HIT Consultant Insightful coverage of healthcare innovation
 

data services

Results 176 - 200 of 788Sort Results By: Published Date | Title | Company Name
Published By: Juniper Networks     Published Date: Aug 10, 2017
Interactive Data is a trusted leader in financial information, delivering a comprehensive set of products and services designed to meet the needs of the front, middle, and back offices at some of the largest and most well-known institutions around the world. These clients trust Interactive Data to help support their investment activities and operational workflow through a broad range of offerings.
Tags : 
interactive data, financial services, global network, market data, ethernet switches, low latency, it infrastructure
    
Juniper Networks
Published By: TIBCO Software     Published Date: May 31, 2018
With data the new competitive battleground, businesses that take advantage of their data will be the leaders; those that do not will fall behind. But gaining an advantage is a more difficult technical challenge than ever because your business requirements are ever-changing, your analytic workloads are exploding, and your data is now widely-distributed across on-premises, big data, the Internet of Things, and the Cloud. TIBCO® Data Virtualization is data virtualization software that lets you integrate data at big data scale with breakthrough speed and cost effectiveness. With TIBCO Data Virtualization, you can build and manage virtualized views / data services that access, transform, and deliver the data your business requires to accelerate revenue, reduce costs, lessen risk, improve compliance, and more.
Tags : 
    
TIBCO Software
Published By: VMware     Published Date: Dec 14, 2018
Hyperconverged infrastructure (HCI) is the best strategic option for meeting your organization’s demands for increased efficiency and agility while leveraging existing apps and data. HCI is a scale-out software-defined infrastructure that converges core data services on flash-accelerated, industry standard servers, delivering flexible and powerful building blocks under unified management. Put simply, HCI has the potential to revolutionise your security environment and increase efficiencies relating to application performance. In this whitepaper, we break down the top 5 reasons why hyperconverged infrastructure is the right way forward for your organisation. Please enter your details to access the whitepaper.
Tags : 
    
VMware
Published By: Cognizant     Published Date: Oct 23, 2018
In the last few years, a wave of digital technologies changed the banking landscape - social/ mobile altered the way banks engage with customers, analytics enabled hyper personalized offerings by making sense of large datasets, Cloud technologies shifted the computing paradigm from CapEx to OpEx, enabling delivery of business processes as services from third-party platforms. Now, a second wave of disruption is set to drive even more profound changes - including robotic process automation (RPA), AI, IOT instrumentation, blockchain distributed ledger and shared infrastructure, and open banking platforms controlled by application programming interfaces (API). As these technologies become commercialized, and demand increases for digitally-enabled services, we will see unprecedented disruption, as non-traditional banks and fintechs rush into all segments of the banking space. This whitepaper examines key considerations for banks as they explore value in the emerging Digital 2.0 world.
Tags : 
cognizant, banking, digital
    
Cognizant
Published By: Cognizant     Published Date: Oct 23, 2018
A group of emerging technologies is rapidly creating numerous opportunities for life sciences companies to improve productivity, enhance patient care and ensure regulatory compliance. These technologies include robotic process automation (RPA), artificial intelligence (AI), machine learning (ML), blockchain, the Internet of Things (IoT), 3-D printing and augmented reality/ virtual reality (AR/ VR). This whitepaper presents a preview of five pivotal technology trends remaking the life sciences industry: AI and automation, human augmentation, edge analytics/ processing, data ownership and protection, and the intermingling of products and services.
Tags : 
cognizant, life sciences, patient care
    
Cognizant
Published By: Intapp     Published Date: Jan 09, 2019
Intapp Time provides superior business intelligence thatchangesyour firm’sfundamental relationship with time.Thisunified suite of applications gives timekeepers access to time data and capture wherever they are: in the office, on a mobile device, online and offline.It is user-centric, offering a completely automated option while fullysupporting hands-on tracking—contemporaneous or reconstructionist.Intapp Time helps your business mine time data to reveal new sources of revenue, inform staff decisions, increase project efficiency, and reduce time leakage.
Tags : 
business, business intelligence, time, tax, time for tax, intapp, applications, time data, automation, reporting, timekeeping, audit, accounting, consulting, professional services, active time capture, passive time capture, time tracking
    
Intapp
Published By: Intapp     Published Date: May 10, 2019
The Cornerstone of Financial Control Time equals money. Time plus data equals control. All professionals, whether in management, consulting, engineering, or accounting, must be confident that their value is reflected in their bottom line. One of the primary factors driving that compensation is the amount of time spent on a particular subject or client. But too often front line earners at those firms don’t provide the clean, data-rich timesheets needed to accurately gauge the effort required by each project.
Tags : 
business, business intelligence, time, tax, time for tax, intapp, applications, time data, automation, reporting, timekeeping, audit, accounting, consulting, professional services, active time capture, passive time capture, time tracking
    
