HIT Consultant Insightful coverage of healthcare innovation
 

news

Results 76 - 100 of 311Sort Results By: Published Date | Title | Company Name
Published By: newScale     Published Date: Jan 30, 2008
Many organizations implementing ITIL as part of their IT Service Management framework begin with the Configuration Management Database (CMDB). While a CMDB is a key piece of any successful ITIL implementation, there are several traps that are easily fallen into when implementing one.
Tags : 
change management, cmdb, service catalogue, service catalog, service management, itil, newscale, itil, service catalog, service catalogue, itil service catalogue, it service catalogue
    
newScale
Published By: newScale     Published Date: Jan 30, 2008
This white paper outlines the challenges associated with IT Request Management and ten best practices that represent the hard-won knowledge from dozens of successful Service Request Management projects. By following these guidelines, your IT organization can provide more responsive service delivery, increase operational efficiency, and improve internal customer satisfaction.
Tags : 
itil, service catalog, service catalogue, itil service catalogue, it service catalogue, best practices, service management, customer service, customer satisfaction, newscale, request fulfillment
    
newScale
Published By: newScale     Published Date: Jan 30, 2008
This white paper is intended to share some of those lessons learned and suggesting ways you can achieve success by avoiding the most common pitfalls. But before we talk about the typical mistakes in creating a Service Catalog, let’s briefly review its purpose.
Tags : 
service catalog, service management, newscale, customer service, itil, v.3, itil v3, itil v.3, itil, service catalog, service catalogue, itil service catalogue, it service catalogue
    
newScale
Published By: newScale     Published Date: Feb 25, 2009
This ENTERPRISE MANAGEMENT ASSOCIATES® (EMA™) white paper introduces the Service Catalog and Service Portfolio Management processes and discusses the selection criteria for Service Catalog and Service Portfolio software solutions.Learn more today!
Tags : 
newscale, itil, cmdb, adoptability, scalability, service marketing, sla
    
newScale
Published By: F5 Networks Inc     Published Date: Mar 30, 2018
With the rate of cloud spending predicted to outpace overall IT spending six to one over the next few years, organizations are rightly concerned about ensuring that applications in the cloud enjoy the same level of security as apps deployed in data centers. Using the public cloud does alter your attack surface area—and leveraging multiple public and private clouds (aka multi-cloud) does so even more. Some threats get bigger, some get smaller. Some even go away, or at least drift out of your control, while new threats should move front and center in your security thinking.
Tags : 
cloud, landscape, navigation, security, technology, applications
    
F5 Networks Inc
Published By: Citrix Systems     Published Date: Jul 28, 2015
At long last, datacenters have a more efficient high-availability deployment option for application delivery controllers. According to new research, that’s welcome news among IT leaders.
Tags : 
    
Citrix Systems
Published By: Teradata     Published Date: Jun 12, 2013
Until now, huge amounts of data have been ignored or underutilized simply because the tools didn't exist to make sense of it all. The good news is that increasingly sophisticated software is combining with growing computing horsepower to produce new analytics platforms that can handle all types of data from disparate systems Organizations can extract intelligence from their data to significantly outperform their rivals on growth, earnings, and performance.
Tags : 
unified data architecture, big data, analytics
    
Teradata
Published By: Red Hat     Published Date: Mar 11, 2016
The cool vendors in this research are very diverse in their technical paradigms. This confirms that the DevOps "virtual" market is still very much in motion/forming and adds to the confusion of potential buyers.
Tags : 
    
Red Hat
Published By: Delphix     Published Date: May 28, 2015
"Security-conscious organizations face a gap between current requirements and capabilities as they relate to data masking. Data volumes are growing exponentially and the risk of data leaks continues to make news, yet many organizations rely on inefficient, legacy approaches to protecting sensitive data. In contrast, top performing companies are turning to virtual databases and service-based masking solutions to ensure that data management functions can keep up with software development.
Tags : 
    
Delphix
Published By: Delphix     Published Date: May 28, 2015
Over the past several years data loss and data leaks have been a regular part of headline news. From high-profile hacks of retailers such as Target and Home Depot to inadvertent email data leaks from large multi-national banks to targeted leaks of sensitive government documents, it is becoming clear throughout the private and public sector that data security or the lack thereof is an existential threat to business operations. While there are many vendors focused on data encryption, data masking is actually the single most effective mechanism for an IT organization to dramatically reduce or even eliminate the risk of data loss.
Tags : 
    
