HIT Consultant Insightful coverage of healthcare innovation
 

enterprise design

Results 126 - 150 of 188Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: Oct 08, 2015
This document consolidates the enterprise campus network design and deployment guidelines with various best practices from multiple deeply focused Cisco Validated Design Guides. The best practices conclusions are derived from thorough solution-level end-to-end characterization of various levels of system types, network design alternatives, and enterprise applications.
Tags : 
cisco infrastructure, enterprise network, network design
    
Cisco
Published By: ServiceNow     Published Date: Oct 02, 2015
Only ServiceNow Express delivers all this as one enterprise-grade cloud service— designed to solve IT service management challenges for enterprises of all sizes. The 3 Pillars of IT Service Management Excellence arE: • Automated Request Management • Integrated Asset Tracking • Intuitive Reporting
Tags : 
    
ServiceNow
Published By: Cisco     Published Date: Aug 28, 2015
Enterprises are rapidly adopting cloud computing solutions in order to meet dynamically changing business requirements. These solutions are typically comprised of both private and public cloud deployments, resulting in the creation of hybrid clouds that are designed to rapidly scale up and down in response to user demands, and they provide the advantages of elastic computing economics.
Tags : 
cloud, hybrid, iot, public cloud
    
Cisco
Published By: Cisco     Published Date: Jul 30, 2015
This document consolidates the enterprise campus network design and deployment guidelines with various best practices from multiple deeply focused Cisco Validated Design Guides.
Tags : 
    
Cisco
Published By: Epicor     Published Date: Jun 22, 2015
If you’re like most corrugated packaging manufacturers, your company operates multiple plants where each plant uses a different enterprise resource planning (ERP) system. This arrangement of multiple ERP systems could be costing you valuable time and money and promoting inefficiencies such as manual data entry. Upgrading to a single ERP system designed for multi-plant operations can help you solve these issues and more. View this whitepaper for eight ways to improve efficiencies with a single ERP system designed for multi- plant operations
Tags : 
erp system, corrugated packaging manufacturers, business operations, manual data entry
    
Epicor
Published By: CA Technologies     Published Date: Jun 09, 2015
Freeform Dynamics Executive Briefing Guide - Orchestrating the DevOps Tool Chain: An enterprise-level approach to continuous delivery. Dale Vile says that business stakeholders are increasingly looking for faster and more frequent delivery of high-impact, high-quality output from IT teams. DevOps is an approach designed to enable the rapid and continuous delivery of value to the business to support the needs of the digital world, he adds. Open source software tools can help organizations adopt this DevOps approach but can cause efficiency, complexity and scalability issues, so Dale believes it is helpful to create a consistent orchestration layer using an enterprise class release automation solution.
Tags : 
    
CA Technologies
Published By: Riverbed     Published Date: Apr 24, 2015
This ENTERPRISE MANAGEMENT ASSOCIATES® (EMA™) whitepaper examines the scope of challenges for assuring web-based and SaaS application performance, and reviews a solution offered by Riverbed that is designed to meet these new requirements.
Tags : 
web-based applications, saas, enterprise-class applications, it management, user experience, cost efficiency and flexibility
    
Riverbed
Published By: HPE     Published Date: Mar 23, 2015
Get the facts about successfully integrating BYOD into your enterprise. Of all the obstacles standing in the way of building a better IT infrastructure, misinformation may be the most daunting. To help you separate the facts from the hype, the experts from HP Technology Consulting have created this informative eBook. It’s designed to provide the immediate insight you need to make the right decisions about some of the most important IT issues your enterprise will ever face.
Tags : 
    
HPE
Published By: Modis     Published Date: Mar 09, 2015
In the wake of the recent Sony data breach, customer and company privacy issues have become a hot topic in the media and the tech sector. The Sony incident and other widely covered consumer-facing data breaches experienced by Target, Home Depot, JPMorgan Chase and others have had a significant financial impact on these companies. Experts are projecting that both the number of incidents and the cost of dealing with data breaches will increase in 2015. To combat these attacks, businesses must respond with a heightened awareness of cybersecurity as well as increased spending on enterprise security as needed. Designating high level executives to lead security and hiring certified security experts are among the best practices for stronger IT security in 2015 and beyond. Download to learn more!
Tags : 
modis, security challenges, it spending, privacy concerns, cybersecurity, security experts, data breaches, consumer facing breaches
    
