HIT Consultant Insightful coverage of healthcare innovation
 

consideration

Results 326 - 350 of 677Sort Results By: Published Date | Title | Company Name
Published By: Polycom     Published Date: Sep 15, 2015
There is a transformational shift around enterprise voice solutions as organizations move from the PBX to unified communications (UC) for their voice needs. In parallel, many organizations are moving their existing on-premises IT and communications infrastructure into the cloud. This brief outlines the benefits and considerations of balancing both of these transitions.
Tags : 
communications, skype, polycom, voice
    
Polycom
Published By: Godfrey     Published Date: Oct 24, 2008
With the constantly-changing media landscape and the growing demand for media communication via 2.0 channels, you need to reconsider both your news and the vendor partners on whom you rely to distribute it. It could mean the difference between a purposeful, engaging and long interactive life for even the "smallest" news item, and a costly yet low-impact news distribution program that saps valuable resources. This white paper tells you some key considerations to help guide your selection process.
Tags : 
godfrey, white paper, b to b, business to business, 2.0, vendor, analytics, brand management
    
Godfrey
Published By: Ayla Networks     Published Date: Jul 24, 2015
Considerations beyond connectivity.
Tags : 
connectivity, platform, data intelligence, flexibility, security
    
Ayla Networks
Published By: HP     Published Date: Aug 25, 2014
This document identifies the configuration considerations and optimizations for running Microsoft Exchange Server 2013 on the HP ConvergedSystem 700x for Microsoft, which provides highly available, flexible email and collaboration services to an organizational private cloud. The HP ConvergedSystem 700x for Microsoft saves a tremendous amount of time and administrative effort associated with such tasks as system planning, design and equipment procurement. However, organizations new to virtualization technologies, yet wanting to establish a private, public or hybrid cloud infrastructure, need to determine how to best deploy applications to reap the associated benefits and savings. Read this techical whitepaper to learn more.
Tags : 
virtualization, data center, cloud, infrastructure, red hat, integrated, optimization, solution
    
HP
Published By: HP     Published Date: Jul 08, 2009
Data is the backbone of every organization. No matter the business, industry, or size, reliable data access is essential to operations. Should a "worst-case scenario" occur, being prepared with an appropriate disaster recovery strategy is essential. Given the potential high cost associated with data loss, reliable data protection is no longer an option; rather, it is an obligation. This white paper discusses a data protection strategy that takes into consideration the business environment, offering sophisticated features while maintaining simplicity, affordability, and reliability.
Tags : 
storage, data protection, reliability, reliable, disaster recovery, business protection, business continuity, storageworks
    
HP
Published By: B Channels     Published Date: Apr 27, 2018
bChannels has years of expertise in defining, building and delivering partner ecosystems. We have invested in understanding and developing discrete Hybrid Cloud ecosystem capabilities. Our solutions help our clients plan and deliver scalable Hybrid Cloud by showing an understanding of their market segments, then delivering on designing effective programs.
Tags : 
    
B Channels
Published By: Equinix     Published Date: Mar 26, 2015
Enterprises grapple with a host of challenges that are spurring the creation of hybrid clouds: collections of computing infrastructure spread across multiple data centers and multiple cloud providers. This new concept often provokes uncertainty, which must be addressed head on. As more applications and computing resources move to the cloud, enterprises will become more dependent on cloud vendors, whether the issue is access, hosting, management, or any number of other services. Cloud consumers want to avoid vendor lock-inóhaving only one cloud provider. They want to know that they will have visibility into data and systems across multiple platforms and providers. They want to be able to move servers and storage around without a negative impact on application availability. The good news is that more solutions become available every day, but with a learning curve and numerous management challenges and considerations. This CITO Research paper provides advice for managers about how to c
Tags : 
hybrid cloud, computing infrastructure, enterprises, storage, application availability
    
Equinix
Published By: NetApp     Published Date: Sep 24, 2014
The steady growth of HYBRID CLOUDS signals the continued need by organizations for greater flexibility and agility while responding to changing business needs.† Learn about best practices, business and IT considerations, and customer success stories for hybrid clouds.
Tags : 
hybrid cloud, on-site computing, off site resources, competitive advantage, cloud computing
    
