HIT Consultant Insightful coverage of healthcare innovation
 

ca wa

Results 6801 - 6825 of 7509Sort Results By: Published Date | Title | Company Name
Published By: BlackBerry     Published Date: Dec 22, 2009
University of Waterloo conducted a six-week pilot project with several of its students in the Project Leadership Program, a distance learning program. Their goal was to see if mobile learning using BlackBerry smartphones would enhance their educational experience.
Tags : 
blackberry, mobile applications, waterloo, cio, pim, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: BlackBerry     Published Date: Dec 22, 2009
The Johnson & Johnson Family of Companies is comprised of the world's premier consumer health company, the world's largest medical devices and diagnostics company, the world's fourth-largest biologics company, and the world's seventh-largest pharmaceuticals company. With over 250 operating companies in 57 countries, Johnson & Johnson's Credo is to put the needs and well-being of the people they serve first.
Tags : 
blackberry, mobile applications, johnson, pharma, cio, pim, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: BlackBerry     Published Date: Dec 22, 2009
AT&T is a premier communications holding company. Its subsidiaries and affiliates, AT&T operating companies, are the providers of AT&T services in the United States and around the world. Among their offerings are the world's most advanced IP-based business communications services, the nation's fastest 3G network and the best wireless coverage worldwide, and the nation's leading high speed Internet access and voice services.
Tags : 
blackberry, mobile applications, at&t, pharma, cio, pim, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: NEC     Published Date: Dec 16, 2009
The proliferation of communications channels has set expectations around cost and productivity benefits. Unified Communications (UC) is proffered as a way of helping bring them all together, but companies struggle to justify the business case for it. Against this background, how important is UC as an approach to streamlining communications, and how can businesses exploit it?
Tags : 
nec, business communication, productivity, unified communications, uc delivery
    
NEC
Published By: Ounce Labs, an IBM Company     Published Date: Dec 15, 2009
Today, when you make decisions about information technology (IT) security priorities, you must often strike a careful balance between business risk, impact, and likelihood of incidents, and the costs of prevention or cleanup. Historically, the most well-understood variable in this equation was the methods that hackers used to disrupt or invade the system.
Tags : 
ounce labs, it securitym it risk, software applications, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography
    
Ounce Labs, an IBM Company
Published By: SAP     Published Date: Dec 14, 2009
Consider how you can gain control of cost structures by taking systematic steps to improve operational efficiency. By using efficient, automated processes, you can reduce waste, unnecessary overtime, and other cost factors. Integrated business software systems put this efficiency overhaul within reach, quickly, and affordably.
Tags : 
sap, efficiency, infrastructure, capital, structure, integration, automation, erp, enterprise resource planning
    
SAP
Published By: McAfee     Published Date: Dec 09, 2009
Despite the six-year-old CAN-SPAM Act, spammers routinely abuse the law and continue to deliver their obnoxious email. One year ago, a major spam-hosting ISP was shut down, causing an impressive drop in botnet activity. Today, however, spam authors are more active and smarter than ever. Spammers love to tailor their messages to the news and the season. Read this report to gain a greater understanding of current spam threats.
Tags : 
mcafee, spam, risk management, vulnerability, can-spam, anti-spam, virus, botnet, twitter, job spam
    
McAfee
Published By: Double-Take Software     Published Date: Dec 03, 2009
Download this paper today to learn about new solutions that use real-time data replication software to automatically backup branch office data to a central server to provide a simpler, more reliable and cost-effective way to protect your branch offices.
Tags : 
double-take, data protection, branch offices, backup, vss, rpo, rto, cdp
    
Double-Take Software
Published By: Vision Solutions     Published Date: Dec 03, 2009
Download this paper today to learn about new solutions that use real-time data replication software to automatically backup branch office data to a central server to provide a simpler, more reliable and cost-effective way to protect your branch offices.
Tags : 
double-take, data protection, branch offices, backup, vss, rpo, rto, cdp, vision
    
Vision Solutions
Published By: IBM     Published Date: Nov 24, 2009
Server sprawl can divert valuable time and resources away from pursuing your core business goals. This white paper will show how System z can give you the visibility, control and automation your business needs to become more successful.
Tags : 
ibm tivoli, leveraging middleware, service management, system z, new enterprise data center, business continuity management, security, process automation
    
IBM
Published By: IBM     Published Date: Nov 20, 2009
The Payment Card Industry Data Security Standard (PCI DSS) is a global security program created to increase confidence in the payment card industry and reduce risks to PCI members, merchants, service providers and consumers. It was developed by the major credit card companies as a guideline to help organizations that process card payments prevent credit card fraud.
Tags : 
ibm, pci requirements, pci dss, credit card fraud, ibm iss certified assessments, ips, ibm public key infrastructure for z/os, ibm tivoli provisioning manager, encryption management
    
IBM
Published By: Athena Security     Published Date: Nov 20, 2009
This paper presents some techniques to cleaning up the rule base along with an effective solution that addresses these automatically for you using Athena FirePAC for Firewall Rule Cleanup.
Tags : 
firewall rules, cisco firewall, netscreen firewall, check point firewall, firewall pci, firewall audit, firewall analysis, firewall rule cleanup, firewall unused rules, cisco pix, juniper netscreen, cisco asa, cisco fwsm.
    
