HIT Consultant Insightful coverage of healthcare innovation
 

data applications

Results 176 - 200 of 843Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: Jun 02, 2015
This study focuses on Cisco's enterprise datacenter strategy and portfolio including UCS and Nexus technologies.
Tags : 
cisco, data center, switches, optimization, scalability, storage, applications, enterprise support
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
Cisco UCS Integrated Infrastructure provides a pre-validated, ready-to-deploy infrastructure, which reduces the time and complexity involved in configuring and validating a traditional data center deployment. Cisco UCS Platforms is flexible, reliable and cost effective to facilitate various deployment options of the applications while being easily scalable and manageable. The reference architecture detailed in this document highlights the resiliency, cost benefit, and ease of deployment of a SAP HANA solution. This document describing the infrastructure installation and configuration to run SAP HANA on a dedicated or shared infrastructure.
Tags : 
    
Cisco
Published By: Cisco     Published Date: May 15, 2015
Cisco Unified Data Center unifies compute, storage, networking, virtualization, and management into a single platform. The result is operational simplicity and business agility -- essential for cloud computing and deploying IT as a Service.
Tags : 
data center, software, networking, infrastructure, applications, cisco
    
Cisco
Published By: Cisco     Published Date: Jan 05, 2015
Interest in cloud computing over the last several years has been phenomenal. For cloud providers, public or private, it will transform business and operational processes, streamlining customer on-ramping and time to market, facilitating innovation, providing cost efficiencies, and enabling the ability to scale resources on demand.
Tags : 
data center, consolidation, server virtualization, new applications
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
The data center infrastructure is central to the overall IT architecture. It is where most business-critical applications are hosted and various types of services are provided to the business. Proper planning of the data center infrastructure design is critical, and performance, resiliency, and scalability need to be carefully considered. Another important aspect of the data center design is the flexibility to quickly deploy and support new services. Designing a flexible architecture that can support new applications in a short time frame can result in a significant competitive advantage. The basic data center network design is based on a proven layered approach that has been tested and improved over the past several years in some of the largest data center implementations in the world. The layered approach is the foundation of a data center design that seeks to improve scalability, performance, flexibility, resiliency, and maintenance.
Tags : 
    
Cisco
Published By: IBM     Published Date: Oct 01, 2013
Continual and timely upgrades of UNIX systems can enable growth and lower costs. But for some Sun/Oracle and HP customers, expected upgrade plans have hit major hurdles. Read this Clipper Group white paper to see how only IBM continues to provide a plan, and a predictable drumbeat, for the future. Read it now.
Tags : 
ibm, ibm power7, ibm power7 systems, data center, it infastructure, data center, enterprise applications, consolidation
    
IBM
Published By: IBM     Published Date: Feb 18, 2009
This white paper provides insight into the requirements for protecting privacy in SAP non-production environments and describes some of the comprehensive data masking techniques available with the IBM® Optim™ Data Privacy Solution for SAP® Applications.
Tags : 
ibm integrated data management, data privacy, sap application, ibm optim data privacy solution, data masking, business context data elements, data integrity
    
IBM
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
As you take advantage of the operational and economic benefits of virtualization and the cloud, it’s critical to secure your virtualized data centers, cloud deployments, and hybrid environments effectively. Because if you neglect any aspect of security, you leave gaps that open the door to web threats and serious data breaches. And, to meet data privacy and compliance regulations, you will need to demonstrate that you have the appropriate security, regardless of your computing environment. Trend Micro Cloud and Data Center Security solutions protect applications and data and prevent business disruptions, while helping to ensure regulatory compliance. Whether you are focused on securing physical or virtual environments, cloud instances, or web applications, Trend Micro provides the advanced server security you need for virtual, cloud, and physical servers via the Trend Micro Deep Security platform. Download this white paper to learn more about the Trend Micro Deep Security platform.
Tags : 
cloud, date security, cloud security, virtualization, security
    
CDW-Trend Micro
Published By: Double-Take Software     Published Date: Jul 27, 2010
Application and data availability can make or break a business. These days backing up to the Cloud is a simple, cost effective way to get the advantages of a datacenter without the expense of creating and managing a physical center. Double-Take Cloud is a simple way to migrate, backup and restore data and applications to the cloud with minimal downtime and complete control over your expenses.
Tags : 
doubletake, cloud, backup, disk-to-disk, failure, recovery, physical center, rto
    
