HIT Consultant Insightful coverage of healthcare innovation
 

distributed

Results 351 - 375 of 482Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: Dec 21, 2016
Today’s corporate networks are more important to business objectives than ever before. Consequently, greater amounts of sensitive data traverse both wired and wireless networks. This plethora of valuable data in today's enterprise attracts an increasing number of hackers and malware applications. However, the inherent connected intelligence and distributed nature that makes the network a treasure trove for cybercriminals can also empower the network to be a proactive security tool. Through traffic visibility, and segmentation, today's enterprise network can prove itself to be a sensor and enforcer for security.
Tags : 
    
Cisco
Published By: CA Technologies EMEA     Published Date: Aug 07, 2017
Generate rich virtual data that covers the full range of possible scenarios and provide the unconstrained access to environments needed to deliver rigorously tested applications on time and within budget. Model complex live system data and apply automated rule-learning algorithms to pay off technical debt and uncover in depth understanding of composite applications, while exposing virtual data to distributed teams on demand and avoiding testing bottlenecks.
Tags : 
virtual services, data, avoid project delays, ca technologies, continuous testing, testing effort, service virtualisation, delivery ecosystem
    
CA Technologies EMEA
Published By: Ruckus Wireless     Published Date: Aug 08, 2016
Minooka School District serves 4,500 pre-K through 8th-grade students. Challenge: Difficulty troubleshooting legacy Aironet infrastructure and supporting increased network demands. Solution: Ruckus Cloud Wi-Fi for distributed site network management.
Tags : 
cloud based access point, cloud based wifi, cloud managed wifi, cloud wifi, cloud based wifi management, cloud wifi controller, cloud managed wireless, cloud managed wireless access point, wifi for schools
    
Ruckus Wireless
Published By: Leo Technosoft     Published Date: Dec 28, 2010
SaaSTenantT is a distributed .NET SaaS Framework that eliminates both the technical and business challenges of building and delivering software as a service.
Tags : 
software development, saas development, aas product development, saastenant, leo technosoft, saas development company, saas product development company
    
Leo Technosoft
Published By: Saepio     Published Date: Feb 18, 2010
Marketing process optimization technologies are emerging everywhere. Yet none fully address a corporate marketer's needs and none fit the definition of a complete, integrated enterprise marketing management system. But that doesn't mean you shouldn't start implementing EMM today.
Tags : 
saepio, emm, roi, marketing process optimization, var, distribution, crm, mrm, distributed marketing, enterprise marketing management, campaign planning
    
Saepio
Published By: Saepio     Published Date: Apr 21, 2010
Brand marketers invest billions to create an emotional connection between their brand and prospective customers. As media fragments and customers increasingly engage with the brand in ways outside the direct control of the corporate marketer, brand positioning and messaging and the building of emotional connections with consumers becomes more challenging.
Tags : 
saepio, emm, roi, marketing process optimization, var, distribution, crm, mrm, distributed marketing, enterprise marketing management, campaign planning
    
Saepio
Published By: SafeNet     Published Date: Jun 03, 2013
An effective strong authentication service enables companies to pursue a consistent authentication policy, across the organization, by automating and simplifying the deployment and management of a distributed estate of tokens.
Tags : 
authentication, authentication deployments, managing authentication
    
SafeNet
Published By: IBM     Published Date: Mar 17, 2009
PTC, the Product Development Company® today announced that Samsung Electronics Co., LTD (SEC), a leading digital products manufacturer of mobile phones, televisions, and semiconductors, has selected PTC Windchill as its digital product development data repository to manage an integrated BOM of mechanical, electrical and software data across its globally distributed product development environment. Windchill is the standard enterprise PLM solution at SEC because of its powerful, Web-based support of key product development processes on a single technology architecture and execution environment.
Tags : 
ibm, telelogic, samsung, ptc windchill, press release, electronics industry, product development, global bom, product lifecycle management, content management, dynamic publishing
    
IBM
Published By: Commvault ABM Oct     Published Date: Feb 15, 2018
Enterprises and managed service providers (MSPs) have some similar challenges in the realm of data protection. Both have to deal with expansive environments—with enterprises protecting distributed offices/geographies, and MSPs protecting many independent subscribers. Both also have been seeing production data storage and secondary protection storage demands rising. Enterprises and MSPs alike should therefore be looking for data protection architectures that have scale-out capabilities built into their core foundation.
Tags : 
data protection, msps, data storage, scale out data protection
    
