HIT Consultant Insightful coverage of healthcare innovation
 

cases

Results 251 - 275 of 577Sort Results By: Published Date | Title | Company Name
Published By: Aviatrix     Published Date: Jun 11, 2018
In evaluating the security posture for your Global Transit Network, your first question might be: Why do I even need additional security? Isn’t what Amazon provides “out of the box” adequate? This is not the right question to ask first. It’s important to appreciate that, while Amazon says it has a shared security model, your Amazon EC2 instance may not meet your security requirements “by default.” Though Amazon makes specific security features available to you, it’s still up to you to choose judiciously among the many native and third-party options. As part of our fact-filled AWS Bootcamp series, Aviatrix CTO Sherry Wei and Neel Kamal, head of field operations at Aviatrix, walk through five use cases and examine what Amazon provides, and the questions you need to be asking to implement Amazon services – or add additional ones – that are appropriate for your business. After examining each use case, we’ll show you how we handle it for our own business. Who Should Watch? Anyone responsi
Tags : 
aws, aws vpc, aws transit vpc, secure transit vpc, vpc egress filter
    
Aviatrix
Published By: dinCloud     Published Date: Jun 19, 2018
As a professional in the legal industry, you may have been reading articles and hearing from colleagues about the traction and momentum for cloud services. Deciphering cloud solutions for your particular needs is still convoluted. A common use case is cloud backup and in many cases, multiple, redundant copies of legal files. Whether it is misplacing or losing data or in the case of a natural disaster, backups are a necessary part of this business.
Tags : 
cloud, trends, legal, industry
    
dinCloud
Published By: Google Apigee     Published Date: Feb 15, 2019
This is the age of API-driven businesses and enterprises need to create great developer experiences to build an ecosystem for their APIs. Many enterprises now view developers as one of the most essential actors in their value chains—the people who translate digital assets into digital experiences that move the business needle. Google Cloud’s new eBook, Creating World-Class Developer Experiences, takes a deeper look at creating world-class developer experiences. Learn about best practices for engaging developers and how to launch a developer portal that speeds adoption or your API products.. Explore how to delight developers and grow API programs with field-tested best practices, real-world use cases and a checklist to help your team get started. What's Inside? ? Field-tested best practices to delight developers and grow API programs ? Real-world use case: AccuWeather ? Developer experience checklist CTA: Download eBook
Tags : 
    
Google Apigee
Published By: Google Apigee     Published Date: Mar 05, 2019
API monetization is a key way to unlock value from your API programs and increase API adoption. Monetization enables API providers to reach beyond current business models, scale API programs, and open new opportunities with customers, developers, and partners. Google Cloud’s new eBook, Maximizing the Business Value of Digital Assets Through API Monetization, maximizing the business value of digital assets via API monetization. Read the real-use cases and learn about best practices to realize additional value from your API products. Explore how to generate revenue from API products and grow API programs with field-tested best practices, real-world use cases and a checklist to help your team get started. What's Inside? ? Field-tested best practices ? Real-world use case: Telstra ? API monetization checklist
Tags : 
    
Google Apigee
Published By: Google Apigee     Published Date: Mar 06, 2019
Inside the API Product Mindset APIs expose data or functionality for use by applications and developers, which means they allow access to a business’s valuable digital assets—and thus to the heart of the business itself. Vulnerable APIs can expose a business’s core data and services to a variety of threats. Therefore, API security should be of paramount importance to any enterprise that exposes digital assets. Google Cloud’s new eBook, Building and Managing Secure APIs, takes a deeper look at the do’s and don’ts of enterprise API security. Explore how to design secure, easy-to-use APIs with field-tested best practices, real-world use cases and a checklist to help your team get started. What's Inside? ? Field-tested best practices ? Real-world use cases ? API monetization checklist
Tags : 
    
