HIT Consultant Insightful coverage of healthcare innovation
 

protocol

Results 226 - 246 of 246Sort Results By: Published Date | Title | Company Name
Published By: Signiant Inc.     Published Date: Aug 14, 2008
FTP (File Transfer Protocol) is used to perform file transfers over Internet Protocol (IP) networks such as the public Internet and corporate intranets. FTP is widely deployed and is widely accepted as a file transfer solution. However, are there downsides to using FTP for file transfers? This paper compares FTP with file transfer methodologies of Signiant's software applications and identifies the shortcomings of FTP that Signiant was designed to overcome.
Tags : 
signiant, ftp, file transfer, file transfer protocol, content delivery
    
Signiant Inc.
Published By: Tail-f Systems     Published Date: Sep 16, 2008
The NETCONF protocol is a modern building block for device management automation, offering a unified approach to network configuration, rather than a device-specific methodology. To equipment vendors, NETCONF is a way to standardize the management interface of network elements. To service providers, NETCONF is a way to optimize the administrative workflow, by moving management intelligence out of the device under management, and consolidating this management into higher-level applications.
Tags : 
netconf, netconf standard, device management automation, network standard, ietf standard, tail-f, tailf
    
Tail-f Systems
Published By: Tail-f Systems     Published Date: Sep 16, 2008
This whitepaper describes how NETCONF and YANG can help drastically simplify network configuration management. The IETF has recently standardized the NETCONF configuration management protocol and is currently in the process of standardizing a NETCONF-oriented data modeling language called YANG. These two new technologies promise to drastically simplify network configuration management.
Tags : 
configuration management, netconf, yang, next-generation network management, next-generation networks, netconf protocol, tail-f, tailf
    
Tail-f Systems
Published By: Tail-f Systems     Published Date: Oct 01, 2008
The complexity and size of networks are increasing dramatically. This is placing new demands on network operators to deploy networks in an affordable and effective manner. NETCONF is a new IETF standard that is redefining the way in which network devices are configured using a highly-scalable, XML-based, machine-to-machine protocol. This webinar will provide a technological update on NETCONF.
Tags : 
netconf, ietf standard, xml-based network management, configuration management
    
Tail-f Systems
Published By: Tail-f Systems     Published Date: Oct 01, 2008
Network management systems must adapt to meet the requirements of next generation networks.  For example, a user interfaces may need to be refreshed with a state-of-the-art Web interface or support for the NETCONF protocol may be required to help customers deploy scalable networks. Adding functionality and integrating with existing applications and data stores has multiple trade-offs in terms of development time and system efficacy.
Tags : 
network management, next-generation networks, netconf, legacy networks, network management systems, tail f, tail-f, tailf
    
Tail-f Systems
Published By: Sparta Social Networks     Published Date: Oct 10, 2008
This case-study talks about how the Packet8 broadband voice over Internet protocol (VoIP) and video communications service which lets broadband Internet users add digital voice and video communications services to their high-speed Internet connection. Videophone users now account for almost 5 percent of Packet8’s 74,000 lines, and are one of several drivers in the company's quarterly growth, up 54 percent in the most period to $6 million in revenue. Download to learn more.
Tags : 
sparta, social network, packet8, internet protocol (voip)
    
Sparta Social Networks
Published By: Genesys     Published Date: Jan 27, 2009
In this document, Opus Research offers seven ways SIP (Session Initiation Protocol) can revolutionize customer care in your enterprise. More specifically, we evaluate deployments that involve SIP and provide case studies that integrate Genesys SIP the Customer Interaction Manager (CIM), Genesys Voice Platform (GVP), and Business Process Routing from Genesys Telecommunications Laboratories.
Tags : 
genesys, sip, session initiation protocol, customer integration manager, genesys voice platform, voip, crm
    
Genesys
Published By: Genesys     Published Date: May 07, 2009
This white paper provides insights on the key attributes of SIP for customer service; how businesses can prosper with adoption of SIP; and flexible deployment strategies for migrating from TDM to VoIP. In addition, this paper will look at the available software, including relatively new arrivals such as unified communications, which can enhance a distributed customer sales and service strategy. Learn more today!
Tags : 
genesys, virtualization, ip migration, voip, sip, session initial protocol, voice over ip, customer service, ip network, data center, unified communications, internet engineering task force’s, ietf’s
    
Genesys
Published By: Eaton     Published Date: Feb 06, 2009
Power distribution units (PDUs) are vital to the management of power to IT arrays and have evolved from a simple panel of switches and outlets to designs that can now be considered "intelligent" through the inclusion of internal processing capabilities.
Tags : 
eaton, power distribution units, pdus, power management, snmp communication protocols, intelligent pdus
    
Eaton
Published By: Ping Identity     Published Date: May 05, 2009
Web Services are emerging as the preeminent method for program-to-program communication across corporate networks as well as the Internet. Securing web Services has been a challenge until recently, as typical Web authentication and authorization techniques employed browser-to-server architectures (not program-to-program). This resulted in user identity ending at the Web Application Server, forcing the Web Services Provider to trust blindly that the Web Services Requester had established identity and trust with the end user.
Tags : 
pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml, security assertion markup language, pki, public key infrastructure, soa, oasis, ws-trust, sso, single sign-on, service oriented architecture, rest, user identity mapping, ldap
    
