HIT Consultant Insightful coverage of healthcare innovation
 

ca wa

Results 276 - 300 of 7022Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: Feb 23, 2016
WAN optimization increasingly resembles a mature market with increasing feature standardization. Vendor innovation is focused on supporting new application types and deployment options, with WAN optimization migrating toward more diverse platforms or to a WAN cloud.
Tags : 
wan architecture, business optimization, network development, network management
    
Cisco
Published By: Cisco     Published Date: Feb 23, 2016
Shifting from a software defined networking model is the first component of a hybrid WAN. See how a hybrid WAN is ideally suited for mobility and cloud models in the whitepaper from ZK Research. Read this design guide for detailed insights into how an Intelligent WAN can improve the way your branch network operates, from headquarters to your most remote location.
Tags : 
netwroking models, business practices, cloud models
    
Cisco
Published By: Cisco     Published Date: Jun 22, 2016
With 50 to 100 billion things expected to be connected to the Internet by 2020, we are now experiencing a major paradigm shift that is revolutionizing business. More and more of the objects we use every day—including those in our factories, utilities, and railroads—are used to capture and distribute information that is helping us know more and do more. The TechWiseTV team and guest experts take an in-depth look at how industries like these are utilizing the data they are gathering from the factory floor all the way out to the field. This exploration into how the Internet of Things actually works in the real world and what your organization must do to take full advantage of it is a great opportunity to understand the practical challenges and specific technology involved in bringing all this potential to life.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jun 21, 2016
Cisco® Validated Designs provide the foundation for systems design based on common use cases or current engineering system priorities. They incorporate a broad set of technologies, features, and applications to address customer needs. Cisco engineers have comprehensively tested and documented each Cisco Validated Design in order to ensure faster, more reliable, and fully predictable deployment. This design guide summary provides you with an overview of the Cisco Intelligent WAN Design Guide, the key technology, the use cases it provides, and additional and related resources.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jun 21, 2016
The e-book describes a hypothetical company, referred to as Need ToChange, which has a traditional approach to WAN design. It then presents Cisco's response to how NeedToChange should evolve its WAN. This e-book includes a summary of the key components of some of the emerging approaches to WAN architecture and design and concludes with a call to action that outlines a project plan that network organizations can use to evolve their WAN.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jun 21, 2016
IT has gone through a significant evolution over the past decade. Virtualization has changed the entire face of the data center, the network edge has become predominantly wireless and consumer devices reign supreme. However, one of the few areas of IT that has yet to evolve is the corporate wide area network (WAN). Managing the WAN is something network managers have always struggled with because WAN speeds are typically an order of magnitude, or more, slower than local area networks (LANs).
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jun 21, 2016
Historically, the speed of a wired connection at the access edge has always been faster than that of a wireless connection. This means workers had to choose between the performance of wired connectivity and the convenience of a wireless connection. Consequently, workers often had to modify the way they worked— first, finding a wired port to use for high-bandwidth applications, such as video or streaming media, and then shifting to wireless connections when the need to be mobile was more important than having the performance of wired.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jul 08, 2016
Today’s threat landscape is nothing like that of just 10 years ago. Simple attacks that caused containable damage have given way to modern cybercrime operations that are sophisticated, well-funded, and capable of causing major disruptions to organizations and the national infrastructure. Not only are these advanced attacks difficult to detect, but they also remain in networks for long periods of time and amass network resources to launch attacks elsewhere. Traditional defenses that rely exclusively on detection and blocking for protection are no longer adequate. It’s time for a new security model that addresses the full attack continuum—before, during, and after an attack.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jul 08, 2016
Modern networks and their components are constantly evolving and traditional next-generation firewalls are not able to provide the level of protection organizations require. In this paper you will learn: • Why typical next-generation firewalls that focus primarily on application visibility and control offer an incomplete approach to threat defense • What organizations need to defeat advanced threats in a resource-constrained environment • What benefits you can gain with the Cisco Firepower™ Next-Generation Firewall (NGFW), the industry’s first fully integrated, threat-focused NGFW
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jul 08, 2016
This white paper can help you confirm that your small business or distributed enterprise needs to invest in an effective next-generation firewalls (NGFW) solution. For small businesses, the NGFW should provide an affordable and manageable entrée to advanced threat protection. In branch offices and the distributed enterprise, NGFWs should provide a detection and enforcement point, analyzing real-time threats and network traffic at scale and benefiting from an integrated and holistic view of the network of which it is a part. In both use scenarios, the NGFW should help your organization defend against targeted and persistent malware attacks, including emerging threats.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jul 08, 2016
When evaluating a next-generation firewall (NGFW) to determine whether the solution can give you comprehensive protection for your entire enterprise, you need to look for seven must-have capabilities. The NGFW should: 1. Integrate security functions tightly to provide effective threat and advanced malware protection 2. Provide complete and unified management 3. Provide actionable indications of compromise to identify malicious activity across networks and endpoints 4. Offer comprehensive network visibility 5. Help reduce complexity and costs 6. Integrate and interface with third-party security solutions 7. Provide investment protection This white paper explains this checklist in depth and provides examples of the benefits a truly effective NGFW solution can deliver.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jul 08, 2016
What You Will Learn: This document will identify the essential capabilities you need in an advanced malware protection solution, the key questions you should ask your vendor, and shows you how Cisco combats today’s advanced malware attacks using a combination of four techniques: • Advanced analytics • Collective global security threat intelligence • Enforcement across multiple form factors (networks, endpoints, mobile devices, secure gateways, and virtual systems) • Continuous analysis and retrospective security
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jul 08, 2016
What You Will Learn: Over the years we’ve all heard claims of simple, seemingly magical solutions to solve security problems, including the use of sandboxing technology alone to fight advanced malware and targeted threats. This paper explores: • Where sandboxing technology stands today • Why it fails to meet the needs of organizations • What’s needed for effective malware analysis
Tags : 
    
