HIT Consultant Insightful coverage of healthcare innovation
 

cloud applications

Results 176 - 200 of 1002Sort Results By: Published Date | Title | Company Name
Published By: Rackspace     Published Date: Feb 01, 2019
Whether you’re already a Google customer or simply getting started with the public cloud, Google Cloud Platform (GCP) is an aordable, reliable, innovative and intuitive cloud solution. Rackspace can help you accelerate innovation and cost savings by taking over the intensive dayto-day operations of GCP — letting you focus on achieving your core business objectives while optimizing the performance of your applications. Rackspace works with customers to identify the scope and criticality of their applications and determine the service level that best addresses their needs. To discover how, download this whitepaper today.
Tags : 
    
Rackspace
Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Most organizations want to leverage the cloud, but also recognize that migrating all their applications at once is not always practical. They are seeking ways to utilize cloud-based services while maintaining certain applications on-premise. For organizations utilizing this hybrid architecture, one of their major challenges is providing users with the flexibility to seamlessly move around the environment while still maintaining appropriate security levels—or more specifically, ensuring consistent control and security policy between on-premise applications and cloud services.
Tags : 
ca technologies, identity, identity management, identity and access management, iam, cloud, user provisioning, security
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Most organizations want to leverage the cloud, but also recognize that migrating all their applications at once is not always practical. They are seeking ways to utilize cloud-based services while maintaining certain applications on-premise. For organizations utilizing this hybrid architecture, one of their major challenges is providing users with the flexibility to seamlessly move around the environment while still maintaining appropriate security levels—or more specifically, ensuring consistent control and security policy between on-premise applications and cloud services.
Tags : 
ca technologies, identity, identity management, identity and access management, iam, cloud, user provisioning, security
    
CA Technologies
Published By: AppDynamics     Published Date: Sep 20, 2017
Cloud computing has been gaining momentum for years. As the technology leaves the early adopter phase and becomes mainstream, many organizations find themselves scrambling to overcome the challenges that come with a more distributed infrastructure. One of those difficulties is getting through a major cloud migration. It is one thing to roll out a few applications and cloud pilot projects, it is an entirely different challenge to start using the cloud across multiple lines of business at massive scale. That is the point that organizations are beginning to reach, and the time has come to take a serious look at cloud migration best practices.
Tags : 
migration, business, cloud, workload, performance applications
    
AppDynamics
Published By: HP - Enterprise     Published Date: Jun 04, 2013
Businesses are overwhelmed with data; it’s a blessing and a curse. A curse because it can overwhelm traditional approaches to storing and processing it. A blessing because the data promises business insight that never existed earlier. The industry has spawned a new term, “big data,” to describe it. Now, IT itself is overwhelmed with its own big data. In the press to roll out new services and technologies—mobility, cloud, virtualization—applications, networks, and physical and virtual servers grow in a sprawl. With them comes an unprecedented volume of data such as logs, events, and flows. It takes too much time and resources to sift through it, so most of it lies unexplored and unexploited. Yet like business data, it contains insight that can help us solve problems, make decisions, and plan for the future.
Tags : 
data research, big data, virtualization, applications, networks
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Jun 05, 2013
When asked how important technology is to driving innovation in their organizations, 100 percent of CEOs indicated it was important, with 80 percent pointing out that it’s very important, according to HP sponsored research. Even CIOs agree with their CEOs. According to the same research, when asked whether or not technology will be the innovation engine or administrative engine for a business or government, approximately two out of three CEOs said it would be the “innovation engine.” This represents a significant shift in the role that technology is playing in enterprises. Today, organizations demand new applications and more functionality delivered more quickly, and at a lower cost than ever before. Many organizations either want a mobile application or are already using one. In fact, according to analysts, by 2016 350 million employees will use smartphones at work and businesses will increase spending on mobile projects over 100 percent in the same time.
Tags : 
mobile, cloud, applications, apps, mobile apps
    
