HIT Consultant Insightful coverage of healthcare innovation
 

ddi

Results 101 - 125 of 955Sort Results By: Published Date | Title | Company Name
Published By: F5 Networks Inc     Published Date: Jan 22, 2009
Microsoft® Exchange® Server is the undisputed industry leader in corporate messaging. With the release of Microsoft Exchange Server 2007, not only does Exchange continue to provide rich, effi cient access to e-mail, calendars, attachments, contacts, and more, but Exchange Server 2007 adds some exciting infrastructure and performance improvements as well. F5’s comprehensive Application Ready infrastructure for Exchange Server 2007 allows organizations to easily provide additional performance, security and availability, to ensure maximum ROI with the minimum amount of work.
Tags : 
microsoft exchange 2007, application ready network guide, microsoft exchange server, corporate messaging, roi, infrastructure optimization, application security
    
F5 Networks Inc
Published By: IBM     Published Date: Mar 05, 2014
For many years, companies have been building data warehouses to analyze business activity and produce insights for decision makers to act on to improve business performance. These traditional analytical systems are often based on a classic pattern where data from multiple operational systems is captured, cleaned, transformed and integrated before loading it into a data warehouse. Typically, a history of business activity is built up over a number of years allowing organizations to use business intelligence (BI) tools to analyze, compare and report on business performance over time. In addition, subsets of this data are often extracted from data warehouses into data marts that have been optimized for more detailed multi-dimensional analysis.
Tags : 
ibm, big data, data, big data platform, analytics, data sources, data complexity, data volume, data generation, data management, storage, acceleration, business intelligence, data warehouse
    
IBM
Published By: HERE Technologies     Published Date: Jun 14, 2019
With upward of a billion vehicles in operation across the world and rising urbanization there is an unprecedented level of traffic and congestion in our major towns and cities. On the front-line, are the emergency dispatchers and responders facing complex challenges as they attempt to overcome congested traffic, unexpected road closures and work zones as quickly as possible. Each additional minute of response time has the potential to save a life, reduce suffering or prevent unnecessary property damage. Most public safety and security organizations, however, are still using legacy location technology, which has its limitations and does not properly address some key challenges. As one of the world’s leading location platforms, HERE shares insights and solutions to improve emergency response times with real-time location data
Tags : 
mapping, public saftey, location data
    
HERE Technologies
Published By: HERE Technologies     Published Date: Jun 14, 2019
With upward of a billion vehicles in operation across the world and rising urbanization there is an unprecedented level of traffic and congestion in our major towns and cities. On the front-line, are the emergency dispatchers and responders facing complex challenges as they attempt to overcome congested traffic, unexpected road closures and work zones as quickly as possible. Each additional minute of response time has the potential to save a life, reduce suffering or prevent unnecessary property damage. Most public safety and security organizations, however, are still using legacy location technology, which has its limitations and does not properly address some key challenges. As one of the world’s leading location platforms, HERE shares insights and solutions to improve emergency response times with real-time location data.
Tags : 
mapping, public saftey, location data
    
HERE Technologies
Published By: SAS     Published Date: Oct 18, 2017
Are you thinking about adding artificial intelligence to your organization? It’s certainly a hot topic and worth the attention. This paper outlines the SAS approach to AI and explains key concepts. It also provides process and implementation tips if you are considering adding AI technologies to your business and analytical strategies.
Tags : 
    
SAS
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Artificial intelligence (AI) seems to be on everyone’s mind. It powers natural language recognition within voice-powered assistants like Siri and Alexa, beats world-class Go players, and enables hyper-targeted e-commerce and content recommendations across the web, as we see with Amazon and Netflix. But recently, AI has begun actively expanding its footprint within the enterprise. Executives are trying to more fully comprehend what AI is and how they can use its insights into their data to better capitalize on business opportunities. This additional information can enable engaging with customers more productively and efficiently, forming an edge against the competition. Read more in our AI survey summary.
Tags : 
artificial, intelligence, enterprise
    
BlackBerry Cylance
Published By: Group M_IBM Q119     Published Date: Mar 05, 2019
In this digital world, fast and reliable movement of digital data, including massive sizes over global distances, is becoming vital to business success across virtually every industry. The Transmission Control Protocol (TCP) that has traditionally been the engine of this data movement, however, has inherent bottlenecks in performance (Figure 1), especially for networks with high, round-trip time (RTT) and packet loss, and most pronounced on high-bandwidth networks. It is well understood that these inherent “soft” bottlenecks arcaused by TCP’s AdditiveIncrease-Multiplicative-Decrease (AIMD) congestion avoidance algorithm, which slowly probes the available bandwidth of the network, increasing the transmission rate until packet loss is detected and then exponentially reducing the transmission rate. However, it is less understood that other sources of packet loss, such as losses due to the physical network media, not associated with network congestion equally reduce the transmission rate.
Tags : 
    