Google Apigee
Published By: Google Apigee     Published Date: Mar 12, 2019
APIs have become the de facto standard for building and connecting modern applications, so any degradation in API performance can have an adverse impact on customer experience, brand value and revenue. Google Cloud’s new eBook, Optimizing API Programs with Monitoring and Analytics, takes a detailed look at the benefits of using API monitoring and analytics technology to optimize your API programs and digital strategies. Explore how to deliver a seamless and connected experience for customers, partners, and employees. What's inside? -Field-tested best practices -Real-world use cases -An API monitoring and analytics checklist
Tags : 
    
Google Apigee
Published By: TIBCO Software     Published Date: Feb 27, 2019
Blockchain in Financial Services is receiving a lot of attention, especially for synchronizing financial agreements between institutions. But how can blockchain be used outside of this context? Can it apply to use cases such as identity, fraud, and AML? Watch this short webinar to hear how blockchain can be used to solve other key issues facing the industry, about research into consensus algorithms beyond proof of work, and about myths and truths that must be considered for a successful enterprise blockchain implementation. Speaker: Nelson Petracek, CTO, TIBCO Software
Tags : 
blockchain, financial services, fraud, aml
    
TIBCO Software
Published By: TIBCO Software     Published Date: Sep 03, 2019
For years, manufacturers have been trying to streamline processes and associated supply chains by building marketplaces, standardized exchanges, and monolithic systems. In many cases, these solutions missed the mark, resulting in fragmented and brittle processes without easy data sharing. Blockchain, the underlying technology behind Bitcoin and other cryptocurrencies, can potentially solve these problems. Sharing information via a trusted distributed network with embedded business logic offers many benefits for manufacturing, especially when combined with the IoT and AI communities. Watch this webinar: Blockchain & Manufacturing: A Smarter Way to Drive Efficiency in the Semiconductor and Electronics Supply Chains, with speaker Nelson Petracek, chief technology officer, TIBCO Software.
Tags : 
    
TIBCO Software
Published By: TIBCO Software     Published Date: May 16, 2019
Banks globally are betting big on artificial intelligence and machine learning to give them the technological edge they need for more real-time, personalized and predictive banking services. A framework will help both differentiate early winners and provide them with sustained advantages in intelligence. Download this IDC Analyst Infobrief to learn about how the world’s best banks are becoming more personal, more predictive, and more real-time than ever. What you will learn: 8 trends that reflect bank’s readiness for connected intelligence 9 pitfalls to avoid & 9 ways to bridge the gaps The personal, real-time and predictive building blocks of AI & ML for banks Notable leaders based on IDC Financial Insights’ research and their respective use cases Essential guidance from IDC to leading banks
Tags : 
data, analytics, customer, banks, intelligence, capabilities, customers, insights, banking
    
TIBCO Software
Published By: Zerto     Published Date: Oct 08, 2018
"Gartner’s SWOT on Zerto examines Zerto’s position as a top provider for enterprise disaster recovery and IT Resilience. This informative, enlightening report from Gartner, the world’s preeminent research and advisory firm, will help business leaders like you make informed decisions about using Zerto solutions to achieve IT resilience. The Gartner SWOT on Zerto covers: In-depth 3rd party Analysis Recommendations on Zerto Use Cases Beyond Disaster Recovery Implications for Your Business Download the Gartner SWOT analysis to help guide you as you navigate the next steps for your organizations path to IT resilience!"
Tags : 
gartner, resilence decision-making, hybrid cloud
    
Zerto
Published By: Oracle     Published Date: Mar 13, 2019
Our research reports on the 5,000 executives from the marketing community, across 24 markets, who agreed that innovation drives growth. However, barriers to innovation remain significant, ranging from isolation within the business, to a lack of insight into the data, and absent support from leadership in 24% of cases, and data remains the second largest issue for marketing with a 10% gap. New technologies help harness data, demonstrate how innovation will benefit teams and businesses, and help CMOs create a successful innovation agenda. Read the report
Tags : 
    
