HIT Consultant Insightful coverage of healthcare innovation
 

it users

Results 226 - 250 of 1329Sort Results By: Published Date | Title | Company Name
Published By: Dell and VMWare     Published Date: Jul 24, 2018
A new 14th generation Dell EMC PowerEdge R740xd server equipped with NVIDIA Tesla M10 GPUs and powered by Intel Xeon Scalable processors delivered high-density graphics acceleration in a virtual enterprise environment As more users move to modern, graphics-intensive Microsoft® Windows® 10 environments, companies using a virtual desktop infrastructure (VDI) need increasingly robust server resources to support them. Your company should strive to get the most from each server and maximize datacenter space while providing an excellent end-user experience.
Tags : 
    
Dell and VMWare
Published By: Dell PC Lifecycle     Published Date: Feb 13, 2018
Hardware technology doesn’t last forever. It has a lifecycle, a measurable beginning and end to its productivity and value. IT is tasked with optimizing the PC lifecycle while driving strategic breakthroughs for their organization. However, the high cost and complexity of PC management leaves IT little time for innovation. We offer flexible financing options that help assure IT will always have everything they need, when they need it, to keep end users engaged and productive. Learn more about Dell solutions powered by Intel®.
Tags : 
management, technology, lifecycle, intel, dell
    
Dell PC Lifecycle
Published By: Dell PC Lifecycle     Published Date: Feb 13, 2018
Hardware technology doesn’t last forever. It has a lifecycle, a measurable beginning and end to its productivity and value. IT is tasked with optimizing the PC lifecycle while driving strategic breakthroughs for their organization. However, the high cost and complexity of PC management leaves IT little time for innovation. We offer flexible financing options that help assure IT will always have everything they need, when they need it, to keep end users engaged and productive. Learn more about Dell solutions powered by Intel®.
Tags : 
optimieren, lebenszyklus, dell, intel
    
Dell PC Lifecycle
Published By: Dell EMC & Intel     Published Date: Apr 13, 2018
Today’s businesses are rapidly transforming to prepare for the changes taking place in the global economy. Companies of all sizes can benefit from tools that automate the deployment and ongoing maintenance of server environments. Put another way, in today’s digital economy, where users need access to intelligible data faster, IT organizations must employ tools that automate the delivery of IT as a Service (ITaaS). Dell EMC’s Intelligent Automation powered by Intel® Xeon® Platinum processor simplifies the management and maintenance of its PowerEdge server hardware. Designed to drive down the cost and resources associated with server lifecycle management, Intelligent Automation relies on integrated Dell Remote Access Controller(iDRAC) and OpenManage server management software to deliver reliable and efficient automation to PowerEdge Servers. Intel Inside®. New Possibilities Outside.
Tags : 
    
Dell EMC & Intel
Published By: Dell EMC & Intel     Published Date: Apr 13, 2018
Today’s businesses are rapidly transforming to prepare for the changes taking place in the global economy. Companies of all sizes can benefit from tools that automate the deployment and ongoing maintenance of server environments. Put another way, in today’s digital economy, where users need access to intelligible data faster, IT organizations must employ tools that automate the delivery of IT as a Service (ITaaS). Dell EMC’s Intelligent Automation powered by Intel® Xeon® Platinum processor simplifies the management and maintenance of its PowerEdge server hardware. Designed to drive down the cost and resources associated with server lifecycle management, Intelligent Automation relies on integrated Dell Remote Access Controller(iDRAC) and OpenManage server management software to deliver reliable and efficient automation to PowerEdge Servers. Intel Inside®. New Possibilities Outside.
Tags : 
    
Dell EMC & Intel
Published By: Schneider Electric     Published Date: May 31, 2019
Gartner predicts that by 2020, 90 percent of organizations will adopt hybrid infrastructure management capabilities. However, this isn’t easy. With a hybrid IT environment can come complexity, confusion, and even infrastructure fragmentation. And, if you leave this poorly managed, your users, business, and most of all customers will certainly start to notice. In this eBook, we’ll explore the evolution of the enterprise data center, impacts of cloud-powered digital solutions, and how to manage hybrid IT solutions.
Tags : 
hybrid,  digital solutions,  schneider electric
    
Schneider Electric
Published By: Okta     Published Date: Aug 21, 2015
Large enterprises, SaaS providers and businesses with major web properties increasingly depend on Okta to handle authentication for their thousands or even millions of users. Learn about the technology and processes Okta has put in place in building a highly scalable platform that will be ready to securely store and serve billions of user identities.
Tags : 
    
Okta
Published By: Okta     Published Date: Aug 24, 2015
Large enterprises, SaaS providers and businesses with major web properties increasingly depend on Okta to handle authentication for their thousands or even millions of users. Learn about the technology and processes Okta has put in place in building a highly scalable platform that will be ready to securely store and serve billions of user identities.
Tags : 
    
