HIT Consultant Insightful coverage of healthcare innovation
 

ca wa

Results 6926 - 6950 of 7422Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jan 09, 2014
Companies worldwide are embracing private clouds, not only because they support new, highly efficient and secure data solutions, but also to drive new competitive organizational strategies. This white paper provides an assessment of the business value of implementing IBM SmartCloud Entry for Power Systems versus comparable private cloud solutions from VMware on Intel. It discusses the benefits of private cloud solutions, including reduced labor and hardware/software costs, ease of implementation and adoption, scalability, organizational flexibility, security, improved efficiency, as well as allocation of and access to IT resources.
Tags : 
smartcloud, private cloud, vmware, workloads, smartcloud entry, ibm smartcloud, edison group, systems director, virtualization technology, virtual machine
    
IBM
Published By: IBM     Published Date: Jan 09, 2014
This interactive eBook describes how virtualization is not a device to implement, but rather a journey to realize greater and greater gains. Featuring cases from midsize companies around the world, the eBook details how to get started, the importance of consolidation, tangible ways to fully benefit from virtualization and more.
Tags : 
ibm, virtualization, ebook, midsize businesses, midmarket, virtualization, consolidate, workload management, optimize virtualization, delivery and automation, optimize delivery, optimize automation, virtualize, server use, it benefits, server adoption, unique technology, midsize businesses, consolidation, capital expenditures
    
IBM
Published By: IBM     Published Date: Jan 09, 2014
Buy-and-hold strategies can actually add costs to the datacenter, as systems age in place. Not only do hardware maintenance and software maintenance fees rise, over time – but the aging of applications also costs the organization money. Investing in a transition from POWER5 to POWER7 resulted in a return on investment (ROI) of more than 150 percent over three years. An insightful and and compelling discussion by IDC that reviews the primary reason for maintaining current systems -- Return on Investment. IDC studied IBM Power Systems sites that remained on the POWER5 platform long after its initial introduction in 2004. When comparisons to the succeeding generation of POWER7 are made, customers have found that the increase in scalability and performance of POWER7 systems, combined with a reduction in server ""footprint""
Tags : 
power7, power system, power cooling, power5 based, workload consolidation, power processors, server infrastructure power7 system, ibm, power7 servers, mission-critical, data center, it infrastructure, architecture
    
IBM
Published By: IBM     Published Date: Jan 09, 2014
This management brief discusses the value proposition for the Case for IBM PureFlex System for Cloud-Enabled SAP Enterprise Environments.
Tags : 
sap, international technology, application serving, system manager, vmware, nodes chassis, netweaver landscape, integrated systems, pureflex system, platform infrastructure, system security, ibm pureflex
    
IBM
Published By: IBM     Published Date: Jul 29, 2014
In this e-book, you will learn how to gain faster application delivery with automated release and deployment.
Tags : 
ibm, ibm urbancode, application delivery, automated release and deployment, release, deployment, application release, software delivery, rapid delivery, deployment standards, release and deployment solutions
    
IBM
Published By: IBM     Published Date: Aug 06, 2014
With IBM analytics for big data with a smart mobile strategy, banks can increase wallet share and assets under management while lowering the organization’s operating ratio by using more efficient channels.
Tags : 
ibm, banking, digital, data, big data, analytics, mobile
    
IBM
Published By: IBM     Published Date: Aug 06, 2014
Security concerns are still causing delays in the introduction of advanced mobile banking capabilities. But getting mobility back on track can be easy once the path becomes clear. One effective way to detect current and future fraud is through an integrated, adaptable mobile risk engine.
Tags : 
ibm, banking, mobility, risk, mitigation, security
    
IBM
Published By: IBM     Published Date: Nov 12, 2014
There is an exponential increase in connected devices that are producing data about our homes, health, cars, and everything in between. The Internet of things (IoT) is exploding into apps that allow users to see and interact with these devices. Watson can enable IoT apps to understand the meaning and intent of the users that interact with these connected devices. Check out this upcoming webcast to learn how the cognitive services from IBM Watson available on Bluemix can make IoT apps be intelligent, overcome complexity, and support discovery and decision making.
Tags : 
cognitive internet, iot, iot apps, intent data
    