Intapp
Published By: NTT Ltd.     Published Date: Jan 16, 2019
NTT Data services has over 600+ BI experts and over 250+ implementations in India, receiving high accolades from Gartner and AMR research. NTT Data Services offers Industry focused offerings and pre-configured models. Some of our offerings include: - Guided Analytics Strategy - Proven Framework & Methodology for ‘C’ level executives - Solution lab for Co-Innovation and Proof of Concepts - Advisory Services - BI Transformations, Big Data Strategy, Information Governance, Health Checks - Proprietary Tools & Accelerators – System Optimization, Architect to Archive, User Adoption - Flexible Delivery - Rapid Development Factory, Shared Services Find more details in this deck.
Tags : 
    
NTT Ltd.
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
SecureWorks provides an early warning system for evolving cyber threats, enabling organisations to prevent, detect, rapidly respond to and predict cyber attacks. Combining unparalleled visibility into the global threat landscape and powered by the Counter Threat Platform — our advanced data analytics and insights engine —SecureWorks minimises risk and delivers actionable, intelligence driven security solutions for clients around the world.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Cybercriminals can be goal-driven and patient, and they often have a singular focus, plenty of time and access to vast, modern technical resources. Both organized and forum-based criminals are working constantly to find innovative and efficient ways to steal information and money with the lowest risk to their personal freedom. If we wish to stay “one step ahead” of the threats detailed in this report, awareness of online criminal threats, techniques and markets is our best defense.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Achieving and maintaining a high level of information security requires information security professionals with robust skills as well as organisational, technical and operational capabilities. The gap between intent and ability to be secure is evident in our sample of UK large enterprises. Deficient companies will only close that gap when they acquire the necessary capabilities. Some of these capabilities can be purchased as information security tools or application solutions, but it is more prudent for an organisation to consider acquiring these capabilities through a service arrangement with a dedicated security services partner.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Despite long-standing concerns captured in a myriad of surveys, security in the cloud has progressed to a more practical and achievable level. The cloud represents a shared security responsibility model whereby that responsibility is split between the Cloud Service Provider and the cloud customer. For organisations moving some or all of their applications and data to the cloud, acceptance of this model clears the way to more thoughtful consideration for how security can and should be architected — from the ground up. As a result, IT and IT Security leaders now have a much clearer trajectory to support their business operations in the cloud in a secure manner.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Finding a strategic partnership with a trusted security expert that can assist you in all the aspects of information security is vital. SecureWorks is a market leader in security that can close the security gap in organisations by evaluating security maturity across an enterprise, help define security strategies and implement and manage security program plans. We are a true strategic partner that can help a CISO embed security at all levels of the organisation.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
The SecureWorks Security and Risk Consulting practice provides expertise and analysis to help you enhance your security posture, reduce your risk, facilitate compliance and improve your operational efficiency.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Technical Tests are designed to cover specific services. Each security test has its own objectives and acceptable levels of risk. There is not an individual technique that provides a comprehensive picture of an organisation’s security when executed alone. A qualified third party can work with you to determine what combination of techniques you should use to evaluate your security posture and controls to begin to determine where you may be vulnerable.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
GDPR will pose different challenges to each organisation. Understanding and acting on the implications for your own organisation is vital. That means taking a risk-based approach to ensure that you are doing what you need to do to manage your own specific risks to personal information. While virtually all organisations will have to implement changes to become GDPR compliant, some will be able to take partial advantage of existing compliance to other security mandates and frameworks, such as ISO 27001 and PCI by extending those measures to protection of personal data. Even so, further work will be required to comply with GDPR, both with regards to security and its other aspects.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: CA Technologies     Published Date: Aug 24, 2017
IDC's research shows that, worldwide, over 70% of enterprise cloud users currently rely on multiple clouds (public and/or private) to support a wide range of applications and workloads. Efficient management of these resources depends on IT operations and DevOps teams having access to consistent, accurate infrastructure performance monitoring data and reporting that span the full set of on-premise cloud infrastructure and public cloud IaaS services. CA Technologies recently announced new capabilities for CA Unified Infrastructure Management (CA UIM) that allow the product to more fully address the monitoring needs of complex multicloud infrastructure as part of delivering on CA's vision to fully enable the agile DevOps in the application economy.
Tags : 
    
