HIT Consultant Insightful coverage of healthcare innovation
 

closure

Results 51 - 75 of 77Sort Results By: Published Date | Title | Company Name
Published By: HERE Technologies     Published Date: May 29, 2019
How HERE delivers fresh and accurate traffic data to optimize mobility, road safety, and transport network management
Tags : 
traffic, data, closures, congestion, incidents, road
    
HERE Technologies
Published By: HERE Technologies     Published Date: Feb 12, 2019
How does a transport authority to provide the safest and most efficient road network possible? How does it ensure the supply of data on road closures, accidents and disruptive events used in its decision-making is of the highest quality? This ebook examines the process used by HERE Technologies to produce industry-leading traffic content. As the foremost global provider of traffic incident information, HERE is well placed to help transport authorities exceed expectations as it produces evermore precise and granular data around the incidents that impact traffic flow.
Tags : 
public sector, urbanization, traffic management
    
HERE Technologies
Published By: Darktrace     Published Date: Jun 21, 2019
Cyber security is today an unavoidable concern for law firms and the legal sector at large, which oversees disproportionately large volumes of sensitive data and which is therefore an attractive target for sophisticated threat actors. From confidential information about mergers and acquisitions to disclosures made under attorney-client privilege, today’s law firms are inundated with data that would be disastrous if leaked, both for the results of individual cases and for these firm’s long-term reputations. Indeed, this reputational damage diminishes the very trust upon which the legal profession is predicated, jeopardizing client relationships and hindering customer acquisition. Legal organizations lose 5% of their clients following a data breach, while significant or high-profile breaches can even prompt a firm’s eventual collapse, as was the case for Mossack Fonseca in the infamous Panama Papers breach. In today’s increasingly digital business world, even the most private legal docum
Tags : 
    
Darktrace
Published By: AWS     Published Date: May 18, 2018
We’ve become a world of instant information. We carry mobile devices that answer questions in seconds and we track our morning runs from screens on our wrists. News spreads immediately across our social feeds, and traffic alerts direct us away from road closures. As consumers, we have come to expect answers now, in real time. Until recently, businesses that were seeking information about their customers, products, or applications, in real time, were challenged to do so. Streaming data, such as website clickstreams, application logs, and IoT device telemetry, could be ingested but not analyzed in real time for any kind of immediate action. For years, analytics were understood to be a snapshot of the past, but never a window into the present. Reports could show us yesterday’s sales figures, but not what customers are buying right now. Then, along came the cloud. With the emergence of cloud computing, and new technologies leveraging its inherent scalability and agility, streaming data
Tags : 
    
AWS
Published By: Mimecast     Published Date: Apr 13, 2018
On the 13th February 2017, the Privacy Amendment (Notifiable Data Breaches) Act was passed in the Australian Parliament, introducing a mandatory notification regime. This bill commences on the 23rd February 2018 and will require organisations to notify data subjects and regulators in the event of an “eligible” data breach. An “eligible data breach” will occur where: ? There is unauthorised access to, or unauthorised disclosure of, the information; and ? A reasonable person would conclude that the access or disclosure would be likely to result in serious harm to any of the individuals to whom the information relates The amended legislation provides greater clarity to Australian citizens about the privacy of their personal information and will affect Australian companies as well as international organisations with Australian operations. It also means that businesses must carefully think about the practical issues related to data breach responses and the disruptive consequences of any un
Tags : 
    
Mimecast
Published By: Asentria Corporation     Published Date: Sep 04, 2007
Today’s service providers face more pressure than ever to keep remote equipment up and running as customers continue to demand higher levels of reliable service while keeping costs competitive. Thus, there is a growing need for remote site management solutions that can help service providers monitor, access and control telecom equipment located at customer sites.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures
    
Asentria Corporation
Published By: Asentria Corporation     Published Date: Sep 04, 2007
More than ever before, IT managers need to secure equipment and facilities against a variety of intrusive conditions that could cripple critical operations, resulting in system malfunctions, loss of data or intellectual property, damage to mission critical hardware or even theft of valuable physical assets. Such conditions often include environmental events, failure of air conditioning systems, power outages, and untoward human actions.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures
    
Asentria Corporation
Published By: Asentria Corporation     Published Date: Sep 04, 2007
Telecom operations typically have sophisticated network and systems management (NSM) software in place to monitor their servers, workstations and routers. Such systems often utilize Simple Network Management Protocol (SNMP) as a means of transmitting and receiving network monitoring information. Great - if you run only modern equipment. 
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures
    
Asentria Corporation
Published By: Qualys     Published Date: Sep 29, 2016
One of the biggest challenges faced by information security teams today is how to effectively prioritize their vulnerability remediation work.
Tags : 
protection, vulnerability, assetview, malware, web application
    
Qualys
Published By: Qualys     Published Date: Jan 11, 2017
One of the biggest challenges faced by information security teams today is how to e?ectively prioritize their vulnerability remediation work.Burdened with this overload of vulnerability disclosures, infosec teams often get overwhelmed by the task at hand and throw up their hands in frustration. After all, no IT department has enough sta? and resources to promptly patch every single vulnerability within their environment.
Tags : 
information security, it compliance, it audit, it security, network security, web application security, application security
    
Qualys
Published By: HP     Published Date: Jul 08, 2009
Read this white paper to learn how scalable and efficient blade server enclosures can meet your business needs. Learn more today!
Tags : 
it outsourcing, hp bladesystem, sllas, uptime, itoncommand, customer applications, data center, space
    
HP
Published By: Asentria Corporation     Published Date: Sep 04, 2007
The proliferation of remote and unmanned facilities is exposing many enterprises to devastating events. The need is to not only detect a threatening condition, but to also get a precise message to the person who is prepared to do something about it.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures
    