HP - Enterprise
Published By: F5 Networks Inc     Published Date: Oct 19, 2012
Private cloud computing can better align IT with business concerns by making IT efficient, responsive, and cost-effective. Learn how to start your private cloud with automation and orchestration to gain operational efficiency and financial benefits.
Tags : 
private cloud, cloud automation, cloud orchestration, cloud security, secure cloud computing, applications in the cloud, data in the cloud, scalable private cloud
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Oct 19, 2012
Whether critical applications live in the cloud, in the data center, or both, organizations need a point of control for application security. Learn how you can achieve the security, intelligence, and performance that today's infrastructure demands.
Tags : 
cloud security, securing applications in the cloud, securing data in the cloud, secure web applications, web application firewall
    
F5 Networks Inc
Published By: TriNet     Published Date: Jul 28, 2015
Download this report in which leading entrepreneurs, recruiters, and investors share the best practices they use to win the talent wars.
Tags : 
best practices, talent management, talent recruitment, cloud-based applications, infrastructure, open-source software, recruitment management
    
TriNet
Published By: NetApp and VMware     Published Date: Jan 06, 2012
Experts discuss how customers can virtualize business-critical apps leveraging common resource pools as key elements to delivering IT as service and cloud computing.
Tags : 
netapp solutions for service providers, service-oriented infrastructure (soi), secure multi-tenancy, service automation and management, data mobility, storage efficiency, integrated data protection
    
NetApp and VMware
Published By: Success Factors     Published Date: Jul 27, 2012
When it comes to evaluating software investment decisions, such as on- premise vs. cloud-based solutions, many factors must be considered. In particular, pay attention to four key areas: support for business strategy, operations, security, and cost.
Tags : 
success factors, sap, cio goals, cloud solutions, cloud applications, cloud application vendors, cio cloud goals, employee central
    
Success Factors
Published By: NetApp     Published Date: Nov 20, 2014
As business requirements drive the need for a hybrid cloud strategy, companies must determine how best to run their applications and manage their data—whether in their private data center, near the cloud, or in the cloud. Hyperscale cloud providers offer excellent flexibility by allowing customers to buy raw resources in a consumption model by the hour.
Tags : 
hybrid cloud, applications, data management, private data center, consumption model
    
NetApp
Published By: Oracle     Published Date: Aug 17, 2017
What you will learn from this report: • The opportunity of loyalty: two thirds of consumers are already members of at least one restaurant loyalty program • What consumers look for in a restaurant loyalty program • What puts consumers off joining loyalty programs in the first place
Tags : 
resource management, product data, remote services, asset management, cloud management, web applications, application scheduling, internet of things
    
Oracle
Published By: VMware, Inc     Published Date: Oct 30, 2014
VMware vCloud® Government Service provided by Carpathia® is an enterprise-class hybrid cloud solution built on vSphere®, which empowers government customers to leverage existing investments in applications and infrastructure. As a result, government agencies can avoid the cost and complexity of re-architecting and retraining sta for public cloud infrastructure that is radically dierent from what is in place today. Instead of operating a combination of onsite and osite IT environments and struggling to maintain both new and legacy applications and infrastructure, vCloud Government Service provides the right mix of internal controls with the ability to securely scale to meet demand for IT resources. As you contemplate migrating basic workloads and/or mission-critical and sensitive data to the cloud, be sure to address these top 5 considerations.
Tags : 
hybrid cloud solution, enterprise-class hybrid, applications and infrastructure, it environments, sensitive data
    
VMware, Inc
Published By: VMware, Inc     Published Date: Oct 30, 2014
VMware® delivers vCloud® Government Service, provided by Carpathia®, an enterprise class hybrid cloud solution where both onsite and offsite IT environments are not just connected and integrated with common management, but are designed to run existing and new applications in exactly the same way. With vCloud Government Service, government customers don’t have to spend cycles adapting to the cloud and rewriting code; instead, they can focus on leveraging what the cloud brings to deliver value to their branch of government or mission responsibilities. Customers can securely extend their data centers to the cloud rapidly, easily and confidently, using a more supportive and integrated cloud infrastructure that is FedRAMP authorized.
Tags : 
hybrid cloud, government agencies, it environments, cloud infrastructure
    
