HIT Consultant Insightful coverage of healthcare innovation
 

here

Results 5051 - 5075 of 5433Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Nov 17, 2009
The information agenda is intended to map out corporate business and technology goals and to create a roadmap to ensure that companies can leverage their corporate information as a strategic asset in the pursuit of these goals.
Tags : 
ium evaluation, ibm, information on demand, uim, iod, information management, scential, filenet
    
IBM
Published By: IBM     Published Date: Nov 16, 2009
Is your information at risk? Read this whitepaper to find out how the IBM WebSphere MQ FTE solution, built on WebSphere MQ, offers reliable, secure and auditable file transfers.
Tags : 
ibm, ebf, websphere mq, file transfer edition, fte, ftp
    
IBM
Published By: Genius Inc     Published Date: Nov 13, 2009
In today's B2B market, where the customer has access to volumes of inforŽmation surrounding their purchase decision, there's been a major shift in the selling paradigm-a shift that all but eliminates "selling" from the process. Now Sales and Marketing professionals must insert themselves into the customŽer's purchasing process at a much earlier stage, helping the customer buy, through an intelligent, dynamic nurturing cycle.
Tags : 
marketing automation, b2b, sales, genius, b2b, lead generation, demand generation, lead scoring
    
Genius Inc
Published By: Qualys     Published Date: Nov 11, 2009
New network vulnerabilities appear constantly and the ability for IT security professionals to handle new flaws, fix misconfigurations and protect against threats requires constant attention. However, with shrinking budgets and growing responsibilities, time and resources are at constrained. Therefore, sifting through pages of raw vulnerability information yields few results and makes it impossible to accurately measure your security posture.
Tags : 
qualys, network secure, it security, vulnerability, it budget, risk management, vulnerability management, misconfigurations
    
Qualys
Published By: APTX     Published Date: Nov 05, 2009
This paper will present the case that there are a number of frailties associated with Dolby E, the most notable of which are the latency, audio quality and general awkwardness in terms of operation and implementation.
Tags : 
aptx, hdtv, audio, surround-sound, dolby e
    
APTX
Published By: VM Ware     Published Date: Nov 04, 2009
This Taneja Group Solution Profile identifies the data protection optimizations available in the VMware vSphere environment.
Tags : 
vmware, data protection, vsphere, server virtualization, smb, disaster recovery
    
VM Ware
Published By: McAfee Inc     Published Date: Oct 30, 2009
Browsers are the least-protected and therefore easiest medium for transferring malware, which is why protecting your company against web-borne threats should be part of a total security solution. This brief explains the key benefits of implementing a web security solution with McAfee. Read more.
Tags : 
mcafee, email protection, midsize, global threat intelligence, security, data protection, spam
    
McAfee Inc
Published By: IBM     Published Date: Oct 29, 2009
Learn more about the role of today's midmarket CIO and what they are doing to achieve three primary goals -- make innovation real, raise the ROI of IT and expand business impact.
Tags : 
ibm, cio, mmdg, midmarket, chief information officer, innovation, roi, business management
    
IBM
Published By: IBM ILOG.     Published Date: Oct 26, 2009
The webcast - Master Agility and Overcome Process Silos with BRMS & SOA Register for the live event here or sign up to be sent the recording after the event if you have a conflict.
Tags : 
agility, ibm, ilog, brms, soa, insurance, healthcare, silos
    
IBM ILOG.
Published By: IBM ILOG.     Published Date: Oct 26, 2009
Find out how your organization can begin to see ROI from WebSphere ILOG BRMS in just 6 to 9 months.
Tags : 
ibm, ilog, roi, brms, business rule management system, websphere, application, compliance
    
IBM ILOG.
Published By: IBM ILOG.     Published Date: Oct 26, 2009
Selecting the right software is the first step in obtaining fast ROI from a business rule management system (BRMS). These tools will help you make the right decision.
Tags : 
ibm, software, brms, business rule management system, roi, websphere, ilog
    
IBM ILOG.
Published By: IBM ILOG.     Published Date: Oct 26, 2009
Smarter State Government Processes in 2010 - Enabling Citizen-Centric Processes, Transforming Service Delivery and Reducing Costs with IBM WebSphere ILOG Business Rule Management System (BRMS) Technology
Tags : 
ibm, ilog, business rule management systems, brms, websphere, government, tax, revenue management
    
IBM ILOG.
Published By: IBM ILOG.     Published Date: Oct 26, 2009
IBM WebSphere ILOG Rule Solutions for Office meets the demands of business users by integrating Microsoft Office Word and Excel with the market-leading WebSphere ILOG BRMS. See Rules for Office in action during this one-hour webinar, including a live demonstration.
Tags : 
ibm, ilog, business rule management systems, brms, websphere, application integration
    
IBM ILOG.
Published By: Mainline Information Systems     Published Date: Oct 20, 2009
From planning, to proving, to production, there are a lot of intricate details to think about when you are considering a Linux implementation. In this webcast, Marianne Eggett summarizes industry best practices for project management of your IBM System z Linux (POC).
Tags : 
system z linux, mainline information systems, project management, best practices, ibm, poc, testing, installation
    