Oracle
Published By: Rand Secure Archive     Published Date: Jun 06, 2013
Without a doubt, technology has revolutionized the way business is done. The vast majority of internal and external communication is now done through email, instant messaging, VOIP and other types of electronic communication. In addition, most business documents exist in digital form. The digitization of business has had significant implications for litigation. Legal eDiscovery is now an essential part of settling cases between organizations. Previously, many companies believed that eDiscovery was only for organizations that were public or highly regulated, but now most companies recognize that electronically stored information (ESI) regulations are applicable to all organizations and there is an ever-increasing need for cost-effective eDiscovery.
Tags : 
coding, ediscovery, legal, effective, organization
    
Rand Secure Archive
Published By: Dynatrace     Published Date: May 21, 2019
The Internet of Things (IoT) is exploding across every industry, everywhere, starting a new chapter in digital transformation. As new use-cases for IoT continue to emerge, the digital experiences they enable will become increasingly critical to business success, connecting all aspects of human society. Based on a global survey of 800 CIOs, this report examines the challenges organizations face as they begin to explore and deploy Internet of Things (IoT) use-cases and web-scale applications.
Tags : 
    
Dynatrace
Published By: NAVEX Global     Published Date: Jul 31, 2018
The U.S. Foreign Corrupt Practices Act (FCPA), the U.K. Bribery Act (UKBA), Sapin II and many other Anti-Bribery and Corruption (ABC) laws and regulations around the world make it clear that bribery and corruption is prohibited, illegal and the source of fines, penalties, reputational damage, and in some cases criminal liability. This is particularly true when the bribes are offered to foreign government officials, especially by third parties. Use this document to identify when bribery and corruption activities are most likely to be occurring within your business. Next to each bribery and corruption ‘red flag’ we have provided some suggested responses and best practices an organisation can use to address these issues and minimize the risks for your business. You’ll learn: What procedures should I have in place for third party engagements? Are there particular red flags that indicate increased corruption risk? How should I respond to high-risk third-party red flags?
Tags : 
    
NAVEX Global
Published By: Pentaho     Published Date: Apr 28, 2016
As data warehouses (DWs) and requirements for them continue to evolve, having a strategy to catch up and continuously modernize DWs is vital. DWs continue to be relevant, since as they support operationalized analytics, and enable business value from machine data and other new forms of big data. This TDWI Best Practices report covers how to modernize a DW environment, to keep it competitive and aligned with business goals, in the new age of big data analytics. This report covers: • The many options – both old and new – for modernizing a data warehouse • New technologies, products, and practices to real-world use cases • How to extend the lifespan, range of uses, and value of existing data warehouses
Tags : 
pentaho, data warehouse, modernization, big data, bug data analytics, best practices
    
Pentaho
Published By: ForeScout     Published Date: Apr 18, 2014
Download your copy of the new eBook entitled “Definitive Guide™ to Next-generation Network Access Control.” This 84-page resource provides security practitioners with key capabilities, implementation considerations, use cases and operational advice for network access control (NAC) and details on how modern NAC platforms can be applied by IT organizations to achieve continuous monitoring and mitigation.
Tags : 
forescout, next generation network access control, implementation considerations, it organizations, security resources, nac platforms
    
ForeScout
Published By: ProfitBricks     Published Date: Jan 01, 2013
Performance testing and benchmarking of cloud computing platforms is a complex task, compounded by the differences between providers and the use cases of cloud computing users. IaaS services are utilized by a large variety of industries and, performance metrics cannot be understood by simply representing cloud performance with a single value. When selecting a cloud computing provider, IT professionals consider many factors: compatibility, performance, cost, security and more. Performance is a key factor that drives many others including cost. In many cases, 3 primary bottlenecks affect server performance: central processing unit (CPU) performance, disk performance, and internal network performance.
Tags : 
cloud computing, iaas, profitbricks, amazon ec2, rackspace cloud, central processing unit, disk performance, internal network performance
    
ProfitBricks
Published By: Tripp Lite     Published Date: Jun 28, 2018
Cooling tends to take a back seat to other concerns when server rooms and small to mid-size data centers are first built. As computing needs grow, increased heat production can compromise equipment performance and cause shutdowns. Haphazard data center expansion creates cooling inefficiencies that magnify these heat-related problems. End users may assume they need to increase cooling capacity, but this is often unnecessary. In most cases, low-cost rack cooling best practices will solve heat-related problems. Best practices optimize airflow, increase efficiency, prevent downtime and reduce costs.
Tags : 
    