Delphix
Published By: ServiceNow     Published Date: May 21, 2015
The Internet has created radical changes in our personal lives. We now live in a “consumerized” online world where we shop for products and services with a few taps on a smartphone. Social media gives us a global forum where anyone can speak their mind. We see news as it unfolds, watch videos on YouTube, stream music from Spotify, and make friends on Facebook. We expect the web to be automated, on demand, and always on – delivering instant gratification no matter where we are.
Tags : 
consumerized, spotify, facebook, smartphone, purchase orders
    
ServiceNow
Published By: MobileIron     Published Date: Apr 11, 2018
The enterprise landscape has changed dramatically with the influx of millennials — and their preferred devices — into the workforce. As a result, Macs that were once limited to mostly niche usage are now rapidly expanding their enterprise footprint. These devices require the same level of security and oversight that organizations apply to all of their other devices. Otherwise, the risk of leaving Macs either unmanaged or secured by point products creates security gaps that can leave the enterprise open to cyberattacks and compliance violations. The good news is, MobileIron makes it easy to secure Macs the same way all other devices in the enterprise are managed. No integrations, additional training, or learning curves are involved. The time has come for a modern approach to Mac management that is seamless for end users, improves operational efficiency, and simplifies IT operations across the entire device lifecycle. MobileIron makes it all possible.
Tags : 
macos, modern, work, era, devices, workforce, organizations
    
MobileIron
Published By: FICO     Published Date: Nov 30, 2016
Unexpected failure or performance erosion of production equipment can significantly impact productivity, product quality and maintenance expenses within any manufacturing organization. It’s also difficult to get operations ‘back on track’ after these failures occur. The good news is that, via the Internet of Things, intelligent use of sensor data, machine learning and optimization can help companies take a proactive approach to predicting failures and re-optimizing processes around them.
Tags : 
iot, internet of things, manufacturing
    
FICO
Published By: Micron     Published Date: Jan 12, 2017
Micron’s 9100MAX delivers on the NVMe promise with 69% better throughput and transaction rates plus much lower latency in PostgreSQL OLTP. Download this technical marketing brief to learn more.
Tags : 
    
Micron
Published By: Cox Business     Published Date: May 31, 2017
For cybersecurity professionals, 2016 presented a year of distributed denial of service (DDoS) attacks that were unprecedented. Week after week, the public was inundated with news of hacks, attacks, and data leaks. It didn’t take long for everybody to realize the old axiom of cybersecurity still holds true - there are two types of companies: those who are hacked and know about it, and those who are hacked and soon will find out. As a key player in the war against DDoS attacks, Neustar has been on the front line, detecting, alerting, and mitigating strikes to keep companies and their customers safe.
Tags : 
    
Cox Business
Published By: Resonate     Published Date: May 30, 2018
The seismic shift in consumer behavior has created the slow demise of many long-established, iconic brands. The woes of brick and mortar retail have become a daily news item, with store closures and financial downturns dominating the headlines. Though low cash and heavy debt play a significant role, many point to online retail as the culprit for this decline. Retail margins on average fell to 9% last year from 10.5% in 2012 and over that period ecommerce sales increased to 15.5% of total sales according to the Wall Street Journal. For most companies, this meant shifting towards online sales.
Tags : 
    
Resonate
Published By: TrendKite     Published Date: Apr 25, 2018
In the digital age, the internet brings a lot of fantastic things to the PR profession, opening new mediums, offering data-driven insights, and allowing new opportunities. But on the other side, it also brings challenges in the overwhelming speed at which news spreads. With endless examples of poorly handled situations, PR knows in this digital age, there is no hiding a burgeoning crisis. So when discussing PR crises and preparedness, make sure to reframe your thinking for today’s world: are you prepared for a digital crisis in a digital age?
Tags : 
communications, trendkite, public relations
    
TrendKite
Published By: TIBCO Software     Published Date: Aug 14, 2018
Increasing your non-interest revenues without increasing customer fees that ultimately drive customers away can be a challenge. The digital economy is opening up new ways to drive additional revenue from existing customers. The same technical innovations are also opening up new ways to communicate with customers about both digital and traditional offerings. But that results in customers becoming overwhelmed with advertising and marketing messages. They are forced to decide upfront who is providing relevant information and who to completely ignore. Ultimately, it comes down to trust. Customers consider generic messages to be spam and learn to filter them out, even if they come from a known vendor. Over the long run, these types of marketing campaigns not only see diminishing returns, they can even damage your long-term relationship with customers and decrease revenues. Micro-marketing overcomes the noise that traditional spam-marketing creates and establishes news levels of trust betwee
Tags : 
    