CA Technologies
Published By: Dyn     Published Date: Nov 03, 2016
Global DNS performance and availability are critical to user experience. According to Gartner, “DNS is mission-critical to all organizations that connect to the internet. DNS failure or poor performance leads to applications, data and content becoming unavailable, causing user frustration, lost sales and business reputation damage.” But many businesses still rely on a single, often in-house DNS solution that lacks global scale and resiliency. This white paper reviews the business advantages of implementing a high availability DNS architecture using redundant DNS services. You will learn: - The critical role DNS plays in the user experience. - The risks of relying solely on a single DNS solution. - The added performance and reliability benefits of a high availability DNS architecture with a redundant managed DNS service. - Criteria for evaluating a managed DNS service provider.
Tags : 
dyn, dns, downtime risk, end-user experience
    
Dyn
Published By: Qualys     Published Date: Jul 19, 2012
Data breaches are bad for business, so every enterprise needs security. In the past this was expensive, because security products were designed for companies with deep pockets and teams of experts. But that's changed. New 'cloud based' services, such as those offered by Qualys, are fast to deploy, safe and easy to use. What's more they're even more affordable. With growing demands from customers and regulators for security, now is a good time to invest in security. Leading cloud-based security services deliver a professional level of security assurance in a form that fits the circumstances and pockets of small businesses.
Tags : 
technology, firewall, security, cloud, data, anti-virus
    
Qualys
Published By: Equinix     Published Date: Jul 07, 2016
Selevision wanted a data centre provider to host its services - Video on Demand, Live TV and Catch-up TV. It needed direct access to the world’s top CDNs, NSPs, ISPs and mobile data providers to securely stream video across the Middle East region. Selevision chose to host its services in the Equinix Internet Business Exchange (IBX) located in Dubai.
Tags : 
content management, content on demand, equinix, content
    
Equinix
Published By: Equinix     Published Date: Jul 11, 2016
Selevision wanted a data centre provider to host its services - Video on Demand, Live TV and Catch-up TV. It needed direct access to the world’s top CDNs, NSPs, ISPs and mobile data providers to securely stream video across the Middle East region. Selevision chose to host its services in the Equinix Internet Business Exchange (IBX) located in Dubai.
Tags : 
content management, content on demand, equinix, content
    
Equinix
Published By: Larsen & Toubro Infotech(LTI)     Published Date: Sep 17, 2019
Nordics based financial company had challenges in migrating the old legacy network design to Cisco ACI for a new Datacentre. Also it did not had service overview and CMDB to support 150 business services transition. LTI leveraged and implemented several ServiceNow modules, customised 100 odd patterns for 150 business services and executed extensive integration of 25 legacy systems. These transactions and implementation helped in easy cost computation for new business expansions ii. Benefits 1. 25% reduction in DC migration time by creating business service oriented move groups 2. Accurate costing of each business service for replication in new regions/geographies
Tags : 
application management, artificial intelligence, b2b technology, cloud applications, cloud architect
    
Larsen & Toubro Infotech(LTI)
Published By: Gigamon     Published Date: Feb 20, 2019
Read this ESG research brief to learn how to improve visibility across distributed computing environments without increasing staff or tools. Download “The Importance of a Common Distributed Data Services Layer” to learn why ensuring visibility in a distributed network environment is crucial and how a common distributed data services layer to collect, process and share data ensures that network operations teams are able to provide better digital experiences, mitigate risk and respond to changing environments.
Tags : 
    
Gigamon
Published By: Intel     Published Date: Aug 26, 2019
Distributed cloud architectures will play an important role in Communication Service Providers’ network transformations. The distributed cloud will be made of numerous edge locations, from the customer premises to mobile base stations to central offices, each of which has its benefits and constraints. CSPs will need to consider attributes such as performance, availability, security, integration, and data and traffic volume to optimize the infrastructure for a myriad of workloads. Learn more about Heavy Reading’s survey results on CSPs adopting a distributed cloud strategy and delivering new services in this white paper.
Tags : 
    
Intel
Published By: CA Mainframe     Published Date: Sep 12, 2008
Data Professionals are now being asked to perform higher-level tasks and interact with businesses as “data stewards”.  In this survey, you will learn the challenges as outlined by over 850 data professionals. Get this CA-sponsored survey of the International DB2 Users Group (IDUG) conducted by Unisphere Research. The closer link between corporate performance and database performance is increasing pressure on data professionals to provide higher-level services to enterprise business customers.
Tags : 
database administrator, dba, database, data management, ca mainframe, mainframe
    
CA Mainframe
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.