HIT Consultant Insightful coverage of healthcare innovation
 

data applications

Results 51 - 75 of 843Sort Results By: Published Date | Title | Company Name
Published By: SAP     Published Date: Feb 21, 2008
Many significant business initiatives and large IT projects depend upon a successful data migration. Your goal is to minimize as much risk as possible through effective planning and scoping. This paper will provide insight into what issues are unique to data migration projects and offer advice on how to best approach them.
Tags : 
sap, data architect, data migration, business objects, information management software, bloor, sap r/3, application
    
SAP
Published By: TIBCO Software     Published Date: Jun 14, 2019
As recognized leader in master data management (MDM), and a pioneer in data asset management, TIBCO EBX™ software is an innovative, single solution for managing, governing, and consuming all your shared data assets. It includes all the enterprise class capabilities you need to create data management applications including user interfaces for authoring and data stewardship, workflow, hierarchy management, and data integration tools. And it provides an accurate, trusted view of business functions, insights, and decisions to empower better decisions and faster, smarter actions. Download this datasheet to learn: What makes EBX™ software unique Various capabilities of EBX software The data it manages
Tags : 
    
TIBCO Software
Published By: Microsoft Office 365     Published Date: Nov 15, 2016
Download the free A to Z eBook to learn more about data security, employee productivity, IT Support and cost. Also, see how the competition measures up against Office 365. Here are a few must-knows when it comes to Office 365: Data compliance out of the box. Built-in security and privacy features; meets key industry standards and supports FERPA, HIPPAA and EU. Online or offline across all devices. Whether you are in the office or on the go, Office applications let you create, edit and share from your PC/MAC or your iOS, Android™ or Windows device with anyone in real time. Work off a single platform and eliminate third-party apps. With our suite of apps, such as Enterprise Content Management, Cloud PBX, and Microsoft MyAnalytics, you can trust that a single vendor is providing you the tools you need to get work done.
Tags : 
    
Microsoft Office 365
Published By: Simba by Magnitude     Published Date: Jul 12, 2019
Siloed data has become the Achilles heel of marketing insights –especially in the world of B2B and B2B2C marketing. Today’s marketing and sales departments sit on a goldmine of data derived from the dozens of applications and data sources in their MarTech stack. Still, the real opportunity for insights is hidden in the combined data across applications. Combining data in a comprehensive way delivers a full picture of marketing efficacy and efficiency. In this eBook, learn about the origins of siloed data, and how data has emerged and evolved, as well as review the benefits that marketing can realize with connected data. Along the way, we’ll share some action items you can take to assess your current situation and build a plan to unify your data and fuel great marketing insights.
Tags : 
    
Simba by Magnitude
Published By: Pure Storage     Published Date: Jan 12, 2018
Data is growing at amazing rates and will continue this rapid rate of growth. New techniques in data processing and analytics including AI, machine and deep learning allow specially designed applications to not only analyze data but learn from the analysis and make predictions. Computer systems consisting of multi-core CPUs or GPUs using parallel processing and extremely fast networks are required to process the data. However, legacy storage solutions are based on architectures that are decades old, un-scalable and not well suited for the massive concurrency required by machine learning. Legacy storage is becoming a bottleneck in processing big data and a new storage technology is needed to meet data analytics performance needs.
Tags : 
reporting, artificial intelligence, insights, organization, institution, recognition
    
Pure Storage
Published By: Pure Storage     Published Date: Jul 03, 2019
Data is growing at amazing rates and will continue this rapid rate of growth. New techniques in data processing and analytics including AI, machine and deep learning allow specially designed applications to not only analyze data but learn from the analysis and make predictions.
Tags : 
    