IBM
Published By: IBM     Published Date: Nov 13, 2014
This IDC Technology Spotlight paper takes a look at why Email remains the primary mode of communication in business today. While there is prevalent speculation that social software and other real-time communications applications will replace email, email nevertheless remains a stalwart in business operations. In addition, as relationships across all business communication channels continue to be redefined, innovative modes and methods of communication are emerging. As a result, locating the right data and information at the right time — while still critical — becomes increasingly complex. IDC expects that organizations will use social software, such as Notes and Domino 9x Social Edition, to complement existing tools and address these business needs for the foreseeable future.
Tags : 
email capabilities, integration, social software, business operations
    
IBM
Published By: Cisco     Published Date: Oct 07, 2014
Malware has changed considerably since the early PC viruses appeared more than 25 years ago. Today, it evolves so quickly that many customers find staying ahead of the latest threat nearly impossible. If the explosion in malware variants weren’t enough, sophisticated client-side attacks and advanced persistent threats (APTs) target victims in ways that evade traditional security measures. The question isn’t whether your network will be attacked with advanced malware. The question is when it will happen and how you will respond. Advanced malware is changing the way security is managed.
Tags : 
email, malware, web security, quadrant, solutions, threats, data loss, phishing attacks, protection, gateway, mitigate, cloud, hybrid, on-premises
    
Cisco
Published By: Cisco     Published Date: Mar 25, 2015
Offices aren’t productivity factories anymore—they’re collaboration centers where individuals and groups can develop their best ideas. That means building out an office takes a whole new approach, and it isn’t just about using aesthetics and shiny toys to attract top talent (although that is part of it). Successful offices are functional tools that bring technology and people together so they can do their best work. Cisco® Collaboration tools bring people together to speed the decision-making process and help you execute on your most innovative ideas while cutting operational waste. Bring Cisco Collaboration to your workplace and create a workplace that works.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Apr 08, 2015
This document will identify the essential capabilities you should seek in an advanced malware protection solution, the key questions you should ask your advanced malware protection vendor, and shows you how Cisco combats today’s advanced malware attacks using a combination of four techniques: ? Big data analytics ? Collective global security intelligence ? Enforcement across multiple form factors (networks, endpoints, mobile devices, secure gateways, and virtual systems) ? Continuous analysis and retrospective security
Tags : 
protection, analytics, global security, intelligence, virtual, gateway, attacks, malware, big data
    
Cisco
Published By: Cisco     Published Date: Jun 02, 2015
This document will identify the essential capabilities you should seek in an advanced malware protection solution.
Tags : 
malware protection, network security, it security, application security
    
Cisco
Published By: Cisco     Published Date: Aug 27, 2015
Gartner's evaluation of 16 contact center infrastructure (CCI) vendors in its 2015 CCI Magic Quadrant report.
Tags : 
contact center infrastructure, unified communication, infrastructure management, crm, customer relationship management, cci solutions, enterprise software management
    
Cisco
Published By: Cisco     Published Date: Aug 28, 2015
Discover how vendors are innovating in this mature market.
Tags : 
applications, systems integration, cloud, platform, wan
    
