HIT Consultant Insightful coverage of healthcare innovation
 

fix

Results 76 - 100 of 289Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Apr 20, 2017
IBM QRadar and BigFix solutions empower IT security teams to view, prioritize and respond to endpoint intelligence in near real time. How can an organization stay ahead of these advanced security threats? Maintaining a high level of baseline security by consistently enforcing security policies and patch levels on endpoints and servers is definitely required and important. But when networks can have multiple vulnerabilities per IP address at scan time, the slow process of mitigating and patching these weaknesses can result in dangerous security gaps. Today’s IT personnel have to make difficult, risk-based decisions on where to focus their efforts—often without having a complete picture of the security environment. This is even more critical when the number of vulnerabilities across the organization is increasing while the organization has limited resources and skills to fix the vulnerabilities.
Tags : 
risk management, vulnerability management, asset security, database accuracy, enterprise security, security solutions
    
IBM
Published By: IBM     Published Date: Apr 24, 2017
IBM QRadar and BigFix solutions empower IT security teams to view, prioritize and respond to endpoint intelligence in near real time. How can an organization stay ahead of these advanced security threats? Maintaining a high level of baseline security by consistently enforcing security policies and patch levels on endpoints and servers is definitely required and important. But when networks can have multiple vulnerabilities per IP address at scan time, the slow process of mitigating and patching these weaknesses can result in dangerous security gaps. Today’s IT personnel have to make difficult, risk-based decisions on where to focus their efforts—often without having a complete picture of the security environment. This is even more critical when the number of vulnerabilities across the organization is increasing while the organization has limited resources and skills to fix the vulnerabilities.
Tags : 
risk management, vulnerability management, asset security, database accuracy, enterprise security, security solutions
    
IBM
Published By: Cyphort     Published Date: Jun 28, 2016
Thanks to its convenience, online shopping has become a major trend over the last few years and lets face it, it’s here to stay. With the rise of online shopping, marketing experts capitalized on this new avenue to advertise their products. Now your friends nudge you on Facebook to buy a product they love and Google suggests a friendly place across the street where you can get your car fixed. It’s become hard to browse even a few pages without running into an ad and because of this increases, malware experts also saw a new avenue of attack - Malvertising.
Tags : 
downloads, best practices, network management, solutions, technology, advertising
    
Cyphort
Published By: Yext     Published Date: May 21, 2013
The paper will show every dealership the most common data location problems. It will explain why these problems need to be fixed and then show you the best strategies to fix them.
Tags : 
advertising, marketing, location, listings, maps, directories, yext, business
    
Yext
Published By: Yext     Published Date: May 21, 2013
The paper will show every doctors office the most common data location problems. It will explain why these problems need to be fixed and then show you the best strategies to fix them.
Tags : 
advertising, marketing, location, listings, maps, directories, yext, business
    
Yext
Published By: Yext     Published Date: May 21, 2013
The paper will show every law firm the most common data location problems. It will explain why these problems need to be fixed and then show you the best strategies to fix them.
Tags : 
advertising, marketing, location, listings, maps, directories, yext, business
    
Yext
Published By: Kenexa     Published Date: Aug 31, 2011
This white paper outlines the role compensation has in a company's ability to attract and retain the best talent.
Tags : 
kenexa, compensation, fixed pay, variable pay, market pay, market pricing, pay structures, salary surveys
    
Kenexa
Published By: StreamSets     Published Date: Sep 24, 2018
Imagine you’re running a factory but without a supply chain management system or industrial controls. Instead, you expect your customers to find and fix your delivery and quality problems. Sound ludicrous? Well, in many enterprises that’s the current “supply chain management” process for big and fast data. It relies on the lightly monitored dumping of unsanitized data into a data lake or cloud store, forcing data scientists and business users to deal with failures from data availability and accuracy issues.
Tags : 
dataflow, operations, factory, industrial
    
StreamSets
Published By: Qualys     Published Date: Jan 08, 2015
Imagine putting first responders on your operational team instantly on alert about new network vulnerabilities – and how to fix them? This capability is called “continuous monitoring” (CM) and a new guide from Qualys shows you how it can dramatically boost security of your network. Learn how CM provides you with an always-on view of potential security holes. The guide explains how using CM is a vital step toward achieving continuous security of your network – the Holy Grail for every network security manager! In the guide, you will learn how to automatically leverage vulnerability scans with CM for stronger security. Continuous Monitoring: A New Approach to Proactively Protecting Your Global Perimeter offers an easy blueprint for using automation to achieve continuous security and compliance. Download the guide now to learn more about CM: Requirements—why CM is vital Scanning—value of continuous vulnerability scans Best Practices—for using CM Benefits—examples of how CM improves se
Tags : 
continuous monitoring, network security, vulnerability, best practices
    