Modis
Published By: Okta     Published Date: Feb 24, 2015
This report outlines the future look of Forrester’s solution for security and risk (S&R) executives working on building an identity and access management strategy for the extended enterprise. We designed this report to help you understand and navigate the major business and IT trends affecting identity and access management (IAM) during the next five years. IAM in 2015 has become a tool not just for security but also for business agility. Competitive challenges push businesses into the cloud and encourage mobile device use even without full-fledged access controls in place.
Tags : 
identity and access management, security and risk, extended enterprise, it trends, business agility
    
Okta
Published By: MobileIron     Published Date: Feb 17, 2015
Agent-based security solutions such as anti-virus software rely on controlling all processes on a system. This approach breaks in sandboxed environments as one process cannot control other aspects of the system. To secure mobile, IT has to replace traditional PC management tools with purpose-built enterprise mobility management (EMM) Platforms, designed to enable end-user productivity while securing apps, content and devices.
Tags : 
mobile, open file architecture, mobileiron, security, sandboxed
    
MobileIron
Published By: HP     Published Date: Feb 02, 2015
HP Converged System 700 offers the opportunity for enterprise organizations to drastically increase their IT and user productivity at a significantly lower TCO compared with alternative infrastructure virtualization approaches. This ESG white paper presents a detailed economic analysis for HP Converged System 700, is designed to provide potential customers with a comprehensive picture of the potential direct and indirect cost and benefit drivers they should consider when evaluating a HP Converged System 700 investment.
Tags : 
    
HP
Published By: Exablox     Published Date: Jan 27, 2015
Object-based storage (referred to as OBS throughout this document) platforms continue to perpetuate cloud and enterprise IT infrastructure. As businesses move toward petabyte-scale data storage, OBS solutions are turning out to be the right choice for balancing scale, complexity, and costs. By way of their core design principles, OBS platforms deliver unprecedented scale at reduced complexity and reduced costs over the long term. Early OBS platforms suffered from "necessity crisis," were too cumbersome to deploy and, in some cases, caused a platform lock-in because of their proprietary access mechanisms. In spite of their from-the-ground-up design, a departure from how traditional SAN and NAS arrays are deployed and, more importantly, a lack of standard interfaces made it difficult for IT organizations to deploy OBS solutions in the infrastructure. Thanks to Amazon S3 and OpenStack Swift becoming de facto access interfaces, this situation has changed.
Tags : 
network attached storage, nas arrays, storage efficiency, idc storage marketscape, storage data resiliency, storage platform scalability, exablox, oneblox
    
Exablox
Published By: Cisco     Published Date: Jan 20, 2015
The current evolution of computing is prompting enterprise datacenters and their associated networks to adopt new approaches. The four pillars of computing — cloud, mobility, social, and analytics — are now the key trends driving new levels of network innovation that will determine the design and operation of datacenter networks over the next several years.
Tags : 
datacenter, optimization, computing, enterprise, scalability, network, orchestration, innovation, cloud, mobility, social, analytics
    
Cisco
Published By: Intralinks     Published Date: Jan 16, 2015
In their newly released report, “On the Radar: Intralinks,” MWD Advisors probes 10 key questions about how Intralinks VIA™ supports workforce mobility by giving organizations the controls to manage and secure business data, wherever it goes. This On the Radar briefing note follows a simple “ten questions” format, designed to provide a concise but thorough overview of a company and its products and services, answering the simple questions like: “Why is it interesting?” “What’s Next?” “Should I consider it?” You’ll learn how organizations should consider the benefits of an enterprise- grade content collaboration solution that’s designed to embrace workforce mobility “but with the security of administrative controls that make it much easier to manage that collaboration and maintain an audit trail.” Download the MWD report and find out why Intralinks VIA “…keep[s] IT and compliance officers happy, while not cramping end users’ mobility.”
Tags : 
workforce mobility, manage and secure, business data, enterprise, collaboration solution
    
Intralinks
Published By: Cisco     Published Date: Jan 15, 2015
The current evolution of computing is prompting enterprise datacenters and their associated networks to adopt new approaches. The four pillars of computing — cloud, mobility, social, and analytics — are now the key trends driving new levels of network innovation that will determine the design and operation of datacenter networks over the next several years.
Tags : 
firewall, next generation, networks, computing, cloud, innovation, enterprise, datacenter, social, analytics
    
Cisco
Published By: IBM     Published Date: Jan 09, 2015
To help enterprises create trusted insight as the volume, velocity and variety of data continue to explode, IBM offers several solutions designed to help organizations uncover previously unavailable insights and use them to support and inform decisions across the business. Combining the power of IBM® InfoSphere® Master Data Management (MDM) with the IBM big data portfolio creates a valuable connection: big data technology can supply insights to MDM, and MDM can supply master data definitions to big data.
Tags : 
big data, mdm, client analytics, real-time analysis
    