Pure Storage
Published By: Hewlett Packard Enterprise     Published Date: Jul 12, 2018
Organizations are running their business on exponentially more data, created by more users, from different devices, and through different IT services and digital processes. While some data growth is fueled by new applications, it also arrives increasingly from non-traditional IT sources, including digital media, machines, and edge devices. Edge IoT devices are generating a massive amount of data that must be managed, monitored, stored, and analyzed. Deciding where to perform each of these functions is critical to supporting new data-driven global business services and processes. This blueprint from HPE Pointnext, the Services division of HPE, is based on real-world experiences from many customers across a range of industries on how to leverage flash storage modernization.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Sep 25, 2017
Solid state storage is increasingly deployed in all sizes of datacenters, from the small and medium business to the large enterprise. It comes in many forms including hybrid arrays, direct attached drives, PCIe flash and accelerators that fit somewhere in between servers and storage. With the price of flash continuing to drop, hybrid storage is becoming more compelling to the small and medium business for critical computing applications such as databases and day-to-day operational computing.
Tags : 
    
Hewlett Packard Enterprise
Published By: Riverbed     Published Date: Feb 26, 2015
Riverbed® SteelHeadTM SaaS addresses cloud services/software as a service (SaaS) performance challenges by providing an easy-to-deploy optimization solution that meets customer needs for application performance over WAN and Internet connections. Combining private wide area network (WAN) and public internet optimization, the SteelHead SaaS is a first-of-its-kind solution, which optimizes traffic across the public Internet with Riverbed’s award-winning SteelHead optimization system (formerly RiOS or Riverbed Optimization System) technology to accelerate data and application protocols. SteelHead SaaS delivers optimized performance up to 30x for cloud services/SaaS applications, such as Microsoft Office 365 or Salesforce.com, regardless of where the end user is located.
Tags : 
saas, cloud services, internet connections, application performance, wide area network, optimization
    
Riverbed
Published By: F5 Networks Inc     Published Date: Jan 22, 2009
Getting your applications to work properly over a Wide Area Network (WAN) is a complex task, and it is not likely to get easier any time soon. Trends such as data center consolidation, the advent of Web 2.0 applications, and the move to web-based application delivery have only served to increase complexity and slow user response times. Often, the result is sluggish application response and at worst, abandoned applications and shopping carts due to slow or failed web page loads. The good news is that you can do something to improve application performance over slow or congested WAN networks. An Application Delivery Network can accelerate your applications and help make sure they’re secure, fast, and available.
Tags : 
acceleration, data center consolidation, web-based application, application performance, application delivery network, accelerate, optimize, big-ip
    
F5 Networks Inc
Published By: Esker     Published Date: Dec 08, 2014
Traditional accounts payable (AP) departments face the challenges associated with processing paper invoices on a daily basis— challenges that can take away your company’s competitive advantage. Luckily, there’s a better way to handle AP processing: automation. See how AP automation solutions can help you: • Process vendor invoices up to 65% faster • Reduce purchase-to-pay costs by 40-60% • Achieve processing accuracy up to 99% • Maintain 100% process visibility • Automatically archive invoices electronically Learn more about the benefits your company can achieve with AP automation– Read the eBook now!
Tags : 
automation, operations, accounts payable, manual inefficiencies, ap workflow, cost, erp system, data recognition
    
Esker
Published By: Ecora Software     Published Date: Aug 15, 2007
Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial
    
Ecora Software
Published By: Ecora Software     Published Date: Aug 16, 2007
Deep dive into the first 4 PCI DSS requirements. Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial
    
Ecora Software
Published By: Ecora Software     Published Date: Aug 15, 2007
Deep dive into PCI DSS requirements 5-9. Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial
    
Ecora Software
Published By: Ecora Software     Published Date: Aug 15, 2007
Achieve and Maintain Compliance with PCI Data Security Standard – Part 4. Deep dive into PCI DSS requirements 10-12. Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial
    
Ecora Software
Published By: Vision Solutions     Published Date: Feb 18, 2008
Continuous member service is an important deliverable for credit unions, and. the continued growth in assets and members means that the impact of downtime is affecting a larger base and is therefore potentially much more costly. Learn how new data protection and recovery technologies are making a huge impact on downtime for credit unions that depend on AIX-hosted applications.
Tags : 
vision, high availability, ibm, aix, cdp, core union
    