Cisco
Published By: Cisco     Published Date: Nov 17, 2015
The days of punching in and zoning out are gone. Offices aren’t productivity factories anymore—they’re collaboration centers where individuals and groups can develop their best ideas. That means building out an office takes a whole new approach, and it isn’t just about using aesthetics and shiny toys to attract top talent (although that is part of it). Successful offices are functional tools that bring technology and people together so they can do their best work. Cisco® Collaboration tools bring people together to speed the decision-making process and help you execute on your most innovative ideas while cutting operational waste. Bring Cisco Collaboration to your workplace and create a workplace that works.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 08, 2015
Driven by budget pressures and the growth of cloud-hosted applications, mobility, and bandwidth-hogging applications such as video, many IT organizations are actively considering direct Internet access (DIA) at their branches. DIA offers two compelling benefits: (1) it can substantially reduce operating costs by freeing up costly WAN bandwidth for mission-critical applications, and (2) it offers a better experience for users accessing applications hosted in the public cloud.
Tags : 
direct internet access, cisco, canada, dia, wan, wide area network
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
Historically, the speed of a wired connection at the access edge has always been faster than that of a wireless connection. This means workers had to choose between the performance of wired connectivity and the convenience of wireless connection. Today evolution of the gigabit can change this sentiment
Tags : 
    
Cisco
Published By: Riverbed     Published Date: Apr 14, 2017
"In the cloud era, businesses need levels of agility that traditional networks can’t provide. The software-defined WAN (SD-WAN) is emerging at branch offices and other remote locations to drive increased efficiencies and to optimize user experiences across cloud applications and services. What you’ll learn from this powerful resource: Why the SD-WAN market is expected to hit $6B by 2020. The products and services that form the SD-WAN landscape. Some essential guidance for SD-WAN planning and implementation."
Tags : 
    
Riverbed
Published By: nettime solutions     Published Date: Jan 27, 2014
Learn how automated time and attendance works, and how an Affordable Care Act module that was built specifically for managing ACA compliance can support multiple classes of employees in different policies.
Tags : 
time and attendance, cloud based time and attendance, aca compilance, affordable care act, saas time and attendance, workforce management, time off tracking, labor analytics
    
nettime solutions
Published By: nettime solutions     Published Date: Jan 27, 2014
In this 30-minute webinar, time and attendance leader nettime solutions will first break down the essentials of the healthcare law, and then dive into the ACA software module available in stratustime that will simplify your ACA compliance and ensure your team can focus on the objectives that matter most in your organization.
Tags : 
time and attendance, cloud based time and attendance, aca compliance, affordable care act, saas time and attendance, workforce management, time off tracking, labor analytics
    
nettime solutions
Published By: GE Healthcare     Published Date: Feb 23, 2015
Southwestern Ontario Diagnostic Imaging Network relies on Centricity™ Clinical Archive to connect 62 hospitals with disparate PACS & RIS systems, resulting in reduced storage costs and data duplication and increased productivity and enhanced quality of care. Learn more in this case study. Centricity Clinical Archive includes the following product components: Centricity Enterprise Archive, Universal Viewer ZFP, Caradigm eHIE, Centricity Clinical Gateway, NextGate MatchMetrix EMPI, PACSGEAR PacsSCANTM
Tags : 
xds, cross enterprise document sharing, unified view of patient images, archive & storage, image sharing & management, vendor neutral archive (vna), centricity clinical archive, mobile image capture, enterprise archive, archiving services, zero footprint viewer, image archive, dicom storage, information technology
    
GE Healthcare
Published By: NAVEX Global     Published Date: Mar 21, 2018
Good analysis and benchmarking of hotline data helps organisations answer crucial questions about their ethics and compliance programme. Comparing internal data year over year to help answer these questions is important. But getting a broader perspective on how your performance matches up to industry norms is critical. To help, each year NAVEX Global takes anonymised data collected through our hotline and incident management systems to create these reports. This particular report is the second NAVEX Global benchmark report we have published that focuses specifically on the status of ethics and compliance hotline services in the EMEA and APAC regions. This benchmark only takes reporting data from organisations that has its data warehoused in Europe—a subset of the data used in our global hotline report.
Tags : 
    
NAVEX Global
Published By: FireEye     Published Date: Feb 28, 2014
This whitepaper further educates you on the new security challenges for state and local governments.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors, real-time security, malicious code installs, block callbacks, threat intelligence, malware forensics, cyber warfare
    
FireEye
Start   Previous    271 272 273 274 275 276 277 278 279 280 281 282 283 284 285    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.