HIT Consultant Insightful coverage of healthcare innovation
 

issues

Results 626 - 650 of 943Sort Results By: Published Date | Title | Company Name
Published By: Dell Software     Published Date: Jul 07, 2013
In this new white paper, learn how SQL Server’s event notifications and extended events help prevent performance challenges. See how you can ensure maximum SQL Server performance, and solve problems before they become problems! Read the white paper now.
Tags : 
sql, server performance issues, solve problems, event notifications, extended events, solve challenges, technology, database management
    
Dell Software
Published By: IBM     Published Date: Jul 22, 2016
This research report examines the key issues, and provides recommendations for leveraging data and analytics to help procurement drive greater enterprise value. Based on in-depth interviews with two dozen leading Chief Procurement Officers (CPOs), the report outlines pragmatic steps that every procurement organization can take to leverage analytics and improve engagement with suppliers and key business stakeholders across the enterprise.
Tags : 
ibm, commerce, procurement, analytics, procurement analytics, data, big data, procurement organization
    
IBM
Published By: IBM     Published Date: Jan 05, 2017
This research report examines the key issues, and provides recommendations for leveraging data and analytics to help procurement drive greater enterprise value. Based on in-depth interviews with two dozen leading Chief Procurement Officers (CPOs), the report outlines pragmatic steps that every procurement organization can take to leverage analytics and improve engagement with suppliers and key business stakeholders across the enterprise.
Tags : 
ibm, procurement, commerce, procurement analytics
    
IBM
Published By: Dassault Systèmes     Published Date: Jul 25, 2017
There is a large gap between understanding how important project management is to a successful product launch and how effective a company may be with its actual execution. John Hayes, CEO of Engineering.com, and Jon Gable, former Strategic Planning Director for Dassault Systèmes , team up to bring you a webinar on product development and project management tools. This webinar covers: • Research report findings from 140 product development professionals • Analysis of how product development issues can be addressed • Web-based project management for product development Gain insight into the latest thinking on project management for product development and how project management issues can impact business at the highest level.
Tags : 
project management, company optimization, execution, product development, research report, web based, business impacts
    
Dassault Systèmes
Published By: e-DMZ Security LLC     Published Date: Sep 27, 2010
This white paper discusses key issues and offers innovative solutions to support granting access to production resources.
Tags : 
e-dmz security. emergency access, production access, access control, compliance, developer access, mission-critical, business-critical, datacenter security
    
e-DMZ Security LLC
Published By: AWS     Published Date: Oct 07, 2019
Cyberattacks and undetected threats present constant risks to the safety of critical data and applications. CrowdStrike can help you overcome that risk with unified endpoint protection and real-time monitoring. This solution helps your organization gain visibility across your entire AWS environment and automatically detect and mitigate threats before they impact your business. Register now to learn how CrowdStrike has helped Oak Hill Advisors (OHA), a global investment firm, secure the assets in their AWS environment by immediately assessing issues and automating their incident responses.
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 09, 2019
Cyberattacks and undetected threats present constant risks to the safety of critical data and applications. CrowdStrike can help you overcome that risk with unified endpoint protection and real-time monitoring. This solution helps your organization gain visibility across your entire AWS environment and automatically detect and mitigate threats before they impact your business. Register now to learn how CrowdStrike has helped Oak Hill Advisors (OHA), a global investment firm, secure the assets in their AWS environment by immediately assessing issues and automating their incident responses.
Tags : 
    
AWS
Published By: Metalogix     Published Date: Mar 25, 2014
SharePoint presents many unique backup issues that are not addressed by general disaster recovery solutions. This whitepaper introduces the broad topic of disaster recovery (DR) and how its principles can be specifically applied to the Microsoft SharePoint 2010 and 2013 platforms.
Tags : 
sharepoint, disaster recovery, microsoft, backup, restoration, dr strategy
    
Metalogix
Published By: Sunbelt     Published Date: Jan 15, 2009
This white paper, sponsored by Sunbelt Software, addresses the variety of issues facing organizations today in the context of their system management challenges, and discusses the capabilities of VIPRE Enterprise, an integrated platform that provides high-performance, integrated endpoint protection capabilities.
Tags : 
sunbelt software, system management, vipre enterprise, malware, anti-virus models, anti-spyware tools
    
