HIT Consultant Insightful coverage of healthcare innovation
 

erp environment

Results 376 - 400 of 440Sort Results By: Published Date | Title | Company Name
Published By: OpenText     Published Date: May 15, 2012
Featured in SharePoint Pro magazine online, the OpenText white paper Extending SharePoint Across Your Information Architecture, by leading SharePoint consultant Colin Spence, offers valuable insights and best practices for integrating SharePoint with your full enterprise application environment.
Tags : 
opentext, sharepoint, technology, buesiness, business information, it management, data quality
    
OpenText
Published By: Sybase     Published Date: May 10, 2012
Sybase's Adaptive ServerŽ Enterprise (ASE) is a high performance relational database management system for mission-critical, data intensive environments that has been meeting these needs for nearly three decades.
Tags : 
adaptive server enterprise, sybase database management system, database management, database management software, database management and software, database management system, database management system software, database management program, database management programs, relational database management system, relational database management systems, data base manag
    
Sybase
Published By: Intel Corp.     Published Date: Apr 25, 2012
Explore Intel's best practices for managing cloud storage environments to create business value inside an enterprise private cloud environment.
Tags : 
cloud, storage, metrics, cloud storage, intel, value, enterprise, private cloud
    
Intel Corp.
Published By: IBM MidMarket Demand Generation     Published Date: Apr 09, 2012
IDC studied a group of enterprises that had deployed SAP applications on IBM Power Systems servers running Linux server operating environments and had been working with those systems for several years.
Tags : 
ibm, technology, sap, tecnology product, linux server, technology platform
    
IBM MidMarket Demand Generation
Published By: Port25 Solutions     Published Date: Mar 09, 2012
Today's enterprise environments need fast, reliable and immediate execution of email messaging flow. And to successfully achieve greater deliverability, proven technologies need to be in place to optimize the messaging infrastructure.
Tags : 
smtp server, mta, email server, mail server, email infrastructure, enterprise software, email delivery, email reporting, bounce categorization, message transfer agent
    
Port25 Solutions
Published By: Texas Memory Systems     Published Date: Feb 25, 2012
For data centers looking to get the maximum performance from Flash-based storage supporting their virtual infrastructure, the RamSan-720 should be given strong consideration.
Tags : 
ramsan-720, integrated ssd, ssd, virtual server, infrastructure, desktop infrastructure, server virtualization, desktop virtualization, architecture, design, zero-latency, retrieval, solid state storage, bandwidth, high bandwidth, flash controllers, applications, data warehousing, tbs, tb capacity
    
Texas Memory Systems
Published By: CyrusOne     Published Date: Jan 19, 2012
Today's enterprises increasingly occupy the cloud. As in nature, the IT cloud needs a sky in which to live. That environment is colocation-read more!
Tags : 
colocation, cloud, infrastructure, data centers, data center planning, cyrusone, cyrus one, data center, texas, infrastructure, capacity, planning, colocation, scablability, costs, demand, data storage, backup, cyrus 1, houston
    
CyrusOne
Published By: Red Hat     Published Date: Jan 01, 2012
A world-leading web content management and customer experience management system built its capabilities on the Ixonos Elastic Cloud – which is based on the Red Hat software stack, including value-rich Red Hat Enterprise Linux. Learn how Red Hat Enterprise Linux offered a stable, flexible environment for cloud deployments.
Tags : 
ixonos elastic cloud, software stack, red hat, ez systems, linux, cloud deployments
    
Red Hat
Published By: Kofax     Published Date: Sep 08, 2011
The Kofax enterprise capture platform offers unmatched scalability from centralized to highly distributed environments, from individual desktops to enterprise deployments and from basic archival scanning to powerful document classification and separation and data extraction. The company's market leading technology supports a wide variety of input devices and line of business applications, providing a strong enterprise-wide platform on which to standardize document driven processes.
Tags : 
kofax ktm, transformation modules, capture, vrs, scan to process, enterprise capture, customer-centric, automated document classification, metadata extraction, new account applications, mfps, loan and mortgage processing, sap, funds processing, credit card application processing, swift format, icr, ocr, omr, automatically index
    
Kofax
Published By: HP and IntelŽ XeonŽ processors     Published Date: Sep 06, 2011
Read this report to better understand the unique file-based storage challenges these organizations face and possible solutions for overcoming them to achieve maximum ROI.
Tags : 
hp + intel, information assets, content driven enterprise, archiving, storage solutions, large content environments
    
HP and IntelŽ XeonŽ processors
Published By: Entrust Datacard     Published Date: Aug 03, 2011
Whether it's a smartcard for physical and logical access, soft tokens on a mobile device, or a unique grid card for strong authentication to a VPN, organizations can consolidate all authentication processes with a single, proven solution.
Tags : 
digital certificate, digital certificates, pki, pki security, two factor authentication, encryption software, multi factor authentication, public key infrastructure, 4g iphone, iphone jail break, jail break iphone, iphone jailbreak, jailbreak, iphone
    
Entrust Datacard
Published By: IBM Cloud Business     Published Date: Jul 12, 2011
IT Managers: Reduce costs with enterprise ready environments. Take advantage of easy and flexible onboarding for business-ready virtual servers. Rapidly improve project set up and shorten development times. Find out how.
Tags : 
cloud computing, desktop virtualization, hardware, ibm corp., security
    
