HIT Consultant Insightful coverage of healthcare innovation
 

cem

Results 576 - 600 of 613Sort Results By: Published Date | Title | Company Name
Published By: Adobe     Published Date: Sep 08, 2011
Review the new architecture based on OSGI, JCR and Sling which can run directly in a Java virtual machine.
Tags : 
adobe, cem, customer experience management, best practices, customer interactions, enterprise applications, cloud compatibility, rias, osgi, sling, java
    
Adobe
Published By: Red Hat     Published Date: Jan 21, 2011
Red Hat Enterprise Virtualization for Desktops can help your business reduce desktop-associated costs, improve data security, and simplify overall desktop infrastructure management. In this session, Jeff Jameson will explain the technology features and benefits of delivering centrally hosted Linux and Windows desktops to the client of your choosing, while providing a true PC-like experience to your end users. With incredibly rich, integrated features like bi-directional audio and video, and kernel-level security enforcement, Red Hat Enterprise Virtualization for Desktops provides a complete solution for your virtual desktop deployments.
Tags : 
red hat virtual tradeshow, live event, enterprise virtualization, desktop infrastructure management, linux, windows desktop, security
    
Red Hat
Published By: Red Hat     Published Date: Jan 20, 2011
In this session, Tim Burke will provide a high-level overview of Red Hat Enterprise Linux 6, setting the context for listeners to be prepared for the more detailed follow-on sessions. Tim will provide a description of the key themes of Red Hat Enterprise Linux 6, including datacenter operational efficiency, performance, scalability, virtualization, and green IT. He will also provide highlights of the key feature advancements in a wide variety of subsystems. Tim will close the session with a description of the product packaging approach.
Tags : 
red hat, enterprise linux 6, datacenter operation, performance, scalability, virtualization, green it, tim burke
    
Red Hat
Published By: Red Hat     Published Date: Jan 20, 2011
In this session, attendees will explore the new features of Red Hat Enterprise Linux 6 performance. John Shakshober (Shak) will share the scalability optimizations for larger SMP systems, > 1TB of memory, new transparent hugepage support, multi-q network performance of 10Gbit and Infiniband, and KVM enhancements that went into Red Hat Enterprise Linux 6. Shak will also share benchmark data from industry standard workloads using common applications such as database servers, Java engines, and various financial applications on the latest Intel and AMD x86_64 hardware.
Tags : 
red hat, enterprise, linux 6 performance, memory, storage, database servers
    
Red Hat
Published By: Allscripts     Published Date: Oct 24, 2014
Cornerstone Medical Care, a 10-provider practice in Brandon, Florida is currently using Allscripts EHR solutions to shift from fee for service to value based care. Today, their risk-based contracts have accounted for a seven-figure increase in revenue. Download the webinar now to learn how!
Tags : 
allscripts, ambulatory practice, value based care, ehr replacement, ehr solution, risk based contracts, actionable data
    
Allscripts
Published By: CDW     Published Date: Sep 17, 2014
You are being buried by data. Multimedia including videos, audio and photos. Unstructured data in presentations, documents and social media feeds. Even the voicemails and databases that used to be the primary residents of your storage system are growing beyond your ability to manage them effectively. How can you keep it all under control without buying an endless stream of disk and storage devices? Experts from EMC and other leading storage manufacturers discuss the very latest trends in storage solutions and how an effective application of storage strategy can help tame the information beast and keep performance and availability issues at bay. Attendees will learn: - What are the hidden drivers in storage growth - How businesses of all sizes can benefit from a tiered storage strategy - Why virtualization is penetrating every level of IT - What role SSD and flash will play in every storage environment - What to do now to improve storage utilization and save costs
Tags : 
storage, tiering, performance, availability, media, feeds, system, netgear, emc, buying, data, social media, manage, voicemail, presentation, residents, issues, disk
    
CDW
Published By: Webroot     Published Date: Nov 02, 2012
This report presents our results and findings as a result of performance benchmark testing conducted for eight security software products, on Windows 7 Ultimate Edition from December 2011 to January 2012.
Tags : 
it security, endpoint security, endpoint protection
    
Webroot
Published By: MobileIron     Published Date: Oct 21, 2016
The release of Android for Work, combined with the enterprise upgrades in Lollipop, delivers an outstanding opportunity for companies that have long waited to support Android devices as part of their BYOD mix. It also cements the need for a multi-OS EMM platform that is capable of delivering configurations across Android, iOS, and Windows devices. For organizations that want to take advantage of Android for Work, the first step will be to find an EMM provider with with a comprehensive platform and broad experience with multi-OS deployments to ensure their success. Download now to learn more!
Tags : 
    
