HIT Consultant Insightful coverage of healthcare innovation
 

http

Results 1 - 25 of 65Sort Results By: Published Date | Title | Company Name
Published By: Workday     Published Date: Sep 14, 2018
"Looking for an agile and scalable ERP system but don’t know where to start? IDC MarketScape is a comprehensive guide specifically for midsize companies. Read an excerpt from the report to learn the capabilities your midsize company should expect from cloud-enabled ERP applications. https://www.workday.com/en-us/forms/reports/idc-me-landscape.dl.html "
Tags : 
    
Workday
Published By: NEC     Published Date: Sep 29, 2009
Written by: IDC Abner Germanow, Jonathan Edwards, Lee Doyle IDC believes the convergence of communications and mainstream IT architectures will drive significant innovation in business processes over the next decade.
Tags : 
it architecture, idc, automation, automated order processing, soa, service oriented architecture, soap, http, xml, wsdl, uddi, esbs, jee, .net, crm, san
    
NEC
Published By: Cisco     Published Date: Oct 11, 2016
The Cisco® 2016 Midyear Cybersecurity Report—which presents research, insights, and perspectives from Cisco Security Research—updates security professionals on the trends covered in our previous security report while also examining developments that may affect the security landscape later this year.
Tags : 
cybersecurity, attackers, http, ransomeware, malware
    
Cisco
Published By: Limelight Networks     Published Date: Mar 02, 2018
Today, digital security is top-of-mind. From the boardroom to the backroom, everyone is asking the same questions, “How do we protect our digital experiences? How do we ensure our website is safe for our visitors? How do we make sure that no one can steal our content?” But safeguarding a digital experience isn’t a one-size-fits-all solution. It often involves multiple techniques and layers of security. From verifying your identity (with HTTPS) to encrypting sensitive data to restricting access and protecting multimedia content, you must approach security in a layered manner, employing multiple means and techniques to protect the digital content through which your audience interacts. This paper explores ten different methods and technologies that an organization can employ to protect its content. This multi-layered approach can effectively protect your digital content, ensure high availability, and maintain superior quality of experience for every digital visitor. You’ll learn: 10 s
Tags : 
content delivery network, cdn, cybersecurity, ddos, waf, web application firewall, distributed denial of service attacks, cloud security, digital rights management
    
Limelight Networks
Published By: DigiCert     Published Date: Aug 01, 2018
As a leading provider of SSL certificates, DigiCert is here to help you discover the benefits of using HTTPS across your entire site, and to help you successfully implement it. HTTPS Everywhere is a best practice security measure for websites that ensures the entire user experience is safe from online threats. The term simply refers to using HTTPS—the secure web protocol enabled by SSL/TLS—across your entire website instead of selectively. Implementing HTTPS Everywhere on your website secures the user and your organization’s data on every page— from start to finish.
Tags : 
    
DigiCert
Published By: Red Hat     Published Date: Jun 17, 2013
A recent Gartner research note discusses the strides DreamWorks Animation has made during its 13 years using open source technology. Red Hat has found that with cloud, virtualization, middleware, and operating system products and services, DreamWorks Animation has streamlined processes, improved techniques, and significantly reduced costs.
Tags : 
dreamworks, animation, production, red hat, technology, gartner, virtualization, cloud
    
Red Hat
Published By: PernixData     Published Date: Jun 01, 2015
David Klee and Bala Narasimhan discuss the tips for DBAs and Infrastructure Admins to maximize the performance of their systems without massive restructuring of their environments. - See more at: http://www.pernixdata.com/resource/database-experts-bringing-together-databases-virtualization-and-storage#sthash.KKii86jl.dRQXxxik.dpuf
Tags : 
pernixdata, virtualization, storage, dbas, databases
    
PernixData
Published By: Akamai Technologies     Published Date: Mar 10, 2016
The web application firewall (WAF) is among the most complex security technologies on the market today. The complexity of managing a WAF includes a pre-defined list of rules to identify thousands of potential exploits, intelligence about new attack vectors, and identifying malicious HTTP requests from legitimate HTTP traffic. Read this white paper to learn how to combine attack detection with threat intelligence using our cloud platform and managed security services to better protect your web applications.
Tags : 
akamai technology, web application security, http, best practices
    
Akamai Technologies
Published By: VMWare EMEA     Published Date: Oct 23, 2017
To meet the challenges of managing such a complex environment, IT teams need an enterprise-ready cloud management platform that can support multivendor environments, automate application and service delivery, and facilitate operations and governance. VMware provides an enterprise-ready cloud management platform that delivers the industry’s most complete solution for managing a heterogeneous, hybrid cloud, and supports cloud management requirements across Day 1 and Day 2 operations for compute, storage, network and application level resources. The VMware solution is in use today across a wide range of industries and use cases, delivering benefits such as faster provisioning, optimized IT operations, and lower capital spending. To learn more about the VMware cloud management platform, visit http://www.vmware.com/virtualization/ cloud-management.
Tags : 
cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
VMWare EMEA
Published By: Intralinks     Published Date: Nov 23, 2015
There are multiple options for organizations with intellectual property and restricted information that must be shared between staff and business partners to adopt in order to avoid inadvertent release of restricted information to unauthorized personnel.
Tags : 
kuppingercole, information sharing, security, data, intralinks
    
