HIT Consultant Insightful coverage of healthcare innovation
 

distributed

Results 376 - 400 of 491Sort Results By: Published Date | Title | Company Name
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"It’s no secret that the way people work has changed dramatically over the past few years. As highly distributed environments become the norm, security teams are scrambling to protect users, the growing number of device types they carry, and their data. With more users, devices, and applications connecting to the network, the number of risks and vulnerabilities is also increasing — triggering a total transformation in the security landscape. In this research readout, we explore the complex factors that make remote and roaming user security a challenge, and the emerging solutions best positioned to meet the needs of today’s increasingly distributed enterprise.Explore the complex factors that make remote and roaming user security a challenge, and the emerging solutions best positioned to meet the needs of today’s increasingly distributed enterprise. "
Tags : 
    
Cisco Umbrella EMEA
Published By: IBM     Published Date: Oct 24, 2013
This IBM whitepaper presents facilities management solutions that utilize feature integrated processes and analytics to create smarter buildings. Facilities management solutions can help improve the effectiveness of a distributed workforce, increase facilities utilization and accelerate workplace configurations.
Tags : 
distributed workforce, facility management, integrated process, facilities management solution, real estate, capital projects, facilities management, integration
    
IBM
Published By: Comcast Business     Published Date: May 07, 2018
Companies today are as distributed as their customer base, with branch offices and satellite locations scattered well beyond traditional boundaries. For many, these distributed sites are the face of the company to the customer, with most—if not all— customer interactions occurring in these locations and not in the corporate headquarters. Banks and finance centers, retail stores and even urgent care centers all fit within the category of the branch office, with each location connected to the corporate headquarters and, increasingly each other. Together, they make up the distributed enterprise. However, each location is its own entity and must be able to operate independently of headquarters to ensure business can continue even if one or other locations experience technical issues. Distributed locations, therefore, must be equipped to handle all manner of customer interactions – and evolving customer expectations—and do so in a way that anticipates what the customers want next. From pers
Tags : 
    
Comcast Business
Published By: DellEMC and Intel®     Published Date: Jan 17, 2017
Distributed enterprises often encompass many remote offices that are essential to running the organization and supporting customers. Important activities at the edge include manufacturing, warehousing and distribution, even mobile or remote life-saving environments like health clinics. And while there is usually a central IT staff that creates the overall business architecture for the enterprise, specialized resources to deploy and maintain the infrastructure at the edge can be scarce. Processeur Intel® Xeon® Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, and Xeon Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, le logo intel, intel atom, intel atom inside, intel core, intel inside, le logo intel inside, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon, xeon phi
    
DellEMC and  Intel®
Published By: Dell EMC     Published Date: Nov 04, 2016
While some distributed enterprises look to the cloud to reduce server sprawl and centralize operations, in many cases, the cloud simply isn’t feasible. Maybe the offices are in remote locations with limited Internet service or low-bandwidth connectivity causes issues such as latency and availability. Download the solutions brief to discover why VCE VxRail hyper-converged appliances from Dell EMC are ideal for consolidating multiple applications in a remote location onto a single, high-performance and high-availability platform that’s easy to deploy and manage.
Tags : 
distributed enterprises, vmware, storage, virtualization, software management, appliances
    
Dell EMC
Published By: ElcomSoft     Published Date: Dec 06, 2007
Information is crucial in decision making. No wonder that protection of information is paid much attention. The most part of information is created and stored digitally (Microsoft Office documents, different databases, and financial data in Intuit Quicken etc). Thus software and hardware means of protecting information are the first to talk about.
Tags : 
password, password recovery, system recovery, elcomsoft
    
ElcomSoft
Published By: VMware SD-WAN by VeloCloud     Published Date: Feb 19, 2019
oftware-Defined WAN, or SD-WAN for short, is at the leading edge of software-based networking deployments. SD-WAN offers significant business value for organizations with distributed branches in terms of business agility and the ability to leverage Internet bandwidth economics – put simply, cost savings. This Software-Defined WAN For Dummies book explains the way for IT and business managers to migrate to a distributed network which is less complex, more flexible and easier to manage. With this book, VMware and Dan Pitt make an important contribution to better understanding the future of WAN implementations.
Tags : 
software-based networking, vmware, sd-wan
    
VMware SD-WAN by VeloCloud
Published By: NEC     Published Date: Nov 12, 2014
In this webinar an expert panel will examine the security and visibility needs of mesh SDN networks by examining the security challenges faced by businesses in distributed SDN environments. The webinar will also present real-world case studies of companies who excelling at providing a superior customer experience for their applications and their sites.
Tags : 
nec, software defined networking, sdn, lan, land area network, wifi, wireless network, network management, business network, network security
    