NetApp
Published By: NetApp     Published Date: Jun 16, 2014
In this IDC Analyst Connection, NetApp posed a number of questions to Ashish Nadkarni, research director of IDC's Storage Systems research practice, on clustered storage and why it matters; how firms are using it; and key considerations when evaulating systems.
Tags : 
netapp, clustered storage, idc, storage systems, evaluating systems
    
NetApp
Published By: NetApp     Published Date: Jun 19, 2014
In this IDC Analyst Connection, NetApp posed a number of questions to Ashish Nadkarni, research director of IDC's Storage Systems research practice, on clustered storage and why it matters; how firms are using it; and key considerations when evaulating systems.
Tags : 
netapp, clustered storage, idc, storage systems, evaluating systems
    
NetApp
Published By: Forcepoint     Published Date: May 14, 2019
IDC Infobrief: How Security Solutions Enable Cloud Success Cloud applications have transformed how organizations conduct business, increasing productivity and reducing costs. However, moving to the cloud means critical data now flows outside the organizationís traditional security boundaries. Unsurprisingly, security concerns still rank as the number one reason for not using cloud services*. This IDC InfoBrief, sponsored by Forcepoint, outlines five key security considerations and best practices for safe cloud adoption, including: Multi-cloud adoption: exposing challenges for security architectures Cloud-first and GDPR implications Cloud application visibility and control Data management and DLP in the cloud Leveraging User and Entity Behavior Analytics (UEBA) for protection Read the eBook to find out the five information security lessons learned from transitioning to the cloud. *IDCís 2017 CloudView Survey; IDCís 2017 CloudImpact Survey
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
IDC Infobrief: How Security Solutions Enable Cloud Success Cloud applications have transformed how organizations conduct business, increasing productivity and reducing costs. However, moving to the cloud means critical data now flows outside the organizationís traditional security boundaries. Unsurprisingly, security concerns still rank as the number one reason for not using cloud services*. This IDC InfoBrief, sponsored by Forcepoint, outlines five key security considerations and best practices for safe cloud adoption, including: Multi-cloud adoption: exposing challenges for security architectures Cloud-first and GDPR implications Cloud application visibility and control Data management and DLP in the cloud Leveraging User and Entity Behavior Analytics (UEBA) for protection Read the eBook to find out the five information security lessons learned from transitioning to the cloud. *IDCís 2017 CloudView Survey; IDCís 2017 CloudImpact Survey
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
IDC Infobrief: How Security Solutions Enable Cloud Success Cloud applications have transformed how organizations conduct business, increasing productivity and reducing costs. However, moving to the cloud means critical data now flows outside the organizationís traditional security boundaries. Unsurprisingly, security concerns still rank as the number one reason for not using cloud services*. This IDC InfoBrief, sponsored by Forcepoint, outlines five key security considerations and best practices for safe cloud adoption, including: Multi-cloud adoption: exposing challenges for security architectures Cloud-first and GDPR implications Cloud application visibility and control Data management and DLP in the cloud Leveraging User and Entity Behavior Analytics (UEBA) for protection Read the eBook to find out the five information security lessons learned from transitioning to the cloud. *IDCís 2017 CloudView Survey; IDCís 2017 CloudImpact Survey
Tags : 
    
Forcepoint
Published By: VMware     Published Date: Nov 02, 2016
As organizations begin to adopt public cloud, one element of consideration is what to do with existing applications. These applications were not built with cloud in mind, though most are virtualized today. These organizations must now determine a modernization strategy for these applications and incorporate how public cloud might fit into the picture. This paper examines the use of public cloud for data center extension and replacement, particularly in light of existing traditional enterprise applications. It also looks at the role of VMware's vCloud Air public cloud service in meeting the needs of these applications.
Tags : 
vmware data center, vcloud air, vsphere, hybrid cloud, public cloud, private cloud, disaster recovery, data center extension
    
VMware
Published By: IBM     Published Date: Jul 14, 2016
Focusing on SaaS, this IDC report details considerations to help optimize your cloud security model to align with business requirements.
Tags : 
ibm, idc, ciso, cloud security, saas
    
