HIT Consultant Insightful coverage of healthcare innovation
 

paper systems

Results 176 - 200 of 307Sort Results By: Published Date | Title | Company Name
Published By: CDW     Published Date: Sep 29, 2015
This is a whitepaper about pre-validated systems assisting it;s effort to simplify infrastructure management and free up resources for innovation efforts.
Tags : 
converged, infrastructure, management, innovation, resources, channel, optimize
    
CDW
Published By: CrowdStrike     Published Date: Nov 28, 2018
Learn how fileless techniques work and why they present such a complex challenge. The arms race between cybersecurity vendors and determined adversaries has never been more heated. As soon as a new security tool is released, threat actors strive to develop a way around it. One advanced threat technique that is experiencing success is the use of fileless attacks, where no executable file is written to disk. The 2017 Verizon Data Breach Investigations Report found that 51 percent of cyberattacks are malware-free, so there’s no indication that these attacks will be subsiding anytime soon. Read this white paper to get the important information you need to successfully defend your company against stealthy fileless attacks. Download this white paper to learn: • The detailed anatomy of a fileless intrusion, including the initial compromise, gaining command and control, escalating privileges and establishing persistence • How fileless attacks exploit trusted systems — the types of processe
Tags : 
    
CrowdStrike
Published By: Sponsored by HP and Intel®     Published Date: Nov 05, 2012
Today, there are many backup and recovery solutions aimed at protecting Hyper-V virtualized environments. Read this white paper to learn how HP StoreOnce backup systems provide a data protection platform that uses deduplication for data retention.
Tags : 
storeonce, deduplication, data retention
    
Sponsored by HP and Intel®
Published By: IBM ILOG.     Published Date: Dec 11, 2009
Businesses today need a Business Rule Management Systems (BRMS) solution that supports business changes and cycles far more effectively than traditional methods and takes direct advantage of business expertise. This IBM RedpaperT publication is intended for anyone who is interested in learning more about IBM WebSphere ILOG Rules for COBOL.
Tags : 
ibm redpaper, websphere ilog rules, cobol, code, cics channels and containers, business rule management systems, brms
    
IBM ILOG.
Published By: Texas Memory Systems     Published Date: Feb 25, 2012
Most companies have only put limited effort toward the system architecture that surrounds the flash memory modules. In this white paper, Storage Switzerland focuses on the importance of architecture design in solid state storage systems.
Tags : 
ssd, architecture, design, zero-latency, retrieval, solid state storage, bandwidth, high bandwidth, flash controllers, applications, data warehousing, tbs, tb capacity, storage, ramsan, texas memory systems, high availability, performance, solid state, enterprise
    
Texas Memory Systems
Published By: IBM     Published Date: Oct 10, 2012
A Comparison of PowerVM and VMware vSphere (4.1 & 5.0) Virtualization Performance.
Tags : 
it infrastructure, data, virtualization, servers
    
IBM
Published By: IBM     Published Date: Nov 07, 2012
In this paper the Evaluator Group discusses the Big Data environment, IBM Systems' ability to run analytics processes against the rising tide of data and the new opportunities that organizational leaders face.
Tags : 
ibm, big data, ibm systems, analytic processes, infosphere
    
IBM
Published By: Oracle Social Cloud     Published Date: May 02, 2014
This white paper offers a brief overview of how organizations can best use social data by implementing a framework to integrate social data with other enterprise and public or curated data. This framework provides a platform for uncovering new insights that can be fed into business intelligence and customer experience management systems in near real-time to help marketing, sales, service, and commerce teams accelerate decision-making and create long-term, profitable customer relationships.
Tags : 
oracle, srm, social media, social data, digital marketing
    
Oracle Social Cloud
Published By: Box     Published Date: Nov 09, 2014
In this whitepaper, you'll find scenarios and economic justification that reveals total costs and expected benefits from deploying cloud services vs. reinvesting in inflexible, capital intensive on-premise systems.
Tags : 
box, cloud computing, cloud services, collaboration
    
Box
Published By: Netsuite DWASF Leads Display Q1 2015     Published Date: Jan 30, 2015
This white paper covers the types of inefficiencies caused by running disparate business solutions for different departments and how a software platform that unifies critical business processes helps companies grow more rapidly and profitably. This paper reviews numerous case studies of companies that switched from disparate systems to an integrated software suite, and provides an analysis by independent industry expert, Nucleus Research, of customers' ROI from using an integrated software suite.
Tags : 
integrated business system, business processes, software platform, disparate systems, integrated software suite
    
Netsuite DWASF Leads Display Q1 2015
Published By: VeriSign     Published Date: Feb 10, 2011
This paper will show how code signing works, how attacks can be mounted against unsigned software, (including autoupdate software), and how real-world signing systems protect software vendors, enterprises and end users.
Tags : 
verisign, ssl spoofing attack, code protection, security, code signing certificates, malicious software
    
VeriSign
Published By: SAP     Published Date: May 15, 2008
Read this white paper by Don Tapscott and explore the criteria best-in-class hospitals use for selecting business intelligence solutions. Companies that learn to effectively harness the information generated by their IT systems will enjoy substantial productivity improvements.
Tags : 
sap, business intelligence, healthcare sector, healthcare industry, bi applications, bi tools, inter-departmental processes
    
SAP
Published By: SAP     Published Date: Jun 22, 2009
Read this white paper from CFO Research Services, which examines why and how chief financial offers are looking to create "highly integrated" organizations by moving from standalone spreadsheets to integrated planning, budgeting, and forecasting systems. (CFO Research Services, 2008)
Tags : 
cfo, sap, global organizations, forecasting, budgeting, planning, finance, financing, commercial advantage, enterprise applications, spreadsheets, integration, integrated, unified organization, forecasting, enterprise resource planning, erp
    
