HIT Consultant Insightful coverage of healthcare innovation
 

it discovery

Results 176 - 200 of 215Sort Results By: Published Date | Title | Company Name
Published By: Lenovo - APAC     Published Date: Oct 11, 2018
While many organizations have acknowledged the importance of digitally transforming their businesses and processes to deliver speed and agility, most are just starting their cloud journey. Cloud-in-a-Box delivers an enterprise cloud platform with a mix of on- and off-premises private cloud and public cloud, with orchestration between them. This will provide the organization with the ability to avoid vendor lock-in, find the optimal cloud services for a particular business or technical need, and increase redundancy. Download IDC Infobrief on “Cloud-in-a-Box” to understand: • How you can deliver the different functions of a data center and meet business requirements by deploying a “Cloud-in-a-Box.” • Understand how industries such as financial services, manufacturing and healthcare can benefit from “Cloud-in-a-Box” technology. • Self-discovery questions and focus areas that every organization needs to go through for successful cloud deployment.
Tags : 
    
Lenovo - APAC
Published By: Arbor     Published Date: Sep 15, 2014
In this whitepaper, noted industry analyst Richard Stiennon examines the emerging requirement in the ongoing arms race with threat actors. Despite years of investment in multiple layers of security defenses, every organization is still wide open to targeted attacks. It is practically impossible to stop all possible attacks. Even next-generation firewalls, complete alerting and logging collected in a SIEM, and universal patch management and vulnerability discovery has proven to be ineffective against threat actors who are motivated, skilled and determined. This paper answers the critical questions about security analytics and explains why it is one of the fastest growing product categories in security.
Tags : 
cyber defenses, threat actors, it security, security analytics
    
Arbor
Published By: Shavlik Technologies     Published Date: Dec 15, 2010
Shavlik Security Suite can patch online and offline virtual machines; works both with an agent-based or agentless approach; supports legacy Windows platforms and a wide range of Microsoft and third-party applications; and furthermore provides strong control of scanning options, and a level of automated remediation that is impressive.
Tags : 
shavlik, security suite, virtual machine, legacy windows platform, third-party application, protection management, automated discovery, scanning
    
Shavlik Technologies
Published By: Ecessa Corporation     Published Date: Mar 11, 2009
Download this white paper to discovery the site-to-site channel bonding capabilities of PowerLink. Site-to-site channel bonding enables two or more sites with PowerLink installed to communicate with each other using the combined throughput of one or more connected WAN links. Learn more today!
Tags : 
adsl load balancing, vpn load balancing and redundancy, bandwidth aggregation, qos, bandwidth control, bandwidth management, multi-homing, bgp multihoming
    
Ecessa Corporation
Published By: Mimecast     Published Date: Aug 19, 2009
Businesses over the past ten years have used email archiving solutions in order to meet record retention compliance, facilitate electronic discovery, and control message-related storage costs. Despite these benefits, many organizations still have not adopted an archiving solution and still simply enforce mailbox quotas or message deletion policies as the best way to manage messaging environments.
Tags : 
mimecast, saas, software as a service, email archive, medium-size business, esg, storage
    
Mimecast
Published By: Druva     Published Date: Aug 04, 2016
The rise of the mobile workforce, combined with an increasing risk of litigation, has created a crisis for businesses. When faced with a request for eDiscovery—the production of electronically-stored information (ESI) in the course of a lawsuit or investigation—legal and IT teams must identify and place costly, time-consuming holds on responsive files. These holds apply across devices and repositories, both inside and outside the organization, including SaaS-based cloud applications such as Office 365, Google for Work, and Box. And lest these teams become complacent, saying “It won’t happen here,” it should be noted that in 2014, 34 percent of companies faced at least one lawsuit with more than $20 million at issue.
Tags : 
    
Druva
Published By: Druva     Published Date: Aug 04, 2016
The rise of the mobile workforce, combined with an increasing risk of litigation, has created a crisis for businesses. When faced with a request for eDiscovery—the production of electronically-stored information (ESI) in the course of a lawsuit or investigation—legal and IT teams must identify and place costly, time-consuming holds on responsive files. These holds apply across devices and repositories, both inside and outside the organization, including SaaS-based cloud applications such as Office 365, Google for Work, and Box. And lest these teams become complacent, saying “It won’t happen here,” it should be noted that in 2014, 34 percent of companies faced at least one lawsuit with more than $20 million at issue.
Tags : 
best practices, storage, mobile workforce, technology, data, office 365, mobile device
    
Druva
Published By: Oracle     Published Date: Dec 11, 2014
"Hopeful messaging is wasted messaging. Clear targeting means more than just Who. It also demands a knowledge of How, When, and What. Read this quick guide on what you can do to ensure your web pages and white papers, social posts, and search optimization are primed and ready for any “road to discovery” your audience takes. Get a clearer picture of who is involved in the buying process. Download the “Modern Marketing Essentials How-To Guide: Targeting”
Tags : 
oracle, marketing cloud, targetting, persona-driven communication, segmentation, database transformation
    