Asentria Corporation
Published By: Asentria Corporation     Published Date: Sep 04, 2007
SNMP (Simple Network Management Protocol) is an industry standard network management protocol for managing wide area and local area networks. It is easy to use, cost-effective, and is built into most networking devices. One of SNMP’s best assets is its use of in-band management, yet, this is also its biggest weakness.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures
    
Asentria Corporation
Published By: Bazaarvoice     Published Date: Nov 05, 2014
This paper explores what authenticity really means to consumers, and how brands can deliver it, every time. Includes best practices for companies that collect and display reviews, handling employee reviews, and how dubious practices can harm your business.
Tags : 
bazaarvoice, customer loyalty, authemticity, customer relationships, authentic users, generated content, best practices, inauthentic practices
    
Bazaarvoice
Published By: IBM     Published Date: May 02, 2014
Leading companies automate their record to report processes. Learn how!
Tags : 
ibm, aberdeen group, big roi, companies automate, business intelligence, change management, external compliance, rtp
    
IBM
Published By: IBM     Published Date: Jul 30, 2014
Read this analyst white paper to identify key strategies and capabilities for effective multi-author, recurring narrative reporting and disclosure management.
Tags : 
ibm, business analytics, finance, automation, record to report, rtr, rtr process, disclosure management
    
IBM
Published By: SAP     Published Date: Sep 10, 2009
To meet evolving regulatory mandates, companies around the world are adopting International Financial Reporting Standards (IFRS), a set of methodologies and disclosure requirements for the preparation and presentation of financial statements. Yet making the transition to IFRS is not just a rote accounting exercise.
Tags : 
sap, business objects, business intelligence, ifrs, financial reporting, cash flow, spend management, iasb
    
SAP
Published By: Eaton     Published Date: Jun 01, 2012
For all their advantages, virtualization and cloud computing bring some unique challenges: higher power demands per server and enclosure, more critical applications residing on each server, and a need for greater visibility into power conditions.
Tags : 
virtualization, cloud computing, resellers, power distribution, power protection, business continuity, power monitoring, power audits
    
Eaton
Published By: Eaton     Published Date: Feb 08, 2017
Not so many years ago, network closets, server rooms and data centers were designed from a “room to rack” standpoint. Deciding specifically where to store your technology typically came later in the design process. However, rapid technology refresh cycles, the need to rackmount more equipment and the desire for increased cooling capacities in an enclosed rack (known as an enclosure), have all begun to reverse that trend. Today, IT professionals are designing these critical workspaces with more of a “rack to room” methodology.
Tags : 
    
Eaton
Published By: Infosys BPM Ltd     Published Date: Feb 12, 2019
The role of FP&A professionals during the first two weeks of the month entails rushing for month closure, gathering data sets, reports, and scrutinizing, processing and analyzing data in Excel workbooks in discussion with the top management. Increasing revenues, optimizing costs, and aligning with the overall business strategy are a few familiar goals laid down for financial planning and analysis (FP&A) professionals. These goals trickle down from finance leaders who are under constant pressure to provide accurate and timely reporting and analysis to support effective decision making. Read on to know how can digitizing FP&A help the finance team to make more robust decisions and be a key part of the finance transformation.
Tags : 
    
Infosys BPM Ltd
Published By: IBM     Published Date: Feb 21, 2013
Disclosure management tools ave transformed the so called ‘Last Mile’ of finance, turning a haphazard, time consuming and error-prone process into a much more streamlined, timely and controlled endeavor.
Tags : 
disclosure management, finance, statutory, reporting, process management, documents
    
IBM
Published By: Asentria Corporation     Published Date: Sep 04, 2007
As an equipment provider for worldwide, national and regional radio and television facilities, Transcom Corporation, headquartered in Huntingdon Valley, Pa., has been meeting the broadcasting capability needs of stations worldwide since 1978. Transcom specializes in distributing new TV transmitters, antenna, cable, Studio Transmitter Link (STL) and audio equipment that enable television and radio stations to transmit sound and video from the studio to the antenna.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures
    
Asentria Corporation
Published By: Tripp Lite     Published Date: Jun 28, 2018
Credit, debit and ATM card fraud costs consumers, merchants and financial institutions billions in losses every year. The payment card industry has responded by creating the PCI security standard. Merchants that fail to comply with PCI face increased risk of security breaches and substantial contractual penalties. Tripp Lite Wall-Mount Rack Enclosures help merchants achieve PCI compliance by securing network/telecommunications hardware and storage media in retail point-of-sale environments and other locations.
Tags : 
    
Tripp Lite
Published By: Qualys     Published Date: Jul 20, 2012
Welcome to Web Application Security For Dummies! Web applications have become the Achilles heel of IT security. Web application vulnerabilities are now the most prevalent at more than 55 per cent of all server vulnerability disclosures. This figure doesn't include vulnerabilities in custom-developed web applications, so it may be just the tip of the iceberg. This book is all about understanding how to quickly find and fix vulnerabilities in web applications. The goal is to prevent attackers from gaining control over the application and obtaining easy access to the server, database, and other back-end IT resources.
Tags : 
technology, security, vulnerabilities, internet, virus, solutions, vulnerability management, web application
    
Qualys
Published By: Bazaarvoice     Published Date: Aug 12, 2013
The FTC social disclosure rules apply to you – now. This webinar shows you how to do social right: Effectively. Ethically. Legally. These guidelines actually keep you out of trouble while building consumer trust along the way.
Tags : 
brand messaging, consumer engagement, social branding, ftc, federal trade commission
    
Bazaarvoice
Start   Previous    1 2 3 4    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.