HIT Consultant Insightful coverage of healthcare innovation
 

complete

Results 51 - 75 of 931Sort Results By: Published Date | Title | Company Name
Published By: CyrusOne     Published Date: Jul 05, 2016
In June 2016, CyrusOne completed the Sterling II data center at its Northern Virginia campus. A custom facility featuring 220,000 square feet of space and 30 MW of power, Sterling II was built from the ground up and completed in only six months, shattering all previous data center construction records. The Sterling II facility represents a new standard in the building of enterpriselevel data centers, and confirms that CyrusOne can use the streamlined engineering elements and methods used to build Sterling II to build customized, quality data centers anywhere in the continental United States, with a similarly rapid time to completion.
Tags : 
cyrusone, data, technology, productivity, engineering
    
CyrusOne
Published By: Oracle     Published Date: Dec 03, 2012
This white paper examines some of the fundamental problems that fragmented IT systems are causing for HR functions that have adopted, or are planning to adopt, the Ulrich model.
Tags : 
the ulrich model, hcm, human capital management, hcm cloud applications, strategic hr
    
Oracle
Published By: Oracle Corp     Published Date: Oct 02, 2012
Accelerate and Complete your HR Transformation
Tags : 
oracle, human resources, transformation
    
Oracle Corp
Published By: Oracle     Published Date: Oct 27, 2015
This paper reveals why Oracle Cloud Platform provides all the benefits of cloud with complete, integrated, secure solutions at every layer of the technology stack.
Tags : 
cloud computing, cloud, cloud platform, enterprise cloud platform, benefits of cloud, integrated solutions, security solutions, oracle cloud platform, oracle
    
Oracle
Published By: Oracle     Published Date: Nov 05, 2015
This paper reveals why Oracle Cloud Platform provides all the benefits of cloud with complete, integrated, secure solutions at every layer of the technology stack.
Tags : 
cloud computing, cloud, cloud platform, enterprise cloud platform, benefits of cloud, integrated solutions, security solutions, oracle cloud platform, oracle
    
Oracle
Published By: Oracle     Published Date: Nov 05, 2015
This paper reveals why Oracle Cloud Platform provides all the benefits of cloud with complete, integrated, secure solutions at every layer of the technology stack.
Tags : 
cloud computing, cloud, cloud platform, enterprise cloud platform, benefits of cloud, integrated solutions, security solutions, oracle cloud platform, oracle
    
Oracle
Published By: Oracle     Published Date: Nov 05, 2015
This paper reveals why Oracle Cloud Platform provides all the benefits of cloud with complete, integrated, secure solutions at every layer of the technology stack.
Tags : 
cloud computing, cloud, cloud platform, enterprise cloud platform, benefits of cloud, integrated solutions, security solutions, oracle cloud platform, oracle
    
Oracle
Published By: Oracle     Published Date: Nov 05, 2015
This paper reveals why Oracle Cloud Platform provides all the benefits of cloud with complete, integrated, secure solutions at every layer of the technology stack.
Tags : 
cloud computing, cloud, cloud platform, enterprise cloud platform, benefits of cloud, integrated solutions, security solutions, oracle cloud platform, oracle
    
Oracle
Published By: Oracle     Published Date: Nov 05, 2015
This paper reveals why Oracle Cloud Platform provides all the benefits of cloud with complete, integrated, secure solutions at every layer of the technology stack.
Tags : 
cloud computing, cloud, cloud platform, enterprise cloud platform, benefits of cloud, integrated solutions, security solutions, oracle cloud platform, oracle
    
Oracle
Published By: AlienVault     Published Date: Mar 30, 2016
Achieving PCI compliance takes focus, determination, and the right set of tools. By building these essential security capabilities into an integrated, complete solution, AlienVault Unified Security Management™ (USM) delivers a workflow-centric approach that materially reduces your organization’s time to compliance versus a solution stitched together from individual point products. In this paper you will read an overview of AlienVault USM™ as well as learn about the capabilities and benefits it includes to help you comply with PCI DSS requirements.
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Oct 20, 2017
Achieving PCI compliance takes focus, determination, and the right set of tools. By building these essential security capabilities into an integrated, complete solution, AlienVault Unified Security Management™ (USM) delivers a workflow-centric approach that materially reduces your organization’s time to compliance versus a solution stitched together from individual point products. In this paper you will read an overview of AlienVault USM™ as well as learn about the capabilities and benefits it includes to help you comply with PCI DSS requirements.
Tags : 
    