Sunbelt
Published By: GFI Software     Published Date: Feb 24, 2011
This white paper, sponsored by GFI Software, addresses the variety of issues facing organizations today in the context of their system management challenges, and discusses the capabilities of VIPRE Antivirus Business, an integrated platform that provides high performance, integrated endpoint protection capabilities.
Tags : 
gfi software, sunbelt, malware protection, system management, threats, endpoint infrastructure, viruses, worms
    
GFI Software
Published By: Microsoft     Published Date: Oct 07, 2016
Security was once largely limited to the confines of an on-premises world, but now it must extend to the cloud, as well as a myriad of mobile devices. Employees and companies now expect increasingly complex interactions with devices, apps, data, and even other users. As many companies struggle to keep up with traditional single-point solutions, and limited budgets, this pressure is creating security blind spots for IT. In a world of evolving threats, it is becoming increasingly impossible to address all of these issues with an on-premises solution.
Tags : 
technology, best practices, data, enterprise, business analytics, business intelligence, business management
    
Microsoft
Published By: IBM     Published Date: Jul 17, 2018
Ensuring your data is compliant can be a fairly straightforward task. Your IT team works their way through the checklist, and stays out of trouble with lawyers and regulatory agencies. There’s value to that. But true data protection is more than regulatory compliance. In fact, even if you’re compliant, your organization could still be at risk unless you strategically identify and protect your most valuable data. Traditionally, you’ve been presented with IT security metrics—sometimes reassuring, other times alarming. But simply reviewing IT security metrics is not meaningful in and of itself. As an executive, you don’t evaluate issues in siloes. Instead, you excel at assessing issues in the broader context of your organizational operations. In other words, technical security data and metrics lack value unless viewed through the lens of business risk. When you’re presented with IT security metrics, your question is: What does this mean for my business? And ultimately, what data should I
Tags : 
    
IBM
Published By: Tripp Lite     Published Date: Mar 02, 2015
VoIP is rapidly becoming the standard for voice communications in business, government, education, government and healthcare. It offers capabilities that far exceed traditional phone systems, with unified communication platforms promising to integrate messaging, mobility, collaboration, relationship management, teleconferencing and other advanced features. The transition to VoIP presents a number of challenges like the need to install new equipment in the MDF and the IDFs dispersed throughout your organization's network/telecom wiring closets. Typical closet designs can't handle the increased wattage and heat output of the PoE switches used to power IP phones. In this white paper you'll learn: • The basics of VoIP migration and implementation • What issues to consider when upgrading network/telecom wiring closets for VoIP • What cost-effective solutions are available to power and protect a VoIP network wiring closet
Tags : 
voice traffic, teleconferencing, messaging, mobility, network, platforms, communication, voip
    
Tripp Lite
Published By: Dell Software     Published Date: Jul 24, 2012
Quest Workspacetm Help Desk is a robust help desk solution for small to medium-sized businesses with complex network environments. It provides a powerful combination of management features integrated with a best-of-breed IT help desk platform. Use the help desk software to manage the ticket system workflows, dashboards, reporting and end-user self-service portals. Use the embedded management features within the help desk platform to proactively manage network events, desktops, servers and applications as well as resolve issues faster and more effectively.
Tags : 
help desk, active directory, resolve issues, reports, windows, iphone, priorituze requests, auto escalation
    
Dell Software
Published By: Rackspace     Published Date: Jan 19, 2016
Many companies want to take advantage of public cloud features, but aren’t willing to compromise on the performance, security and control that they require for their business applications and data. Public clouds have the potential to introduce performance issues caused by “noisy neighbors,” security concerns associated with placing sensitive data in a shared infrastructure environment, and a lack of control driven by the inability to customize and fine-tune cloud resources to meet the needs of a given application.
Tags : 
rackspace, private cloud, enterprise, application, data
    
Rackspace
Published By: AVACorp     Published Date: Mar 04, 2011
Tracking risks, assumptions, issues and dependencies in a practical way with proper project management towards better delivery
Tags : 
raid based project management approach
    
AVACorp
Published By: DigitalPersona UK     Published Date: Jul 21, 2011
This white paper shows how integrated security suites can help organizations achieve high security and compliance with internal and external mandates, while also providing lower out-of-pocket costs, simplified management, and no compatibility issues.
Tags : 
fingerprint authentication, identity management, identity protection, data security, identity theft, loss prevention, compliance, strong authentication
    
