HIT Consultant Insightful coverage of healthcare innovation
 

consideration

Results 151 - 175 of 631Sort Results By: Published Date | Title | Company Name
Published By: ServiceNow     Published Date: Mar 27, 2014
Eight top considerations on how to add mobile capabilities and support successfully, with the first three focusing on adding mobile views and functionality to business applications, the next three focusing on using increased mobility to help reinvent IT, and the final two bringing it all together.
Tags : 
simplify mobility, mobile capabilities, mobile views, functionality, business applications, connectivity
    
ServiceNow
Published By: Aerohive     Published Date: May 13, 2015
Understanding Network Design Considerations for High-Speed Wi-Fi in a Mobile-First Network.
Tags : 
creating a mobile first environment, high speed wi-fi, aerohive 802.11 ac
    
Aerohive
Published By: Aerohive     Published Date: May 13, 2015
Understanding Network Design Considerations for High-Speed Wi-Fi in a Mobile-First Network.
Tags : 
creating a mobile first environment, high speed wi-fi, aerohive 802.11 ac
    
Aerohive
Published By: Aerohive     Published Date: May 14, 2015
Understanding Network Design Considerations for High-Speed Wi-Fi in a Mobile-First Network.
Tags : 
creating a mobile first environment, high speed wi-fi, aerohive 802.11 ac
    
Aerohive
Published By: Aerohive     Published Date: May 14, 2015
Understanding Network Design Considerations for High-Speed Wi-Fi in a Mobile-First Network.
Tags : 
creating a mobile first environment, high speed wi-fi, aerohive 802.11 ac
    
Aerohive
Published By: Aerohive     Published Date: May 14, 2015
This analysis is designed to provide potential customers with a comprehensive picture of the direct and indirect costs and benefits they should consider when evaluating Aerohive or any other wireless connectivity solutions.
Tags : 
wireless connectivity, aerohive, controlle-less, benefits of wirelesss connectivity
    
Aerohive
Published By: Mimecast     Published Date: Oct 25, 2017
Even as cyberattacks have evolved, phishing remains the number one threat delivery tactic. Why? Because it’s effective. That’s the bad news. The good news is, your organization can effectively defend against phishing attempts with the right program in place. You can stand in the way of the abuse of your most mission-critical communications app. There are six key areas to consider. Read this Gartner research note, Fighting Phishing: Optimize Your Defense, to advance your anti-phishing program.
Tags : 
anti-phishing, cyber security, secure email gateway, url filtering, mimecast
    
Mimecast
Published By: Teradata     Published Date: May 02, 2017
As companies consider incorporating enterprise-level cloud services offered by Amazon Web Services, Microsoft Azure, Teradata, and others, many challenges arise related to data security, integration into existing data architecture, and analytics activities themselves. Download this article to understand these and other considerations for evaluating and adopting a cloud strategy for your enterprise, and what it means for analytics.
Tags : 
cloud analytics, cloud development, cloud storage, cloud management, cloud security, cloud services, storage analytics
    
Teradata
Published By: NAVEX Global     Published Date: Mar 03, 2014
Assessment tools, best-practice tips, considerations, and more
Tags : 
compliance, trends, grc, employee handbook, policy management, procedures
    
NAVEX Global
Published By: Gelato     Published Date: Jul 02, 2018
Operating across multiple countries is complex, as is shipping printed material. When our customers shared their stories with us, we knew we needed to act. In April 2017, Gelato entered each BRIC country. By establishing legal entities and print partners within Brazil, Russia, India, and China, Gelato gives customers an easy way to get printed material to colleagues and customers within those borders. The specific considerations in each BRIC country are numerous and often cumbersome. And who better to share insights on the state of local printing than the Gelato country managers on the ground? This ebook is for global enterprises than need to get prints in the BRIC countries, for those that are considering starting up sales and marketing operations in the regions for the first time, and also for domestic businesses that simply want to improve their local print processes.
Tags : 
    
Gelato
Published By: IBM     Published Date: Jun 16, 2015
This white paper discusses the different support challenges that can confront you when implementing a smarter infrastructure that includes new solutions like cloud initiatives, virtualized environments and other new breeds of computer models. To keep these solutions running daily, you should consider the level of support that will be required.
Tags : 
it infrastructure, business intelligence, it solutions, cloud solutions, virtualized environments, it maintenance, it support
    
IBM
Published By: IBM     Published Date: Apr 03, 2018
This paper gives key considerations when making a strategic commitment to a database platform.
Tags : 
data management, cloud, database platform
    
IBM
Published By: Intel     Published Date: Apr 16, 2019
When seeking a new cloud service provider (CSP), uptime and data sovereignty will be decisive considerations for many customers. At a time when cloud outages can bring down a huge number of web services and make the news, reliability is a hot topic. There is also a growing sensitivity towards where workloads are hosted, following introduction of regulations. Download Intel's latest eGuide, 'Meet Your Customers’ Biggest Cloud Concerns’ to discover: • How to boost uptime with hardware engineered for reliability • The ways telemetry can be used to call attention to potential problems before they occur • How to protect against the threat of cybercrime with a multi-layered approach to security • Why data geolocation is increasingly important, and how you can help with location tagging.
Tags : 
    
Intel
Published By: Intel     Published Date: Apr 16, 2019
When seeking a new cloud service provider (CSP), uptime and data sovereignty will be decisive considerations for many customers. At a time when cloud outages can bring down a huge number of web services and make the news, reliability is a hot topic. There is also a growing sensitivity towards where workloads are hosted, following introduction of regulations. Download Intel's latest eGuide, 'Meet Your Customers’ Biggest Cloud Concerns’ to discover: • How to boost uptime with hardware engineered for reliability • The ways telemetry can be used to call attention to potential problems before they occur • How to protect against the threat of cybercrime with a multi-layered approach to security • Why data geolocation is increasingly important, and how you can help with location tagging.
Tags : 
    