NEC
Published By: Trend Micro SaaS     Published Date: Sep 22, 2009
Just about anybody with an email address knows about spam and spam filters-or at least they think they do. However, it is a complex subject, with far more to it than meets the eye. This Ferris Research white paper looks at spam: what it is, how it is sent, and how it is filtered. It unravels the complexities and gives an accessible, factual overview into the scourge of spam.
Tags : 
saas, trend, trend micro, phishing, spam filters, software as a service, trendlabs, email security, security, interscan messaging, service level agreement, sla, virus, spam, phishing, distributed denial of service, ddos, filtering, worry free, security
    
Trend Micro SaaS
Published By: TeamQuest     Published Date: Apr 09, 2014
Find out what more than 400 respondents globally had to say about solving issues associated with agility, risk and efficiency. This 1:15 video shares and summarizes several findings that can help organizations increase IT efficiency in today's rapidly changing, highly dynamic, highly shared and distributed environments.
Tags : 
teamquest, virtualization, it professionals, optimize software, distributed environment, data center, performance
    
TeamQuest
Published By: SAS     Published Date: Mar 06, 2018
Imagine getting into your car and saying, “Take me to work,” and then enjoying an automated drive as you read the morning news. We are getting very close to that kind of scenario, and companies like Ford expect to have production vehicles in the latter part of 2020. Driverless cars are just one popular example of machine learning. It’s also used in countless applications such as predicting fraud, identifying terrorists, recommending the right products to customers at the right time, and correctly identifying medical symptoms to prescribe appropriate treatments. The concept of machine learning has been around for decades. What’s new is that it can now be applied to huge quantities of data. Cheaper data storage, distributed processing, more powerful computers and new analytical opportunities have dramatically increased interest in machine learning systems. Other reasons for the increased momentum include: maturing capabilities with methods and algorithms refactored to run in memory; the
Tags : 
    
SAS
Published By: McAfee     Published Date: Mar 31, 2017
The Adwind Remote Administration Tool is a backdoor Trojan written in Java language that targets various platforms that support Java files. Adwind does not exploit any vulnerabilities. In most cases, for an infection to succeed, the user must run the malware by double-clicking the .jar file that is usually distributed as an attachment, or opening an infected Microsoft Word document. The infection spreads if the Java Runtime Environment is installed on the user's computer. After the malicious .jar file is executed on the target system, the malware installs silently and connects to a remote server via a preconfigured port to receive commands from a remote attacker and perform other illegal operations.
Tags : 
backdoor trojans, trojan protection, malware, malware protection
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
The Adwind Remote Administration Tool is a backdoor Trojan written in Java language that targets various platforms that support Java files. Adwind does not exploit any vulnerabilities. In most cases, for an infection to succeed, the user must run the malware by double-clicking the .jar file that is usually distributed as an attachment, or opening an infected Microsoft Word document. The infection spreads if the Java Runtime Environment is installed on the user's computer. After the malicious .jar file is executed on the target system, the malware installs silently and connects to a remote server via a preconfigured port to receive commands from a remote attacker and perform other illegal operations.
Tags : 
backdoor trojans, trojan protection, malware, malware protection
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
The Adwind Remote Administration Tool is a backdoor Trojan written in Java language that targets various platforms that support Java files. Adwind does not exploit any vulnerabilities. In most cases, for an infection to succeed, the user must run the malware by double-clicking the .jar file that is usually distributed as an attachment, or opening an infected Microsoft Word document. The infection spreads if the Java Runtime Environment is installed on the user's computer. After the malicious .jar file is executed on the target system, the malware installs silently and connects to a remote server via a preconfigured port to receive commands from a remote attacker and perform other illegal operations.
Tags : 
backdoor trojans, trojan protection, malware, malware protection
    
McAfee
Published By: Forcepoint     Published Date: May 14, 2019
Forcepoint Strategies for Distributed Network Security Financial institutions are facing increasing challenges as their organizations become more distributed, applications move to the cloud, and threats rapidly evolve. But legacy solutions are fragmented, labor intensive, and inconsistent. You need a better way. Forcepoint Next Generation Firewall (NGFW) leads the industry with #1 security, manageability, and availability. Download our whitepaper to learn about: Senior IT executives’ perspectives on the current network security landscape Forcepoint NGFW’s centrally managed solution combining enterprise-grade SD-WAN and network security Success stories from companies like Sword Apak, Avency, and Carglass Download our whitepaper to learn more!
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
Forcepoint Strategies for Distributed Network Security Financial institutions are facing increasing challenges as their organizations become more distributed, applications move to the cloud, and threats rapidly evolve. But legacy solutions are fragmented, labor intensive, and inconsistent. You need a better way. Forcepoint Next Generation Firewall (NGFW) leads the industry with #1 security, manageability, and availability. Download our whitepaper to learn about: Senior IT executives’ perspectives on the current network security landscape Forcepoint NGFW’s centrally managed solution combining enterprise-grade SD-WAN and network security Success stories from companies like Sword Apak, Avency, and Carglass Download our whitepaper to learn more!
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
Forcepoint Strategies for Distributed Network Security Financial institutions are facing increasing challenges as their organizations become more distributed, applications move to the cloud, and threats rapidly evolve. But legacy solutions are fragmented, labor intensive, and inconsistent. You need a better way. Forcepoint Next Generation Firewall (NGFW) leads the industry with #1 security, manageability, and availability. Download our whitepaper to learn about: Senior IT executives’ perspectives on the current network security landscape Forcepoint NGFW’s centrally managed solution combining enterprise-grade SD-WAN and network security Success stories from companies like Sword Apak, Avency, and Carglass Download our whitepaper to learn more!
Tags : 
    