Okta
Published By: Oracle     Published Date: Feb 28, 2018
Oracle Exadata is powerful, optimised, and cloud-ready. IDC has put the business value of the Oracle Exadata to the test by interviewing eight customers. They reported better business outcomes and efficiencies as a result of improved database performance, scalability, and reliability. The resulting whitepaper also reveals business value highlights, such as 429 percent five-year ROI, US$222,000 additional revenue per 100 users, and 94 percent less unplanned downtime.
Tags : 
oracle, exadata, customers, experience, cloud, idc, business, value
    
Oracle
Published By: CA Technologies     Published Date: Jan 26, 2015
The ability to apply software to strategic advantage is the de? ning technology theme of this decade. This is not just an IT issue. It is a business imperative. Every business is in the software business. In some industries, the number of software jobs has doubled over the past ? ve years. JP Morgan Chase has more software developers than Google and more technologists than Microsoft. If you think your company isn’t in the software business, you’re wrong. Airlines, oil companies, telecommunications providers all are using applications to attract customers and gain a competitive advantage. With the ubiquitous adoption of mobile devices, a whole new platform for application and content delivery is evolving. With their colorful, interactive, intuitive user interfaces, always-on global connectivity, sensing capabilities such as GPS and device orientation and their ability to connect with users through personalized con? guration options, mobile is truly the de? ning platform of the applicat
Tags : 
enterprise mobility management, mobile devices, software, competitive advantage, strategic requirement
    
CA Technologies
Published By: MobileIron     Published Date: Feb 05, 2016
Mobile platforms have leapfrogged PC security for years, but as mobile device adoption explodes worldwide, these platforms face more security threats than ever before. While mobile devices are still safer than PCs, hackers are relentlessly searching for new ways to exploit these operating systems and gain access to their valuable data. Four major threats are currently targeting iOS and Android devices using very clever tactics. In fact, users may not know their devices have been compromised until after their data has been hacked.
Tags : 
mobile malware, activesync, mobile platforms, hackers, data threat, android, ios
    
MobileIron
Published By: MobileIron     Published Date: Aug 03, 2016
In this edition we discuss emerging risks, report OS enterprise share, and list the top blacklisted consumer apps. We conclude with our recommendations for enterprises to protect their assets against mobile risks and threats. Several new mobile attacks have emerged that threaten enterprises. Most are re-using old tactics against mobilespecific services, such as SideStepper’s use of Man-In-The-Middle (MITM) against MDM, rather than employing new techniques or exploiting new vulnerabilities. When attacks against users are successful, they can result in the loss of both personal and business data.
Tags : 
    
MobileIron
Published By: MobileIron     Published Date: Aug 04, 2016
Mobile platforms have leapfrogged PC security for years, but as mobile device adoption explodes worldwide, these platforms face more security threats than ever before. While mobile devices are still safer than PCs, hackers are relentlessly searching for new ways to exploit these operating systems and gain access to their valuable data. Four major threats are currently targeting iOS and Android devices using very clever tactics. In fact, users may not know their devices have been compromised until after their data has been hacked.
Tags : 
mobile malware, activesync, mobile platforms, hackers, data threat, android, ios
    
MobileIron
Published By: JBoss Developer     Published Date: Feb 05, 2016
As Oracle Java Composite Application Platform Suite (CAPS) nears the end of its life cycle, healthcare organizations are switching to Red Hat JBoss Fuse to prepare for future business needs. Red Hat JBoss Fuse represents existing use cases on a more flexible, standards-compliant platform. With over 100 different connectors, Red Hat JBoss Fuse offers extensive integration coverage to optimize data flow — both to internal users and to external healthcare partners — on-premise, on mobile devices, or in the cloud.
Tags : 
jboss, redhat, oracle, java, java composite application platform, fuse, integration, data optimization
    
JBoss Developer
Published By: Red Hat     Published Date: Jun 23, 2016
The Middleware Services Group within Information Technology Services (ITS) at the University of North Carolina at Chapel Hill needed a comprehensive, dynamic solution for frequent server provisioning requests and, in particular, managed servers. Without such a solution, the likelihood that users would employ outside vendors significantly increased. Use of outside vendors would potentially increase security concerns, present additional costs, and further complicate system administration. Moving to a fully-interoperable Platform-as-a-Service (PaaS) offering, built on OpenShift Enterprise by Red Hat, has allowed the middleware services team to deliver a flexible development and hosting environment that has fostered innovation and increased peace of mind.
Tags : 
best practices, technology, productivity, enterprise, red hat
    
Red Hat
Published By: SolidFire_NetApp     Published Date: Nov 21, 2016
It’s no surprise that the Software-as-a-Service (SaaS) market is exploding; its benefits are evident and mounting. In fact, IDC predicts that the SaaS market will grow significantly by 2020. SaaS end users are reaping the benefits of greater software efficiency, agility, reduced operational headaches, and trading CapEx for OpEx. The SaaS model enables low cost to entry, scale, and no maintenance as opposed to traditional software which placed these burdens on the end user.
Tags : 
    