Intralinks
Published By: Zoom     Published Date: Apr 06, 2016
Solar City provides a customer testimonial detailing how Zoom was able to help reduce executive travel costs, increase efficiency, and expand nationally and internationally. Learn more about Zoom today at http://zoom.us/
Tags : 
zoom, solar city, video conferencing, zoom rooms, conference systems
    
Zoom
Published By: Mimecast     Published Date: Feb 28, 2017
Meer Informatie over Office 365™ Migratierisico's en hoe u de afhankelijkheid van uw SaaS-applicaties kunt beheersen. Als u als organisatie overweegt om naar Office 365™ over te stappen, moet u zich bewust zijn van een aantal belangrijke risico's voor uw e-mailinfrastructuur. De cloud lijkt misschien een eenvoudig, kosteneffectief alternatief voor lokale e-mail, maar de continuïteit en de veiligheid mag niet over het hoofd worden gezien. Download hieronder ons e-boek, Zonder Zorgen Uw E-mail naar de Cloud Verplaatsen: Aanbevolen Procedures voor het Beheersen van Risico's in een Office 365 Wereld" voor meer informatie over het beheersen van risico's met uw e-mail in de cloud. - See more at: http://info.mimecast.com/wakkerworden.html#sthash.xdcnYAbz.dpuf
Tags : 
office 365, e-mail, beveiliging, salesforce, schaalbaarheid
    
Mimecast
Published By: Mimecast     Published Date: Feb 28, 2017
Vervalsing van e-mail verpersoonlijking – ook wel bekend als CEO fraude of "whaling" aanvallen vormen een groeiende bedreiging voor bedrijven van elke omvang. Deze veiligheidsbedreiging heeft in de afgelopen 3 jaar meer dan 2 biljoen Euro aan schade veroorzaakt.* Denkt u dat deze aanvallen geen bedreiging voor u opleveren? Even wakker worden! Download nu het nieuwe Mimecast – e-boek: Anatomie van een "whaling" aanval, om meer te leren over deze bedreiging voor uw organisatie, de feiten, kosten en de schade die het kan veroorzaken – en hoe u het kan voorkomen. - See more at: http://info.mimecast.com/anatomievaneenwhalingaanval.html#sthash.rjajy1cW.dpuf
Tags : 
financieel, e-mail, phishing, veiligheid, whaling
    
Mimecast
Published By: Mimecast     Published Date: Feb 28, 2017
Lär dig mer om riskerna med att migrera till Office 365™ och hur du undviker en SaaS-monokultur. När en organisation överväger att migrera till Office 365, måste de vara medvetna om flera signifikanta risker för deras e-postinfrastruktur. Molnet kan verka vara ett enkelt och kostnadseffektivt alternativ till en lokal e-post, men kontinuitets- och säkerhetsaspekterna får inte förbises. Hämta vår e-bok, "Trygg flytt av er e-post till molnet: Bästa praxis för att hantera risker i Office 365”, nedan för att lära dig mer om hur ni undviker problem med molnbaserad e-post. - See more at: http://info.mimecast.com/dagsaattankaom.html#sthash.7mojzQPN.dpuf
Tags : 
office 365, e-post, säkerhet, salesforce, skalbarhet
    
Mimecast
Published By: IBM     Published Date: Jun 25, 2018
Complex and strictly regulated supply chains require trust between involved parties to function properly and maximize efficiency. Addressing a wide range of challenges, IBM Blockchain efficiently streamlines the supply chain by digitizing the process to provide a secure, trustworthy and shared record of ownership. Making relevant information available to parties involved, the blockchain addresses transparency issues and open standards. It can also simultaneously track the supply chain status for risks and triggers remediation actions before a crisis emerges. Learn more about how IBM Blockchain can transform your supply chain to get more business value out of your processes and data. Click here to find out more about how embedding IBM technologies can accelerate your solutions’ time to market. https://www-07.ibm.com/ibm/au/businesspartners/embed/
Tags : 
    
IBM
Published By: VMware Citrix     Published Date: Jan 23, 2018
VMware Horizon and Workspace ONE is the most complete solution for delivering, managing, and protecting Windows desktops, applications, and online services across devices, locations, media, and connections. To learn more about how Workspace ONE delivers and manages any device by integrating identity, application, and enterprise mobility management: Visit http://www.vmware.com/products/horizon
Tags : 
vmware, horizon, workspace, delivering, managing, applications, desktop, online services
    