Qualys
Published By: Quocirca     Published Date: Sep 07, 2007
Companies are faced with increasing pressures on the communications capabilities they offer their employees.  More employees are mobile, working from home or in other remote locations with a growing need to talk and share information with their colleagues.  This cuts across fixed and mobile communications, but businesses still want the flexibility of mobile, and the costs, predictability, quality and service models of fixed.
Tags : 
telecom, quocirca, mobility, soho, voip, ip telephony, convergence, small business
    
Quocirca
Published By: SAS     Published Date: Jan 17, 2018
We have conditioned patients not only to expect opioids for pain relief, but to utilize more and more of them, and the addiction is both psychological and physical. To remedy the situation, a lot of policies and practices and behaviors must change around how the health care system approaches pain. But we do not yet have the data and analytics we need to determine what specifically to do at the patient level or the policy level. Download this whitepaper to learn more about the resources available and how we can fix this issue.
Tags : 
    
SAS
Published By: Riverbed     Published Date: Jul 10, 2017
Performance issues today are compounded by increasingly complex infrastructures that IT teams must contend with when delivering applications. As a result, detecting and fixing performance problems is hard. Sluggish end-user transactions may present themselves as being slow due to the code.
Tags : 
application performance, performance issues, complex infrastructure, transactions
    
Riverbed
Published By: Comcast Business     Published Date: Oct 19, 2018
Industry historically has run on the concept of "If it ain't broke, don't fix it." Companies that had found success with a process or technology were content to maintain their status quo, and it wasn't until they started falling behind their competition that they considered making a change. Digital Transformation changed that, as organizations increasingly embraced technology to push ahead of their competitors and be more proactive in the decisions that impact their business.
Tags : 
digital transformation
    
Comcast Business
Published By: RedEye On Demand     Published Date: Apr 09, 2009
Direct digital manufacturing, otherwise known as rapid manufacturing, is a process that employs additive fabrication technology (aka rapid prototyping) to produce end-use items. Directly from CAD data, components are manufactured without molding, casting or machining. The impact of direct digital manufacturing is far-reaching, and the opportunities and advantages are extensive. This is why direct digital manufacturing is heralded as the next industrial revolution.
Tags : 
redeye on demand, cad, rapid manufacturing, jigs & fixtures, design for manufacturability, design for assembly, return on investment
    
RedEye On Demand
Published By: CCSS     Published Date: Sep 04, 2007
Many IT Managers will be familiar with the ‘disk or die’ ultimatums that a disgruntled system can issue. If the system demands feeding and threatens to shut down if it doesn’t get more disk to chew, it’s time to address the issue of disk once and for all.  The expense of using disk to accommodate problems in the hope of buying extra investigation time is a quick fix that few organizations can sustain.
Tags : 
systems management, monitoring, disk management, disk monitoring, ccss, network performance, network performance management, disk
    
CCSS
Published By: IBM     Published Date: Sep 10, 2009
This white paper outlines methods to help service providers improve overall operational efficiency within the service assurance operational environment. Learn how IBM Tivoli® Netcool® solutions can help service providers streamline their operations, improve responsiveness and reduce costs.
Tags : 
netcool, ibm, idc, mobile service providers, fixed-line service providers, operational efficiencies, communications, media and entertainment
    
IBM
Published By: Acronis     Published Date: Apr 28, 2011
Based on Acronis' patented disk imaging and bare metal restore technologies, Acronis® Backup & RecoveryT 10 Advanced Server Virtual Edition is the next generation of the Acronis True Image family of products, engineered specifically for virtualized environments. Acronis Backup & Recovery 10 Advanced Server Virtual Edition enables organizations of all sizes to extend the cost-saving benefits of virtualization by protecting virtual machines running on a single physical host for a low, fixed price.
Tags : 
acronis, backup and recovery, 10 advanced server virtual edition, patented disk imaging, bare metal restore, true image, disaster recovery, remote server
    
