HIT Consultant Insightful coverage of healthcare innovation
 

cases

Results 501 - 525 of 588Sort Results By: Published Date | Title | Company Name
Published By: Symantec     Published Date: Nov 15, 2013
Learn how to determine which virtual backup products are most appropriate for your particular use-cases and scenarios and evaluate whether the total cost of ownership fits your budget.
Tags : 
syamntec, virtual backup software, evaluation report, info-tech research group, backup and recovery
    
Symantec
Published By: Citrix     Published Date: May 09, 2014
A wide range of business issues is driving IT toward desktop virtualization. One solution—Citrix XenDesktop with FlexCast technology—helps IT teams empower their entire workforces, one project at a time
Tags : 
citrix, virtualization, desktop virtualization, mobile workers, laptops, xendesktop, mobile
    
Citrix
Published By: Citrix     Published Date: Aug 15, 2012
Mobility and consumerization are little more than buzzwords without the applications that drive business activities. A successful enterprise mobility strategy places priority on applications first, mapping their mission to the variety of use cases out in the field. This paper describes how you can simplify application mobilization with Citrix.
Tags : 
citrix, xenapp, windows applications, microsoft applications, windows, microsoft, mobilizing applications, mobile devices
    
Citrix
Published By: Localytics     Published Date: Jul 18, 2014
This 28-page ebook gives app developers & marketers the best practices, use cases and how-to steps required to boost user engagement and personalize app experience.
Tags : 
in-app messaging, push messaging, messaging best practices, in-app marketing, push marketing, user analysis, app personalization, personalize app
    
Localytics
Published By: Oracle     Published Date: Nov 05, 2013
Sales people spend more time out of the office than in. When they are out of the office, they need information at their fingertips. And in today’s more mobile, more collaborative, and more data-rich business world, the needs of corporate sales forces are radically changing. In particular, sales people have always needed access to information about their customer before a meeting and an easy way to update customer information after a meeting. Now, to work more efficiently from the road, they could benefit from and in many cases need additional help in the form of relationship management assistance, collaboration tools, and contextual and relevant business analytics.
Tags : 
mobility, mobile, collaboration, crm, customer service, sales, enterprise communication, mobile crm
    
Oracle
Published By: Cisco     Published Date: Jan 06, 2015
Cisco Validated Designs (CVDs) provide the foundation for systems design based on common use cases or current engineering system priorities. They incorporate a broad set of technologies, features, and applications to address customer needs. Cisco engineers have comprehensively tested and documented each CVD in order to ensure faster, more reliable, and fully predictable deployment.
Tags : 
engineering system, campus wired, reliability, predictable deployment, cisco, validated designs, applications
    
Cisco
Published By: HP     Published Date: Aug 25, 2014
At first, virtualization efforts focused on optimization – making the server more efficient. These efforts transitioned into standardizing virtualization across the data center, including management of servers, storage and networking. Now customers are looking to use virtualization technology and all supporting infrastructure as a complete and extremely efficient system.HP ConvergedSystem 300 for Virtualization has been designed to address one of today’s top priorities for IT organizations – deploying applications faster through virtualization but in a way that does not increase IT complexity. Pre-configured to meet the needs of mid-market customers, HP ConvergedSystem 300 for Virtualization offerings can be easily, reliably, and rapidly deployed to support a variety of virtualized application use cases such as general IT infrastructure, decision support, collaboration or business processing.
Tags : 
converged system, server, complexity, storage, networking, virtualization, data center, cloud
    
HP
Published By: UnsubCentral     Published Date: Oct 17, 2014
Email suppression lists are often created and maintained for one purpose: honoring the consumer’s opt out request and remaining CAN-SPAM compliant. While those are incredibly important, there are so many other ways that a suppression list can and should include. Take a look at our e-book to find out how you can use your suppression lists to increase your ROI.
Tags : 
mail marketing compliance, email list scrubbing, suppression list, email suppression list, suppression list management, suppression file management, email suppression file scrubbing, affiliate email marketing
    
UnsubCentral
Published By: Dell     Published Date: Aug 24, 2015
This business-oriented white paper summarizes the wide-ranging benefits of the Hadoop platform, highlights common data processing use cases and explores examples of specific use cases in vertical industries.
Tags : 
dell, big data, hadoop, cloud, data center, cloudera, data warehousing
    
Dell
Published By: Dell     Published Date: Aug 24, 2015
This paper discusses how the many Dell | Cloudera Hadoop solutions help organizations of all sizes, and with a variety of needs and use cases, tackle their big data requirements.
Tags : 
dell, big data, data management, cloud solutions, hadoop, servers, cloud computing, storage
    
Dell
Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: VMware     Published Date: Mar 03, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: Inside HPC Media LLC     Published Date: Sep 24, 2019
The 2019 version of High Performance Computing (HPC) has changed considerably from previous years’. Most notably, advancements in Artificial Intelligence (AI) has given rise to data-centric applications in machine learning. Machine learning often relies on HPC technologies, particularly in the early training phase, and in many cases, machine learning initiatives share infrastructure, budgets, and personnel with established HPC installations. A 2018 Intersect360 Research study found that the majority of experienced HPC users had also embarked on machine learning applications, usually overlapping HPC and AI.
Tags : 
    
Inside HPC Media LLC
Published By: Oracle Corporation     Published Date: Apr 01, 2013
This paper focuses on configuring Oracle GoldenGate to run on Oracle Exadata. The Oracle Exadata Database Machine can act as the source database, as the target database, or in some cases as both source and target databases for GoldenGate processing.
Tags : 
database, goldengate, oracle, maximum availability architecture, arcitecture
    
