads.
Tags : 
ibm, ibm power systems, suse, suse linux enterprise server, linux, ibm hardware, open source
    
IBM
Published By: IBM     Published Date: Oct 11, 2016
Topics to be discussed include: - The need for new RAS characteristics in next-gen applications - The benefits of having an agile and scalable platform for workloads running SUSE Linux Enterprise Server on IBM Power Systems
Tags : 
ibm, hardware, systems hardware, linux, linux on power
    
IBM
Published By: Dell EMC     Published Date: Nov 10, 2015
Storage is becoming more difficult for organizations to manage – learn how a unifying storage architecture can help.
Tags : 
    
Dell EMC
Published By: Singtel     Published Date: Oct 28, 2014
Examine the three broad challenges that Financial Services Institutions (FSIs) face today: compliance and risk management, consolidation and innovation. To address these effectively, FSIs require an Information and Communication Technology (ICT) infrastructure that offers both the security and reliability of their legacy communications systems as well as the flexibility and scalability that new generation networks provide, in order to adapt and innovate in the highly competitive financial services environment.
Tags : 
singtel, vpn, wan, lan
    
Singtel
Published By: Ektron     Published Date: Jun 03, 2014
Increase relevancy and visitor engagement on your site with personas & content targeting
Tags : 
ektron, content targeting, lead nuturing, website, roi, relevancy
    
Ektron
Published By: Ektron     Published Date: Jun 03, 2014
Learn the step-by-step process to create a strategic, inbound website
Tags : 
ektron, website, marketing strategies, seo rankings, roi, inbound website
    
Ektron
Published By: Oracle     Published Date: Apr 05, 2016
With cybercrime and security breaches sharply on the rise, protecting valuable information from cyberattacks is an ongoing challenge for companies. In this increasingly insecure world, your critical information deserves the best protection, making the database and surrounding infrastructure the best line of defense. Protect your data better through evolving your approach to data security. Learn about three key steps to reinvent the security of your surrounding infrastructure to create an information fortress by protecting your valuable data at its source.
Tags : 
information management, security, best practices, information secuirty
    
Oracle
Published By: Oracle     Published Date: Apr 26, 2016
Information security attacks are on the rise. And enterprises are highly vulnerable when it comes to databases, where their most critical business information resides. It's time to turn the database, and the infrastructure it runs on, into an information fortress.
Tags : 
    
Oracle
Published By: EMC Corporation     Published Date: May 27, 2014
RSA Technical Brief: The openness of today's networks and the growing sophistication of advanced threats make it almost impossible to prevent cyber attacks and intrusions. This technical brief discusses why combating advanced threats depends on organizations shifting more security resources from prevention to detection and remediation, and developing intelligence-driven security programs.
Tags : 
emc, security operations, security analytics, intelligence-driven security, threat detection, security monitoring, critical incident response
    
EMC Corporation
Published By: EMC Corporation     Published Date: Mar 20, 2014
This paper details why organization needs to shift more security resources from preventing intrusion toward rapid threat detection and remediation, and the intelligence-driven security approach that is required to do so.
Tags : 
emc, incident response, malware detection, security journey, reduce risk, improve security, budget constraints, threat intelligence
    
EMC Corporation
Published By: RSA Security     Published Date: Oct 24, 2013
This paper details why organization needs to shift more security resources from preventing intrusion toward rapid threat detection and remediation, and the intelligence-driven security approach that is required to do so.
Tags : 
rsa, emc, security, operations center, threat, threat detection, intelligence-driven
    
RSA Security
Published By: HP     Published Date: Aug 12, 2014
HP's Peter Mansell, reveals why HP decided to build CloudSystem around open standards and APIs, and Freeform Dynamics' Dale Vile, who explains how you can avoid building yourself into a silo.
Tags : 
cloudsystem, avoid building yourself into a silo, cloud migration, cloud administration
    
HP
Published By: IBM     Published Date: Oct 09, 2015
In this white paper, IDC Energy Insights discusses the current and future challenges that utilities face in meeting their business objectives and the role analytics will play.
Tags : 
ibm, analytics, research, data, demand growth, utilities, energy
    
IBM
Published By: IBM     Published Date: Feb 02, 2016
In this white paper, IDC Energy Insights discusses the current and future challenges that utilities face in meeting their business objectives and the role analytics will play.
Tags : 
analytics, energy, utilities, ibm, big data
    
IBM
Published By: B Channels     Published Date: Apr 27, 2018
bChannels has years of expertise in defining, building and delivering partner ecosystems. We have invested in understanding and developing discrete IoT ecosystem capabilities. We see three steps to deliver IoT Channels success: 1. Partner Insights: Identify routes and partners for scalable loT, understanding market segments 2. Partner Journey: Find and engage partners in loT segments to nurture and grow 3. Partner Support: Build and deliver effective IoT partner ecosystem programs
Tags : 
    
B Channels
Published By: McAfee     Published Date: Oct 01, 2013
Building and Maintaining a Business Continuity Program Successful - strategies for financial institutions for effective preparation and recovery.
Tags : 
disaster recovery, system availability, technology, mcafee, security management
    
McAfee
Published By: Google Apigee     Published Date: Mar 06, 2019
Inside the API Product Mindset APIs expose data or functionality for use by applications and developers, which means they allow access to a business’s valuable digital assets—and thus to the heart of the business itself. Vulnerable APIs can expose a business’s core data and services to a variety of threats. Therefore, API security should be of paramount importance to any enterprise that exposes digital assets. Google Cloud’s new eBook, Building and Managing Secure APIs, takes a deeper look at the do’s and don’ts of enterprise API security. Explore how to design secure, easy-to-use APIs with field-tested best practices, real-world use cases and a checklist to help your team get started. What's Inside? ? Field-tested best practices ? Real-world use cases ? API monetization checklist
Tags : 
    
Google Apigee
Published By: Business.com     Published Date: Jul 20, 2009
Not long ago, search marketing and branding were viewed as two entirely different aspects of the marketing mix. Like oil and water, they didn't mix. In reality, brand building and search marketing are inextricably linked and actually tend to drive better overall marketing ROI when working together. Get the 5 simple but effective tips to build B2B brands with search marketing.
Tags : 
b2b, business.com, brand, search marketing, branding, roi, marketing mix, seo
    
Business.com
Published By: K2     Published Date: Apr 27, 2015
This whitepaper talks about common challenges encountered when building SharePoint 2013 business apps, what the implications are, and best practices for finding a solution that can make app development within SharePoint 2013 more successful for your organization.
Tags : 
portal and collaboration needs, sharepoint, custom apps, best practices, sharepoint development, business apps
    
K2
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.