HIT Consultant Insightful coverage of healthcare innovation
 

it discovery

Results 176 - 200 of 215Sort Results By: Published Date | Title | Company Name
Published By: SAS     Published Date: Oct 18, 2017
When designed well, a data lake is an effective data-driven design pattern for capturing a wide range of data types, both old and new, at large scale. By definition, a data lake is optimized for the quick ingestion of raw, detailed source data plus on-the-fly processing of such data for exploration, analytics and operations. Even so, traditional, latent data practices are possible, too. Organizations are adopting the data lake design pattern (whether on Hadoop or a relational database) because lakes provision the kind of raw data that users need for data exploration and discovery-oriented forms of advanced analytics. A data lake can also be a consolidation point for both new and traditional data, thereby enabling analytics correlations across all data. To help users prepare, this TDWI Best Practices Report defines data lake types, then discusses their emerging best practices, enabling technologies and real-world applications. The report’s survey quantifies user trends and readiness f
Tags : 
    
SAS
Published By: Cisco     Published Date: Jan 15, 2015
For nearly 10 years, viruses endured as the primary method of attack, and over time they were largely matched by defenders’ ability to block and protect against them. Motivated by the notoriety and the knowledge gained by the discovery and publicizing of new vulnerabilities, attackers continued to innovate. What ensued were distinct threat cycles, an “arms race,” so to speak. Approximately every five years attackers would launch new types of threats— from macroviruses to worms to spyware and rootkits—and defenders would quickly innovate to protect networks from them.
Tags : 
attacks, viruses, protection, networks, threats, arms race, vulnerabilities, macroviruses
    
Cisco
Published By: Kaspersky     Published Date: Jan 22, 2016
Hardly a day goes by without the discovery of a new cyber threat somewhere in the world! But how do you keep up with new malware and evolving cybercriminal tricks?
Tags : 
kaspersky, cybercrime, hackers, malware, threat protection
    
Kaspersky
Published By: Smarsh     Published Date: Feb 27, 2014
Financial Services firms are moving into a new phase in the evolution of communications oversight and face challenges ranging from new and changing regulations to employee privacy. Learn how legal, compliance and IT professionals are managing compliance and e-discovery for email, Web, IM, social media, enterprise social networks, corporate issued mobile devices and the bring your own device (BYOD) trend.
Tags : 
compliance, e-discovery, archiving, enterprise, communications compliance, email archiving, social media archiving, byod
    
Smarsh
Published By: Smarsh     Published Date: Feb 27, 2014
Recent Microsoft® Exchange editions have basic archiving functionality, but highly regulated and publicly-held companies are likely to require more sophisticated third-party archiving solutions with advanced compliance, e-discovery and legal hold capabilities. Read this report to learn why content should be archived, what native archiving functionality in Exchange can (and cannot) do and recommendations for defining your archiving practices.
Tags : 
compliance, e-discovery, archiving, enterprise, communications compliance, email archiving, social media archiving, byod
    
Smarsh
Published By: Evergage, Inc.     Published Date: Dec 11, 2015
If you’re looking for inspirational examples of real-time personalization on your e-commerce site, download our FREE eBook, Real-Time Personalization Look Book: Great Ideas & Examples for E-Commerce, and start turning more shoppers into buyers, reduce shopping cart abandonment and lift revenues on your site today!
Tags : 
real-time personalization, e-commerce sites, buyer experience, customer loyalty, product discovery, customer targeting
    
Evergage, Inc.
Published By: Riverbed     Published Date: Sep 05, 2014
Information is becoming the currency of the 21st century, and organizations of all sizes are creating more information than ever before. Frequently, organizations struggle with how best to balance storage requirements with available budgets. The benefits of greater storage capacity are clear: better change management and roll-back, easier archival and discovery, reliable backup and recovery. But to continually grow on-site capacity requires unsustainable investment and introduces unnecessary risk. Prominent cloud service providers present an appealing alternative with their vast amounts of storage, offering low cost, high availability, and built-in redundancy. Riverbed’s Whitewater® family of cloud storage gateways is a drop-in replacement for existing tape- and diskbased backup targets, cuts backup costs 30-50% compared to tape and disk, and provides effective DR capability with minimal effort.
Tags : 
data security, cloud storage, gateways, requirements, archival, discovery, management
    