Intel
Published By: IBM APAC     Published Date: Aug 25, 2017
Transitioning from traditional IT to cloud IT is not an all-at-once, big bang effort. Rather, the cloud adoption process should be an agile, incremental process. And the first part of that process is understanding the different cloud models. Contrary to popular belief, cloud isn’t necessarily only public cloud, multi-tenant, and hosted in a vendor’s data center. It can also be private cloud, single-tenant, and/or hosted in a corporate data center. Often the best solution is a hybrid combination of these options. This paper will show you the advantages of hybrid cloud applications and explore the considerations you should make to find an optimal solution for your organization.
Tags : 
cost reduction, cost optimization, business agility, innovation, business models
    
IBM APAC
Published By: CA Technologies     Published Date: Jan 08, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy.
Tags : 
ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device, access control, application security, mobile authentication
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Mobile devices are ubiquitous and end users keep tend to keep them close at hand. This represents both an opportunity and a challenge with regard to security and authentication. There is an opportunity to leverage mobile devices to provide out-of-band authentication methods for access to sensitive applications and data. There is also a growing challenge to provide user convenient authentication directly from mobile devices. This eBook will discuss these use cases and how they fit into your overall mobile authentication strategy
Tags : 
ca technologies, authentication, password management, bring your own device, byod, mobile security, security, mobile device, access control, application security, mobile authentication, identity management, security management, web service security, wireless security, mobile device management
    
CA Technologies
Published By: Citrix Systems     Published Date: Jan 29, 2013
This paper describes the issues that arise when allowing iPad into the enterprise network and the steps IT must take to maintain control. It outlines security considerations, risk mitigation options and the architecture required to support the iPad
Tags : 
ipad, android, tablet, mobility, byo, smartphone, citrix
    
Citrix Systems
Published By: hybris software     Published Date: Aug 01, 2012
Industry leaders are engaging in multichannel integration for some very good reasons. More effective cross-channel strategies lead to more satisfied consumers as well as more efficient, more profitable retail operations. In fact, as the survey indicates, consumers expect integrated multichannel experience from their favorite brands.
Tags : 
multichannel, retailing, multichannel retailing, technology considerations, hybris, pos, point of sale, print, mobile, call center, social media, website, integrated multichannel experience, cross-channel strategies, synergy, buy online, immediacy, convenience, cost savings, aisle kiosks
    
hybris software
Published By: Smarsh     Published Date: Dec 07, 2016
To meet the requirements of FINRA & SEC, you must first understand what they require of investment firms and organizations. Better yet, you must understand what is classified as a violation of those rules, then put practices in play that mitigate the risk and position you as an active advocate for compliance— not a violator or passive enabler for non-compliant activity.
Tags : 
    
Smarsh
Published By: Cox Communications     Published Date: Nov 10, 2014
Business phone systems may not attract the same attention or achieve the same acclaim that computers, smart phones and tablets regularly receive. You won’t hear of too many publicized conferences or Twitter trends but that does not negate their importance.
Tags : 
twitter, evolving features, business phone service, cox, functionality
    
Cox Communications
Published By: AppDynamics     Published Date: Sep 21, 2017
Perhaps more than any programming language, Java continues to have a profound impact on how people navigate today’s world. Java’s functionality is responsible for setting a great deal of what users expect in terms of performance from their internet-accessible devices. The history of Java is more than two decades long and the language continues to grow and adapt in response to evolving consumer and business expectations. Throughout all of these changes, however, the performance of Java applications remains a paramount concern for developers.
Tags : 
    
AppDynamics
Published By: ServiceNow     Published Date: Mar 24, 2015
IT departments have a huge opportunity to make their enterprises more agile, cost efficient & competitive by embracing the opportunities available through mobile devices & constant connectivity. Supporting a more mobile workforce & customer base is a necessity.
Tags : 
it departments, mobility, agile enterprises, cost efficient and competitive, connectivity, it production
    
ServiceNow
Published By: MobileIron     Published Date: Aug 20, 2018
The new generation of mobile devices, applications, and cloud services significantly improve agency efficiencies. Tasks that were once relegated to timeconsuming deskwork, are now performed in the field, and with improved accuracy. Because of this, more and more public safety agencies are adopting these new technologies. One purpose of the FBI’s CJIS Security Policy is to enable agencies to fully leverage mobile devices, but without sacrificing security. Mobile devices introduce a variety of new threat vectors and risks. Careful consideration of these risks is important to maintaining information security. Threats to mobile devices stem mainly from their size, portability, and available wireless interfaces. Examples of mobile device threats include: • Loss or theft of device • Unauthorized access to device • Mobile operating system vulnerabilities • Communication over untrusted networks • Malware or malicious Apps • Jailbreak or rooting activity • Data loss through user behaviors
Tags : 
criminal, justice, information, services, cjis, compliance
    
MobileIron
Published By: athenahealth     Published Date: Jun 08, 2015
In this whitepaper, we argue that traditional models for estimating HCIT costs are inadequate and overlook several business-critical variables. Our intention is not to provide a comprehensive TCO model, but to expose and examine the operational considerations that most TCO models fail to recognize or account for, and to equip executives to ask the right questions about the cost of delivering clinical and financial results stemming from technology procurement
Tags : 
hcit, heath care it, ownership, patient experience, tco, information technology, practice management
    
athenahealth
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.