IBM
Published By: Group M_IBM Q418     Published Date: Sep 24, 2018
Take a look at the IT ecosystem of any company today and thereís a good chance youíll find it includes offerings from several cloud services providers. Thatís certainly the case at mid- to large-sized companies with at least 500 employees, according to a recent survey conducted by IDG Research. The survey of 100 senior IT professionals found that 59% are already multi-cloud adopters ó that is, using computing and storage services from two or more cloud providers. Another 31% of respondents say they plan to become multi-cloud organizations in the coming 12-24 months, with only 10% still in the ďconsiderationĒ phase.
Tags : 
    
Group M_IBM Q418
Published By: SAS     Published Date: Apr 16, 2015
This research brief begins with an outline of the major costs to consider when making an investment in analytics, the second section presents five modernization stages that analytics hardware/software have experienced, and the final section finishes with considerations when calculating total cost of ownership of the analytics ecosystem.
Tags : 
    
SAS
Published By: Zebra     Published Date: Jul 10, 2014
This white paper discusses key considerations when selecting mobility solutions and unveils how mobility enabled operations can improve freight trucking efficiency, reduce operating expenses and boost customer satisfaction.
Tags : 
zebra, truck freight carriers, cost effectiveness, operating expenses, customer satisfaction, mobility solutions
    
Zebra
Published By: ThousandEyes     Published Date: Nov 17, 2016
Demand for benchmarking of monitoring KPIs and metrics is on the rise. While monitoring tools look to deliver more consistent and standardized means of comparison, approaches vary. I&O leaders must determine key criteria and considerations when identifying tools to meet this growing requirement. Download now to learn more!
Tags : 
    
ThousandEyes
Published By: KPMG     Published Date: Jun 06, 2019
What impact will the cloud-enabled workplace have on your cybersecurity strategy? This yearís research shows that organisations are navigating a myriad of both old and new cybersecurity challenges to bring the cloud into scope. Read this to discover: ē how growing cloud dependency has created distinctive challenges around cyber security ē what the biggest cyber challenges are for organisations in this context ē how intelligent automation and machine learning is being used to overcome operational obstacles hampering cloud security ē a set of cybersecurity considerations for modern IT environments.
Tags : 
    
KPMG
Published By: ForeScout     Published Date: Aug 15, 2017
In this IDC Perspective report, research director Abhi Dugar looks at†IoT†security in the context of widespread cloud adoption, paying special attention to enterprises that maintain hybrid deployments.
Tags : 
    
ForeScout
Published By: Hewlett Packard Enterprise     Published Date: Aug 02, 2017
Youíre looking at flash storage because you see itís taking the storage world by storm. Youíre interested in accelerating business-critical applications, consolidating a virtual server or desktop deployment, trying to get ahead of your companyís data onslaught, or some combination of the above. This easy-to-read guide was developed to help arm you with key considerations and questions to ask before investing in a flash storage array for your business today, and for the future.
Tags : 
flash storage, storage consolidation, virtual storage, data usage
    
Hewlett Packard Enterprise
Published By: HPE APAC     Published Date: Feb 24, 2017
A guide for the savvy tech buyer. This easy-to-read guide was developed to help arm you with key considerations and questions to ask before investing in a flash storage array for your business today, and for the future.
Tags : 
flash storage, flash storage array, applications, virtual server, desktop deployment
    
HPE APAC
Published By: Hewlett Packard Enterprise     Published Date: Aug 15, 2016
This easy-to-read guide was developed to help arm you with key considerations and questions to ask before investing in a flash storage array for your business, today and for the future.
Tags : 
    
Hewlett Packard Enterprise
Published By: Great Bay Software     Published Date: Jan 24, 2018
Ninety percent of business executives believe the Internet of Things (IoT) is important to the future of their organization. And, as IoT is expected to generate a whopping 21% increase in corporate profits by 2022, itís clear thereís value in adoption. However, there are still plenty of risks that require mitigation through careful planning, cross-functional teamwork and mature security measures. This white paper explores the business benefits and the security complexities IoT introduces for business organizations, and provides key considerations and recommendations for securing IoT deployments. Download the white paper today!
Tags : 
iot, security, security systems, iot deployments
    
Great Bay Software
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.