Riverbed
Published By: Inside HPC Media LLC     Published Date: Sep 24, 2019
Artificial Intelligence (AI) is rapidly becoming an essential business and research tool, providing valuable new insights into corporate data and delivering those insights with high velocity and accuracy. Enterprises, universities, and government organizations are investing tremendous resources to develop a wide array of future-focused Deep Learning (DL) and Machine Learning (ML) solutions such as: • Autonomous vehicles that circulate unassisted in our cities • Real-time fraud detection that protects shopping and internet transactions • Natural language translators that remove language barriers • Augmented reality that delivers a far richer entertainment experience • Accelerated drug discovery • Fully enabled personalized medicine and remote health diagnostics
Tags : 
    
Inside HPC Media LLC
Published By: Oracle Corporation     Published Date: Mar 01, 2013
Answering the Million Dollar Question with Oracle Endeca
Tags : 
oracle, oracle endeca, social media, product reviews, oracle endeca information discovery.
    
Oracle Corporation
Published By: Oracle Corporation     Published Date: Mar 01, 2013
Find out how to change the game with Oracle Endeca Information Discovery.
Tags : 
oracle, oracle endeca, information discovery
    
Oracle Corporation
Published By: IBM     Published Date: Jan 26, 2015
There is an exponential increase in connected devices that are producing data about our homes, health, cars, and everything in between. The Internet of things (IoT) is exploding into apps that allow users to see and interact with these devices. Watson can enable IoT apps to understand the meaning and intent of the users that interact with these connected devices. Check out this webcast to learn how the cognitive services from IBM Watson available on Bluemix can make IoT apps be intelligent, overcome complexity, and support discovery and decision making.
Tags : 
ibm, bluemix, big data, intent, iot
    
IBM
Published By: Oracle     Published Date: Dec 11, 2014
"Hopeful messaging is wasted messaging. Clear targeting means more than just Who. It also demands a knowledge of How, When, and What. Read this quick guide on what you can do to ensure your web pages and white papers, social posts, and search optimization are primed and ready for any “road to discovery” your audience takes. Get a clearer picture of who is involved in the buying process. Download the “Modern Marketing Essentials How-To Guide: Targeting”
Tags : 
oracle, marketing cloud, targetting, persona-driven communication, segmentation, database transformation
    
Oracle
Published By: Bloofusion     Published Date: Mar 01, 2010
Use the ten tough questions to quiz and help select your next SEO firm more effectively. Whether you are a CMO at billion dollar software firm or running your own online enterprise, at some point optimizing your site for discovery and favorable ranking by search engines for the terms that result in lead generation or purchase will become a priority.
Tags : 
bloofusion, ecommerce, url, ids, seo, cookie, optimization, tags
    
Bloofusion
Published By: IBM     Published Date: Feb 18, 2015
UrbanCode Deploy provides extensive capabilities for configuring WebSphere Application Server (WAS) through plug-ins: Application Deployment for WebSphere - which enables the auto-discovery of WAS cells; and Middleware Configuration for WebSphere - which allows for management of WAS configurations. When combined, UrbanCode Deploy and these plug-ins enable a rapid, controlled method for continuous delivery to WebSphere Application Servers.
Tags : 
application delivery, websphere, ibm, urbancode, application server
    
IBM
Published By: ProofSpace     Published Date: Jul 31, 2007
This paper details the processes by which ProofMark tags electronic records with a self-validating cryptographic seal that acts as a "tamper indicator" based on a true and provable time-reference datum.  With this it is able to provide instantaneous and irrefutable proof of authenticity, no matter where the data resides or who has controlled it.
Tags : 
proofspace, proofmark, proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data
    