Group M_IBM Q119
Published By: Cisco     Published Date: Dec 19, 2016
Criminal groups behind today's cyberattacks have become better organized, introducing reconnaissance activity, custom malware, evasion techniques, and other sophisticated tactics that place a burden on traditional security defenses. The litany of high-profile data breaches is impacting every industry and prompting organizations of all sizes to respond by modernizing their IT security infrastructure. The battlefield continues to be at the endpoint, where attackers typically strike to gain initial access to the corporate network. Most organizations have been waging this battle using traditional antivirus at the endpoint, a solution that has received a lot of improvements over its more than 25 years of existence but clearly isn't keeping up with attacker sophistication. Emerging endpoint specialized threat analysis and protection (STAP) products can either replace or complement antivirus by adding behavioral analysis and continuous system and user activity monitoring to identify new and s
Tags : 
    
Cisco
Published By: IBM     Published Date: Sep 18, 2008
Powering your IT hardware often costs more than double the price of the actual machine. While this fact alone motivates businesses to build more energy efficient data centers, IBM's Project Big Green details the additional operational and social benefits for businesses. Read more on IBM's holistic approach to reducing your IT energy use to save you money.
Tags : 
ibm, network management, networking, green, green computing, green datacenter, green data center, data center, environmental
    
IBM
Published By: GFI     Published Date: Mar 25, 2008
This white paper explains what makes spam such an unbearable problem and how spamming tactics are evolving daily to beat anti-spam software. In the space of two months, spammers have switched from image spam to using PDF, Excel and ZIP file attachments. By using these attachments to send images instead of embedding them in the body of the email message, spammers have taken the cat-and-mouse game with anti-spam software developers to a new level.
Tags : 
attachment spam, filter attachment spam, image spam, pdf spam, excel spam, xls spam, stock spam, gfi
    
GFI
Published By: IBM     Published Date: Jun 25, 2018
Recognizing the shift to a subscription business model required real-time customer support, Autodesk turned to IBM technology to enhance its customer experience. Using Watson Assistant, Autodesk developed a virtual agent to interact with customers, applying natural language processing (NLP) and deep learning techniques to recognize and extract the intent, context and meaning behind inquiries. Quickly resolving easy customer concerns, Watson Assistant is supporting 100,000 conversations per month, with response times 99% faster than before and leading to a 10-point increase in customer satisfaction levels for Autodesk. Find out how Watson Assistant can accelerate your customer support experience. Click here to find out more about how embedding IBM technologies can accelerate your solutions’ time to market.
Tags : 
    
IBM
Published By: AWS     Published Date: Jun 03, 2019
Background Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that aren’t built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro™ Deep Security™ is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers.
Tags : 
    
AWS
Published By: AWS     Published Date: Jun 03, 2019
Background Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that aren’t built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro™ Deep Security™ is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers.
Tags : 
    
AWS
Published By: Workforce Software     Published Date: Feb 02, 2015
Leave administration is one of the most challenging aspects of workforce management and an area that continues to become more complicated as leave regulations—and lawsuits—increase. For employers, having to understand and comply with complex federal regulations, such as the Family and Medical Leave Act (FMLA), in addition to myriad local laws, union rules and company policies can be overwhelming. The task of complying with these many regulations often consumes a great deal of time for HR teams, especially those operating across multiple geographies.
Tags : 
workforce software, software, automate, outsource, fmla, act, cloud, management, employee leave, strategy
    
Workforce Software
Published By: Aomega     Published Date: Nov 06, 2006
Recent regulatory additions require that companies take proactive measures like penetration testing to enforce data privacy and integrity.  By deploying a distributed model companies can execute testing from different security levels which is important in challenging posture based on level of access.
Tags : 
regulatory compliance, compliance, data privacy, pci, data privacy, data protection, access control, security testing, security audit, glba, hipaa compliance, aomega
    
Aomega
Published By: MuleSoft     Published Date: Nov 27, 2018
In today’s digitally disrupted economy, organizations across industries face competition at unparalleled heights. As a result, differentiation through business automation has become synonymous with convenience and speed. However, since the technology landscape is changing at an increasing pace, business automation shouldn’t be thought of as a one-time, centralized effort in a discrete process. Rather, organizations should view business automation as a way to decentralize access to systems and enable the broader organization. Download this whitepaper to learn: The value of business automation Why traditional approaches to business automation – such as custom code, implementing standalone solutions, or using point-to-point connections – do not suffice. The benefits of an API-led approach to business automation. How organizations like Wells Fargo, the State of Colorado, Tic:Toc, and Addison Lee achieved business automation success using APIs.
Tags : 
    