IBM
Published By: Cisco     Published Date: Jan 05, 2015
The data center is central to IT strategy and houses the computational power, storage resources, and applications necessary to support an enterprise business. A flexible data center infrastructure than can support and quickly deploy new applications can result in significant competitive advantage, but designing such a data center requires solid initial planning and thoughtful consideration of port density, access-layer uplink bandwidth, true server capacity, oversubscription, mobility, and other details.
Tags : 
data center, consolidation, server virtualization, new applications
    
Cisco
Published By: Cisco     Published Date: Jan 05, 2015
Enterprises are rapidly adopting cloud computing solutions in order to meet dynamically changing business requirements. These solutions are typically comprised of both private and public cloud deployments, resulting in the creation of hybrid clouds that are designed to rapidly scale up and down in response to user demands, and they provide the advantages of elastic computing economics. In order to benefit from this environment, businesses need to connect with these hybrid clouds more easily from their heterogeneous bases, and balance the need for compliance and control against the need to rapidly innovate and the ability to scale as required. This presents a complex integration challenge for IT organizations. As a result, they increasingly find themselves brokering cloud services as opposed to creating an all-private cloud environment.
Tags : 
the cloud, cloud computing, transitioning
    
Cisco
Published By: Cisco     Published Date: Jan 05, 2015
The current evolution of computing is prompting enterprise datacenters and their associated networks to adopt new approaches. The four pillars of computing — cloud, mobility, social, and analytics — are now the key trends driving new levels of network innovation that will determine the design and operation of datacenter networks over the next several years.
Tags : 
cloud computing, infrastructure, marketplace, application, hybrid, enterprise
    
Cisco
Published By: VMware, Inc     Published Date: Oct 30, 2014
VMware® delivers vCloud® Government Service, provided by Carpathia®, an enterprise class hybrid cloud solution where both onsite and offsite IT environments are not just connected and integrated with common management, but are designed to run existing and new applications in exactly the same way. With vCloud Government Service, government customers don’t have to spend cycles adapting to the cloud and rewriting code; instead, they can focus on leveraging what the cloud brings to deliver value to their branch of government or mission responsibilities. Customers can securely extend their data centers to the cloud rapidly, easily and confidently, using a more supportive and integrated cloud infrastructure that is FedRAMP authorized.
Tags : 
hybrid cloud, government agencies, it environments, cloud infrastructure
    
VMware, Inc
Published By: GeoTrust     Published Date: Oct 06, 2014
"The business and security benefits of GeoTrust Enterprise Security Center IT departments face a range of issues—some obvious, some more subtle—when dealing with SSL certificates. These issues can have serious business and security consequences. GeoTrust Enterprise Security Center was designed with customer input to address these problems."
Tags : 
security center, it departments, ssl certificates, security consequences, customer input, manage
    
GeoTrust
Published By: IBM     Published Date: Oct 01, 2014
To help enterprises create trusted insight as the volume, velocity and variety of data continue to explode, IBM offers several solutions designed to help organizations uncover previously unavailable insights and use them to support and inform decisions across the business. Combining the power of IBM® InfoSphere® Master Data Management (MDM) with the IBM big data portfolio creates a valuable connection: big data technology can supply insights to MDM, and MDM can supply master data definitions to big data.
Tags : 
mdm, big data, master data, data solutions
    
IBM
Published By: HP     Published Date: Oct 01, 2014
Enterprises look to private clouds for more than just virtual infrastructure provisioning. Private cloud vendors have started to bundle additional capabilities into their solutions, including pervasive VM management capabilities, design tools for complex application templates, and service catalogs. Over the next 12 months, more than half of enterprises will prioritize building internal private clouds. Today, the most common approach is through the purchase of commercial software to layer atop existing infrastructure resources. Regardless of the approach you choose, there’s no shortage of tools to support your efforts.
Tags : 
wave, private, cloud, solutions, application, templates, catalogs, services, capabilities, complex, infrastructure, virtual, private, management, pervasive, tools
    
HP
Published By: MobileIron     Published Date: Sep 22, 2014
Agent-based security solutions such as anti-virus software rely on controlling all processes on a system. This approach breaks in sandboxed environments as one process cannot control other aspects of the system. To secure mobile, IT has to replace traditional PC management tools with purpose-built enterprise mobility management (EMM) Platforms, designed to enable end-user productivity while securing apps, content and devices.
Tags : 
mobile security, mobile first era, mobile operating systems, agent-based security, emm platforms, user productivity
    
MobileIron
Start   Previous    1 2 3 4 5 6 7 8    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.