MobileIron
Published By: Secureworks     Published Date: Oct 04, 2017
The General Data Protection Regulation1 is a European Union regulation with the full title of ‘Regulation on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, which repeals Directive 95/46/EC (General Data Protection Regulation)’. It’s the first comprehensive overhaul and replacement of European data protection legislation in over twenty years and could be the most significant regulatory framework to hit organizations since Sarbanes-Oxley in 2002. Its purpose is to replace the varying implementations across Europe of the earlier EU Data Protection Directive with a single harmonized EU regulation. The intended outcome is a standardized set of expectations about how an organization must manage and protect personally identifiable information on employees, clients and other applicable data subjects. Any organization that holds data on EU citizens, regardless of where it is domiciled, within the EU or otherwise, is in sco
Tags : 
    
Secureworks
Published By: Return Path     Published Date: Jan 29, 2013
The need for marketers to improve their optimization practices has led Return Path and the Relevancy Group to explore the state of email marketing measurement and analysis, as well as its role and impact on marketing performance.
Tags : 
email marketing optimization practices, audience segmentation, inbox placement, email program results, email marketing performance, competitive benchmarking tools, competitor email programs
    
Return Path
Published By: Jobvite     Published Date: May 15, 2013
Can you directly link your recruiting sources to successful employee performance? Don’t worry. Only 22% of organizations claim to have mastered this skill, according to a recent Analyst Insight report from Aberdeen Group. Download your report now.
Tags : 
new hires, jobvite, recruiting, job placement, job recruiting, new staff, staffing, hire management, hiring tools, social hiring, social recruiting
    
Jobvite
Published By: Allscripts     Published Date: Sep 16, 2014
Download this ebook to understand the basic foundation that every practice needs in an EHR moving in to 2015 and beyond. Use the easy to follow checklist of criteria to ensure the vendor meets your individual practice’s needs as well.
Tags : 
ehr replacement, electronic medical record replacement, electronic medical record, electronic health record, electronic health record replacement, ehr ambulatory practice, ehr physician practice, ehr practice, ehr strategy, ehr needs, ehr, practice management, practice management solution, icd-10, meaningful use, mu2, improved outcomes, measuring quality outcomes, population health, fqhc ehr
    
Allscripts
Published By: HireRight     Published Date: May 01, 2013
There are a number of reasons why shrewd staffing agencies run background checks on potential employees before inviting them in to their business and, in turn, into their customers’ businesses. Background screening may be required by law for certain placements and industries, or, the customer may require screening. In all instances, failure to properly screen employees can have serious business and financial consequences. This industry brief outlines the risks that can arise from bad hires and how careful background screening can help mitigate those risks.
Tags : 
staffing, hireright, human resources, hr department, clients, potential employees
    
HireRight
Published By: Cox Business     Published Date: May 31, 2017
Does IT get a lot of questions from users these days? For starters, maybe they want to know why their applications don’t run faster, why they’re having downtime, why their favorite enhancements aren’t top priorities, on and on--why, why, why? Tough questions. You’d love to have the resources to give them positive answers. Of course, that would require beefing up bandwidth and modernizing the network architecture. But the truth is, your paltry budget barely keeps the lights on.
Tags : 
    
Cox Business
Published By: CopiaTECH     Published Date: Mar 18, 2008
With the advancement of IT, technology has brought great improvements and new challenges. One such challenge is spyware: software designed to either capture your data or use your system for its own purposes. This paper discusses in detail various kinds of spyware and measures of protection against it.
Tags : 
copiatech
    
CopiaTECH
Published By: LogRhythm     Published Date: Aug 08, 2016
Among the countless changes in Windows 10 Microsoft has provided IT organizations more visibility into auditable actions on Windows 10 machines and the resulting events in the Security Log. Understanding these enhancements is important because we need every edge we can get to detect endpoint intrusions. Threat actors use a sophisticated mix of phishing, social engineering, and malware to attempt to compromise any user within an organization. A seemingly benign order request sent to a salesperson or a benefits summary to someone in HR can contain attachments infected with malware. Once such payloads are in, the goal is to determine how to leverage current users and other accounts on the compromised machine to access valuable and sensitive data, as well as how to spread out within the organization and repeat the process.
Tags : 
microsoft, security, best practices, data
    