SolidFire_NetApp
Published By: VMware     Published Date: Jul 01, 2016
Cloud computing adoption continues to expand as the overall benefits of cloud (cost efficiency, self-service, and IT standardization) are becoming more broadly recognized. While private cloud is the primary type of cloud infrastructure that is in use today, organizations are finding that cloud can no longer be a standalone IT sourcing and consumption model. Enterprises demand greater flexibility and scalability, leading them to invest in hybrid cloud models, which supply them with a seamless application, data, and management environment across all of their IT resources. IDC expects that the percentage of users who adopt private or public cloud models will diminish over the next several years, as enterprises increasingly choose to implement a hybrid cloud model.
Tags : 
vmware data center, vcloud air, vsphere, hybrid cloud, public cloud, private cloud, disaster recovery, data center extension, data center replacement, date center modernization, virtual private cloud
    
VMware
Published By: Microsoft     Published Date: Jul 07, 2016
Before you transform your business with mobility services, you need to consider both the management and security challenges you’ll face from the combination of mobile devices and cloud-based apps. In this IDC report, you’ll examine enterprise mobility management technology—offered through solutions such as the Microsoft Enterprise Mobility Suite—and how it helps manage the security risks of your mobility strategy. Learn about these critical benefits: • Provisioning and configuration devices and users—across platforms • Ensuring only authorized users access data with identity system integration • Ensuring only compliant devices access the corporate network through conditional access policies • Allowing mobile applications to deploy in a more secure, streamline manner with enterprise app stores • Providing security for data at rest, within workflows or over wireless networks, using granular policies around applications
Tags : 
mobile, cloud, best practices, productivity, technology
    
Microsoft
Published By: Microsoft     Published Date: Oct 07, 2016
Security was once largely limited to the confines of an on-premises world, but now it must extend to the cloud, as well as a myriad of mobile devices. Employees and companies now expect increasingly complex interactions with devices, apps, data, and even other users. As many companies struggle to keep up with traditional single-point solutions, and limited budgets, this pressure is creating security blind spots for IT. In a world of evolving threats, it is becoming increasingly impossible to address all of these issues with an on-premises solution.
Tags : 
technology, best practices, data, enterprise, business analytics, business intelligence, business management
    
Microsoft
Published By: CA Technologies     Published Date: Aug 21, 2017
By necessity, every company is now a software company. By 2017, two-thirds of customer service transactions will no longer require the support of a human intermediary. That means that if you haven’t already done so, you must adapt your business model to meet the needs of online customers. Failure to do so will put you at a severe competitive disadvantage. And chief among those demands is that you provide an exceptional user experience. App speed, reliability and ease of use are the new currency in this fast-changing landscape. In fact, app characteristics such as convenience and the ability to save users time can enhance brand loyalty by 60 percent or more.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
OAuth is an emerging Web standard for authorizing limited access to applications and data. It is designed so that users can grant restricted access to resources they own—such as pictures residing on a site like Flickr or SmugMug—to a third-party client like a photo printing site. In the past, it was common to ask the user to share their username and password with the client, a deceptively simple request masking unacceptable security risk. In contrast to this, OAuth promotes a least privilege model, allowing a user to grant limited access to their applications and data by issuing a token with limited capability.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
The mobile app has become “the” strategic initiative for all digital organizations attempting to drive business forward. “By 2017, mobile apps will be downloaded more than 268 billion times, generating revenue of more than $77 billion — making apps one of the most popular computing tools for users across the globe.”1 The app has become more than a simple method of communication. It is the new critical point of engagement, the face of the organization, and quite possibly the difference maker in customers staying or leaving. Getting the “user experience” (or UX) right in the eyes of the consumer is no longer a nice to have but fundamental to achieving success.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 24, 2017
• Use CA Live API Creator to deliver running prototypes in hours. Convert business requirements into working software. • Not just for wireframes, but also for running systems, databases, logic and user interfaces. It’s as simple as a spreadsheet and just as fast. • Impress your business users with results in hours to get their feedback on the data model and logic. Iterate instantly. • All you need is in the box. No IDE to install or configure. Just use your browser.
Tags : 
    
CA Technologies
Published By: HP Enterprise Business     Published Date: Jan 20, 2017
We all want our work to be meaningful and valuable. Working with mobile apps enables us to reach millions – potentially billions – of users if we create something our users like, value, and find useful. Download now to learn more.
Tags : 
    
HP Enterprise Business
Published By: Google     Published Date: Apr 26, 2018
No one in today’s highly connected world is exempt from security threats like phishing, ransomware, or denial-of-service (DoS) attacks. Certainly not Google. Google operates seven services with more than one billion active users each (including Google Search, YouTube, Maps, and Gmail). We see every type of attack, bad software, and bad actors—multiple times a day—and we’re proud of what our people, processes, and technology do to stop them. Google has published more than 160 academic research papers on computer security, privacy, and abuse prevention and has privately warned other software companies of weaknesses discovered in their systems. Within Google, we enforce a zero-trust security model, which monitors every device on the internal network.
Tags : 
    
Google
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.