Forcepoint
Published By: Netviewer     Published Date: Oct 21, 2009
Whether your business is medium-sized or a conglomerate: Now more than ever, projects are a part of our everyday work, characterized by changing tasks, flexible working groups and the participation of external specialists. Project managers increasingly face the challenge of having to motivate and direct geographically distributed teams.
Tags : 
netviewer, web conferences, dmm, roi, project management, travel association, webinar, virtual meeting, cad, netviewer, net meeting
    
Netviewer
Published By: Riverbed     Published Date: Oct 09, 2012
In this report, Taneja Group explores how Riverbed Technology has identified a critical challenge that limits IT performance in highly distributed customer environments: costly, complex, and hardware-heavy branch offices. The report profiles the new Steelhead EX + Granite appliance, combining a true "branch-office box" virtualized hardware platform with a first-of-its-kind block storage technology. Download now.
Tags : 
it infrastructure, data, virtualization, optimization, servers
    
Riverbed
Published By: Riverbed     Published Date: Jan 16, 2013
In this report, Taneja Group explores how Riverbed Technology has identified a critical challenge that limits IT performance in highly distributed customer environments: costly, complex, and hardware-heavy branch offices.
Tags : 
wan, mobile, it infrastructure, virtualization, vsp
    
Riverbed
Published By: Riverbed Technology, Inc.     Published Date: Apr 22, 2014
In this Taneja Group Product Profile we review Riverbed’s SteelFusion (formerly Granite), and examine how it marries together multiple technical advances to deliver innovative branch converged infrastructure. SteelFusion supports distributed IT by addressing traditional branch challenges – providing simplified deployment, resiliency in the face of network issues, improved protection, fast recovery from the central datacenter, and a greatly lowered OPEX.
Tags : 
riverbed, branch office recovery, branch office, data loss, risk aversion, backup recovery, virtual servers, branch operations, technology challenges
    
Riverbed Technology, Inc.
Published By: TeamQuest     Published Date: Apr 09, 2014
Using a simple, easy-to-understand scale from zero to 100, TPI is calculated automatically and provides a simple key performance indicator for overall health. Competitive solutions typically combine several KPIs using simple math to create an overall health KPI. But TPI incorporates more sophisticated analysis that actually understands the queuing behavior of computer systems.
Tags : 
teamquest, tpi, kpi, virtualization, it professionals, optimize software, distributed environment, data center, performance
    
TeamQuest
Published By: TeraCloud     Published Date: Dec 11, 2007
TSF delivers the first Java-enabled enterprise Storage Resource Management (SRM) solution that simplifies the administration and management of distributed and mainframe storage resources across the entire enterprise, from a single point of control. TSF helps you plan more effectively, lower administration costs, and puts you in control of your storage environment.
Tags : 
storage, srm, storage resource management, storage management, tsf, tsa, teracloud, teracloud storage, infrastructure, san, sans, storage area
    
TeraCloud
Published By: Datastax     Published Date: Apr 08, 2019
For decades, organizations relied on traditional relational database management systems (RDBMS) to organize, store, and analyze their data. But then Facebook came along, and an RDBMS was suddenly not quite enough. The social giant needed a powerful database solution for its Inbox Search feature, and Apache Cassandra—a distributed NoSQL database—was born. Released as an open source project in July 2008, Cassandra—named after the mythological prophet who famously put a curse on an oracle—became an Apache Incubator project in March 2009. It graduated to a top-level project in February 2010
Tags : 
    
Datastax
Published By: Arbor Networks     Published Date: Jan 31, 2013
Because of the damage they cause and the bewildering speed with which they mutate, botnets are perceived as malevolent and unstoppable. Fortunately there are companies such as Arbor Networks, which are dedicated to analyzing and stopping botnets.
Tags : 
anatomy of a botnet, botnet, ddos, global basis, distributed denial of service, analyzing, service, arbor networks
    
Arbor Networks
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.