HIT Consultant Insightful coverage of healthcare innovation
 

fundamental

Results 301 - 325 of 435Sort Results By: Published Date | Title | Company Name
Published By: Citrix Systems     Published Date: Nov 10, 2014
ADCs are advanced load balancers with functions and features that enhance the performance of applications. Today, companies of all sizes with geographical dispersal of people and different data constructs require ADCs to optimize their complex application environments from web applications, to Exchange, SharePoint and databases. It is interesting that before the term ADC was used more recently (in the last decade), companies relied on load balancers for website availability and scalability. In this paper we will describe the fundamentals of a load balancing system and its evolution to an ADC.
Tags : 
database, sharepoint, application, load balancer, performance, availability, website, scalability, function, optimization
    
Citrix Systems
Published By: Cox Communications     Published Date: Nov 10, 2014
One of the most fundamental aspects of marketing your business is having the right technology in place, And at the forefront of your technology hub should be a reliable phone service. Having a dependable phone network your company can is vital in more ways that one. Even in today's world of competing technology and emerging tech-trends, a proper phone system is the link that enables you to connect with anyone, from co-workers down the hallway to the business partner on the other side of the globe.
Tags : 
tech-trends, voip, pbx, hosted pbx, sip, ports, did, pots, sip trunking, did, centrex
    
Cox Communications
Published By: IBM     Published Date: Nov 04, 2014
This white paper explores the five fundamental qualities of a risk-aware organization, along with five use cases of how IBM helped clients put the practices into action in the real world.
Tags : 
ibm, security, risk, byod, safeguard, protection, threat protection, it security, security iq
    
IBM
Published By: EngageSciences     Published Date: Nov 04, 2014
Discover the latest research on the fundamental impact UGC is having on brands, and how it can drive audience acquisition, boost engagement and optimise commerce.
Tags : 
user generated content, ugc, advocacy marketing, content aggregation, content curation, social commerce, social media marketing, the power of user generated content, social media, marketing, interactive marketing, marketing software, social hubs, social commerce, online retail, web socialisation, social media retail
    
EngageSciences
Published By: ForgeRock     Published Date: Oct 24, 2014
Identity is a fundamental requirement to digital growth. Businesses and organizations cannot properly take advantage of mobile, cloud, or Internet of Things (IoT) technologies without a scalable and repeatable identity strategy. Without it, they have no way to identify and engage with their customers in a meaningful way — whether it be through a laptop, mobile phone, tablet, connected car, healthcare wearable, connected home device or the next great connected innovation. This guide is designed to help you understand the essentials of customer-focused identity and how it helps you engage with your customers.
Tags : 
revenue generator, digital growth, identity management, customer-focused
    
ForgeRock
Published By: sevone     Published Date: Oct 23, 2014
Whether you’re looking to improve your application and service delivery, consolidate existing performance monitoring tools and responsibilities or justify the impact of a new technology deployment, the following six steps can help you create the fundamental building blocks of an effective performance monitoring strategy.
Tags : 
    
sevone
Published By: IBM     Published Date: Oct 10, 2014
Confused by all the agile advice? Relax! With Agile for Dummies by your side you’ll learn the fundamentals of agile and how to increase the productivity of your software teams while enabling them to produce higher-quality solutions that better fulfill customer needs much faster.
Tags : 
ibm, agility, software productivity, agile teams, agile practice, faster solutions, adoption mistakes, dummies, ebook, software teams, growing popularity, growing scalability
    
IBM
Published By: GeoTrust     Published Date: Oct 06, 2014
As use of the Internet has grown, the Web has also become more popular with scammers, identity thieves, and other cybercriminals. Given the number of people who experience or have heard about phishing and other Web-based scams, many Internet users don't feel comfortable sharing their personal details online. Fortunately, there is secure sockets layer (SSL) technology, a standard solution for protecting sensitive information online. But there's more to SSL than just basic safety. Read this guide to learn about what SSL does, how it works, and how it can help build credibility online.
Tags : 
ssl, website security, scammers, identity theifs, cybercriminals, secure sockets layer, credibility
    