Mainline Information Systems
Published By: IBM     Published Date: Oct 14, 2009
Web conferencing tools ensure that face-to-face meetings can still take place while removing the costs associated with business travel. Now available as a service with no infrastructure costs, these solutions are being used by savvy companies to go more places than boarding a plane or getting in a car allows.
Tags : 
web conferencing, ibm, infrastructure cost, smb, saas, software-as-a-service, sametime unyte, spend management
    
IBM
Published By: IBM     Published Date: Oct 13, 2009
Stopping inappropriate data access. This turnkey solution safeguards servers - where business data is stored and accessed - with a combination of software and managed security services that automate critical areas of security oversight. By monitoring and tracking system access, the solution is effective at enforcing security policies.
Tags : 
security threats, ibm, server, express mps, security policies, intrusion prevention, server sensor, internet security systems
    
IBM
Published By: IBM     Published Date: Oct 09, 2009
Many companies are being challenged to increase flexibility and reuse their existing IT assets with SOA. This white paper explains how an IBM SOA approach, featuring WebSphere Enterprise Service Bus software, can help you add new services faster and change services more easily.
Tags : 
websphere esb, ibm, it flexibility, soa interoperability, mediation modules, service oriented architecture
    
IBM
Published By: IBM     Published Date: Oct 09, 2009
So what if things are tough out there, you can still deliver your business objectives while saving costs with the right application foundation. In this Web seminar we'll compare IBM WebSphere Application Server with JBoss, explain their various differences, and how they add up in a Total Cost of Ownership study.
Tags : 
smart soatm, application foundation, ibm, websphere application, jboss, total cost of ownership, rational, sca
    
IBM
Published By: IBM     Published Date: Oct 09, 2009
Succeeding in today's economy not only means utilizing technology to create intelligent, instrumented and interconnected solutions, but leveraging technology to optimize costs and do more with less. This brochure describes how the 3 key attributes of IBM's application foundation help deliver higher quality of service at a lower cost than JBoss.
Tags : 
websphere application server, ibm, jboss, application foundation, open source, tco, configuration, oss
    
IBM
Published By: IBM     Published Date: Oct 09, 2009
This webcast, "Untangle Your Connectivity Infrastructure - Free Up Your Cost," shows how IBM SOA solutions and IBM WebSphere untangle costly and debilitating complexities associated with connecting and integrating applications, services, and processes spread throughout the organization. The result is business agility and cost optimization.
Tags : 
connectivity infrastructure, ibm, application intergration, cost optimization, it complexity, business integration
    
IBM
Published By: IBM     Published Date: Oct 09, 2009
Does your IT change as fast as the market? A service-oriented architecture (SOA) provides a foundation that enables agility and aligns IT to business goals. This interactive presentation from IBM will show you how to provide fast, flexible, reliable access to information, business-wide. It also covers methods to ensure trust, management and security across business applications.
Tags : 
application foundation, ibm, service-oriented architecture, soa, websphere, point-to-point connectivity, esb messaging, esb enrichment
    
IBM
Published By: IBM     Published Date: Oct 09, 2009
"Recently, Open Source Software has been gaining in popularity due to the ability it provides users to view and modify source code. Another attraction is the perceived cost savings. Read the white paper that takes a look at the truth about those savings. Initially, deployment environments like JBoss have an advantage-zero initial software acquisition costs. However, the white paper will show how, over time, IBM WebSphere Application Server (WAS) and IBM WebSphere Application Server Network Deployment (WAS ND) win the TCO battle. Learn more."
Tags : 
open source, ibm, tco, total cost ownership, roi, return on investment, application development, jboss
    
IBM
Published By: ASG Software Solutions     Published Date: Sep 28, 2009
Virtualization is now mainstream. Enterprises continue to heavily invest in virtualization projects and while short term hardware and cost saving benefits are being achieved, few enterprises achieve anywhere close to the full potential of virtualization as they struggle with new problems like assuring performance and availability, preventing VM sprawl, and maximizing resource utilization
Tags : 
asg, cmdb, bsm, itil, bsm, bsp, metacmdb, virtualization
    
ASG Software Solutions
Published By: iPass     Published Date: Sep 22, 2009
A few short years after 3G service brought us anytime, anywhere broadband-and before Apple rolled out its 3G iPhone-4G networks began raising the bar in select markets. This latest evolution in wireless networking offers faster wireless data transmission speeds, vastly superior coverage and support for a new generation of mobile applications and services.
Tags : 
ipass, wifi, smartphones, roaming, web portal, vpn, ethernet, connection detail records
    
iPass
Published By: Marathon Technologies     Published Date: Sep 18, 2009
There are many expensive, complex technologies that promise high availability for SQL. Fortunately there are also simple, automated ways to get the highest levels of protection. The following five secrets to affordable SQL availability will help you to implement a SQL environment with little or no downtime, zero data loss, and no added IT complexity.
Tags : 
marathon, downtime, everrun, server, failure, outage, windows, sql
    
Marathon Technologies
Start   Previous    196 197 198 199 200 201 202 203 204 205 206 207 208 209 210    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.