AlienVault
Published By: Microsoft Office 365     Published Date: Dec 11, 2017
Embrace the GDPR with the most complete, secure, and intelligent solution for digital work. The GDPR is compelling every organization to consider how it will respond to today’s security and compliance challenges. This may require significant changes to how your business gathers, uses, and governs data. Microsoft has brought together Office 365, Windows 10, and Enterprise Mobility + Security into a single, always-up-to-date solution called Microsoft 365—relieving organizations from much of the cost and complexity of multiple, fragmented systems that were not necessarily designed to be compliant with current standards Read this white paper for an in-depth exploration of: The GDPR and its implications for organizations. How the capabilities of Microsoft 365 Enterprise edition can help your organization approach GDPR compliance and accelerate your journey. What you can do to get started now.
Tags : 
    
Microsoft Office 365
Published By: SAS     Published Date: Apr 20, 2017
Enterprises routinely claim to be focused on the customer experience, yet few really keep that promise. What’s in the way? Fragmentation and complexity in both customer data and customer-facing processes. IIA spoke with Wilson Raj, Global Director of Customer Intelligence, and Jonathan Moran, Customer Intelligence Product Marketing at SAS Institute Inc. about how organizations can leverage technology platforms and analytics to become more completely and genuinely customer-centric – making connections in the right way, at the right time, and on the right device.
Tags : 
    
SAS
Published By: Plex Systems     Published Date: Feb 26, 2014
Plex is the easy way for a processor to ensure compliance, have complete quality assurance and traceability, and have a record of ingredients movements up and down the supply chain. Using Plex means a processor can always know the product genealogy in high detail.
Tags : 
cloud, plex, erp, cloud computing, manufacturing, management, best practices, productivity, high level production
    
Plex Systems
Published By: SAS     Published Date: Mar 06, 2018
As explored in this paper, the SAS Fraud Framework supports a complete, modular, enterprise-level program integrity solution that helps payers prevent, detect and manage fraud, waste and abuse across all silos and lines of business. Its fully integrated components offer both top-down and bottom-up functionality for exposing hidden and risky networks. This approach gives payers enhanced detection capabilities, greater insight into case management and improved operational efficiency while decreasing overall cost of ownership. The result is highly effective, early, and even preventative detection of fraud, waste, abuse and corruption that improves operational efficiency and reduces health care costs.
Tags : 
    
SAS
Published By: IBM     Published Date: Mar 28, 2016
Workforce analytics is a very significant development in human resources. It promises the potential for deeper understanding of the ways workers contribute to organizational performance. However, workforce analytics is not just about analyzing data to reveal exciting insights; it also requires the active involvement of a firm’s workers if the potential of analytics is to be fully realized. Without active employee participation, workforce analytics efforts face at best, restricted data sources and data sets that are incomplete and at worst, the risk of damaging employee relations and, ultimately, productivity. This white paper summarizes recommendations that will encourage enthusiasm for workforce analytics and active employee participation, using the FORT (Feedback, Opt-in, Reciprocal, Transparent) framework. The FORT criteria could prove particularly useful in European countries. This is because the 1995 European Union Data Protection Directive, along with certain local legislative pr
Tags : 
ibm, ibm smarter workforce institute, work trends, employee engagement
    
IBM
Published By: F5 Networks Inc     Published Date: Apr 18, 2012
VDI deployments offer tremendous advantages but can also impact server and network resources significantly.  A complete VDI solution should deliver a reliable, high-performing desktop user experience while taming complexity and supporting scalability within a secure, stable framework.
Tags : 
vdi, vmware view, citrix, xenapp, xen desktop, virtual desktop infrastructure, big-ip, application delivery controllers, adc, vdi performance, vdi scalability, vdi security, microsoft vdi
    