LogRhythm
Published By: VMware AirWatch     Published Date: Oct 27, 2016
Hear how leading hospitals are using the Digital Clinical Workspace as a platform for innovation to improve the patient and provider experience, and enable the right device at the right time for the right task. The session will cover new key technologies to help protect patient data and cover the recent announcement of Target Platform for Epic 2015.
Tags : 
    
VMware AirWatch
Published By: Dell EMC Storage     Published Date: Aug 15, 2019
Pursuing agility to truly impact business transformation requires embracing data center modernization as a core competency. Crucial to this is having the most up-to-date IT infrastructure to support the scale and complexity of a changing technology landscape. Companies must embrace this imperative by adopting software-defined data center principles, embracing modernization, and automating their IT management processes. Those that do will propel business innovation and deliver superior customer experiences with fast, secure, and reliable business technology. In December 2018, Dell Technologies commissioned Forrester Consulting to evaluate the business value of modern infrastructure in company data centers. Forrester conducted an online survey with 508 IT infrastructure technology decision makers in seven countries to explore this topic. This spotlight focuses on the 102 respondents we surveyed at midmarket businesses (MBs) with 100 to 499 employees. We found that while most midmarket fi
Tags : 
    
Dell EMC Storage
Published By: Forcepoint     Published Date: Apr 20, 2016
This will appear under the headline in some cases; in other cases, just the long description will appear. Both descriptions should work independently of each other and not be super redundant if possible: Relying on point products to protect your network is a losing strategy. Having tools than your IT team can handle raises costs, complexity and risk. Deploying enterprise security architecture with control over enforcement, coordination, end-to-end visibility and process automation from a single pane of glass, is the winning approach.
Tags : 
security, security protection, security architecture, security, protection
    
Forcepoint
Published By: GFI     Published Date: Jun 12, 2007
In a survey conducted throughout November and December 2004, SERVO asked 100 of their top customers which projects they were most likely to accomplish in 2005. Interestingly, email archiving made it to the top 5 corporate priorities and this finding can easily be backed up as recent market trends show a six-fold increase in demand for email archiving solutions.
Tags : 
email archiving, archive, archiving, email management, email, sarbox, sarbanes oxley, sarbanes-oxley, sox, gfi, mail archiver, mailarchiver
    
GFI
Published By: Careerminds     Published Date: Feb 20, 2013
Sign up now for a free 30 minute online presentation and let us share with you how dynamic changes in the workforce are impacting employees' outplacement expectations.
Tags : 
staffing, outplacement, careers, human resources, recruiting
    
Careerminds
Published By: Astaro     Published Date: Aug 10, 2009
Previously, the network at the City of Lake Wales didn't possess any firewalls, intrusion protection or web filtering solutions. As a result the network, which is spread out to multiple locations (including law enforcement), was left wide open to security breaches and caused system performance problems as users unwittingly picked up spyware and malware.
Tags : 
astaro, security, gateway, cisco pix, web filtering, intrusion protection, firewall, firewalls, network, spyware, malware, astaro, integrated security solution, surfcontrol, pix, cisco, firewall, internet security, devine lake wales, failover
    
Astaro
Published By: Asentria Corporation     Published Date: Sep 04, 2007
Simple voicemail has evolved into complex integrated messaging platforms and the generic black handset has been replaced by a plethora of devices. Service providers can become critical partners for companies looking to ensure availability of their voice network.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures, fault management, network management, remote site monitoring, remote site alarms, environmental monitoring, network alarm monitoring, network alarm management, remote telemetry units, alarm management system, network management systems, network monitoring, protocol mediation
    
Asentria Corporation
Published By: YouSendIt     Published Date: Jul 18, 2011
This whitepaper highlights how organizations can solve their attachment management problems while imposing little or no change on the way that users work and increasing IT's visibility into the process for compliance purposes -- inexpensively and at reduced corporate risk.
Tags : 
email attachments, online file sharing, ftp replacement, send large files, secure file transfer, managed file transfer, file transfer, online file storage, large email attachment, upload, upload files, send it on, yousendit, file sharing, yousendit file sharing
    
YouSendIt
Published By: YouSendIt     Published Date: Jul 18, 2011
This whitepaper highlights how organizations can solve their attachment management problems while imposing little or no change on the way that users work and increasing IT's visibility into the process for compliance purposes -- inexpensively and at reduced corporate risk.
Tags : 
email attachments, online file sharing, ftp replacement, send large files, secure file transfer, managed file transfer, file transfer, online file storage, large email attachment, upload, upload files, send it on, yousendit, file sharing, yousendit file sharing
    
YouSendIt
Start   Previous    11 12 13 14 15 16 17 18 19 20 21 22 23 24 25    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.