HIT Consultant Insightful coverage of healthcare innovation
 

end users

Results 376 - 400 of 486Sort Results By: Published Date | Title | Company Name
Published By: SAS     Published Date: Nov 16, 2018
Instances of fraud have become commonplace in many industries, and it’s costing organizations millions of dollars annually and placing corporate brands at risk. But despite significant investments in staff and anti-fraud software, new and emerging fraud threats keep slipping through undetected. Why? Because it’s too costly to keep anti-fraud software current. Paying a vendor to make software changes dramatically increases total cost of ownership. This paper discusses how SAS addresses this challenge with next-generation fraud solutions like SAS Visual Investigator, a cloud-ready investigation and incident management platform that end users can easily configure and adapt to detect new and evolving types of fraud.
Tags : 
    
SAS
Published By: Cisco     Published Date: Nov 17, 2014
Modern data centers have and continue to undergo transformation. Driven by familiar trends, green IT, endpoint growth, externalization, and increased resource requirements, modern data centers support more services, users, and data than ever before. The potential of new risks to the modern data center demands renewed attention to data center security. Data center architects must build in proper security controls, and policies and processes to address and mitigate these new risks.
Tags : 
endpoint proliferation, ids, ips, externalization, cisco
    
Cisco
Published By: Cisco     Published Date: Feb 17, 2015
The Cisco 2015 Annual Security Report, which presents the research, insights, and perspectives provided by Cisco® Security Research and other security experts within Cisco, explores the ongoing race between attackers and defenders, and how users are becoming everweaker links in the security chain.
Tags : 
cisco, security, report, 2015, threat, intelligence, capabilities, benchmark, trends, cyber security, geopolitical, corporate, vulnerabilities, risk, spam, cybercrime, data, encryption, privacy, compatibility
    
Cisco
Published By: GFI     Published Date: Sep 18, 2012
Decreasing budgets, an increasingly mobile workforce, limited staff, time constraints, a growing dependence on e-solutions - you face unique challenges as an IT professional. And you can't afford to disrupt your end users or clientele to implement security solution after security solution. That's where the IT Security Kit comes in. This handy kit provides everything you need to quickly and easily find the antivirus product that's manageable, reliable, cost-effective and just right for your organization.
Tags : 
technology, security, it security, antivirus, antispam, virus detection
    
GFI
Published By: BlackBerry     Published Date: Mar 12, 2013
BlackBerry® 10 is an entirely new mobile computing platform that removes many of the barriers that slow down other devices. Here are just a few of the reasons end users love BlackBerry 10.
Tags : 
reasons to love blackberry 10, reasons end users, efficiently and effortless, blackberry 10, mobile devices
    
BlackBerry
Published By: AppSense     Published Date: Nov 26, 2012
This case study demonstrates how AppSense Application Manager is transparent to end-users, unobtrusive for administrators, and requires extremely little administration.
Tags : 
user experience, end-point users, appsense, application management, application manager, desktop security, end user experience
    
AppSense
Published By: AppSense     Published Date: Nov 26, 2012
Read how AppSense Application Manager provides the only URM solution that dynamically controls end-user rights with surgical precision, providing users with the rights they need while increasing security and reducing IT costs.
Tags : 
user rights management, appsense, desktop security, windows optimization, it service requests, secure apps, user productivity, rights management
    
AppSense
Published By: OutSystems     Published Date: Jul 15, 2014
Anyone with a mobile device these days knows all about the seemingly never-ending procession of new applications for smartphones, tablets and anything else people can carry in their pockets, purses or bags. And while apps are extremely popular, there’s also been failure with millions of attempts to build mobile applications for both business and consumer use. How can the mistakes be avoided? We asked several experts in the eld to outline some of the top pitfalls of mobile application development and how teams can avoid them to build a useful, innovative app that enables and empowers as many potential end-users as possible.
Tags : 
outsystems, applications, strategic business, innovation, app development, mobile
    
OutSystems
Published By: nlyte Software     Published Date: Sep 30, 2014
This new Gartner report reviews 17 vendors of Data Center Infrastructure Management (DCIM) solutions. Based on its own expert analysis and backed up by in-depth interviews with users in the space, Gartner has just published the Magic Quadrant for Data Center Infrastructure Management Tools for the first time.
Tags : 
nlyte software, nlyte, data center, data center infrastructure, gartner report, infrastructure management
    
nlyte Software
Published By: IBM     Published Date: Jan 02, 2014
Buy-and-hold strategies can actually add costs to the datacenter, as systems age in place. Not only do hardware maintenance and software maintenance fees rise, over time – but the aging of applications also costs the organization money. Investing in a transition from POWER5 to POWER7 resulted in a return on investment (ROI) of more than 150 percent over three years.An insightful and and compelling discussion by IDC that reviews the primary reason for maintaining current systems -- Return on Investment. IDC studied IBM Power Systems sites that remained on the POWER5 platform long after its initial introduction in 2004. When comparisons to the succeeding generation of POWER7 are made, customers have found that the increase in scalability and performance of POWER7 systems, combined with a reduction in server "footprint" size and overall electrical requirements, resulted in significant reductions in ongoing costs, or opex, per 100 end users supported.
Tags : 
ibm, idc, server transition, server alternatives, business value, operating costs, hardware platforms, server life cycles, hardware maintenance, software maintenance, application costs, modernization, business continuity, power5, power7, leveraging technology, it managers, it infrastructure, technology replacement cycle, data center
    