DigitalPersona UK
Published By: IBM Corporation     Published Date: Sep 20, 2010
This IBM® Redguide™ publication provides a high level overview of the new IBM WebSphere® CloudBurst™ Appliance, including current issues being faced in the information technology (IT) industry and how WebSphere CloudBurst can address many of these issues.
Tags : 
application servers, enterprise software, ibm websphere, application server, middleware, cloudburst appliance, server provisioning
    
IBM Corporation
Published By: Venafi     Published Date: Mar 04, 2015
This technical case study addressing key and certificate security issues is designed for security conscious enterprises to understand real-life attack scenarios that threaten their businesses in today’s world. This white paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches. This paper should be read by more technical IT security staff who are interested in detailed attack methods and remediation tactics. The executive summary is intented for IT Security leaders (CISOs and their direct reports) and addresses the proof-of-concept attack impacts on the business. The attack scenario described in this technical white paper is based on a reproduction of a real-world attack in a Raxis test environment that simulated an enterprise security infrastructure.
Tags : 
venafi, ssh keys, vpn credentials, digital certificates
    
Venafi
Published By: Venafi     Published Date: Mar 26, 2015
This technical case study addressing key and certificate security issues is designed for security conscious enterprises to understand real-life attack scenarios that threaten their businesses in today’s world. This white paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches. This paper should be read by more technical IT security sta? who are interested in detailed attack methods and remediation tactics. The executive summary is intended for IT Security leaders (CISOs and their direct reports) and addresses the proof-of-concept attack impacts on the business.
Tags : 
secutiry, certificates, keys, security attacks, business
    
Venafi
Published By: VMware     Published Date: Aug 16, 2019
It can be stressful to be at the heart of your organization's digital transformation initiatives. You're the IT pro everyone is trusting to balance two top business priorities: maximizing end-user productivity and minimizing threats. Modern management ensures you can do both. Download this customer experience to learn how two IT leaders describe how they are improving employee productivity and addressing complex management issues head-on with a modern approach to management.
Tags : 
    
VMware
Published By: Lane Telecommunications     Published Date: Apr 14, 2009
There is little doubt that Multi Function Peripherals (MFP) offer businesses of all sizes significant benefits: they combine printing, scanning, copying and fax functions in one machine and deliver considerable cost and space savings. They also address some very important business process, management and legal issues faced by virtually every business. Within this discussion document we concentrate on the fax element and look specifically at the integration of MFPs with network fax run through a fax server such as Lane’s Passport Fax Server.
Tags : 
fax over internet protocol, mfp, multi function peripherals, network fax, erp applications, off-the-shelf, compliance, fragmented audit trail
    
Lane Telecommunications
Published By: Domino     Published Date: Oct 05, 2018
Industry 4.0 promises a whole host of benefits to food manufacturers — from reduced errors and more uptime to unprecedented visibility into operations at every step in the process. But for many food manufacturers out there, this is uncharted territory. Getting machines of various vintages connected and communicating seamlessly with each other and with existing control systems can seem like an expensive and difficult proposition. Coding and marking is a great place to start for many companies, since SKU proliferation is putting greater demands on packaging lines and introducing additional opportunities for human error. In this brief white paper, Domino examines five key issues with integrating coding and marking systems that often present challenges for food manufacturers along the road to Industry 4.0.
Tags : 
    
Domino
Published By: HPE     Published Date: Dec 23, 2015
Small and midsized businesses (SMBs) face many challenges as they adapt to today’s new style of doing business. Shifting government regulations, threats to network security, requirements for 24x7 application availability and the demands for new methods to work with customers, suppliers and employees require ongoing investments in IT. These issues impact SMBs even harder because of budget constraints and limited IT resources. SMB’s who learn how to efficiently utilize IT assets and increase IT productivity will be successful.
Tags : 
    
HPE
Published By: CA Mainframe     Published Date: Sep 12, 2008
Compliance requires strong security controls for mainframe environments also. This white paper discusses some major challenges that mainframes bring to compliance, and some key issues that need to be addressed. It also presents some key technologies and approaches that you can use to help you achieve easier compliance for your mainframe systems.
Tags : 
ca mainframe, mainframe, compliance
    
CA Mainframe
Start   Previous    19 20 21 22 23 24 25 26 27 28 29 30 31 32 33    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.