Cisco
Published By: F5 Networks Inc     Published Date: Dec 08, 2017
There’s a reason why web application firewalls have been getting so much attention lately. It’s the same reason we keep hearing about major security and data breaches left, right, and center. Web application security is difficult—very difficult.
Tags : 
owasp, web application safety, data breaches, firewalls
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Dec 08, 2017
In today’s digital marketplace, your applications are your business. They fuel innovation and are the driving force for staying competitive in an always-on, always-connected world. Apps are the way you build relationships with your customers, empower your employees, facilitate growth, and so much more.
Tags : 
cloud risk, application safety, corporate data risk
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Dec 08, 2017
The NSA’s Information Assurance Directorate left many people scratching their heads in the winter of 2015. The directive instructed those that follow its guidelines to postpone moving from RSA cryptography to elliptic curve cryptography (ECC) if they hadn’t already done so. “For those partners and vendors that have not yet made the transition to Suite B elliptic curve algorithms, we recommend not making a significant expenditure to do so at this point but instead to prepare for the upcoming quantum-resistant algorithm transition.” The timing of the announcement was curious. Many in the crypto community wondered if there had been a quantum computing breakthrough significant enough to warrant the NSA’s concern. A likely candidate for such a breakthrough came from the University of New South Wales, Australia, where researchers announced that they’d achieved quantum effects in silicon, which would be a massive jump forward for quantum computing.
Tags : 
quantum computing, quantum, computing, browser encryption. encryptionm
    
F5 Networks Inc
Published By: SAS     Published Date: Jan 17, 2018
Executives, managers and information workers have all come to respect the role that data management plays in the success of their organizations. But organizations don’t always do a good job of communicating and encouraging better ways of managing information. In this e-book you will find easy to digest resources on the value and importance of data preparation, data governance, data integration, data quality, data federation, streaming data, and master data management.
Tags : 
    
SAS
Published By: SAS     Published Date: Jan 17, 2018
What can you see and discover when you’re able to explore trends and make predictions with your organization’s data? If you’re a midsize home delivery business, you can discover new ways to make customers happy. If you’re a local government agency, you can predict where your resources are needed most. And if you’re a growing hospital, you can bring life-changing patient data directly to doctors and nurses. In this e-book, we’ve profiled six organizations that are using self-service visual exploration to make big improvements in the way they work. From college administrators to professional sports teams, everyone makes better decisions with easy access to powerful, interactive analytics.
Tags : 
    
SAS
Published By: Pentaho     Published Date: Feb 26, 2015
This TDWI Best Practices report explains the benefits that Hadoop and Hadoop-based products can bring to organizations today, both for big data analytics and as complements to existing BI and data warehousing technologies.
Tags : 
big data, big data analytics, data warehousing technologies, data storage, business intelligence, data integration
    
Pentaho
Published By: Pentaho     Published Date: Nov 04, 2015
This report explains the benefits that Hadoop and Hadoop-based products can bring to organizations today, both for big data analytics and as complements to existing BI and data warehousing technologies based on TDWI research plus survey responses from 325 data management professionals across 13 industries. It also covers Hadoop best practices and provides an overview of tools and platforms that integrate with Hadoop.
Tags : 
pentaho, analytics, platforms, hadoop, big data, predictive analytics, data management
    
Pentaho
Published By: Financial Force     Published Date: Dec 01, 2017
This IDC Vendor Profile describes FinancialForce.com, a cloud applications company with financial management, ordering and billing, human capital management (HCM), professional services automation (PSA), and supply chain management (SCM) solutions built on the Salesforce1 platform and a 36-year heritage of building financial management solutions at UNIT4 (the former Agresso and CODA products). FinancialForce.com's accounting solution, launched in 2008 as CODA 2go, was the first on - demand financial system built entirely on the Salesforce1 Platform. Backed by Technology Crossover Ventures, Advent International, Salesforce Ventures, and UNIT4, FinancialForce.com's applications continue to be the leading finance and professional services solutions available as native Salesforce1 applications on the AppExchange.
Tags : 
    
Financial Force
Published By: Financial Force     Published Date: Dec 01, 2017
The #1 Accounting App on the Salesforce Platform. FinancialForce Accounting is a simple, yet powerful accounting application that is straightforward to learn, easy to implement and trouble-free to maintain. The perfect complement to Salesforce CRM, it brings back office data to the front, allowing companies to align sales, services and finance on a single cloud.
Tags : 
    
Financial Force
Published By: Aria Systems     Published Date: Jun 15, 2016
"Smart Campus: Break down classroom walls with a smart technology strategy 70% of K-12 and IT administrative decision-makers said preparing students for the future workforce was one of the main drivers for adopting classroom technology. Read how to prepare your network for a digital-first classroom experience in this report >"
Tags : 
    
Aria Systems
Published By: Aria Systems     Published Date: Jun 15, 2016
"Transforming the capabilities of Norway’s largest hospital with Avaya VENA Fabric Connect Oslo University Hospital needed a scalable, smart healthcare network to bring together three hospitals and absorb future growth, new acquisitions and third-party services. Read this case study for the details on how they accomplished their goals, and much more >"
Tags : 
    
Aria Systems
Published By: Oracle     Published Date: Jan 12, 2017
In this whitepaper, learn three reasons why companies do not actively manage profitability, understand the benefits of active profitability management, and learn how companies can overcome data and software barriers.
Tags : 
    
Oracle
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.