HIT Consultant Insightful coverage of healthcare innovation
 

information age

Results 276 - 300 of 1201Sort Results By: Published Date | Title | Company Name
Published By: Teradata     Published Date: May 02, 2017
A Great Use of the Cloud: Recent trends in information management see companies shifting their focus to, or entertaining a notion for the first time of a cloud-based solution. In the past, the only clear choice for most organizations has been on-premises data—oftentimes using an appliance-based platform. However, the costs of scale are gnawing away at the notion that this remains the best approach for all or some of a company’s analytical needs. This paper, written by McKnight Consulting analysts William McKnight and Jake Dolezal, describes two organizations with mature enterprise data warehouse capabilities, that have pivoted components of their architecture to accommodate the cloud.
Tags : 
data projects, data volume, business data, cloud security, data storage, data management, cloud privacy, encryption, security integration
    
Teradata
Published By: EMC Corporation     Published Date: Dec 09, 2010
Find out why the Council believes that organizations that actively shape their cloud deployment strategies and extend strong information governance practices into the cloud will maximize their ability to leverage information for business advantage.
Tags : 
emc corporation, cloud agility, intelligent governance strategies, best practices, information governance, compliance, data and content
    
EMC Corporation
Published By: Cisco     Published Date: Apr 20, 2016
Be more productive, collaborative, and get more done faster using Cisco WebEx Meeting Center — the proven industry leader in web and video conferencing. As a FedRAMPcompliant service, you can use Cisco WebEx to hold regular meetings with anyone — regardless of location. Manage projects, host meetings, and make faster, more informed decisions by keeping everyone on the same page with meetings that allow everyone to see, hear, and view the same information at the same time. And host engaging and creative sessions with colleagues, internal teams and other agencies.
Tags : 
cisco webex, meeting center, security, web conferencing, video conferencing, fedramp
    
Cisco
Published By: IBM     Published Date: Oct 12, 2015
This IBM-commissioned profile of government information management professionals examines the challenges of dealing with the increase in digital and unstructured content as well as the roles that shared capture service and improved case management.
Tags : 
ibm, forrester, digital, engagement, forrester technology, information management
    
IBM
Published By: IBM     Published Date: Apr 19, 2016
The use of analytics will define the successful midmarket business of the next decade, just as it will define the successful larger organization in this information age. The past decade has seen rapid change in the business climates with an explosion of global competition and economic uncertainty. Despite this, many midmarket companies have thrived by using their size and agility as a competitive advantage. Certainly they have fewer resources than large corporations who are able to invest large sums in IT. However, small yachts can turn and adjust their course much quicker than large cruise ships. The same came be said for midmarket companies. The most successful organizations are ones that can react the quickest to changes in the market place. Midmarket companies can take advantage of their smaller size by being more agile and quicker to change, or even reinvent themselves, to respond to the market.
Tags : 
ibm, ibm pure data system, big data, data analytics, analytics architecture, competitive advantage, midmarket organization
    
IBM
Published By: IBM     Published Date: Jul 08, 2016
Big data analytics offer organizations an unprecedented opportunity to derive new business insights and drive smarter decisions. The outcome of any big data analytics project, however, is only as good as the quality of the data being used. Although organizations may have their structured data under fairly good control, this is often not the case with the unstructured content that accounts for the vast majority of enterprise information. Good information governance is essential to the success of big data analytics projects. Good information governance also pays big dividends by reducing the costs and risks associated with the management of unstructured information. This paper explores the link between good information governance and the outcomes of big data analytics projects and takes a look at IBM's StoredIQ solution.
Tags : 
ibm, idc, big data, data, analytics, information governance
    
IBM
Published By: IBM     Published Date: Jan 27, 2017
As with most innovations in business information technology, the ultimate truth about cloud lies somewhere in between. There is little doubt that cloud-based infrastructures offer an immediate opportunity for smaller organizations to avoid the costly investment needed for a robust on-premises computing environment. Data can be found, processed and managed on the cloud without investing in any local hardware. Large organizations with mature on-premises computing infrastructures are looking to Hadoop platforms to help them benefit from the vast array of structured and unstructured data from cloud-based sources. Organizations have feet in both cloud and on-premises worlds. In fact, one could easily argue that we already live in a “hybrid” world.
Tags : 
    