GeoTrust
Published By: Nutanix     Published Date: Oct 01, 2014
This webinar will help enterprises understand the fundamentals of web-scale IT and how other companies are using web-scale principles to build private cloud-like environments.
Tags : 
nutanix, cloud, convergence, hyperconvergence, virtualization, web scale, it scale
    
Nutanix
Published By: IBM     Published Date: Sep 15, 2014
Application release and deployment practices are the backbone of the DevOps movement. Learn how automating application release and deployment can speed time to market, drive down costs and reduce risk. Improve software deployment in your organization through innovative automation methods!
Tags : 
application release, deployment practices, software development, software delivery products
    
IBM
Published By: Riverbed     Published Date: Sep 05, 2014
In conducting a survey of 159 IT professionals with direct responsibility for business-critical applications, Forrester found that all enterprises surveyed had fundamental issues while managing the performance of these applications and business services.
Tags : 
application, performance, management, tool set, enterprises, fundamental issues
    
Riverbed
Published By: Act-On     Published Date: Aug 18, 2014
Lead scoring is a key missing link in many B2B marketing strategies. A growing number of B2B marketers understand this vital role lead scoring plays in the marketing process. Yet they still face challenges getting started with lead scoring and learning how to generate a measureable ROI from their efforts. In this whitepaper you will learn seven foundational steps your company can take to set up a functional and cost-effective lead scoring strategy. These include understanding the fundamentals of lead scoring; learning how to identify the traits that define your ideal sales prospects; and building a system that will grow with your organization over time.
Tags : 
act-on, marketing, integration, lead scoring, b2b, strategy, roi
    
Act-On
Published By: ExactTarget     Published Date: Aug 14, 2014
Marketing as you know it will never be the same. There’s a fundamental shift in relationships between brands and customers—fueled by smartphones, social media, and today’s always-on, always-connected mentality. Marketers have access to more customer data (big data) than ever before. But the quantity of data only matters if you’re smart about using it—to power 1:1 customer journeys.
Tags : 
marketing cloud, target, big data, brands, customers, social media, smartphones, always-on
    
ExactTarget
Published By: HP     Published Date: Aug 08, 2014
Enterprise IT organizations are challenged by accelerating data growth and increasing reliance on the data. This requires a fundamental rethinking of how data is protected and accessed. HP StoreOnce backup and CommVault Simpana deliver an integrated, end-to-end data protection and rapid recoverability solution to enhance business continuity and resiliency.
Tags : 
it organizations, storage, commvault simpana, data protection, recoverability, enterprise, data, storeonce
    
HP
Published By: EMC Corporation     Published Date: Aug 05, 2014
To develop the visibility, agility and speed to deal with advanced threats, traditional security strategies for monitoring, often based around security information and event management (SIEM) systems need to evolve into a central nervous system for large-scale security analytics. In particular, four fundamental capabilites are required: 1. Pervasive visibility 2. Deeper analytics 3. Massive scalability 4. Unified view Download here to learn more!
Tags : 
big data, data management, security threats, advanced analytics, security management, predictive analytics, compliance
    
EMC Corporation
Published By: Egencia     Published Date: Aug 04, 2014
Over the past decade, procurement fundamentals have redefined travel management. As the industry refreshes its position on traveler satisfaction, however, travel management and procurement concepts find a new balance in best-in-class programs.
Tags : 
egencia, modern travel management, business travel, managing expenses, travel dollars, travel policy
    
Egencia
Published By: Windstream     Published Date: Aug 04, 2014
Cloud computing today is fundamentally altering business processes and changing the way organizations interact with customers, partners, and employees. This transformation brings incredible opportunities, including the ability to build a realtime enterprise where interaction and innovation flourish, and more agile, flexible, and cost-effective practices thrive. Yet cloud computing also presents significant challenges. The path to value is not clearly marked, and there are potential stumbling points along the way. Please download the whitepaper to learn more!
Tags : 
windstream, cloud computing, cloud hybrid options, oxford economics, cloud benefits
    
Windstream
Published By: CA Technologies     Published Date: Aug 01, 2014
This paper offers a look at the obstacles of prior generations of service management platforms, and it reveals how a new generation of solutions addresses some of these fundamental limitations.
Tags : 
service desks, service management platforms, service desk solutions, failing service desks, saas
    