Commvault ABM Oct
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Most organizations are in the midst of some form of digital transformation (DX), transforming how they bring products and services to the market—and ultimately deliver value to their customers. But DX initiatives also bring complexity for the network operations team. With business-critical services distributed across multiple clouds, this leads to potential performance issues, especially at branch locations. Given these realities, it is no wonder that software-defined wide-area network (SD-WAN) technology is rapidly going mainstream. Unfortunately, SD-WAN is an example of the paradox of DX: transformative technology can potentially move the business to the next level, but the expanded attack surface it creates can expose the organization to significant risk. That is why an SD-WAN deployment, like every other DX effort, should be accompanied by a security transformation (SX) that rethinks outdated principles, broadens protection beyond the data center, and integrates the security archit
Tags : 
    
Fortinet EMEA
Published By: VMware SD-WAN by VeloCloud     Published Date: May 20, 2019
Software-Defined WAN, or SD-WAN for short, is at the leading edge of software-based networking deployments. SD-WAN offers significant business value for organizations with distributed branches in terms of business agility and the ability to leverage Internet bandwidth economics – put simply, cost savings. This Software-Defined WAN For Dummies book explains the way for IT and business managers to migrate to a distributed network which is less complex, more flexible and easier to manage. With this book, VMware and Dan Pitt make an important contribution to better understanding the future of WAN implementations
Tags : 
    
VMware SD-WAN by VeloCloud
Published By: Citrix     Published Date: Apr 10, 2017
Citrix can help you with the challenge of adopting a new approach to WAN technology.
Tags : 
citrix, wan, wan technology, mobility, cloud, cloud computing
    
Citrix
Published By: Comcast Business     Published Date: Feb 09, 2018
Software-defined WAN technology unlocks the potential of broadband to create a foundation for transformation across business locations
Tags : 
    
Comcast Business
Published By: Ounce Labs, an IBM Company     Published Date: Dec 29, 2009
Countless studies and analyst recommendations suggest the value of improving security during the software development life cycle rather than trying to address vulnerabilities in software discovered after widespread adoption and deployment. The justification is clear.For software vendors, costs are incurred both directly and indirectly from security flaws found in their products. Reassigning development resources to create and distribute patches can often cost software vendors millions of dollars, while successful exploits of a single vulnerability have in some cases caused billions of dollars in losses to businesses worldwide. Vendors blamed for vulnerabilities in their product's source code face losses in credibility, brand image, and competitive advantage.
Tags : 
source code vulnerability testing, independent model, centralized model, distributed model, software development life cycle, source code scanning, application security, source code security testing
    
Ounce Labs, an IBM Company
Published By: Forcepoint     Published Date: Jun 06, 2019
Cost, speed, and reliability are all important to consider when designing a network, but balancing all three is no easy task. As your organization expands, you need a resilient, fast, and secure network—especially in large, distributed environments. And it needs to be affordable. This is where a software-defined WAN (SD-WAN) comes to the rescue. And deploying it today can provide a quantifiable competitive advantage. Gartner estimates SD-WAN has less than 5% market share today, but predicts 25% of users will manage their WAN through software within two years. "Secure Enterprise SD-WAN for Dummies" guides you step-by-step how to manage and secure digital networks with SD-WAN, with instructions even the most novice networking professional can understand. Read “Secure Enterprise SD-WAN for Dummies” and gain a competitive edge today!
Tags : 
    
Forcepoint
Published By: Okta     Published Date: Apr 29, 2015
Distributed workforces and mobile devices are disrupting business as usual. End-users are frequently accessing applications and data from outside the corporate network. This presents new security challenges for IT. Read this eGuide to learn ways to secure your mobile workforce.
Tags : 
mobile, mobile workforce, okta, security
    
Okta
Published By: Box     Published Date: Feb 18, 2015
For security and IT pros concerned with protecting sensitive information across multiple endpoints and applications. Explore how cloud can enable us to go back to basics of security to address the challenges of distributed computing and make our organizations more secure.
Tags : 
cloud, it pros, security, dlp, cloud securiity
    
Box
Published By: Symantec.cloud     Published Date: Nov 29, 2010
This three-part report describes how all businesses can benefit from SaaS services, in particular the variety of services that make up hosted services from Symantec.
Tags : 
messagelabs symantec hosted services, mobile workforce, saas services, security, management policies, distributed workforce
    
