HIT Consultant Insightful coverage of healthcare innovation
 

consideration

Results 276 - 300 of 631Sort Results By: Published Date | Title | Company Name
Published By: Landis + Gyr     Published Date: Mar 17, 2016
The rapid acceleration of Distributed Energy Resources (DER) presents a range of challenges for electric utility management. The good news is that a strategic approach, one that taps the power of data analytics, can meet the rising need to manage DER. Download this white paper, to learn about the current state of DER and how to get started with a smart grid analytics solution: • Cost-benefit analysis • Challenges of integrated DERs • Planning considerations • Advanced analytics tools and predictive grid analytics benefits • Choosing a platform
Tags : 
cost-benefit analysis, der, analytics, platform, utility, smart grid
    
Landis + Gyr
Published By: Microsoft     Published Date: May 16, 2016
Each predictive maintenance project will be unique—tailored to the needs of your business and your equipment. But at its core, the principles and considerations for a predictive maintenance solution are very similar. Download this whitepaper for a framework for getting started with your predictive maintenance projects.
Tags : 
iot, internet of things, microsoft, predictive maintenance project, predictive maintenance solution, devices, return on investment
    
Microsoft
Published By: Ciena     Published Date: Nov 15, 2016
"Demand for more energy continues to increase, putting a lot of pressure on utility companies to upgrade their aging supply infrastructure. This white paper addresses: >The current status of the electric grid >Explains why upgrading to a Smart Grid is necessary >Discusses the importance of the communication network’s role in this migration >Offers prescriptions for success in a smooth evolutionary path. Explore ""The Utility of the Future, Considerations for Evolving to a Smart Grid Infrastructure"" by downloading it today. "
Tags : 
sdh, sonet sdh, sonet/sdh, sdh network, synchronous digital hierarchy, what is sdh, sonet vs sdh, define sdh, sonet, sonet definition, what is sonet, sonet ring, sonnet def, sonet network, synchronous optical network, define sonet, g.707, sonet frame structure, sonet technology, sts 12
    
Ciena
Published By: Ciena     Published Date: Nov 15, 2016
"In healthcare, as the trends supporting eHealth accelerate, the need for scalable, reliable, and secure network infrastructures will only grow. This white paper describes the key factors and technologies to consider when building a private network for healthcare sector enterprises, including: Transport Network Equipment Outside Fiber Plant Converged Platforms Reliability, Redundancy, and Protection Reconfigurable Networks Management Software Security Services, Operation, Program Management, and Maintenance Download our white paper to learn more."
Tags : 
packet networking, packet networking portfolio, packet optical hie network, packet-optical transport, patient data security, private and hybrid cloud, private optical network for healthcare, private optical network for hospitals, rapidly growing bandwidth, real-time telesurgery video and data, remote imaging and diagnosis, simplify healthcare network operations, telehealth and telemedicine, telesurgery and video diagnosis, transfer massive imaging files, transmitting full-body mri images, transmitting genome data, transport network equipment, value-based care models, wan and lan convergence reduces
    
Ciena
Published By: Fujitsu     Published Date: Aug 01, 2017
Regardless of which model you choose, BYOD needs to be carefully planned to get the full benefits without increasing costs. Decisions must also be made about whether to accept some cost increases as a trade-off for benefits that improve your bottom line. To be successful, both for the business and for employees, BYOD must balance conflicting expectations to create an equilibrium in which both parties get what they want – while also each giving something in return. Many factors will influence the true cost of your BYOD program, but the decision should not be based purely on cost considerations. Research by analyst firm Forrester found that nearly 70% of companies increased their bottom line revenues as a result of deploying BYOD programs5 – so some cost increases may well be a price worth paying.
Tags : 
hardware costs, devices, byod, technology, online communities, intel, productivity goals
    