Athena Security
Published By: Lionbridge     Published Date: Nov 19, 2009
This paper will interest ISV product managers and engineers of educational software products, chief learning officers and chief technology officers of corporate universities, along with information technology personnel at the community and state college level, including developers of custom applications & application services.
Tags : 
learning management systems, srcom 2004, saas, cms, ldap-based sso, isv product managers, educational software products, custom applications, student information systems, section 508, ims qti, lionbridge lms solution
    
Lionbridge
Published By: 4Retail     Published Date: Nov 19, 2009
If you find yourself under the burden of mass emails and wasting valuable time sifting through volumes of unnecessary information, read on to find out why you are not alone and how you can change your working practices by looking to alternative ways of communicating.
Tags : 
email overload, communication, document management, problem of spam, project management, global sourcing, global sourcing management, on demand collaboration solution, email viruses, communication tool, growing inboxes, document upload
    
4Retail
Published By: Lionbridge     Published Date: Nov 18, 2009
The IEEE is trying to cope by introducing the 802.11n standard-but it's still in draft form. Meanwhile, how can manufacturers cope with the confusion and promise surrounding 802.11's future? The situation is outlined, and a forward path, based on strategic testing, is proposed.
Tags : 
802.11 standard, 802.11n challenges, wireless networking, draft-n standard, ieee, 802.11 specification, veritest, ixchariot software, veritest's methodology, lionbridge
    
Lionbridge
Published By: McAfee Inc     Published Date: Nov 16, 2009
With all the benefits and opportunities the Internet provides, it can also be a very inhospitable place, requiring organizations' constant vigilance to protect themselves from attack. To better understand important security issues affecting organizations today, IDC recently completed a survey of more than 260 IT and Firewall managers and executives in the US and Europe that aimed to profile their organization's firewall deployments.
Tags : 
mcafee, email protection, firewall, it security, midsize, global threat intelligence, security, data protection
    
McAfee Inc
Published By: NetApp     Published Date: Nov 11, 2009
This case study outlines how Gateway Health realized a 291% ROI by using NetApp solutions to reduce infrastructure costs, increase IT staff efficiency and increase user productivity through simplification and virtualization of their SAN environment.
Tags : 
netapp, idc, roi, user productivity, virtualization, san environment, downtime reduction, workforce efficiency
    
NetApp
Published By: McAfee     Published Date: Nov 09, 2009
Medium organizations around the globe are increasingly concerned about cyberthreats, and the rising number of incidents shared publicly certainly justifies their worries. In the first half of 2009, for example, McAfee Labs saw almost as much new malware as it did in all of 2008. At the same time, most organizations have frozen or cut their IT security budgets. Threats up, budgets down. This is what we call the "security paradox."
Tags : 
mcafee, risk management, security, security management, security threats, vulnerability assessments, vulnerability management
    
McAfee
Published By: ASG Software Solutions     Published Date: Nov 09, 2009
Composite applications can provide multiple benefits, such as business agility, better utilization of business software assets through code reuse, development efficiencies, and cost optimization. Once companies are skilled at deploying them, many find that they roll out new applications and integrations faster, while maximizing the value of "tried and true" software components.
Tags : 
asg, cmdb, bsm, itil, roi, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms, itsm
    
ASG Software Solutions
Published By: BMC ESM     Published Date: Nov 06, 2009
Leading bank shares best practices, results of IT compliance implementation. Zions Bancorporation is a leader in SBA lending, public finance advisory services, and agricultural finance. Which means compliance is critical, both to internal workflows and legal mandates like Sarbanes-Oxley.With nearly 25% of the enterprise virtualized, it became clear to IT leaders at Zions that an advanced solution to IT compliance was required. Attend the webinar.
Tags : 
bmc esm, zions, it compliance, virtualization, roi
    
BMC ESM
Published By: BMC ESM     Published Date: Nov 05, 2009
Realizing its existing processes and tools were inadequate, labor intensive and error-prone, Morgan Stanley began looking for a new application deployment solution in early 2007. While not required in the initial assessment, Morgan Stanley also hoped to find a tool that would also provide capabilities such as hardware and operating system provisioning.
Tags : 
bmc esm, deployment, morgan stanley, hardware, operating system, management, application automation, operations manager, bladelogic, deploy application, application release manager
    
BMC ESM
Published By: APTX     Published Date: Nov 05, 2009
This paper will present the case that there are a number of frailties associated with Dolby E, the most notable of which are the latency, audio quality and general awkwardness in terms of operation and implementation.
Tags : 
aptx, hdtv, audio, surround-sound, dolby e
    
APTX
Published By: Electric Cloud     Published Date: Nov 04, 2009
ElectricAccelerator improves the software development process by reducing build times, so development teams can reduce costs, shorten time-to-market, and improve quality and customer satisfaction.
Tags : 
electric cloud, electricaccelerator, software development, dependency management, software build accelerator, visualization, cluster manager, open source, roi
    
Electric Cloud
Published By: IBM     Published Date: Oct 28, 2009
The five-minute Maintenance & Technology Service Self-Assessment from IBM can help you start addressing the shortfalls in your hardware, software and managed support areas. You'll learn how to create plans for potential issues, plus identify next steps to improve your support.
Tags : 
infrastructure, ibm, vendor management, vendor assessment, maintenance, technical support
    
IBM
Published By: McAfee Inc     Published Date: Oct 26, 2009
Medium organizations around the globe are increasingly concerned about cyberthreats, and the rising number of incidents shared publicly certainly justifies their worries. In the first half of 2009, for example, McAfee Labs saw almost as much new malware as it did in all of 2008. At the same time, most organizations have frozen or cut their IT security budgets. Threats up, budgets down. This is what we call the "security paradox."
Tags : 
mcafee, security, cyberattacks, midsize, cyberthreats, compliance, security tools, sans, data protection, dlp, midmarket, compliance, availability, email security
    
McAfee Inc
Start   Previous    266 267 268 269 270 271 272 273 274 275 276 277 278 279 280    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.