Symantec.cloud
Published By: bigtincan     Published Date: Oct 10, 2014
These days, business productivity depends largely on the ability to securely access and interact with a wide range of information over mobile devices, such as tablets and smartphones. From sales executives to field technicians, the demand for accessing corporate content securely on mobile devices is growing exponentially. In the past, implementing security measures to protect corporate content has involved VPNs, intranets, firewalls and passwords. However the increasing uptake of mobile devices in corporate settings means security measures must be implemented over a plethora of networks and devices. bigtincan has created a powerful solution with BigTinCan hub. An application for mobile devices, it allows for the distribution, management and governance of a range of content, including documents and rich media content, with enterprise-grade security.
Tags : 
mobile apps, mobile content, mobile security, corporate content
    
bigtincan
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"It’s no secret that the way people work has changed dramatically over the past few years. As highly distributed environments become the norm, security teams are scrambling to protect users, the growing number of device types they carry, and their data. With more users, devices, and applications connecting to the network, the number of risks and vulnerabilities is also increasing — triggering a total transformation in the security landscape. In this research readout, we explore the complex factors that make remote and roaming user security a challenge, and the emerging solutions best positioned to meet the needs of today’s increasingly distributed enterprise.Explore the complex factors that make remote and roaming user security a challenge, and the emerging solutions best positioned to meet the needs of today’s increasingly distributed enterprise. "
Tags : 
    
Cisco Umbrella EMEA
Published By: IBM     Published Date: Oct 24, 2013
This IBM whitepaper presents facilities management solutions that utilize feature integrated processes and analytics to create smarter buildings. Facilities management solutions can help improve the effectiveness of a distributed workforce, increase facilities utilization and accelerate workplace configurations.
Tags : 
distributed workforce, facility management, integrated process, facilities management solution, real estate, capital projects, facilities management, integration
    
IBM
Published By: Comcast Business     Published Date: May 07, 2018
Companies today are as distributed as their customer base, with branch offices and satellite locations scattered well beyond traditional boundaries. For many, these distributed sites are the face of the company to the customer, with most—if not all— customer interactions occurring in these locations and not in the corporate headquarters. Banks and finance centers, retail stores and even urgent care centers all fit within the category of the branch office, with each location connected to the corporate headquarters and, increasingly each other. Together, they make up the distributed enterprise. However, each location is its own entity and must be able to operate independently of headquarters to ensure business can continue even if one or other locations experience technical issues. Distributed locations, therefore, must be equipped to handle all manner of customer interactions – and evolving customer expectations—and do so in a way that anticipates what the customers want next. From pers
Tags : 
    
Comcast Business
Published By: DellEMC and Intel®     Published Date: Jan 17, 2017
Distributed enterprises often encompass many remote offices that are essential to running the organization and supporting customers. Important activities at the edge include manufacturing, warehousing and distribution, even mobile or remote life-saving environments like health clinics. And while there is usually a central IT staff that creates the overall business architecture for the enterprise, specialized resources to deploy and maintain the infrastructure at the edge can be scarce. Processeur Intel® Xeon® Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, and Xeon Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, le logo intel, intel atom, intel atom inside, intel core, intel inside, le logo intel inside, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon, xeon phi
    
DellEMC and  Intel®
Published By: Dell EMC     Published Date: Nov 04, 2016
While some distributed enterprises look to the cloud to reduce server sprawl and centralize operations, in many cases, the cloud simply isn’t feasible. Maybe the offices are in remote locations with limited Internet service or low-bandwidth connectivity causes issues such as latency and availability. Download the solutions brief to discover why VCE VxRail hyper-converged appliances from Dell EMC are ideal for consolidating multiple applications in a remote location onto a single, high-performance and high-availability platform that’s easy to deploy and manage.
Tags : 
distributed enterprises, vmware, storage, virtualization, software management, appliances
    
Dell EMC
Published By: ElcomSoft     Published Date: Dec 06, 2007
Information is crucial in decision making. No wonder that protection of information is paid much attention. The most part of information is created and stored digitally (Microsoft Office documents, different databases, and financial data in Intuit Quicken etc). Thus software and hardware means of protecting information are the first to talk about.
Tags : 
password, password recovery, system recovery, elcomsoft
    
ElcomSoft
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.