HIT Consultant Insightful coverage of healthcare innovation
 

it discovery

Results 26 - 50 of 215Sort Results By: Published Date | Title | Company Name
Published By: Appcito     Published Date: Apr 09, 2015
Social media marketing ?rm ViralMint rolled out a new feature that proved so popular that the increased customer tra?c swamped the capabilities of the existing load balancer solution and greatly increased application response times. Lacking visibility into the volume or nature of its tra?c, ViralMint had no clues for how to address its issues. A fortuitous conversation led to discovery of the Appcito Cloud Application Front End (CAFE) service, which allowed ViralMint to gain control of its cloud application tra?c, retain its customers’ trust and build on its unexpected success.
Tags : 
customer traffic, load balancer solution, application response times, visibility, cloud application service, cloud application delivery, aws, amazon web services
    
Appcito
Published By: Avi Networks     Published Date: Mar 06, 2019
OpenShift-Kubernetes offers an excellent automated application deployment framework for container-based workloads. Services such as traffic management (load balancing within a cluster and across clusters/regions), service discovery, monitoring/analytics, and security are a critical component of an application deployment framework. Enterprises require a scalable, battle-tested, and robust services fabric to deploy business-critical workloads in production environments. This whitepaper provides an overview of the requirements for such application services and explains how Avi Networks provides a proven services fabric to deploy container based workloads in production environments using OpenShift- Kubernetes clusters.
Tags : 
    
Avi Networks
Published By: IBM     Published Date: Jul 11, 2012
This paper discusses the challenges of managing applications in highly dynamic IT environments such as public and private Clouds. Modern enterprise applications are engineered for agility and are frequently deployed over flexible IT infrastructures.
Tags : 
modern applications, architectures, infrastructure, cloud, dynamic it, web traffic, scalability, reliability, flexibility, public cloud, private cloud, mission-critical applications, custom applications, service oriented architecture, soa, virtualization, addm, diagnostics, discovery, end-user monitoring
    
IBM
Published By: Riverbed     Published Date: Oct 17, 2012
As your business needs become more dynamic, monitoring systems will be key to understanding how applications fulfill business needs. With complexity growing at a fast rate, application discovery and mapping will soon be mandatory.
Tags : 
riverbed, application visibility, infrastructure monitoring, it infrastructure
    
Riverbed
Published By: CA Technologies EMEA     Published Date: Aug 07, 2017
A big part of GDPR compliance will focus on how data is collected going forward. But a substantial emphasis will fall on the data businesses already hold. With many mainframes containing generations-old data, a manual data audit is completely unrealistic. That’s where CA comes in. CA Data Content Discovery enables organizations to find, classify and protect mission essential mainframe data—three valuable steps toward achieving GDPR compliance.
Tags : 
gdpr, personal data, social information, ip addresses, ca technologies, mainframe security, anonymize data, privacy projects
    
CA Technologies EMEA
Published By: Trend Micro SPN     Published Date: May 15, 2009
Measuring the effectiveness of your security infrastructure is key to any enterprise as threats change on a minute by minute basis. See an example of the report you would receive following a Trend Micro Threat Discovery Assessment.
Tags : 
trend micro, trend, cloud-client, malware, anti-virus, hijacked, fraud, virus, security, threat discovery assessment, secure, threat discovery, worms, trojans, infected, recovering, instant messaging
    
Trend Micro SPN
Published By: Larsen & Toubro Infotech(LTI)     Published Date: Mar 28, 2019
US Based multinational technology conglomerate were having too many business critical incidents and lot of manual efforts. Leveraging LTI’s Mosaic Discovery solution various issues were detailed out accordingly to identify impacting business processes. Download complete case study.
Tags : 
    
Larsen & Toubro Infotech(LTI)
Published By: Cisco     Published Date: Jan 15, 2015
For nearly 10 years, viruses endured as the primary method of attack, and over time they were largely matched by defenders’ ability to block and protect against them. Motivated by the notoriety and the knowledge gained by the discovery and publicizing of new vulnerabilities, attackers continued to innovate. What ensued were distinct threat cycles, an “arms race,” so to speak. Approximately every five years attackers would launch new types of threats— from macroviruses to worms to spyware and rootkits—and defenders would quickly innovate to protect networks from them.
Tags : 
attacks, viruses, protection, networks, threats, arms race, vulnerabilities, macroviruses, worms, spyware, rootkits, defenders
    