Tripp Lite
Published By: Box     Published Date: Jun 11, 2014
Box, the leader in Enterprise Content Collaboration, helps businesses integrate these applications and in particular add secure mobile collaboration to Microsoft Office 365. This whitepaper best practices for integrating two common enterprise applications – content creation and collaboration – with Box and Office 365. It provides a guide for business making the transition to the cloud and key use cases for collaboration.
Tags : 
box, enterprise transformation, enterprise content collaboration, office 365, microsoft, api integration, content creation, content collaboration
    
Box
Published By: CA Technologies     Published Date: Jun 03, 2015
"Are dev and test constraints holding back your digital transformation? Today, just about all businesses are scrambling to add digital components to their products and services with the hopes of capturing—and maintaining—the interest of an increasingly demanding customer base. As you undergo this digital transformation, your IT teams face tremendous pressure to not only develop innovative new experiences, but do so at an accelerated rate—lest competitors beat you to market with the next big thing. Take a new approach to solving the familiar challenge of doing more with less—and doing it faster than ever before -- remove the constraints holding you back. At its core, Service Virtualization is all about removing constraints within the SDLC by simulating dependent systems, services and behaviors. In order to understand the true depth and breadth of this concept, however, it helps to see how Service Virtualization can be utilized in different development scenarios.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 04, 2015
The application economy poses several challenges to a digital transformation strategy. To truly capitalize on the opportunity, organizations like yours have to think bigger than small-scale augmentations or throwing more resources at the problem. Such “solutions” might work in isolated cases, but they’ll never move the needle enough or drive competitive differentiation. With Continuous Deployment, you can transform and accelerate the SDLC, so complex deployments occur in hours or minutes, not weeks or days.
Tags : 
    
CA Technologies
Published By: PeopleFluent     Published Date: Oct 07, 2015
This report includes analysis of the types of customers (company sizes, industries etc.) that use PeopleFluent, a discussion of its key use cases, what companies and users like most about the product, and areas for improvement, as well as comparisons that show how PeopleFluent stacks up against other leading talent management products. It also includes independent research and an interview with the vendor.
Tags : 
peoplefluent, talent management, business software, talent management product, user interface
    
PeopleFluent
Published By: Panasonic     Published Date: Nov 09, 2015
This report will discuss which industries are set to gain the most from IoT, which use cases may be the most innovative, and how business leaders can strategically move towards an ever-connected enterprise landscape.
Tags : 
panasonic, data, enterprise, data
    
Panasonic
Published By: Genesys     Published Date: Jul 13, 2018
With artificial intelligence (AI) gaining ground, the right contact center infrastructure (CCI) can be the critical business differentiator for long-term flexibility and scalability. Gartner Research looked at three use cases to evaluate CCI vendors, and Genesys received the highest use case scores (4.16 out of 5) for Customer Engagement Center in Gartner Critical Capabilities.
Tags : 
gartner, contact center, artificial intelligence, infrastructure, crm system
    
Genesys
Published By: Forcepoint     Published Date: May 14, 2019
2018 NSS Labs SD-WAN Group Test In this report, NSS Labs simulated an enterprise network that has branches connected to a data center through two links: an MPLS line and a commercial broadband connection. They reviewed a select number of vendors, testing their throughput performance, video quality and VoIP quality as well as security effectiveness. NSS Labs verified that Forcepoint NGFW handled all of their use cases and offers all the operational capabilities that they recommend as necessary for SD-WAN as well as scoring 100% across all security tests, blocking all evasion techniques. “Forcepoint is one of the few vendors to support all of the use cases and capabilities we tested as well as strong security in their SD-WAN solution. They should be on the short list for any organization that’s looking to connect and protect their distributed enterprise.” - Vikram Phatak, CEO, NSS Labs Read the report and learn how Forcepoint delivers SD-WAN with enterprise scale and security to ma
Tags : 
    
Forcepoint
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.