SAP
Published By: SAP     Published Date: Jun 27, 2009
Read this white paper by Don Tapscott and explore the criteria best-in-class retailers use for selecting business intelligence solutions. Companies that effectively harness the vast quantities of information that IT systems generate - both within the corporation and outside its walls - are poised to gain competitive advantage.
Tags : 
sap, business intelligence, it systems, price, promotion, markdown, businessobjects, rfid, spar, netweaver
    
SAP
Published By: SAP     Published Date: Mar 24, 2011
As you prepare to embark on an ERP implementation or to upgrade an existing system, you have a lot to juggle and plan. You know the horror stories of "go-lives" going bad but you aren't sure how to avoid the pitfalls. This white paper discusses at length how Utopia's formal data migration methodology reduces the risks of large systems deployments by using a tried-and-tested framework for the entire migration process, from source data analysis through post-go-live support.
Tags : 
data migration management, source data analysis, data integrity, erp implementation
    
SAP
Published By: Centrify Corporation     Published Date: Dec 02, 2014
Capturing the detailed actions of privileged users is even more critical in today’s business environment. Security and compliance issues also exist with third-parties including Cloud Providers, Service Providers and ISVs. And every major compliance regulation requires organizations to document what users actually do with the privileges and rights granted to them and how their actions impact the IT environment. This research paper covers how to solve the security, compliance, and third party access challenges organizations face when auditing and monitoring UNIX, Linux and Windows systems; and why traditional approaches like log rollup tools alone will fail to meet requirements of today’s demanding IT environment.
Tags : 
privileged user activity, enterprise compliance, security, third party access, it environment
    
Centrify Corporation
Published By: VSS Monitoring     Published Date: Jul 09, 2014
Learn how to optimize network monitoring in high-frequency trading (HFT) When a millisecond can cost a $1 million-plus, there's no tolerance for packet loss or latency. Download this white paper to learn how: The bursty data traffic of HFT can overwhelm networks & their legacy monitoring systems.
Tags : 
vss monitoring, network monitoring, security, threats, cyber terrorists, security protocols, high frequency trading
    
VSS Monitoring
Published By: IBM     Published Date: Jul 01, 2015
This white paper discusses how enterprise analytics systems can assist provider organizations in building sustainable healthcare systems and achieving their vision for accountable care
Tags : 
healthcare analytics, data blueprint, enterprise analytics systems, sustainable healthcare systems, mission-critical analysis, integrated data model, operational analytics, information technology, enterprise resource planning, electronic health records, enterprise content management
    
IBM
Published By: IBM     Published Date: Mar 30, 2016
This white paper discusses how enterprise analytics systems can assist provider organizations in building sustainable healthcare systems and achieving their vision for accountable care—from near-term demands for regulatory and quality reporting to transforming care delivery.
Tags : 
ibm, healthcare analytics, healthcare, big data, enterprise analytics systems, information technology
    
IBM
Published By: Diskeeper Corporation     Published Date: Jun 08, 2007
Tight IT budgets demand that desktop and laptop PCs remain in service well beyond their prime. But as these systems age, performance degrades. The culprit most often is file fragmentation. Download this paper to find out how Diskeeper can help your systems perform longer.
Tags : 
pc performance, system performance, defrag, defragment, defragmentation, old pc, old pcs, old desktop, desktop pc, pc maintenance, diskeeper, diskkeeper, disk keeper
    
Diskeeper Corporation
Published By: Vendor Guru     Published Date: Jan 04, 2008
This white paper provides an overview of the basic elements to look for when buying a phone system. It surveysthe landscape of enterprise telephony today: the features available, the pros and cons of traditional and VoIPsystems, and the adaptability of new generation equipment to rapidly changing business needs.
Tags : 
pbx, ippbx, ip pbx, voip, voip, voice over ip, phone, phone system, ip telephony, telephony, vendor selection, voip provider, voip providers, vendor guru, vendorguru, vendor guru telephony, vendorguru telephony, quinstreet
    
Vendor Guru
Published By: SAP     Published Date: Aug 11, 2010
This paper will examine how you can gain reliable, accessible information from efficient, integrated IT systems - and use that information to make faster, smarter decisions.
Tags : 
sap sme, information management, integrated it system, business management solutions, smb, small midsized business
    
SAP
Published By: HP and Intel     Published Date: May 17, 2012
Download this paper to better understand how a buy-and-hold strategy can actually add costs to the data center as systems age in place.
Tags : 
lifecycle, operations, flexibility, serviceability, data center, redefine, expectations, productivity, experience, storage performance, servers, gen8, intel, proliant
    
HP and Intel
Published By: Akamai     Published Date: Jul 01, 2011
The whitepaper shows how merchants can rid their systems of sensitive payment information.
Tags : 
akamai, enterprise payment security 2.0, payment security management, edge tokenization, pci compliance, credit card data, cybersource, payment data capture, 2.0
    
Akamai
Published By: HP     Published Date: Jul 22, 2014
In this ESG white paper, the capabilities and common characteristics of flash implementations are categorized as “bronze”-, “silver”-, and “gold”-type approaches, depending on the degree to which they enable fully featured storage systems. It evaluates how HP’s storage delivers the basics and follows with a series of flash-specific optimizations and advances that we’ll call “gold standard” flash capabilities, after which it hints at HP’s vision of the future for their flash storage architecture. Throughout the paper, the importance of both IT architecture and business implications is emphasized.
Tags : 
tier-1, storage, data, flash, storage system, data center
    
HP
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.