Vision Solutions
Published By: Cisco     Published Date: Mar 22, 2019
Cisco ACI, the industry-leading software-defined networking solution, facilitates application agility and data center automation. With ACI Anywhere, enable scalable multicloud networks with a consistent policy model, and gain the flexibility to move applications seamlessly to any location or any cloud while maintaining security and high availability.
Tags : 
    
Cisco
Published By: Quocirca     Published Date: Jan 13, 2009
Given today’s economic climate, businesses are, more than ever, looking to create additional value through the reduction of risk and by saving costs. For many, the economic downturn is seen as the best time to optimise the infrastructure that they already have in place, to look at ways to trim unnecessary expenditure and to use existing resources more effectively. As organisations are increasingly reliant on data networks that encompass an ever-growing range and number of internet protocol (IP) enabled devices and applications, they need to more effectively administer and manage these assets—they can no longer take the management of their IP networks for granted.
Tags : 
quocirca, ipam, dynamic host configuration protocol, domain name system, radio frequency identification, voice over ip
    
Quocirca
Published By: Tripwire     Published Date: Mar 31, 2009
Learn the basics about security benchmarks, and specifically how the security benchmarks developed by the Center for Internet Security (CIS) can help you with your compliance initiatives.
Tags : 
center for internet security, cis, tripwire, compliance, internet security, cis-certified, framework, regulation
    
Tripwire
Published By: IBM     Published Date: Sep 10, 2009
Data protection and recovery can be a complicated problem in remote offices. But there are options. This white paper explores a range of possibilities, and shows how an adaptive data protection solution can protect remotely stored data for enterprises of all sizes.
Tags : 
ibm, applications, risks, rcovery considerations, backup, tivoli software, tivoli® storage manager fastback, remote office
    
IBM
Published By: Red Hat     Published Date: Jun 09, 2014
Read this whitepaper and learn how administrators are keeping up by guiding their enterprises toward new, software-defined storage platforms that simplify and unify storage capacity across the enterprise and into the cloud.
Tags : 
red hat, architects, data driven applications, data, storage platforms, storage server, data defined storage platforms
    
Red Hat
Published By: Red Hat     Published Date: Jun 10, 2014
Read this whitepaper and learn how administrators are keeping up by guiding their enterprises toward new, software-defined storage platforms that simplify and unify storage capacity across the enterprise and into the cloud.
Tags : 
red hat, architects, data driven applications, data, storage platforms, storage server, data defined storage platforms
    
Red Hat
Published By: McAfee     Published Date: Sep 15, 2014
Attacks today incorporate increasingly sophisticated methods of social engineering and client-side software manipulation to exfiltrate data without detection. Some attackers leverage so-called spearphishing to entice employees to give up access information and spread their attacks to other enterprise systems; others use password crackers against compromised applications in order to gain further access rights to the network. The attackers might also set up channels for command and control communications with the compromised systems, as in the case of the Zeus or SpyEye bot infections.
Tags : 
network protection, it security, firewall, hacker detection, security management
    
McAfee
Published By: Anaplan     Published Date: Mar 29, 2018
The concept of integrated business planning — closing gaps in an organization’s various planning functions and aligning operations and strategy with its financial performance — has existed in various forms for decades. What has changed is creation of planning platforms that can handle the fluidity of data to erase silos and enterprise borders where once there were multiple geographies, departments, time zones, languages and currencies. All elements of business are managing the avalanche of information coming to them. Just like connecting disparate people, we also must connect data that resides in various systems, applications and tools.
Tags : 
afp, ibp, business, organizations, enterprise, data, systems
    
Anaplan
Published By: Anaplan     Published Date: Aug 28, 2018
The concept of integrated business planning — closing gaps in an organization’s various planning functions and aligning operations and strategy with its inancial performance — has existed in various forms for decades. What has changed is creation of planning platforms that can handle the luidity of data to erase silos and enterprise borders where once there were multiple geographies, departments, time zones, languages and currencies. All elements of business are managing the avalanche of information coming to them. Just like connecting disparate people, we also must connect data that resides in various systems, applications and tools.
Tags : 
afp, business, planning, capability, integration, organization
    
Anaplan
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.