Oracle
Published By: SAS     Published Date: Oct 18, 2017
When designed well, a data lake is an effective data-driven design pattern for capturing a wide range of data types, both old and new, at large scale. By definition, a data lake is optimized for the quick ingestion of raw, detailed source data plus on-the-fly processing of such data for exploration, analytics and operations. Even so, traditional, latent data practices are possible, too. Organizations are adopting the data lake design pattern (whether on Hadoop or a relational database) because lakes provision the kind of raw data that users need for data exploration and discovery-oriented forms of advanced analytics. A data lake can also be a consolidation point for both new and traditional data, thereby enabling analytics correlations across all data. To help users prepare, this TDWI Best Practices Report defines data lake types, then discusses their emerging best practices, enabling technologies and real-world applications. The report’s survey quantifies user trends and readiness f
Tags : 
    
SAS
Published By: Oracle Analytics     Published Date: Oct 06, 2017
Business decision making is undergoing a data-infused renaissance. Organizations are tired of the limitations of spreadsheets and dealing with long IT business intelligence (BI) development cycles just to gain access to the data they need now. Fortunately, with the advent of visual analytics and discovery tools (many offered in the cloud), the journey to data insight is getting simpler and faster. Rather than trying to divine meaning from a group of predefined reports or simple static dashboards, visual analytics helps users gain insights from data more quickly using intuitive data visualization. Increasingly, visual analytics tools provide easy-touse data preparation features for better data access. They support collaboration, mashups, and storytelling. TDWI Research sees growing interest in applying more modern, up-to-date tools for working with data.
Tags : 
    
Oracle Analytics
Published By: IBM     Published Date: Jun 04, 2018
"The appearance of your reports and dashboards – the actual visual appearance of your data analysis -- is important. An ugly or confusing report may be dismissed, even though it contains valuable insights about your data. Cognos Analytics has a long track record of high quality analytic insight, and now, we added a lot of new capabilities designed to help even novice users quickly and easily produce great-looking and consumable reports you can trust. Watch this webinar to learn: • How you can more effectively communicate with data. • What constitutes an intuitive and highly navigable report • How take advantage of some of the new capabilities in Cognos Analytics to create reports that are more compelling and understandable in less time. • Some of the new and exciting capabilities coming to Cognos Analytics in 2018 (hint: more intelligent capabilities with enhancements to Natural Language Processing, data discovery and Machine Learning)."
Tags : 
data analysis, data analytics, dashboards
    
IBM
Published By: Smarsh     Published Date: Feb 27, 2014
Recent Microsoft® Exchange editions have basic archiving functionality, but highly regulated and publicly-held companies are likely to require more sophisticated third-party archiving solutions with advanced compliance, e-discovery and legal hold capabilities. Read this report to learn why content should be archived, what native archiving functionality in Exchange can (and cannot) do and recommendations for defining your archiving practices.
Tags : 
compliance, e-discovery, archiving, enterprise, communications compliance, email archiving, social media archiving, byod
    
Smarsh
Published By: BlackBerry     Published Date: Jul 23, 2010
Investing in mobility is like investing in any other important business activity, and its success will largely depend on how closely it is aligned with both business and IT drivers. A successful mobility plan should focus on 'mobilizing' your critical business processes and include planning phases for discovery, development and deployment. This Guide focuses on how to build an effective mobility plan while providing valuable insight into the benefits of mobilizing your business applications.
Tags : 
blackberry, mobility, smartphones, cell phones, mobile workforce, e-commerce, handset, touchpoint
    
BlackBerry
Published By: ProofSpace     Published Date: Aug 08, 2007
Digital signatures aren't enough. This paper posits that data integrity needs to be redefined within the context of a time-sensitive mechanism.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, time stamp
    
ProofSpace
Published By: Mimecast     Published Date: Apr 16, 2009
According to industry analysts, email volume in organizations is growing by more than 30% annually, and the average user receives 7MB of data per day via email. if not more. As a result of this growth, the handling of email has become a critical business, IT and regulatory issue - driving the need for email archiving solutions. Most organizations looking for an email archiving solution are motivated by four reasons: mailbox/server management, compliance/records retention, eDiscovery/litigation support, and knowledge management/IP protection. In addition to these challenges, IT departments want to know how to control costs of the email environment, while keeping important data accessible for business, legal and regulatory users.
Tags : 
mimecast, saas, email solutions, email managemeng, archiving, ediscovery, mailbox, compliance
    
Mimecast
Published By: Mimecast     Published Date: Feb 05, 2010
According to industry analysts, email volume in organizations is growing by more than 30% annually, and the average user receives 7MB of data per day via email. As a result of this growth, the handling of email has become a critical business, IT and regulatory issue - driving the need for email archiving solutions. Most organizations looking for an email archiving solution are motivated by four reasons: mailbox/server management, compliance/records retention, eDiscovery/litigation support, and knowledge management/IP protection.
Tags : 
mimecast, saas, software as a service, email archive, medium-size business, esg, storage
    