Double-Take Software
Published By: Vision Solutions     Published Date: Jul 27, 2010
Double-Take Cloud is a simple way to migrate, backup and restore data and applications to the cloud with minimal downtime and complete control over your expenses.
Tags : 
doubletake, cloud, backup, disk-to-disk, failure, recovery, physical center, rto
    
Vision Solutions
Published By: Group M_IBM Q418     Published Date: Oct 02, 2018
Organizations are faced with providing secure authentication, authorization, and Single Sign On (SSO) access to thousands of users accessing hundreds of disparate applications. Ensuring that each user has only the necessary and authorized permissions, managing the user’s identity throughout its life cycle, and maintaining regulatory compliance and auditing further adds to the complexity. These daunting challenges are solved by Identity and Access Management (IAM) software. Traditional IAM supports on-premises applications, but its ability to support Software-as-a-Service (SaaS)-based applications, mobile computing, and new technologies such as Big Data, analytics, and the Internet of Things (IoT) is limited. Supporting on-premises IAM is expensive, complex, and time-consuming, and frequently incurs security gaps. Identity as a Service (IDaaS) is an SaaS-based IAM solution deployed from the cloud. By providing seamless SSO integration to legacy on-premises applications and modern cloud-
Tags : 
    
Group M_IBM Q418
Published By: HP     Published Date: Sep 04, 2014
Data Intensity is an enterprise cloud services provider focusing on Oracle applications. Founded in 2001, it currently has 240 employees and operates two data centers with about 1,200 virtual servers. They needed a flexible storage platform to handle growth of individual customer applications, such as Oracle ERP, with minimal downtime with low operating costs. Testing included storage systems from five different vendors to find a solution that was easy to administer and provides thin provisioning, snapshots, and rapid provisioning.
Tags : 
3par, storage, data, cloud, oracle, data intensity, virtual, solution
    
HP
Published By: Internap     Published Date: Dec 02, 2014
As organizations aim to increase business agility and streamline costs, demand for public cloud services continues to grow exponentially, with Gartner predicting it will become the majority of new IT spending by 2016. This evolving application ecosystem with its intensive performance demands is placing new pressures on traditional public cloud services. Amid this shift, Internap surveyed nearly 250 Internet infrastructure decision makers to gain insight into cloud adoption, requirements and challenges – including the differences in feedback between the cloud-wise, those using cloud services, and the cloud-wary, those with no near-term plans to use cloud services. The details of these findings are reflected in this Cloud Landscape Report.
Tags : 
internap, cloud landscape, application ecosystem, cloud adoption, cloud, internet infrastructure
    
Internap
Published By: Carbonite     Published Date: Apr 09, 2018
No one ever wants a recovery to go south—whether it’s your first or 50th time completing a data recovery operation. But your organization will experience a bit more anxiety when it goes to perform its first recovery using a new solution. If the phrase “successful recovery”, in your experience, has applied to only a few applications or a limited set of files, it’s understandable that you may be anxious the first time you test a recovery of your entire environment. Know this: you can successfully conduct a full recovery of your environment the first time as well as every time thereafter. This is the challenge and opportunity that I face every day in my role: to deliver successful cloud recovery for my clients no matter what. While we never guarantee that a recovery will occur without some hiccups during the process, I can point to the fact that every cloud recovery that I have overseen has met our agreed upon service levels whether that guarantee is for a 1-hour recovery, a 24-hour rec
Tags : 
    
Carbonite
Published By: IBM     Published Date: Oct 24, 2013
Learn how automating 'Last Mile of Finance' processes can help CFOs and their finance teams meet expanded reporting requirements--including XBRL tagging.
Tags : 
ibm, cognos disclosure management, business intelligence, data collection, last mile of finance, account reconciliation, internal management, financial reporting
    
IBM
Published By: Extreme Networks     Published Date: Feb 10, 2015
Dans cet eBook, nous vous présenterons des cas d’utilisation illustrant comment une solution d’analyse des applications peut être utilisée de manière efficace par le service informatique.
Tags : 
extreme networks, purview, analyse des applications, sans fil, wifi, solution réseau, solution de business intelligence, business intelligence
    