VMware, Inc
Published By: Okta     Published Date: May 09, 2016
Cloud-first, mobile-first organizations are seeing huge benefits from taking a more distributed approach to IT. Business units are given more freedom to evaluate and select SaaS applications that will enable efficiency and growth. Users are given more freedom to use the devices that make them the most productive. When this trend started, most IT organizations were able to implement some basic, manual processes to administer and govern IT in this best-of-breed distributed environment. However, as the number of touchpoints increases, IT needs to automate to keep pace. This paper goes into more detail on the top 5 reasons to automate identity lifecycle and identity administration and build a solid foundation for future cloud-first, mobile-first IT.
Tags : 
    
Okta
Published By: Okta     Published Date: May 09, 2016
Part of a strong foundation for cloud-first, mobile-first IT includes supporting BYOD. BYOD can improve end user satisfaction and enable employees to work anywhere from any device. To really get these benefits though, the end-user experience must provide seamless access to the applications end-users want and need. Accomplishing this starts with extending app provisioning to mobile devices, and automatically deprovisioning mobile access as part of the identity lifecycle. For the best user experience, you’ll want automatic configuration of native mobile applications with mobile SSO, security settings and app settings like usernames, URLs and tenant IDs. Provisioning devices to users should be simply an extension of the foundational identity lifecycle management system. And, mobility management should enable IT teams to implement simple policies to enable and secure access from mobile. This eGuide provides an overview of how Okta can power BYOD programs with integrated identity and mobili
Tags : 
    
Okta
Published By: Okta     Published Date: May 09, 2016
Hear how Okta automates employee onboarding and offboarding through deep integration between Workday, Medallia’s human resources information system, and Active Directory.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security
    
Okta
Published By: Okta     Published Date: May 11, 2016
Within 6 months of starting to use Okta, customers on average will connect more than 10 applications for single sign-on. Once single-sign-on is tackled, cloud-first IT organizations can start to tackle the next set of problems. These next challenges are all about how you manage identities across all connected systems, how to determine who has access to what, and how you maintain control over user access. Some of the largest organizations in the world spend millions of dollars building out complex workflow systems to manage these processes. Even then, they depend heavily on manual work to actually get the job done. With Okta, there is a better way to do this, and it’s accessible to organizations of all sizes. Okta Provisioning gives you a foundation for cloud-first IT that brings sanity to your IT processes and enables you to encourage business groups to keep adopting more applications and users to bring the devices of their choice to work. App management, mobility management, and authe
Tags : 
    
Okta
Published By: Silver Peak     Published Date: Feb 11, 2016
he WAN has always been about connecting users to applications and moving data, but the playing field has now changed with datacenters migrating to the cloud along with missioncritical applications. .
Tags : 
wan, enterprises, saas, broadband internet, data, connectivity, connection, cloud
    
Silver Peak
Published By: Silver Peak     Published Date: Feb 11, 2016
This report outlines the limitations of legacy networks and how adding a technology called multipath networking can greatly improve the performance of cloud applications. It also provides advice on the evaluation criteria for multi-path networking solutions.
Tags : 
networking, cloud, cloud computing, multipath networking, multipath networking solutions, cloud applications, networking solutions
    
Silver Peak
Published By: Akamai Technologies     Published Date: Mar 10, 2016
The web application firewall (WAF) is among the most complex security technologies on the market today. The complexity of managing a WAF includes a pre-defined list of rules to identify thousands of potential exploits, intelligence about new attack vectors, and identifying malicious HTTP requests from legitimate HTTP traffic. Read this white paper to learn how to combine attack detection with threat intelligence using our cloud platform and managed security services to better protect your web applications.
Tags : 
akamai technology, web application security, http, best practices
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Mar 15, 2016
Manufacturers, in an effort to succeed with digital transformation, are relying on the Internet and public cloud to deliver key enterprise applications and processes. As manufacturers continue to become more digital enterprises, their network architecture must as well. Read this paper to learn key considerations for architects to create a holistic network that takes today’s, and tomorrow’s, requirements into consideration.
Tags : 
network management, manufacturing, network optimization, network applications, cloud services, enterprise applications
    
Akamai Technologies
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.