IBM
Published By: IBM     Published Date: Jan 27, 2017
Cloud- based data presents a wealth of potential information for organizations seeking to build and maintain competitive advantage in their industries. However, as discussed in “The truth about information governance and the cloud,” most organizations will be challenged to reconcile their legacy on- premises data with new third- party cloud- based data. It is within these “hybrid” environments that people will look for insights to make critical decisions.
Tags : 
    
IBM
Published By: IBM     Published Date: Jan 27, 2017
Cloud-based data presents a wealth of potential information for organizations seeking to build and maintain a competitive advantage in their industry. However, as discussed in “The truth about information governance and the cloud,” most organizations will be confronted with the challenging task of reconciling their legacy on-premises data with new, third-party cloud-based data. It is within these “hybrid” environments that people will look for insights to make critical decisions.
Tags : 
    
IBM
Published By: IBM     Published Date: Apr 14, 2017
Cloud-based data presents a wealth of potential information for organizations seeking to build and maintain competitive advantage in their industries. However, as discussed in “The truth about information governance and the cloud,” most organizations will be challenged to reconcile their legacy on-premises data with new third-party cloud-based data. It is within these “hybrid” environments that people will look for insights to make critical decisions.
Tags : 
data integration, lifecycle management, hybrid environment, cloud-based data, information governance, decision making
    
IBM
Published By: IBM     Published Date: Jul 06, 2017
Effectively using and managing information has become critical to driving growth in areas such as pursuing new business opportunities, attracting and retaining customers, and streamlining operations. In the era of big data, you must accommodate a rapidly increasing volume, variety and velocity of data while extracting actionable business insight from that data, faster than ever before. These needs create a daunting array of workload challenges and place tremendous demands on your underlying IT infrastructure and database systems. In many cases, these systems are no longer up to the task—so it’s time to make a decision. Do you use more staff to keep up with the fixes, patches, add-ons and continual tuning required to make your existing systems meet performance goals, or move to a new database solution so you can assign your staff to new, innovative projects that move your business forward?
Tags : 
database, growth, big data, it infrastructure, information management
    
IBM
Published By: IBM     Published Date: Jul 06, 2017
Known by its iconic yellow elephant, Apache Hadoop is purpose-built to help companies manage and extract insight from complex and diverse data environments. The scalability and flexibility of Hadoop might be appealing to the typical CIO but Aberdeen's research shows a variety of enticing business-friendly benefits.
Tags : 
data management, yellow elephant, business benefits, information management
    
IBM
Published By: Group M_IBM Q1'18     Published Date: Dec 19, 2017
As organizations develop next-generation applications for the digital era, many are using cognitive computing ushered in by IBM Watson® technology. Cognitive applications can learn and react to customer preferences, and then use that information to support capabilities such as confidence-weighted outcomes with data transparency, systematic learning and natural language processing. To make the most of these next-generation applications, you need a next-generation database. It must handle a massive volume of data while delivering high performance to support real-time analytics. At the same time, it must provide data availability for demanding applications, scalability for growth and flexibility for responding to changes.
Tags : 
database, applications, data availability, cognitive applications
    
Group M_IBM Q1'18
Published By: Group M_IBM Q2'19     Published Date: Apr 03, 2019
As the information age matures, data has become the most powerful resource enterprises have at their disposal. Businesses have embraced digital transformation, often staking their reputations on insights extracted from collected data. While decision-makers hone in on hot topics like AI and the potential of data to drive businesses into the future, many underestimate the pitfalls of poor data governance. If business decision-makers can’t trust the data within their organization, how can stakeholders and customers know they are in good hands? Information that is not correctly distributed, or abandoned within an IT silo, can prove harmful to the integrity of business decisions.
Tags : 
    
Group M_IBM Q2'19
Published By: Oracle     Published Date: Jan 28, 2019
Databases tend to hold an organization’s most important information and power the most crucial applications. It only makes sense, then, to run them on a system that’s engineered specifically to optimize database infrastructure. Yet some companies continue to run their databases on do-it-yourself (DIY) infrastructure, using separate server, software, network, and storage systems. It’s a setup that increases risk, cost, complexity, and time spent deploying and managing the systems, given that it typically involves at least three different IT groups.
Tags : 
    