Cisco
Published By: LexisNexis     Published Date: Mar 25, 2013
In this case study, Beasley Allen saves $100,000 in E-Discovery costs on one case with the use of LAW PreDiscovery. Learn how it delivers the fastest return of investment of any software product the firm has acquired by use in one litigation matter.
Tags : 
beasley allen, law prediscovery costs, save, civil litgation costs
    
LexisNexis
Published By: Frontrange     Published Date: Mar 13, 2013
Recent new technology introductions are fundamentally changing the way we utilize and manage IT resources. This whitepaper shows how these new processes and automation solutions deliver the agility and extensibility to maintain performance and relia
Tags : 
it service management, itsm, service desk, service catalog, service management software, mobile service management, cloud itsm, service manager, help desk software, hybrid it service management, heat help desk, client management, network discovery software, software audit, pc hardware inventory software, hardware software inventory, hardware inventory, pc hardware inventory, audit service level agreement, network inventory
    
Frontrange
Published By: Infoblox     Published Date: Sep 09, 2014
With trends like virtualization and BYOD making networks more complex, the need for accurate and dynamic IP address management (IPAM) is growing. Learn how to implement an IPAM solution that centralizes information to create highly efficient teams.
Tags : 
infoblox_dns_dhcp_ipam, infoblox_ddi, infoblox_dns, infoblox_ipam, infoblox_dhcp, infoblox_ip_address_management, dhs_dhcp_ipam, dns, domain_name_server, dhcp, dynamic_host_configuration_protocol, ipam, ip_address_management, internet_protocol_address_management, ddi, dns server, dhs_dhcp_server, network_control, network_automation, network_availability
    
Infoblox
Published By: IBM     Published Date: Feb 05, 2015
This new research — based on data collected in May 2013 from 29 organizations using visual data discovery and 95 that were not — reinforces those findings. In addition, Aberdeen's research demonstrates that visual data discovery can help to usher in a different approach to analytics, an approach that is far more user driven.
Tags : 
advanced analytics, visual data discovery, managed reporting, data discovery tools
    
IBM
Published By: McAfee     Published Date: Jan 28, 2013
Re-think your DLP — This white paper discusses how a new DLP model aligns data discovery, classification, policy management, and security controls to your business requirements and processes.
Tags : 
dlp, business-centric dlp, dlp business rules, discovery, classification, policy management, security controls
    
McAfee
Published By: Carbonite     Published Date: Aug 02, 2017
The risk and downtime associated with server migration have prevented many IT organizations from making the move to cloud. Some have valid concerns about cloud lock-in. Still, without cloud, IT teams are less agile, less flexible and less able to meet the demands of their business. With so much C-suite awareness of the cloud competitive edge, IT can no longer avoid taking this step. Carbonite DoubleTake™ Cloud Migration Center quickly and easily migrates physical, virtual and cloud workloads over any distance with minimal risk and near-zero downtime. The streamlined process automates 100 manual steps into five easy steps, automating everything from server discovery to target VM provisioning to the ultimate cutover. Using efficient real-time, byte-level replication technology, Cloud Migration Center creates a replica of the entire server being migrated and keeps it in sync with production systems. The migrated data can be validated without disrupting business operations, and downtime is
Tags : 
carbonite, cloud migration, automation, virtual workload, cloud workload
    
Carbonite
Published By: IBM Watson Health     Published Date: Jul 06, 2018
The need Carson Tahoe Health needed insights to convince its board that an outpatient palliative care program could help address its higher-thanaverage mortality rates and help decrease the risk of future financial impact from those rates The solution The healthcare system used IBM® CareDiscovery to track and analyze end-stage patient mortality and related length of stay, readmissions, utilization and costs in key disease groups—by comparing those who participated in trial inpatient palliative care and those who did not The benefit The analysis was used to demonstrate to the system’s board that an outpatient palliative care service line was viable in terms of both cost savings and quality-of-care improvement
Tags : 
    
IBM Watson Health
Published By: IBM Watson Health     Published Date: Jul 09, 2018
Gaps in care in health systems cause higher mortality rates and inflate costs. Download this case study for a closer look at how one health system used IBM CareDiscovery data to prove to their board that an outpatient palliative care service line was viable in both cost savings and quality of care improvement.
Tags : 
mortality rates, quality of care, palliative care, care continuum, clinical performance improvement, ibm, carediscovery, roi, value-based care, episode-of-care, mortality data, process-of-care model, hospital insights, health system insights
    