Extreme Networks
Published By: Commvault     Published Date: Jul 06, 2016
Around-the-clock global operations, data growth, and server virtualization all together can complicate protection and recovery strategies. They affect when and how often you can perform backups, increase the time required to back up, and ultimately affect your ability to successfully restore. These challenges can force lower standards for recovery objectives, such as reducing the frequency of backup jobs or protecting fewer applications, both of which can introduce risk. High-speed snapshot technologies and application integration can go a long way toward meeting these needs, and they have quickly become essential elements of a complete protection strategy. But snapshot copies have often been managed separately from traditional backup processes. Features like cataloging for search and retrieval as well as tape creation usually require separate management and do not fully leverage snapshot capabilities. To eliminate complexity and accelerate protection and recovery, you need a solution
Tags : 
commvault, intellisnap, netapp, backup, recovery, data growth, server virtualization, data protection
    
Commvault
Published By: BLADE Network Technologies     Published Date: Nov 18, 2008
The Tolly Group’s hands-on evaluation of BLADE’s RackSwitch G8000 demonstrates that the device offers non-blocking 1/10G switching, lower latency and less energy consumption than the Cisco 4948-10GE. These are very important productivity indicators for the top-of-the-rack switches deployed in the data center where latency-sensitive applications such as clusters and financial applications set strict requirements.
Tags : 
rackswitch, blade network technologies, non-blocking 1/10g switching, cisco 948-10ge, top-of-the-rack switches
    
BLADE Network Technologies
Published By: IBM     Published Date: Jun 07, 2016
In a multi-database world, startups and enterprises are embracing a wide variety of tools to build sophisticated and scalable applications. IBM Compose Enterprise delivers a fully managed cloud data platform so you can run MongoDB, Redis, Elasticsearch, PostgreSQL, RethinkDB, RabbitMQ and etcd in dedicated data clusters.
Tags : 
ibm, analytics, database, ibm compose enterprise
    
IBM
Published By: IBM     Published Date: Jun 21, 2017
Today, it’s unlikely that a single database will meet all your needs. For a variety of reasons—including the need to support cloud-scale solutions and increasingly dynamic app ecosystems—startups and enterprises alike are embracing a wide variety of open source databases. These varied databases—including MongoDB, Redis and PostgreSQL— open doors to building sophisticated and scalable applications on battle-hardened, non-proprietary databases.
Tags : 
ibm, data base, cloud, scalability, app ecosystem
    
IBM
Published By: Palo Alto Networks     Published Date: May 25, 2017
The security perimeter once familiar to the enterprise has become incredibly fragmented. Data and applications reside everywhere: on the network, endpoints and in the cloud. The cloud, in particular, is seeing huge growth with enterprises adopting these environments at a rapid pace. According to Gartner, 55 percent of large enterprises will successfully implement an all-in cloud SaaS strategy by 2025.1 Combined with an increasingly mobile and global workforce, and more importantly, increasingly distributed SaaS cloud environments, organizations are now faced with securing a multitude of applications, users, devices and networks – all hosting sensitive data that is critical to business growth, reputation and customer trust.
Tags : 
    
Palo Alto Networks
Published By: Ciena     Published Date: Nov 15, 2016
"In healthcare, as the trends supporting eHealth accelerate, the need for scalable, reliable, and secure network infrastructures will only grow. This white paper describes the key factors and technologies to consider when building a private network for healthcare sector enterprises, including: Transport Network Equipment Outside Fiber Plant Converged Platforms Reliability, Redundancy, and Protection Reconfigurable Networks Management Software Security Services, Operation, Program Management, and Maintenance Download our white paper to learn more."
Tags : 
packet networking, packet networking portfolio, packet optical hie network, packet-optical transport, patient data security, private and hybrid cloud, private optical network for healthcare, private optical network for hospitals
    
Ciena
Published By: Ciena     Published Date: Jun 12, 2017
In healthcare, as the trends supporting eHealth accelerate, the need for scalable, reliable, and secure network infrastructures will only grow.
Tags : 
sdn, nfv, packet networking, packet networking portfolio, packet optical hie network, packet-optical transport, patient data security, private and hybrid cloud
    
Ciena
Published By: NEC     Published Date: Aug 12, 2014
Server virtualization is revolutionizing the datacenter by making applications mobile, increasing application uptime, and allowing IT admins to allocate computing resources more efficiently. The technology has been deployed widely enough that the role of the computer server has evolved from directly hosting operating systems and applications to hosting fully virtualized environments. Server that can support more virtualized machines (VMs - complete application stacks) allow their users to gain higher return on their IT investments. Private Cloud can extend the virtualization benefits in ways that broaden the benefits of virtualization to all parts of the organization. In this white paper, you will learn how Corporate IT uses these tools to meet the increasing demand for IT services.
Tags : 
tier 1, cloud, machines, datacenter, servers, virtualization, customer value, analytics
    
NEC
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.