F5 Networks Inc
Published By: McAfee     Published Date: Mar 07, 2013
McAfee delivers a complete database security solution that protects your entire database environment efficiently and cost effectively, while maintaining optimum system performance and availability.
Tags : 
database security, database security compliance, database activity monitoring, virtual patching for databases, database compliance audit, database regulatory compliance, database vulnerability management, database vulnerabilities, sql injection, buffer overflow, insecure sql code
    
McAfee
Published By: McAfee     Published Date: Mar 08, 2013
McAfee delivers a complete database security solution that protects your entire database environment efficiently and cost effectively, while maintaining optimum system performance and availability.
Tags : 
database security, database security compliance, database activity monitoring, virtual patching for databases, database compliance audit, database regulatory compliance, database vulnerability management, database vulnerabilities, sql injection, buffer overflow, insecure sql code
    
McAfee
Published By: CDW     Published Date: Jun 25, 2015
A helpful infographic showing a comparison of Adobe Standard DC and Pro DC, the complete PDF solution for working anywhere.
Tags : 
adobe, infographic, acrobat, comparison
    
CDW
Published By: SAP     Published Date: Nov 22, 2011
Learn how SAP BusinessObjects BI OnDemand offers complete, integrated business intelligence that extends your reporting and analysis of data in the Salesforce application from salesforce.com. This software-as-a-service (SaaS) solution is free to try and requires no dedicated hardware or software installation.
Tags : 
sap, business objects, technology, salesforce, bi ondemand, free trial, reporting
    
SAP
Published By: IBM     Published Date: May 09, 2016
The clear benefits of agile development—better collaboration, incremental delivery, early error detection and the elimination of unnecessary work—have made it the default approach for many teams. Agile methods are also being adopted by systems engineering teams to deliver the same benefits. Some developers have questioned whether requirements fall into the category of unnecessary work, and can be cut down or even completely eliminated. Meanwhile, teams developing complex products, systems and regulated IT continue to have requirements-driven legacy processes. So how does requirements management fit in an agile world? This paper argues that requirements management can bring significant value to agile development in regulated IT and complex product development projects, and sets out the characteristics of an effective requirements management approach in an agile environment.
Tags : 
ibm, watson, iot, internet of things, continuous engineering, agile, agile development
    
IBM
Published By: Oracle APAC ZO OD Prime Volume HCM ABM Leads June 2017     Published Date: Jul 12, 2017
Deep-dive analytics tools have completely transformed the way many organizations do business—helping remove the guesswork from major areas of operations, and provide everybody with the clear, actionable answers they need to make informed business decisions. The benefits of sophisticated analytics are being reaped across the business. But according to Deloitte, HR is lagging behind— with only 14 percent of companies using analytics in HR, compared to 77 percent using these tools in Operations1.
Tags : 
human resources, employee engagement, talent management
    
Oracle APAC ZO OD Prime Volume HCM ABM Leads June 2017
Published By: Red Hat     Published Date: Jun 23, 2016
Amadeus is a leading provider of innovative technology solutions for the global travel industry. To meet changing customer demand, the €4 billion company needed a new computing platform that was highly available, flexible, and tolerant to infrastructure fluctuations. Amadeus chose OpenShift Enterprise by Red Hat as the foundation for its new application infrastructure. When the project is complete, Amadeus expects the cloud solution to decrease system latency for better customer service, increase platform availability, streamline operations through automation, and reduce time to market for new services.
Tags : 
enterprise, best practices, productivity, technology, cloud solution
    
Red Hat
Published By: Imprivata     Published Date: Dec 06, 2013
A complete Single Sign-On and Access Management solution that simplifies user experience and improves employee productivity.
Tags : 
sso, single sign on, single sign on authentication, two factor authentication, single sign on solutions, identity and access management, epcs, e-prescribing, clinical workflow, enterprise password management, biometric authentication, citrix single sign on, cpoe meaningful use, healthcare it, vmware single sign on
    
Imprivata
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.