IBM Watson Health
Published By: IBM     Published Date: Oct 22, 2014
A case study on how a major oil and gas producer saves 35 percent on data storage costs and 30 percent in litigation-related costs by adopting a smarter data discovery and defensible disposal strategy, using IBM Enterprise Content Management solutions.
Tags : 
legacy data, data storage costs, data storage, content management
    
IBM
Published By: Comview     Published Date: Dec 10, 2014
Download this white paper, and uncover the steps this HIT team took to manage their IT and telecommunications portfolio, translating to millions in savings on their operations budget! Discover the hidden costs of your organization’s technologies, and their massive impact on the annual IT and telecom budget.
Tags : 
comview, telecom management, telecom expense management, healthcare telecom, it budget, telecom budget
    
Comview
Published By: Oracle Corporation     Published Date: Mar 01, 2013
Find out how to change the game with Oracle Endeca Information Discovery.
Tags : 
oracle, oracle endeca, information discovery
    
Oracle Corporation
Published By: Frontrange     Published Date: Mar 13, 2013
Managing IT services has rarely been as challenging as it is today. The solution is to adopting a standards-based strategy that automates IT service management. This white paper examines what’s holding IT back and offers a potential way forward.
Tags : 
it service management, itsm, service desk, service catalog, service management software, mobile service management, cloud itsm, service manager, help desk software, hybrid it service management, heat help desk, client management, network discovery software, software audit, pc hardware inventory software, hardware software inventory, hardware inventory, pc hardware inventory, audit service level agreement, network inventory
    
Frontrange
Published By: Shavlik Technologies     Published Date: Dec 15, 2010
Now you can have easy SaaS-based Discovery and Reporting on all Physical and Virtual Systems, Security Update Status and Assets in Minutes.
Tags : 
shavlik, cloud-based it management, saas, discovery and reporting, virtual systems, security update, netchk protect, virtual infrastructure
    
Shavlik Technologies
Published By: Infoblox     Published Date: Nov 07, 2013
Failure to meet compliance can result in fines, dangerous network exposure and damage to a company’s reputation. Traditional techniques leave many organizations at risk. Read this white paper to learn 7 critical steps to achieve network compliance.
Tags : 
infoblox_network_automation, infoblox netmri, infoblox_switch_port_manager, infoblox_automation_change_manager, infoblox_spm, infoblox_acm, network_automation, netmri, spm, acm, switch_port_manager, automation_change_manager, change_and_configuration, compliance_manager, network_compliance, network_complexity, multi-vendor_network, network_change_configuration, network_discovery
    
Infoblox
Published By: Numara Software     Published Date: Jul 09, 2009
In this informative webinar, you will learn about the challenges of implementing configuration management along with suggestions on how to get started, and best practices to ensure success. You will also learn how Numara® FootPrints® Configuration Management, with its fast implementation, practical approach to implementing configuration management and automated integration to auto-discovery tools, takes the pain and time out of creating and maintaining a functional CMDB. Learn more today!
Tags : 
configuration management, cmdb, numara, footprints, auto-discovery tools, hardware, itil, service management, call volume, it budget, service channel management, customer experience, sla, service management solution, projects, surveys, workflow, service desk, tracking, billing
    
Numara Software
Published By: Spectrum Enterprise     Published Date: Jun 05, 2017
FRONTEO provides end-to-end project management, litigation consulting and eDiscovery solutions for a global base of law firms and corporations. To meet customers’ time-critical information needs, Chief Operating Officer David Wilner, requires connectivity and data center solutions that can handle hundreds of terabytes of data—reliably and at top speeds. That’s why, by 2013, Wilner could no longer tolerate the reliability issues he was having with the company’s previous network provider. In search of a better partner, Wilner’s team chose Spectrum Enterprise. Unlike other providers who, Wilner felt, take little accountability for network reliability, he appreciated that— same as FRONTEO itself—Spectrum Enterprise offered a true end-to-end solution.
Tags : 
    
Spectrum Enterprise
Published By: CA ITAM     Published Date: Sep 09, 2008
This white paper discusses how to make the leap from basic asset tracking to a more robust asset management program that can improve decision-making and service levels, reduce costs and mitigate risks. The focus is the CA IT Asset Management solution's ability to accelerate your IT Asset Management program's maturity by providing asset ownership information (the complement to discovery information).
Tags : 
    
CA ITAM
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.