IBM
Published By: Cisco     Published Date: Apr 10, 2015
This document is a Cisco Validated Design (CVD) for Cisco Connected Mobile Experience (CMX) Solutions. It presents system-level requirements, recommendations, guidelines, and best practices for detecting, connecting, and engaging mobile users within your venue and leveraging your Wi-Fi network to fit your business needs. As Cisco continues to develop and enhance the technologies required to implement a CMX solution, this CVD will evolve and be updated to provide the latest guidelines, recommendations, and best practices for designing and deploying a CMX solution.
Tags : 
cisco, design, network architecture, mobile devices, best practices, wifi, wlan, wan, cmx
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
There is a tendency to discount the network as just simple plumbing, to think that all you have to consider is the size and the length of the pipes or the speeds and feeds of the links, and to dismiss the rest as unimportant. Just as the plumbing in a large stadium or high rise has to be designed for scale, purpose, redundancy, protection from tampering or denial of operation, and the capacity to handle peak loads, the network requires similar consideration. As users depend on the network to access the majority of the information they need to do their jobs and to transport their voice or video with reliability, the network must be able to provide resilient, intelligent transport.
Tags : 
    
Cisco
Published By: Polycom     Published Date: Aug 16, 2017
"Effective, engaging collaboration that leverages video conferencing should incorporate features like content sharing, clear participant rosters, easy call management controls and Instant Messaging. But, according to Microsoft research, some 97 percent of meeting rooms aren’t adequately equipped to handle video. In fact, a majority of these rooms host the most rudimentary of collaboration solutions like a digital projector and an audio connection for conference calls. And, while most of these enterprises are adopting Skype for Business for end-users, the reality is that many of their conference rooms lack the ability to connect to Skype for Business calls, which eliminates effective collaboration tools like video and content sharing. Download this guide to see how to create engaging voice and video meeting experience with Skype for Business."
Tags : 
polycom, skype for business, voice, video, microsoft
    
Polycom
Published By: Polycom     Published Date: Nov 30, 2017
Effective, engaging collaboration that leverages video conferencing should incorporate features like content sharing, clear participant rosters, easy call management controls and Instant Messaging. But, according to Microsoft research, some 97 percent of meeting rooms aren’t adequately equipped to handle video. In fact, a majority of these rooms host the most rudimentary of collaboration solutions like a digital projector and an audio connection for conference calls. And, while most of these enterprises are adopting Skype for Business for end-users, the reality is that many of their conference rooms lack the ability to connect to Skype for Business calls, which eliminates effective collaboration tools like video and content sharing. Download this guide to see how to create engaging voice and video meeting experience with Skype for Business.
Tags : 
skype for business, collaboration, video conferencing, content sharing, call management controls, microsoft office 365
    
Polycom
Published By: cPacket Networks     Published Date: Oct 02, 2014
The modern applications delivery environment is distributed and dependent on data centers and network connectivity. Therefore, users are increasingly dependent on consistent network performance for day-to-day activities. Learn what pitfalls a business should avoid when implementing a network monitoring solution.
Tags : 
cpacket, cpacket networks, data center, network intelligence, network performance, application delivery, cloud computing, cloud network
    
cPacket Networks
Published By: Symantec     Published Date: Oct 20, 2014
Symantec ApplicationHA helps you create a resilient VMware environment to deliver effective business services to your end users with virtual machine restart as well as application level monitoring and restart. ApplicationHA is fully compatible with your existing tools such as VMware High Availability, vMotion, FT, DRS and SRM.
Tags : 
symantec, vmware, business applications, apm, virtualization
    
Symantec
Published By: Appcito     Published Date: Apr 09, 2015
Appcito CAFE (Cloud Application Front End) is an easy-to-deploy, uni?ed and cloud-native service enabling cloud application teams to select and deploy enterprise-grade L4 to L7 application network services. The multi-cloud CAFE service is available for the OpenStack open-source cloud computing software platform. OpenStack is a multivendor ecosystem used to deploy Infrastructure-as-a-Service (IaaS) solutions. It allows users to bring compute, storage, and networking resources into private and public clouds through a set of open APIs.
Tags : 
openstack, cloud applications, load balancing, application security, cloud application delivery
    
Appcito
Published By: BlackBerry Cylance     Published Date: Mar 12, 2019
Today’s advanced cyber threats target every computer and mobile device, including enterprise endpoints, especially those that make up critical infrastructure like industrial control systems and embedded devices that control much of our physical world. The modern computing landscape consists of a complex array of physical, mobile, cloud, and virtual computing, creating a vast attack surface. Meanwhile, the cybersecurity industry is prolific with defense-in-depth security technologies, despite a threat landscape that remains highly dynamic, sophisticated, and automated. Cylance, however, takes a unique and innovative approach of using real-time, mathematical, and machine learning threat analysis to solve this problem at the endpoint for organizations, governments, and end-users worldwide.
Tags : 
    