Ping Identity
Published By: Enea     Published Date: Nov 23, 2010
The white paper is tutorial covering gateways in telecom applications.
Tags : 
telecom, gateway, sip, protocols
    
Enea
Published By: HP and Intel® Xeon® processors     Published Date: Aug 01, 2012
Many of today's enterprise midrange arrays boast of integration with VMware vSphere VAAI primitives, boot from SAN protocols and snapshot functionality. But in the case of the HP 3PAR F200 and F400 models, this is only where their integration begins. HP 3PAR F-class midrange arrays provide enhanced levels of VMware integration and optimized virtual machine density so users experience levels of VMware efficiency, performance and visibility well beyond what other midrange arrays natively provide.
Tags : 
3par, vsphere integration, vm density, vmware srm, storage capacity, san, load balancing, snapshots
    
HP and Intel® Xeon® processors
Published By: HP and AMD     Published Date: Feb 04, 2012
This report sponsored by HP + Intel outlines a strategy for getting the benefits of the cloud quickly. Learn about the solutions that can help you save time, improve storage efficiency and maintain a secure, available environment.
Tags : 
intel, storage, 2.0, cloud, infrastructure, virtualization, infrastructure, trends, storage, flexibility, drivers, market dynamics, trends, converged, custom requirement, deduplication, tiering, protocol, foundation, supply chain
    
HP and AMD
Published By: Attachmate     Published Date: Jul 09, 2013
Is your file transfer system keeping up with growing trading-partner requirements? Can it accommodate multiple platforms, protocols, and security standards? Can it successfully deliver large files, to the right person, on time? If uncertainty is part of your daily routine, you need to see this video.
Tags : 
download ftp program, secure ftp, secure large file transfer, managed file transfer, ftp automation, managed ftp reflection ftp client, file transfer software, file transfer management, ftp client security, secure dropbox alternatives, enterprise file sharing, enterprise file sharing, automated secure file transfer, automated file transfer, file transfer automation, secure file transfer automation, alternatives to cloud file transfer, secure ftp software, secure ftp automation
    
Attachmate
Published By: Infoblox     Published Date: Jun 11, 2012
Learn why any organization relying on the IT ecosystem enabled by the Internet Protocol - especially those organizations with public-facing content - are at great risk. Get your free complimentary white paper NOW!
Tags : 
infoblox, private cloud, public cloud, cloud, routers, switches, servers, firewalls, agilitytime, value, network, network automation, automation, tasks, productivity, configuration, infrastructure, enterprise, enterprise network, compliance
    
Infoblox
Published By: Norse     Published Date: Mar 10, 2014
Learn about how the internet has changed over the past year and see how these major changes have affected security protocols and how your organization should respond to keep current in a world that is run by the Internet.
Tags : 
norse, sans, internet of things, cybersecurity, nstac, industrial internet, cyber-physical systems, emerging technologies, survey, malware
    
Norse
Published By: GE Healthcare     Published Date: Feb 23, 2015
This study surveyed radiologists about inefficiencies in their workflows, revealing a number of shortcomings with the information technologies radiologists employ to review, interpret, and report diagnostic imaging examinations.
Tags : 
enterprise imaging, advanced visualization, universal viewer, centricity pacs, 3d imaging, radiology imaging solutions, diagnostic medical imaging, radiology medical imaging, medical imaging technology, medical imaging pacs, medical imaging systems, medical imaging services, medical imaging technologies, smart reading protocols, multi-modality reading, unified view of patient images, information technology
    
GE Healthcare
Published By: Great Bay Software     Published Date: Jan 04, 2018
IoT device capabilities are constantly evolving and enterprise adoption is increasing at a rapid pace. As adoption grows, these connected devices provide additional entry points for external threats, thus broadening the organizations' attack surface. The enterprise must now look for solutions to address an increasingly complex problem: how to detect, monitor and control unmanaged devices that are connecting to the network and may lack consistent security protocols, putting critical business data at risk.
Tags : 
iot, iot security, iot endpoint security
    
Great Bay Software
Published By: CA Technologies EMEA     Published Date: Oct 18, 2017
OAuth permet à l’utilisateur de déléguer ses droits d’accès à une API, permettant ainsi à un service d’être intégré à un autre pour le compte de cet utilisateur. Ce sont les mêmes fournisseurs du Web social qui ont popularisé le schéma d’exposition d’une API afin de permettre à des développeurs tiers d’enrichir leurs plates-formes qui ont été les premiers à avoir appliqué ces mécanismes de délégation des autorisations. Créé en 2006, le protocole OAuth a permis de standardiser les mécanismes de ce type.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Oct 19, 2017
OAuth est un protocole Web relativement nouveau qui régit l’octroi d’un accès limité aux applications et données. il a été conçu pour permettre aux utilisateurs d’octroyer un accès restreint aux ressources dont ils sont propriétaires (images résidant sur un site tel que Flickr ou smugMug, par exemple) à un client tiers tel qu’un site d’impression de photos par exemple. ce livre blanc de cA Technologies décrit ce qu’est OAuth et vous montre comment faciliter son implémentation au sein de votre organisation.
Tags : 
    
CA Technologies EMEA
Start   Previous    1 2 3 4 5 6 7 8 9 10     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.