MuleSoft
Published By: Cisco     Published Date: Dec 15, 2010
Adding automation can provide consistent best practice-based execution of procedures, improve business continuity, increase IT productivity, and reduce the risk of business disruption.
Tags : 
cisco, sap system, automation, system copy and refresh, best practice, business continuity, it productivity, automated administration, document management
    
Cisco
Published By: Oath     Published Date: Nov 15, 2017
On the road, traffic slows you down— online, it drives sales. When AutoWeb, a leading automotive marketing site, saw success with its search campaigns via Oath’s Yahoo Gemini, it began to test additional Oath ad solutions and found that a layered approach can be a win/win.
Tags : 
    
Oath
Published By: Oath     Published Date: Nov 20, 2017
On the road, traffic slows you down— online, it drives sales. When AutoWeb, a leading automotive marketing site, saw success with its search campaigns via Oath’s Yahoo Gemini, it began to test additional Oath ad solutions and found that a layered approach can be a win/win.
Tags : 
    
Oath
Published By: Oath     Published Date: Nov 20, 2017
On the road, traffic slows you down— online, it drives sales. When AutoWeb, a leading automotive marketing site, saw success with its search campaigns via Oath’s Yahoo Gemini, it began to test additional Oath ad solutions and found that a layered approach can be a win/win.
Tags : 
    
Oath
Published By: Avi Networks     Published Date: May 14, 2018
Avi Vantage is the only solution that delivers built-in application analytics in addition to enterprise-grade load balancing and application security. With millions of data points collected in real time, the platform delivers network-DVR like capabilities with the ability to record and display application analytics over specific time intervals (last 15 minutes, hour, day, week etc.) or for individual transactions. These application insights including total round trip time for each transaction, application health scores, errors, end user statistics, and security insights (DDoS attacks, SSL vulnerabilities, ciphers etc.) simplify troubleshooting of applications.
Tags : 
    
Avi Networks
Published By: Red Hat     Published Date: Nov 08, 2017
With help from Red Hat Consulting, Aviva Asia Pte. Ltd. created and launched a new application based on Red Hat JBoss Middleware within a tight six-month time frame. With this new solution, Aviva has reduced costs by replacing proprietary licensing fees with Red Hat’s flexible, cost-effective subscription pricing model. In addition, hosting the new application locally on-premise has improved response times for end users, helping Aviva bring new services to market faster..
Tags : 
system migration, proprietary imaging, bond management workflow system, enterprise solutions, open source technology
    
Red Hat
Published By: Red Hat     Published Date: Jan 02, 2018
When Aviva plc, a multinational insurance provider group, acquired Friends Provident International (FPI), it needed to replace FPI’s costly proprietary imaging and bond management workflow system. With help from Red Hat Consulting, Aviva Asia Pte. Ltd. created and launched a new application based on Red Hat JBoss Middleware within a tight six-month time frame. With this new solution, Aviva has reduced costs by replacing proprietary licensing fees with Red Hat’s flexible, cost-effective subscription pricing model. In addition, hosting the new application locally on-premise has improved response times for end users, helping Aviva bring new services to market faster.
Tags : 
    
Red Hat
Published By: Godfrey     Published Date: Oct 02, 2008
Branding has always been about much more than logos and graphics. It comprises the total experience customers and prospects have with your company. By adding newer, richer choices, today’s new communications technologies – everything from blogs and podcasts to wikis and mobile – are changing the fundamental basis of business-to-business marketing. Almost daily. While some are saying that branding is no longer relevant in that increasingly fragmented media world, we believe branding actually is more important than ever. In fact, it’s critical to your success.
Tags : 
godfrey, b-to-b branding, business-to-business branding, b-to-b branding in web 2.0, b-to-b interactive media, brand guardians, brand ambassadors, media proliferation, brand fragmentation, business-to-business marketing
    
Godfrey
Published By: Quinstreet - Netapp     Published Date: Jun 11, 2012
After years of adding servers and storage hardware to keep up with demand, the Balwin-Wallace College invested in an initiative to virtualize and consolidate its sprawling computing and storage infrastructure. Download this study to see the results.
Tags : 
netapp, network storage, cloud computing, virtualization, storage efficiency, data storage, information management, nas
    
Quinstreet - Netapp
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.