CA Technologies
Published By: Localytics     Published Date: Jul 18, 2014
Whether your business model is driven by in-app advertising, purchases, or paid subscriptions, driving your revenue is fundamentally dependent on personalization and engagement. The metrics are available, but identifying which are the most important for tracking engagement and are the most actionable can be tricky.
Tags : 
app metrics, app measurement, app users, app screenflow, track users, user segmentation, segment user, user retention, retain user, user acquisition, acquire user, lifetime value, user value, engage user, user engagement, session length, session interval, time in app, measure app user, app user metrics
    
Localytics
Published By: Symantec Corporation     Published Date: Jul 11, 2014
Always On SSL is a fundamental, cost-effective security measure that provides end-to-end protection for website visitors by enforcing the use of encryption with SSL certificates from a trusted Certificate Authority on every single page.
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals, security, software development
    
Symantec Corporation
Published By: Epicor     Published Date: Jun 30, 2014
Manufacturers that address the fundamental requirements know that “Top-to-Shop” isn’t an urban legend anymore. Those that have eliminated the disconnect between the shop floor and the top floor have succeeded in enhancing the extended supply chain. More importantly, their executive leadership consistently achieves business goals—with the help of those on the line and in plant, operations and management.
Tags : 
epicor, manufacturing, operations, cost cutting, machinery, labor, contract manufacturing
    
Epicor
Published By: BMC Software     Published Date: Jun 13, 2014
The last five years have fundamentally changed the way people interact with technology, leaving IT in a reactive mode. As business customers have rushed to “consumerized” services and experiences, IT is beginning to redefine its approach to offering IT services.  In this eBook, explore the top trends driving the New IT for IT Service Management, and how leading organizations are evolving to focus on end-user experience.
Tags : 
bmc, itsm solutions, changing business, cloud, cios, software, it organizations, saas, mobile, social, on demand solutions
    
BMC Software
Published By: Box     Published Date: Jun 11, 2014
The old world of collaboration—desktops, wired network connections, virtual private networks, and clunky software—has given way to a new world of collaboration. Today’s generation of mobile devices, wireless technologies, and cloud capabilities has had an inexorable and fundamental impact on how people work together and share information. Collaboration is now device- and network-agnostic. It’s not just about being able to work anywhere and anytime, it’s about being able to connect to any document at any time. Read this CIO white paper to learn how to bridge the gap in the modern world.
Tags : 
box, collaboration, desktops, wired networks, virtual private networks, mobile devices, wireless technologies
    
Box
Published By: IBM     Published Date: May 28, 2014
The right test data management solution accelerates time to value for business-critical applications and builds relationships and efficiencies across the organization. IBM InfoSphere Optim Test Data Management closes the gap between DBAs and application developers by providing all teams with accurate, appropriately masked and protected data for their work. Developers can confirm that new application functionalities perform as expected. QA staff can validate that the application performs as intended based on the test cases, and that integrations work properly. And business leaders can be more confident that competitive functionality will be delivered on time with less risk.
Tags : 
ibm, ibm infosphere, ibm optim solutions, ibm test data, test data management, dba, database management, big data, applications, business critical applications, integrations
    
IBM
Published By: McAfee     Published Date: May 19, 2014
Las redes informáticas están diseñadas para facilitar el flujo de comunicación, no para impedirlo. Desafortunadamente, los paquetes de datos pueden ser manipulados de manera que parezcan normales, aunque contengan un exploit. Estas técnicas eluden las medidas de seguridad estándar y, en la mayoría de los casos, distribuyen una carga maliciosa sin ser detectada. A menudo, estas técnicas de evasión avanzadas (AETs) aprovechan propiedades de protocolos poco utilizadas, en combinaciones inesperadas y la mayoría de los dispositivos de seguridad de red no son capaces de detectarlas. Aunque muchos superan pruebas de la industria con altas calificaciones, estas se basan en la protección contra un número reducido de amenazas. Se desconoce el número exacto de AETs, pero se calcula que hay cientos de millones. Para protegerse, la seguridad de red debe incorporar algunas funciones fundamentales.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, ngfw, next gen firewall, security, it management
    
McAfee
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.