Fujitsu
Published By: Forcepoint     Published Date: May 14, 2019
IDC Infobrief: How Security Solutions Enable Cloud Success Cloud applications have transformed how organizations conduct business, increasing productivity and reducing costs. However, moving to the cloud means critical data now flows outside the organization’s traditional security boundaries. Unsurprisingly, security concerns still rank as the number one reason for not using cloud services*. This IDC InfoBrief, sponsored by Forcepoint, outlines five key security considerations and best practices for safe cloud adoption, including: Multi-cloud adoption: exposing challenges for security architectures Cloud-first and GDPR implications Cloud application visibility and control Data management and DLP in the cloud Leveraging User and Entity Behavior Analytics (UEBA) for protection Read the eBook to find out the five information security lessons learned from transitioning to the cloud. *IDC’s 2017 CloudView Survey; IDC’s 2017 CloudImpact Survey
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
IDC Infobrief: How Security Solutions Enable Cloud Success Cloud applications have transformed how organizations conduct business, increasing productivity and reducing costs. However, moving to the cloud means critical data now flows outside the organization’s traditional security boundaries. Unsurprisingly, security concerns still rank as the number one reason for not using cloud services*. This IDC InfoBrief, sponsored by Forcepoint, outlines five key security considerations and best practices for safe cloud adoption, including: Multi-cloud adoption: exposing challenges for security architectures Cloud-first and GDPR implications Cloud application visibility and control Data management and DLP in the cloud Leveraging User and Entity Behavior Analytics (UEBA) for protection Read the eBook to find out the five information security lessons learned from transitioning to the cloud. *IDC’s 2017 CloudView Survey; IDC’s 2017 CloudImpact Survey
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
IDC Infobrief: How Security Solutions Enable Cloud Success Cloud applications have transformed how organizations conduct business, increasing productivity and reducing costs. However, moving to the cloud means critical data now flows outside the organization’s traditional security boundaries. Unsurprisingly, security concerns still rank as the number one reason for not using cloud services*. This IDC InfoBrief, sponsored by Forcepoint, outlines five key security considerations and best practices for safe cloud adoption, including: Multi-cloud adoption: exposing challenges for security architectures Cloud-first and GDPR implications Cloud application visibility and control Data management and DLP in the cloud Leveraging User and Entity Behavior Analytics (UEBA) for protection Read the eBook to find out the five information security lessons learned from transitioning to the cloud. *IDC’s 2017 CloudView Survey; IDC’s 2017 CloudImpact Survey
Tags : 
    
Forcepoint
Published By: Tenable     Published Date: Feb 07, 2018
While multinational companies can likely meet some of the GDPR requirements right now, most will find the path to full compliance requires many changes to business-as-usual security practices. Read this paper to learn how you should be preparing your information security program for compliance with the GDPR. Written for InfoSec leaders, the paper includes: - A glossary outlining key concepts of the Regulation - 13 essential steps you should take to help ensure GDPR compliance - A summary of infosec considerations posed by the EU Data Protection Directive 95/46/EC and GDPRD
Tags : 
security frameworks, compliance, iso 27000, cis controls, nist, pci, security regulation
    
Tenable
Published By: Tenable     Published Date: Nov 06, 2018
"Insights and ideas to help you evaluate vendors and improve your security program. Organizations seeking to evaluate vulnerability assessment solutions turn to the “Gartner Market Guide for Vulnerability Assessment” for expert help in navigating the market. Tenable is pleased to provide a complimentary copy of the report. According to Gartner, “the vulnerability assessment (VA) market is mature, but is being challenged by the need to cover changing device demographics and emerging technologies and better represent true risk.” Gartner addresses these considerations and others in the 2018 Market Guide for Vulnerability Assessment, providing insights that will help you evaluate vendors and improve your security program. Topics covered: The scope of the market for vulnerability assessment solutions, common use cases and challenges Recommendations for identifying requirements and vendor selection criteria Changing device demographics and other trends impacting the market and effective v
Tags : 
    
Tenable
Published By: gyro     Published Date: Feb 01, 2019
Although humor is featured in many of the most memorable ads of all time, it is still seldom seen in the world of business-to-business. Why? B-to-B professionals are afraid humorous ads may fall flat or — worse — damage brand image. In the first study of its kind, gyro and Research Now SSI have discovered that humor can be a powerful tactic for capturing attention and even prompting purchase consideration.
Tags : 
advertising, humor, qualitative research, quantitative research, b2b advertising
    
gyro
Published By: NetApp     Published Date: Jun 16, 2014
In this IDC Analyst Connection, NetApp posed a number of questions to Ashish Nadkarni, research director of IDC's Storage Systems research practice, on clustered storage and why it matters; how firms are using it; and key considerations when evaulating systems.
Tags : 
netapp, clustered storage, idc, storage systems, evaluating systems
    
NetApp
Published By: NetApp     Published Date: Jun 16, 2014
Learn the benefits of converged infrastructure solution for virtualized environments and the key considerations for choosing the best platform for your midsize enterprise.
Tags : 
netapp, midsize it infrastructure, converged infrastructure, flexpod express, it responsiveness
    
NetApp
Published By: NetApp     Published Date: Jun 18, 2014
Learn the benefits of converged infrastructure solution for virtualized environments and the key considerations for choosing the best platform for your midsize enterprise.
Tags : 
netapp, midsize it infrastructure, converged infrastructure, flexpod express, it responsiveness
    
NetApp
Published By: NetApp     Published Date: Jun 19, 2014
In this IDC Analyst Connection, NetApp posed a number of questions to Ashish Nadkarni, research director of IDC's Storage Systems research practice, on clustered storage and why it matters; how firms are using it; and key considerations when evaulating systems.
Tags : 
netapp, clustered storage, idc, storage systems, evaluating systems
    