Oracle
Published By: Dassault Systèmes     Published Date: Jun 19, 2018
This paper introduces a brief explanation of digital continuity and the opportunities and threats that it faces. The movement of product information to the digital domain in the 21st century has meant that we do not have physical items, like pieces of paper, which we can authenticate as being reliable information for decision making. Digital continuity is meant to remedy shortcomings of the digital environment by ensuring that information is unique, authoritative, current, and consistent, or more simply, has the characteristic of singularity. This paper includes: • Digital continuity within the Product Lifecycle • Digital continuity within manufacturing • Threats to digital continuity If we implement digital continuity correctly, we have all the advantages of the singularity of paper documents, but with the instantaneous and simultaneous ability to access the latest, updated information. Offered Free by: Dassault Systemes
Tags : 
    
Dassault Systèmes
Published By: CA Technologies     Published Date: Jan 06, 2014
Why should organizations take insider threats seriously? Because the stakes have never been higher, especially given the value enterprises place on intellectual capital and trade secrets.
Tags : 
mediacom, insider threats, substantial threats, bladley manning, edward snowden, malicious insiders, exploited insiders, sensitive information, steal information, secure data, secure passwords, security breaches, broken privacy, reputational damage, cyber-security, business closures, business security, insider rights, threat environment
    
CA Technologies
Published By: Schneider Electric     Published Date: May 04, 2016
This paper discusses how an automated system helps pipeline operators comply with new federal regulations by safely reducing demands placed on controllers and the fatigue often associated with their tasks.
Tags : 
pipeline integrity, oil and gas, pipelines, control room, control room management, leak detection, schneider electric, telvent, lars larrsen, kelly doran
    
Schneider Electric
Published By: Avaya     Published Date: Jan 15, 2014
Be guided on what the best practices are, offering strategies, actionable tactics, and examples of enterprises on the cutting edge so your organization won't have an overabundance of options when working with partners and customers.
Tags : 
avaya, collaboration, effective enterprise, effective collaboration, new culture, broadcasting center, organizational roles, customer experience, customer satisfaction, the cloud, cloud center, cloud contact center, best practices, actionable tactics, collaboration technology, integration, change management, command and control, information age, distance barriers
    
Avaya
Published By: CA WA     Published Date: May 12, 2008
Emerging information technologies like composite and multi-tier applications, service oriented architectures (SOA), virtualization, grid and cluster computing, and Web Service-based application delivery create an extraordinary opportunity for IT managers. With these dynamic technologies, they can provide business owners with IT services that are extremely flexible and agile, driving a more dynamic and competitive business.
Tags : 
ca wa, workload automation, roi
    
CA WA
Published By: EMC Corporation     Published Date: May 27, 2014
The information security mission is no longer about implementing and operating controls. This report by the Security for Business Innovation Council (SBIC) describes how information security teams are transforming to include a much broader set of technical and business-centric activities, to better manage the wider risks to information assets.
Tags : 
emc, security operations, security analytics, intelligence-driven security, threat detection, security monitoring, critical incident response
    
EMC Corporation
Published By: Citrix Systems     Published Date: Sep 17, 2015
Explore 10 reasons why app and desktop virtualization should be the foundation for your layered approach to information security.
Tags : 
information security, mobility, risk management, consumerization
    
Citrix Systems
Published By: Wisegate     Published Date: Nov 02, 2011
IT and security execs share practical advice on what it takes to lead a successful IT implementation and lessons learned from from the trenches.
Tags : 
governance, risk and compliance (grc), identity and access management (iam), it project management, it best practices
    
Wisegate
Published By: Forrester     Published Date: May 10, 2012
In the never-ending race to stay ahead of the competition, companies are developing advanced capabilities to store, process, and analyze vast amounts of data from social networks, sensors, IT systems, and other sources to improve business intelligence and decisioning capabilities.This report will help security and risk professionals understand how to control and properly protect sensitive information in this era of big data.
Tags : 
data-centric security, information protection, information management, data protection, security, risk and compliance, data warehousing
    
Forrester
Published By: hybris software     Published Date: Aug 01, 2012
It's true that deploying B2B e-commerce platform involves many unique requirements not commonly found in B2C operations, such as incorporating a complex product port-folio, multiple distribution channels, and integrating with third party systems And yet, it's possible to complete an initial out-of-the-box B2B implementation within three months, if all the right critical path steps are followed. Additional features and functionality can be added after the initial launch, provided that the chosen out-of-the-box platform is designed to be used over the long run.
Tags : 
information technology, finance, analytics, maerchandising, product management, marketing, mapping, requirements gathering, design, construction, deployment, e-commerce, b2b, on premise, on demand, agility of solution, systems integration, speed, branding
    
hybris software
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.