TIBCO Software
Published By: Menlo Security     Published Date: Jun 01, 2018
"Uncover the Business Impact of Managing Risky Web Content Download this white paper to learn: How to safely manage ""uncategorized"" websites when sites are unknown to the secure web gateway (SWG) policies, which are largely based on website categories, such as news, entertainment, weather, social media, etc. The cost implications of securing web content, including staffing, clean-up and risk mitigation Isolation - a new technique for malware prevention to maintain end user & IT staff productivity Administrators can either be lenient in allowing access to uncategorized sites, increasing malware risk, or deny access and deprive employees of necessary information. There are hidden costs to both approaches. "
Tags : 
    
Menlo Security
Published By: Centrica Business Solutions     Published Date: Aug 14, 2018
We live in an era of increased business risk and while news headlines focus on threats to business such as cyber-crime and global terrorism, there is a more pervasive and immediate issue in the form of security and continuity of the energy supply of every business.
Tags : 
energy, impact, resilience, strategy
    
Centrica Business Solutions
Published By: Iterable     Published Date: Sep 07, 2018
Since the term “omni-channel” was first coined by the Harvard Business Review in 2011, some marketing technology vendors claimed that they could provide businesses with this holy grail of brand ubiquity. Unfortunately, most of these early claims were false starts where vendors over-promised and under-delivered. The good news is that a select number of solutions have caught up with all the promises and can now turn them into action. In this guide, we explain why the conversation around omni-channel marketing has changed and how you can transform your marketing strategy to leverage this new, powerful technology. We’ll give you a heads up on the roadblocks you’ll encounter on your journey to achieving omni-channel relevance and the benefits you’ll gain once you reach your destination. No highfalutin jargon, no talking in circles and no nonsense. Just practical advice on how to create a superb customer experience.
Tags : 
    
Iterable
Published By: HP     Published Date: Jul 03, 2014
In this newsletter, we share our thoughts on the mobility-led opportunities that have emerged and look at the issues that have to be addressed if we are to adapt successfully to the new world order.
Tags : 
mobility, the evolution of technology, mobility lead opportunities
    
HP
Published By: Akamai Technologies     Published Date: May 07, 2018
2017 was a momentous year in security, even though the DDoS landscape appeared to plateau. Maybe it was because Mirai hit so hard at the end of 2016 and the owners of other botnets were retooling to catch up. Maybe it was because news of large data breaches captured so many headlines, drawing the attention of both criminals and the public. Or maybe it is simply due to the cyclical nature of attack popularity that we have seen in the past. No matter the cause, our prediction is that the trend won’t continue in 2018, and it is not time to be complacent. The Mirai botnet is far from played out, as botnet creators are continuing to modify the source code for their individual needs and, with more connected platforms devices than ever, the Internet will continue to offer fertile ground for largescale attacks.
Tags : 
internet, security, cryptocurrency, data, breaches, botnet
    
Akamai Technologies
Published By: Clearswift     Published Date: Jun 09, 2008
Anyone who spends any time online cannot have failed to notice. People are using the Web in new ways; ways that make the 'brochureware' of the early Web experience look and feel decidedly flat. It's a new world, characterised by a wave of new jargon, brands and web based experiences. MySpace. FaceBook.  Wikipedia. Flickr. Twitter. YouTube. Mashups. Blogs. Newsfeeds. Download this white paper for a simple guide to the terms, opportunities and threats that Web 2.0 poses.
Tags : 
internet security, web 2, web 2.0, clearswift, social media, social networking, facebook, myspace, web 2.0, security, web security, clearswift
    
Clearswift
Published By: Red Hat, Inc.     Published Date: Jul 10, 2012
Is data changing the way you do business?Is it inventory sitting in your warehouse? The good news is data-driven applications enhance online customer experiences, leading to higher customer satisfaction and retention, and increased purchasing.
Tags : 
it planning, data, data-driven applications, data challenges, data solutions, big data solutions, big data challenges, in-memory databases, web-abpplications, in-memory data grid, nosql, storage nodes, e-commerce applications, social applications, logisitcs applications, trading applications, data scaling, rest, memcached, hot rod
    
Red Hat, Inc.
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.