ProofSpace
Published By: ProofSpace     Published Date: Aug 07, 2007
This white paper presents a solution framework for Life Science Organizations that want to implement enterprise digital trust management to protect their electronic value chain.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, time stamp
    
ProofSpace
Published By: ProofSpace     Published Date: Aug 08, 2007
Digital signatures aren't enough. This paper posits that data integrity needs to be redefined within the context of a time-sensitive mechanism.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, time stamp
    
ProofSpace
Published By: ProofSpace     Published Date: Aug 17, 2007
This white paper defines the life cycle of an electronically signed record and describes  the requirements for handwritten signature-equivalence throughout its retention period.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography
    
ProofSpace
Published By: ProofSpace     Published Date: Sep 10, 2007
Read this paper and learn the principles that are prerequisites to enforceable electronic agreements as required by existing legal standards and electronic signature legislation.  This paper will also specify sixteen measurement criteria that can be used as metrics to assess whether the architecture of an electronic transaction will meet the requirements of admissibility.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography
    
ProofSpace
Published By: CA ITAM     Published Date: Sep 09, 2008
This white paper discusses how to make the leap from basic asset tracking to a more robust asset management program that can improve decision-making and service levels, reduce costs and mitigate risks. The focus is the CA IT Asset Management solution's ability to accelerate your IT Asset Management program's maturity by providing asset ownership information (the complement to discovery information).
Tags : 
    
CA ITAM
Published By: Mimosa Systems     Published Date: Jan 14, 2009
This paper describes how Cost and Breakeven Analysis of Email Discovery Using Mimosa NearPoint Email Archiving with eDiscovery Option. This customer is one of the largest manufacturers and marketers of healthcare supplements in North America with corporate headquarters in California. The company wanted to solve two related problems: eDiscovery risk and cost and PST propagation.
Tags : 
mimosa systems, ediscovery option, ediscovery risk, pst propogation, mimosa nearpoint
    
Mimosa Systems
Published By: Mimosa Systems     Published Date: Jan 14, 2009
Email archiving is emerging as a critical new IT application for managing email. For legal discovery, storage management, and regulatory compliance, email archiving provides important benefits that cannot be achieved with native email applications. The purpose of this “Email Archiving 101” paper is to provide a basic introduction to email archiving and explain how it benefits management of the email application server. The leading enterprise email application is Microsoft® Exchange Server, and this paper is geared toward this application; however, the principles discussed apply to all messaging applications.
Tags : 
mimosa systems, email archiving, mimosa nearpoint, microsoft exchange server, email applications, enterprise email application
    
Mimosa Systems
Published By: Mimosa Systems     Published Date: Jan 14, 2009
This white paper will present an improved approach to legal discovery for Microsoft® Exchange systems provided by Mimosa Systems. Unlike existing methods for legal discovery of Exchange Server data, Mimosa’s approach delivers major advances in performance and granularity of information. To begin this paper, we will review the industry forces that are driving the need to manage email for legal discovery, followed by a discussion of the market-leading enterprise messaging application—Microsoft Exchange Server and the challenges it presents for legal discovery.
Tags : 
mimosa systems, microsoft exchange systems, legal discovery, email for legal discovery
    
Mimosa Systems
Published By: Ecessa Corporation     Published Date: Mar 11, 2009
Download this white paper to discovery the site-to-site channel bonding capabilities of PowerLink. Site-to-site channel bonding enables two or more sites with PowerLink installed to communicate with each other using the combined throughput of one or more connected WAN links. Learn more today!
Tags : 
adsl load balancing, vpn load balancing and redundancy, bandwidth aggregation, qos, bandwidth control, bandwidth management, multi-homing, bgp multihoming
    
Ecessa Corporation
Published By: IBM Corporation     Published Date: Jun 09, 2011
This Research Brief categorizes databases as a "dangerous and growing security gap" - and offers steps to improve database security across the enterprise.
Tags : 
ibm, guardium, database security, risk, database discovery, vulnerability scanning, penetration testing, user monitoring
    
IBM Corporation
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.