BlackBerry Cylance
Published By: IBM     Published Date: Jul 08, 2015
To meet the business imperative for enterprise integration and stay competitive, companies must manage the increasing variety, volume and velocity of new data pouring into their systems from an ever-expanding number of sources. They need to bring all their corporate data together, deliver it to end users as quickly as possible to maximize its value, and integrate it at a more granular level than ever before—focusing on the individual transaction level, rather than on general summary data. As data volumes continue to explode, clients must take advantage of a fully scalable information integration architecture that supports any type of data integration technique such as ETL, ELT (also known as ETL Pushdown), data replication or data virtualization. Read this new whitepaper to learn about the seven essential elements needed to achieve the highest performance.
Tags : 
    
IBM
Published By: VMware AirWatch     Published Date: May 18, 2016
VMware AirWatch gives enterprises identity, productivity and collaboration solutions through enterprise mobility management. The VMware AirWatch platform gives end users a seamless digital workspace, so they can be more effective on the go. A future-proof mobility platform enables IT to support business initiatives now and in the future with features: • Broadest OS and device support with same-day updates • Unified identity management framework across solutions • Suite of integrated productivity and collaboration apps • Centralized content management and collaboration • Global scalability with multi-tenant framework AirWatch offers a unique vision for identity, mobile, network and Infrastructure that is trusted by more than 16,000+ organizations, including 500 of the Global 2000, and has been positioned as a leader by Gartner in the 2015 Magic Quadrant for Enterprise
Tags : 
productivity, best practices, business intelligence, business management, information technology, device support, device management, content management
    
VMware AirWatch
Published By: VMware     Published Date: Dec 27, 2016
In this 60-minute webinar, discover how VMware AirWatch®, the world’s leader in Enterprise Mobility Management, enables end users with a digital workspace and empowers IT with a unified and secure mobility platform. Recently recognized as the leader in the 2016 Gartner Magic Quadrant for Enterprise Mobility Management for the sixth consecutive year, VMware AirWatch is at the forefront of the Enterprise Mobility Management space. Watch now to learn more about our comprehensive Enterprise Mobility Management platform and the VMware AirWatch solutions.
Tags : 
    
VMware
Published By: VMware     Published Date: Dec 27, 2016
With Windows 10, Microsoft brings to market a mobile and cloud-ready OS that is poised to have a significant impact on organizations’ end user computing (EUC) strategy. The modern OS offers a unified platform for building apps and extending the organization’s core processes to end users anywhere and using any Windows 10-powered device. However, enterprise wide execution of this business mobility vision comes with its own set of challenges. A 2015 VMware study involving 1,000+ IT decision makers identified the following top concerns for adoption of mobility initiatives: Reduce the overall cost and complexity of management Ensure security and control of devices at all times Minimize the risk of corporate data loss With a unified endpoint management vision, VMware AirWatch® is strategically positioned to address these challenges. AirWatch's EUC solution enables organizations to fully capitalize on their mobility initiatives and IT departments to redefine themselves as true business enab
Tags : 
    
VMware
Published By: SAS     Published Date: May 12, 2016
This paper examines the barriers to adoption from an IT and end-user perspective, and shows how self-service analytics in general – and SAS Visual Analytics in particular – can eliminate these barriers. Self-service analytics empowers users to truly exploit the wealth of data available to them, while ensuring that the IT organization maintains governance and control over that data.
Tags : 
sas, business analytics, it organization
    
SAS
Published By: SAS     Published Date: Apr 25, 2017
Organizations in pursuit of data-driven goals are seeking to extend and expand business intelligence (BI) and analytics to more users and functions. Users want to tap new data sources, including Hadoop files. However, organizations are feeling pain because as the data becomes more challenging, data preparation processes are getting longer, more complex, and more inefficient. They also demand too much IT involvement. New technology solutions and practices are providing alternatives that increase self-service data preparation, address inefficiencies, and make it easier to work with Hadoop data lakes. This report will examine organizations’ challenges with data preparation and discuss technologies and best practices for making improvements.
Tags : 
    
SAS
Published By: LifeSize, a division of Logitech     Published Date: Jul 07, 2014
Cisco and Polycom are expensive, on-premises solutions that take weeks to deploy. They require large, ongoing investments to manage them and do not offer a cloud service. How much time and how many resources do you have to spend training and supporting users to work with your Cisco or Polycom solution? Don’t be fooled by packaging. Their solutions are still complex, on-premises hardware that require a team of IT specialists to support and lack the flexibility for you to grow at your own pace. For a price similar to that of your infrastructure software maintenance, you can use Lifesize Cloud and skip the high cost and complexity of Cisco’s or Polycom’s on-premises infrastructure.
Tags : 
lifesize, on-premise solutions, cloud service, software, infrastructure, maintenance
    
LifeSize, a division of Logitech
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.