Oracle Corporation
Published By: Viavi Solutions     Published Date: Jan 04, 2017
Network performance Monitoring and diagnostics (NPMD) solutions are designed to capture and in many cases store network conversations in order to manage and troubleshoot IT service issues. Therefore, your NPMD solution must be viewed as an integral part of PCI DSS compliance efforts and never compromise these initiatives. This white paper goes through the best offerings that can strengthen these efforts.
Tags : 
    
Viavi Solutions
Published By: Oracle     Published Date: Sep 30, 2014
Our team has curated 20 examples of inspiring cross-channel marketing creative from the past year – showcasing standout cross-channel creative. Carefully curated by a team of experts, this collection of accomplished design, copy, coding and strategy points the way forward for marketing.
Tags : 
oracle, marketing, cloud, connected, customer, modern, lookbook, digital marketing
    
Oracle
Published By: AlienVault     Published Date: Jul 22, 2016
In this paper, you’ll read about a few specific use cases where AlienVault technologies help you Observe, Orient, Decide, and Act for effective incident response.
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Oct 20, 2017
Security Information and Event Management (SIEM) is a critical security capability for threat detection and compliance. However, many organizations who start down the path of a SIEM deployment run into surprises in terms of the cost, resources and expertise required to effectively implement and maintain a SIEM deployment. This free SIEM Analyst Research Bundle compiles research reports from leading industry analysts - 451 Research, Frost & Sullivan, and SANS - to help you understand different approaches to SIEM and considerations to help you find the right solution for your needs. Learn more about: Primary SIEM use cases and technology requirements Critical SIEM capabilities Considerations for cloud environments Approaches to SIEM for resource-constrained organizations
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Oct 20, 2017
This 2017 Spotlight report reveals the latest data points and trends in how organizations are leveraging Managed Security Services Providers (MSSPs) to augment, or in some cases completely outsource their security programs. You'll learn about key findings including: The predominant driver for organizations to consider managed security services The most critical capabilities organizations look for in MSSPs The most requested security services offered by MSSPs Key benefits respondents have achieved by partnering with an MSSP Whether you are evaluating using an MSSP, or are an MSSP yourself, download this report to gain valuable insights into how MSSPs are helping their clients improve their security posture.
Tags : 
    
AlienVault
Published By: Alacritech     Published Date: Aug 21, 2009
Today's systems and servers need an efficient way to move the ever-increasing amounts of data over networks. Many companies have introduced solutions such as TCP/IP Offload Engines (TOE) Network Interface Cards (TNICs), Network Interface Cards (NICs), and iSCSI Host Bus Adapters (HBAs) to solve efficiency and throughout challenges. However, the functionality of these solutions is quite varied, and in some cases, rapidly becoming obsolete.
Tags : 
data transfer, tcp/ip, tnic, nic, hba, iscsi, alacritech
    
Alacritech
Published By: Schneider Electric     Published Date: Apr 23, 2019
The fourth industrial revolution is well underway. It focuses on digital transformation and creation of the Industrial Internet of Things (IIoT). A key part of this revolution is technology that enables new realities—including virtual reality (VR), augmented reality (AR), and mixed reality (MR). These new realities are already being applied in industrial settings and are poised to grow exponentially in the next few years. This storyscape dives into use cases for each type of reality and presents the benefits of each in relation to industrial automation.
Tags : 
augmented reality, industrial revolution
    
Schneider Electric
Published By: Schneider Electric     Published Date: Jun 07, 2019
Colocation providers are dealing with market forces that represent both great opportunity and significant challenge – in some cases from the same development. Providers have to deal with an ever-changing set of buyers, with CFOs and COOs playing an increased role in the decision-making. And they need to address emerging trends such as the Internet of Things and cloud computing, which ,can have both a positive and negative impact on their businesses.
Tags : 
decision-making, emerging threats, schneider electric, - colocation data center threats, colocation provider
    
Schneider Electric
Published By: Aventail     Published Date: Aug 21, 2009
The SSL VPN Technical Primer explains how SSL VPNs work, and includes an objective comparison of the distinguishing factors between IPSec and SSL VPN technologies. You'll learn why these two technologies, based on fundamentally different designs and methodologies, each serve specific use cases best.
Tags : 
ssl, vpn, ssl vpn, comparison table, comparison guide, comparison chart, ipsec, ipsec vpn
    
Aventail
Published By: ICG Commerce     Published Date: Aug 21, 2009
This paper introduces the Procurement Services Provider model and how it can help companies significantly reduce procurement costs for greater bottom line value. The paper published by the Aberdeen Group speaks about the value a PSP can bring to an organization and it showcases ICG Commerce as a pioneer for this new service offering.
Tags : 
eprocurement, procurement, cost control, procurement services provider, psp, icg commerce, icg
    
ICG Commerce
Published By: TopLayer     Published Date: Aug 21, 2009
This white paper written by Reymann Group, compliance consultant firm, showcases thought leadership on how intrusion prevention solutions can enable proactive security responses necessary to protect today's corporate enterprise and its customers from real time threats posed by widespread cyber terrorists, hackers, and rogue insiders.
Tags : 
sarbanes, intrusion prevention, ips, sox, sarbanes-oxley, sarbox, network security, cybercrime
    
TopLayer
Start   Previous    10 11 12 13 14 15 16 17 18 19 20 21 22 23 24    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.