Acronis
Published By: Motorola     Published Date: Feb 06, 2008
Aberdeen's research shows that Unified Communications (UC) solutions have a measurable impact on the productivity of an organization's workforce. Read this report to learn how best-in-class organizations are leveraging their UC solutions as part of an integrated business-process mapping program to understand how UC solutions help the workforce most effectively impact those core business processes.
Tags : 
unified communications, soft phones, ivr, mobile, mobility, fixed mobile convergence, productivity, motorola
    
Motorola
Published By: ScriptLogic     Published Date: Mar 29, 2012
Quest ChangeBASE Professional enables organizations to easily address application compatibility challenges and quickly prepare applications for migration by automatically assessing and fixing potential compatibility issues.
Tags : 
    
ScriptLogic
Published By: IBM     Published Date: Jul 06, 2017
Effectively using and managing information has become critical to driving growth in areas such as pursuing new business opportunities, attracting and retaining customers, and streamlining operations. In the era of big data, you must accommodate a rapidly increasing volume, variety and velocity of data while extracting actionable business insight from that data, faster than ever before. These needs create a daunting array of workload challenges and place tremendous demands on your underlying IT infrastructure and database systems. In many cases, these systems are no longer up to the task—so it’s time to make a decision. Do you use more staff to keep up with the fixes, patches, add-ons and continual tuning required to make your existing systems meet performance goals, or move to a new database solution so you can assign your staff to new, innovative projects that move your business forward?
Tags : 
database, growth, big data, it infrastructure, information management
    
IBM
Published By: 3D Systems     Published Date: May 15, 2019
Jigs and fixtures offer manufacturers a reliable process for delivering accurate, high-quality outcomes, whether for a specific part or feature, or for consistency across multiples of parts. Although the methodologies and materials for producing jigs and fixtures have evolved beyond the conventional metal tooling of years past, their position as a manufacturing staple remains constant due to the benefits they offer. This eBook discusses the use of additive manufacturing (AM) for jig and fixture applications, and demonstrates how production support can be improved in terms of speed, cost and functionality. The applications included within this eBook offer a mere glimpse at what is possible with AM for production support. The examples chosen illustrate opportunities for applying design principles and technology capabilities that are transferable across a wide range of applications.
Tags : 
    
3D Systems
Published By: 3D Systems     Published Date: May 15, 2019
Jigs and fixtures offer manufacturers a reliable process for delivering accurate, high-quality outcomes, whether for a specific part or feature, or for consistency across multiples of parts. Although the methodologies and materials for producing jigs and fixtures have evolved beyond the conventional metal tooling of years past, their position as a manufacturing staple remains constant due to the benefits they offer. This eBook discusses the use of additive manufacturing (AM) for jig and fixture applications, and demonstrates how production support can be improved in terms of speed, cost and functionality. The applications included within this eBook offer a mere glimpse at what is possible with AM for production support. The examples chosen illustrate opportunities for applying design principles and technology capabilities that are transferable across a wide range of applications.
Tags : 
    
3D Systems
Published By: Nokia     Published Date: Aug 04, 2016
Download this whitepaper to learn more about why: LANs need upgrades to support high-bandwidth fixed and mobile services A passive optical LAN (POL) delivers capacity, cost savings, lasting value Upgrading to POL can reduce TCO by 37% within 5 years
Tags : 
passive optical lan, mobile services, network performance, mobile connectivity, tco
    
Nokia
Published By: Mentor Graphics     Published Date: Apr 03, 2009
A powerful signal integrity analysis tool must be flexibility, easy to use and integrated into an existing EDA framework and design flow. In addition, it is important for the tool to be accurate enough. This report reviews a validation study for the Mentor Graphics HyperLynx 8.0 PI tool to establish confidence in using it for power integrity analysis.
Tags : 
mentor graphics, pdn simulation, eda framework, mentor hyperlynx 8.0 pi, integrity analysis, virtual prototypes, esr, capacitor
    
Mentor Graphics
Published By: HP - Enterprise     Published Date: Aug 25, 2011
This white paper details how hybrid app security enables organizations to resolve critical security issues faster and cheaper than any other technology
Tags : 
"application security", cyber-attacks, software security assurance, dast, sast, security breach, data breach, owasp
    
HP - Enterprise
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.