Mimecast
Published By: IBM     Published Date: Jun 25, 2018
Vast resources of data are increasingly available, but the sheer volume can overwhelm human capability. By implementing the cognitive system of IBM Watson Discovery into their infrastructure, businesses can extract deeper and more accurate insights by efficiently identifying, collecting and curating structured and unstructured data. Watson Discovery, also capable of creating content collections and custom cognitive applications, can transform organizational processes to extend proprietary content and expert knowledge faster and at greater scales. Read more to learn how Watson Discovery can keep your organization evolving ahead of the competition. Click here to find out more about how embedding IBM technologies can accelerate your solutions’ time to market.
Tags : 
    
IBM
Published By: mindSHIFT     Published Date: Nov 29, 2007
Have you adjusted your data retention policies and electronic discovery procedures to comply with the new Federal Rules of Civil Procedure (FRCP)? Learn how email archiving can help you with these electronic discovery requirements.
Tags : 
frcp, secure content, secure data, data protection, database security, compliance, frcp compliance, data governance
    
mindSHIFT
Published By: ARMA     Published Date: Nov 04, 2014
The relationship between an organization's information-handling practices and the impact those practices have on its ability to respond to electronic discovery is recognized in the Electronic Discovery Reference Model (EDRM). But the EDRM falls short of describing standards or best practices that can be applied to the complex issues surrounding the creation, management, and governance of electronic information. ARMA International's Generally Accepted Record-keeping Principles and its information Governance Maturity Model are designed specifically to provide a scalable, broadly applicable framework to address these issues.
Tags : 
information-handling practices, edrm, electronic discovery, maturity model
    
ARMA
Published By: Microsoft Surface     Published Date: Jun 30, 2017
The Natural Progression of the Digital Experience Our notes are the gatekeepers to discovery. From alternating current to the lithium battery, the flick of a pen is often the first stage of every great idea, but how many other great discoveries and connections have we missed, simply because we didn’t write something down?
Tags : 
    
Microsoft Surface
Published By: Microsoft Surface     Published Date: Jun 30, 2017
The Natural Profession of the Digital Experience Our notes are the gatekeepers to discovery. From alternating current to the lithium battery, the flick of a pen is often the first stage of every great idea, but how many other great discoveries and connections have we missed, simply because we didn’t write something down?
Tags : 
    
Microsoft Surface
Published By: Mimecast     Published Date: Jun 04, 2013
With recent high profile cases, such as the News of the World hacking scandal, hitting the news headlines, the issue of email retention has quickly moved up the IT Director’s agenda.
Tags : 
email archiving, ediscovery, compliance, legal, intrusion prevention, security
    
Mimecast
Published By: IBM     Published Date: Jul 26, 2017
Business leaders are eager to harness the power of big data. However, as the opportunity increases, ensuring that source information is trustworthy and protected becomes exponentially more difficult. If not addressed directly, end users may lose confidence in the insights generated from their data—which can result in a failure to act on opportunities or against threats. Information integration and governance must be implemented within big data applications, providing appropriate governance and rapid integration from the start. By automating information integration and governance and employing it at the point of data creation, organizations can boost confidence in big data. A solid information integration and governance program must become a natural part of big data projects, supporting automated discovery, profiling and understanding of diverse data sets to provide context and enable employees to make informed decisions. It must be agile to accommodate a wide variety of data and seamle
Tags : 
mdm, big data, automation, organization
    
IBM
Published By: Intel Security     Published Date: Oct 20, 2015
Modern hybrid data centers, which embrace physical, virtual, and cloud servers, require a new security mindset. The biggest challenges faced by IT in this type of environment is workload discovery, comprehensive security with minimal performance impact, and management. This white paper offers insights into how McAfee Server Security Suites tackles all of these challenges and provides better visibility across the entire enterprise data center.
Tags : 
data center security, datacenter security, server security, endpoint security, virtual system security, data center virtualization, datacenter virtualization, virtual data center
    
Intel Security
Published By: Spredfast, Inc.     Published Date: Feb 05, 2015
Integrating social sponsorships can be more than a logo. In fact, they should be. When you add social experiences to your sponsorship packages, you’re bringing brand partners all-new ways to engage with audiences and gain valuable exposure. You’re also creating more inventory and new revenue streams for your owned properties. Welcome to the Next Level in Sponsorship outlines 3 basic steps for successfully integrating social into your packages. Up-to-the-minute examples from The NBA, Discovery.com, Toyota, JCPenney®, and other innovators in the sports and media worlds deliver fresh perspectives and creative inspiration. Pump up the value of your sponsorship packages with social. Download our quick-read whitepaper today.
Tags : 
spreadfast, sponsorship, inventory, revenue, social, advertiser, relationship, engage
    
Spredfast, Inc.
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.