IBM Cloud Business
Published By: EMC Corporation     Published Date: May 27, 2011
This ESG white paper confirms that momentum continues to build around server virtualization. Learn about an in-depth survey of 463 senior IT professionals in both large midmarket and enterprise-class organizations in North America and resulting trends.
Tags : 
enterprise strategy group, esg, emc, backup and recovery, enterprise applications, vmware, mark bowker, david a. chapa, server virtualization, data protection, availability, deduplication, avamar 6.0, vce, virtual computing environment
    
EMC Corporation
Published By: Red Hat     Published Date: Apr 18, 2011
Learn how to build a private cloud that makes use of technologies you already own while proceeding at your own pace and still maintaining strategic flexibility for the future by using infrastructure products that provide an enterprise-class environment consistently across bare metal, virtualized servers, private clouds, and public clouds.
Tags : 
red hat, on-demand webinar, private cloud, virtualized server, cloud computing, virtualization
    
Red Hat
Published By: Red Hat     Published Date: Jan 21, 2011
Gordon Haff - Senior Cloud Product Manager, Red Hat You can build a private cloud today in an evolutionary way that makes use of and integrates with technologies that you already own. Proceed at your own pace and maintain strategic flexibility for the future using infrastructure products that provide a robust, enterprise-class environment that is consistent across bare metal, virtualized servers, private clouds, and public clouds. The steps are all thoroughly documented in a reference architecture, and can be augmented with additional Red Hat products and services as needed. In this session, Gordon Haff will take you through the steps.
Tags : 
red hat virtual tradeshow, live event, private cloud, virtualization, enterprise software, virtualized server
    
Red Hat
Published By: Red Hat     Published Date: Jan 21, 2011
Daniel Walsh - Principal Software Engineer, Red Hat In this session, Daniel Walsh will show attendees new SELinux features and explain how to use them in Red Hat Enterprise Linux 6. He will cover several SELinux topics, including: * Confining users * Securing your virtual environment * Securing the desktop * Controlling grid jobs * Sandboxing: putting the power into the hands of the administrator * Building and shipping your own SELinux policy
Tags : 
red hat virtual tradeshow, live event, enterprise linux 6, security, desktop, selinux, virtual environment
    
Red Hat
Published By: Citrix Online     Published Date: Nov 17, 2010
This report documents hands-­-on testing of server virtualization technology from Citrix with a focus on manageability, consolidation, and cost effectiveness.
Tags : 
citrix xenserver, enterprise data center, server virtualization, consolidation, cloud computing environment, xencenter management console
    
Citrix Online
Published By: IBM     Published Date: Aug 30, 2010
All enterprises dealing with private data in test environments should mask or generate test data to comply with regulations such as Payment Card Industry (PCI), the Health Insurance Portability and Accountability Act (HIPAA), Sarbanes-Oxley (SOX), and European Union (EU) as well as to protect against internal and external attacks.
Tags : 
ibm, test data privacy, compliance, data masking, payment card industry, pci, security, database
    
IBM
Published By: Savvis     Published Date: Jul 07, 2010
This paper describes the Symphony VPDC enterprise-grade infrastructure service that provides true high availability enterprise IT environments, supporting development to production, with automated provisioning of servers, network, storage, software and security.
Tags : 
savvis, virtual private data center, cloud computing, virtualization, vpdc, hosting management service
    
Savvis
Published By: Savvis     Published Date: Jul 07, 2010
Savvis Symphony Dedicated and Open offer enterprises a compelling opportunity to reshape their hosting environment to a more scalable and cost-efficient operating model without sacrificing security or performance.
Tags : 
savvis symphony dedicated, virtualization, cloud computing, infrastructure
    
Savvis
Published By: IBM     Published Date: Jun 22, 2010
Learn how the IBM WebSphere Portal can help extend the value of your System z platform to the web. Download this free white paper from IBM today!
Tags : 
ibm websphere, system z, mainframe, ibm, web 2.0
    
IBM
Published By: IBM     Published Date: Feb 03, 2010
A recent IBM CEO study revealed innovation, along with global integration and a disruptive business model, to be among the key traits of the Enterprise of the Future.1 As to how that innovation will take place-CEOs include collaboration and the use of Web 2.0 tools at the top of the list.
Tags : 
ibm ep, empowering people, web 2.0, enterprise software, social networking environment, roi
    
IBM
Published By: Ounce Labs, an IBM Company     Published Date: Jan 26, 2010
A range of application security tools was developed to support the efforts to secure the enterprise from the threat posed by insecure applications. But in the ever-changing landscape of application security, how does an organization choose the right set of tools to mitigate the risks their applications pose to their environment? Equally important, how, when, and by whom are these tools used most effectively?
Tags : 
owasp, ounce wagner, csrf, xss, cross-site scripting, sql, security management strategy, source code analysis, web application firewalls, web application scanner
    
Ounce Labs, an IBM Company
Published By: BMC Control M     Published Date: Sep 15, 2009
This paper, from industry analyst firm Enterprise Management Associates, explores how workload automation can help IT reduce outages, consolidate vendors, improve integration, and cut costs. Learn more. Download the white paper, "IT Automation: Going Beyond the Obvious to Find Real Cost Savings."
Tags : 
bmc control-m, enterprise management associates, workload automation, wla, peoplesoft, sap, oracle, as/400, openvms, extract-transfer-load, etl, business service managemen, bsm, service level managemen, slm, mainframe, windows, unix, linux, custom applications
    
BMC Control M
Published By: Bocada     Published Date: Aug 21, 2009
Today, the common approach to collecting information about computing activity across the enterprise is to use software agents installed on individual clients and servers. However, when this approach is applied to data protection management in the enterprise environment, it has proven both ineffective and inefficient.
Tags : 
data protection, network security, software agent, agentless, bocata, bocada
    
Bocada
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.