VMware Citrix
Published By: Red Hat, Inc.     Published Date: Jul 10, 2012
Cloud computing has a lot of appeal, from auto-scaling to lower costs, and it's all just a few clicks away. Thus, the big question is not "why cloud?" but rather "how cloud?"
Tags : 
cloud, cloud computing, autoscaling, lower costs, applications technology, applications platform, it productivity, application lifecycle, tomcat, java ee, virtualization, multiple platforms, platform-as-a-service, paas, developer productivity, maven, hudson, production support, production maintenance, cloud architecture
    
Red Hat, Inc.
Published By: Zebra ABM     Published Date: Dec 14, 2017
Meet the demands of your highest-volume POS lanes with Zebra MP7000 next generation multi-plane 1D/2D imager. To learn more about Zebra's MP7000, go to: https://goo.gl/693u8o.
Tags : 
webinar, video, multi, plane, scanner, zebra, technologies, mp7000, next generation
    
Zebra ABM
Published By: Zebra ABM     Published Date: Dec 14, 2017
The MP7000 is loaded with features that take scanning performance and simplicity to the next level for faster checkout lanes, increased cashier productivity and POS throughput — and a better shopping experience. To learn more about the MP7000, go to: https://goo.gl/693u8o.
Tags : 
zebra technologies, mp7000, multi, plane, scanner, webinar
    
Zebra ABM
Published By: McAfee     Published Date: Feb 25, 2015
This report summarizes the McAfee 5206's throughput based on the latest version 5.8 software, with various firewall policies applied and different traffic scenarios.
Tags : 
mcafee 5206's throughput, mcafee, testing of the mcafee ngfw, security, firewall, security internet, dpi, url filtering, http traffic, application awareness
    
McAfee
Published By: Aria Systems     Published Date: Nov 02, 2015
The case for recurring revenue models has grown so strong as to be irrefutable, but putting these ideas to work for your business requires infrastructure, a plan, and proficient implementation. This Guide to Recurring Revenue Success was written by industry expert Bob Harden to inform you about the opportunity for recurring revenue, what’s necessary to succeed, and how to get started. You'll learn: • Why the recurring revenue model is spreading so rapidly • How to get started on developing a recurring revenue strategy • Which elements are essential for successful implementation • What lies ahead for companies which adopt recurring revenue models - See more at: http://info.ariasystems.com/recurring-revenue-success-guide.html#sthash.W65wlfVw.dpuf
Tags : 
aria systems, revenue models, recurring revenue success, bob harden
    
Aria Systems
Published By: Amazon Web Services     Published Date: Aug 01, 2018
Learn more about the AWS Partner Webinar Series at - https://amzn.to/2ILG0R7. Join our webinar to hear how Lyft and other data-driven organizations benefit from uncovering hidden insights in real time with AI solutions from Amazon Web Services (AWS) and Anodot. Learn how to prevent events that can impact your revenue and brand integrity with a solution that detects anomalies quickly, allowing you to address issues in a timely manner to help ensure a consistently high-quality experience for your customers.
Tags : 
    
Amazon Web Services
Published By: Amazon Web Services     Published Date: Aug 06, 2018
Learn more Salesforce and Amazon Web Services at http://amzn.to/2zhcn1v. Building and releasing cutting-edge applications quickly can be difficult when you lack proper tooling and integrated customer data. Salesforce Heroku delivers a cloud-native, developer-friendly platform that streamlines application development by integrating formerly siloed customer data and removing the burden of infrastructure management, allowing developers to focus their attention solely on creating customer-centric applications. Join the upcoming webinar to hear how the Financial Times builds customer-driven applications with faster cycle times with Heroku and AWS.
Tags : 
    
Amazon Web Services
Published By: Amazon Web Services     Published Date: Aug 06, 2018
Learn more about AWS Partner Webinars at - https://amzn.to/2I6ogPM. In this webinar, you will learn about VMware Cloud on AWS, an integrated hybrid cloud offering jointly developed by AWS and VMware delivering a highly scalable, secure and innovative service that enables organizations to seamlessly migrate and extend their on-premises VMware vSphere-based environments to AWS running on next-generation Amazon Elastic Compute Cloud (Amazon EC2) bare metal infrastructure.
Tags : 
    
Amazon Web Services
Published By: F5 Networks Inc     Published Date: Jan 22, 2009
Understanding HTTP and how these headers control behavior of web-based applications can lead to better end-user performance, as well as making it easier to choose an application acceleration solution that addresses the shortcomings of HTTP and browser-based solutions.
Tags : 
fundamentals of http, web-based applications, http, application acceleration solution, browser-based solutions
    
F5 Networks Inc
Start   Previous   1 2 3    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.