NetApp
Published By: F5 Networks Inc     Published Date: May 03, 2017
Global adoption of the cloud is accelerating at a dizzying rate each year with businesses of all sizes realizing the cost-saving, flexibility, and scalability benefits of migrating and running applications in the cloud. In a 2016 survey*, F5 found that 67 percent of the respondents identified themselves as “Cloud First,” and three cloud models—private, public, and SaaS—dominated the top five IT strategic trends. As pressure to move applications to cloud and hybrid environments intensifies, IT teams must grapple with sometimes significant migration challenges. Though each migration is different, there are several common considerations to keep in mind to help you on your own cloud journey. This guide provides a blueprint to help you think through many of the long-term impacts of your migration options and establish a strong foundation for your cloud migration strategy. The end result should be a migration strategy that leaves you in a position to support your technology as your business
Tags : 
cloud, cloud computing, hybrid environment
    
F5 Networks Inc
Published By: ALE     Published Date: Jan 10, 2019
The purpose of this design guide is to present the requirements and considerations relevant to the transportation vertical along with design options, best practices and configuration guidelines. While this design guide is focused on Shortest Path Bridging (SPB-M) based networks, it also addresses data networking solutions applicable for this transportation vertical. Although several modes of transport exist, this document focuses on rail (metro, heavy, light) and road transport. More specifically, this document focuses on the fixed network infrastructure underpinning the multiple systems that enable the safe and reliable operation of rail and intelligent transport systems. To find out more download this whitepaper today.
Tags : 
    
ALE
Published By: Absolute Software     Published Date: Sep 09, 2011
Security professionals are wondering how to best deal with the oncoming tide of personal mobile devices finding their way into the workplace. Download this research report to learn some key areas of consideration before moving ahead with a mobile implementations strategy.
Tags : 
absolute, managing security, risk challenges, mobile devices, it implementation, secure processes
    
Absolute Software
Published By: BMC Software     Published Date: Jul 01, 2011
Help Desk software as a service is attractive to many IT departments. It offers the same benefits of traditional IT help desk solutions, in addition to reducing capital expenses, accelerating implementation, and providing easier upgrades. This paper explores considerations for implementing IT service management in-house or as a service.
Tags : 
service management, bmc software, itil, saas, help desk software, delivery model, cloud based help desk, simple, affordable, bmc, drive profit, reduce risk, paul avenant
    
BMC Software
Published By: Raritan Inc.     Published Date: Mar 05, 2009
This White Paper examines these considerations in greater detail and defines best practices when evaluating and deploying a Smart Card Authentication solution.
Tags : 
power distribution unit, raritan, pdu, power monitoring, environmental monitoring, data center power, data center monitoring, monitor power, power metering, data center temperature, electrical power meter
    
Raritan Inc.
Published By: Entrust Datacard     Published Date: Jan 16, 2015
Upon issuance, all SSL digital certificates have a finite lifespan and are no longer recognized as valid upon expiration. Certificates may have varying periods of validity and are often set to expire anywhere between one and five years based on company policy and/or cost considerations. This guide — intended for IT and security professionals — outlines the key elements of a certificate lifecycle management process and how to provide adequate tools and training to implement this process.
Tags : 
entrust, ssl, certificates, security, professionals, management, lifecycle, certificate, issues, holes, verification, applications, domains, audit, scan, systems, policies, monitor, inventory
    
Entrust Datacard
Published By: ArcSight     Published Date: Mar 03, 2009
This document provides an overview of the drivers for Log Management scalability and outlines the key requirements to consider as part of the evaluation process.
Tags : 
log management, security, fraud, insider threat, suspicious network activity, pci dss, hipaa, sox, application security, arcsight, mission critical assets
    
ArcSight
Published By: LogMeIn     Published Date: Jul 18, 2014
This paper provides a Live Chat Comparison with a goal-driven approach to chat vendor selection.
Tags : 
live chat, boldchat, logmein, comparing live chat vendors
    
LogMeIn
Published By: ForeScout     Published Date: Aug 14, 2012
In a BYOD world, companies can choose to secure and manage the entire mobile device user pool or secure portions of that community. Either way, steps must be taken to prevent unauthorized access to network resources and data loss. Enterprises should consider solutions that allow policies to be applied based on user, device, network, application, and data leakage risks.
Tags : 
archetecting, flexible, strategy, for securing, enterprise, bring, device, byod, data, loss, prevention, mobile, security, landscape, data, access, device, mobility, risks, augmenting
    
ForeScout
Published By: ForeScout     Published Date: Aug 14, 2012
Business wants more fluid access to data while IT organizations must maintain security. As the variety of access and multitude of threats to network resources and sensitive information have grown, so has the need for more flexible and automated ways to effectuate security policies, controls and enforcement. Rarely is this need more keenly felt than at the network endpoint, where people, technology, information assets and requirements for security and compliance meet most directly.
Tags : 
pragmatic, path, achieving nac results, essential implementation, process, control, consideration, data, access, it organization, security, protection, network, access, control, nac, interoperability, 802.1x standards, control, options
    
ForeScout
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.