HIT Consultant Insightful coverage of healthcare innovation
 

rum

Results 251 - 275 of 449Sort Results By: Published Date | Title | Company Name
Published By: CA Technologies EMEA     Published Date: May 24, 2018
In der digitalen Wirtschaft sind Anwendungsprogrammierschnittstellen (APIs) unerlässlich, um Ideen schnell umzusetzen und neue Geschäftschancen zu nutzen. Sie sind die Bausteine der digitalen Transformation und ermöglichen es Unternehmen, eine herausragende Customer Experience bereitzustellen, neue Umsatzquellen zu erschließen und Mitarbeiter, Partner, Anwendungen und Geräte jederzeit und überall mit Daten zu verbinden.APIs sind nicht unbedingt eine neue Technologie, aber in der heutigen digitalen Welt ist ihre Bedeutung gewachsen, und sie sind für jeden Aspekt des Unternehmens wichtig geworden. Dies wiederum hat den Bedarf an einem effektiven API Management erhöht. Aber wie sieht eine effektive Lösung aus?Im API Management Playbook wird erläutert:• Warum die digitale Transformation in der Application Economy unerlässlich ist• Warum APIs die Bausteine der digitalen Transformation sind• Auf welche wichtigen Interessenvertreter in Ihrem Unternehmen APIs Auswirkungen haben• Was der API-Le
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: May 25, 2018
Negli ultimi anni le suite software di Project and Portfolio Management (PPM) sono cambiate notevolmente. Da semplici strumenti per il consolidamento di attività, si sono trasformate in potenti soluzioni enterprise con molteplici capacità, dalla pianificazione e gestione degli investimenti alla collaborazione, fino all'automazione dei workflow di iniziative concomitanti.
Tags : 
liberare, potenziale, dei, dati, dell'azienda
    
CA Technologies EMEA
Published By: Tenable     Published Date: Jan 25, 2019
"This Gartner report charts your course to the future of information security with Gartner’s “continuous adaptive risk and trust assessment” (CARTA) as your guide. This reports highlights a need for security and risk management leaders to embrace a strategic approach where security is adaptive, everywhere, all the time. Gartner calls this strategic approach ""continuous adaptive risk and trust assessment,"" or CARTA. By reading “Seven Imperatives to Adopt a CARTA Strategic Approach,” you will gain insight into CARTA and better understand the people, process and technical changes it calls for, including: -Replacing one-time security gates with adaptive, context-aware security platforms. -Continuously discovering, monitoring, assessing and prioritizing risk and trust — reactively and proactively. -Performing risk and trust assessments early in digital business initiatives, including development. -Instrumenting for comprehensive, full-stack visibility, including sensitive data handling.
Tags : 
    
Tenable
Published By: Veeam '18     Published Date: May 01, 2019
Il ransomware è al primo posto nei pensieri dei leader di molte organizzazioni poiché queste ultime devono affrontare le conseguenze potenzialmente disastrose degli attacchi riusciti. ESG ha intervistato i leader e le organizzazioni IT per scoprire la reale portata del problema ransomware, quali sono le conseguenze economiche delle interruzioni causate da questi attacchi e quali sono le best practice e le capacità che le organizzazioni devono applicare per essere protette. Secondo la ricerca ESG, quasi i due terzi delle organizzazioni intervistate in tutto il Nord America e l'Europa occidentale hanno subito un attacco ransomware a un certo punto dell'anno scorso, e il 22% ha riportato attacchi settimanali. Gli attacchi hanno contribuito a rendere la sicurezza informatica un obiettivo dell'investimento IT e la spesa in questo senso sta accelerando. Ciò che è necessario per respingere questa epidemia sono le best practice e gli strumenti per: • Prevenire o almeno mitigare gli attacchi •
Tags : 
    
Veeam '18
Published By: Veeam '18     Published Date: May 01, 2019
VMware Cloud su Amazon Web Services (AWS) è un servizio on-demand che ti consente di eseguire applicazioni in ambienti cloud basati su vSphere con l’accesso a un’ampia gamma di servizi AWS. Supportato dalla VMware Cloud Foundation, questo servizio integra vSphere, vSAN e NSX insieme alla gestione di VMware vCenter ed è ottimizzato per l’esecuzione su un’infrastruttura AWS, dedicata, elastica e bare metal. Grazie a VMware Cloud su AWS, i team IT possono gestire le risorse basate sul cloud con strumenti VMware a loro familiari. Questa panoramica della soluzione offre una descrizione di come il supporto Veeam su AWS consente ai clienti di accelerare l’adozione delle implementazioni di cloud ibrido con la possibilità di copiare, replicare o migrare i carichi di lavoro sul cloud AWS in modo semplice ed efficiente e sfruttare gli investimenti esistenti nelle tecnologie Software-Defined Data Center (SDDC) di VMware.
Tags : 
    
Veeam '18
Published By: Veeam '18     Published Date: May 07, 2019
Die mechanische Art der Produktion ist eine Illusion. Die Produkte von heute sind sehr stark auf die Datenverfügbarkeit angewiesen, wobei die Produktionslinie im Zentrum eines expandierenden digitalen Netzwerkes befindet, das Lieferanten, Vertriebshändler, Partner und Kunden miteinander verbindet. Kundenanpassung, Just-in-Time-Bestandsführung, Rechte des geistigen Eigentums und Wettbewerb sind in einem modernen Produktionsunternehmen miteinander verflochten.
Tags : 
    
Veeam '18
Published By: Veeam '18     Published Date: May 07, 2019
In diesem fünfminütigen, leicht lesbaren Dokument wird erläutert, warum Unternehmen Office 365-Daten schützen müssen. Dieser Bericht zeigt Ihnen: • Das große Missverständnis zwischen der Verantwortung von Microsoft und den IT-Organisationen • 6 Gründe, warum die Sicherung von Office 365 von entscheidender Bedeutung ist • Wer kontrolliert Office 365-Daten?
Tags : 
    
Veeam '18
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Today, organizations of all sizes recognize the value of an agile software delivery process. Agility is the foundation for cost–efficiency, competitiveness, high team morale and customer satisfaction. Yet most organizations face an agility paradox in that the more agile their software delivery workflow becomes, the higher the risk that instability or unpredictability will be introduced and undercut the investment they make in software production. Fortunately, there is a solution to this conundrum. It’s called shift–left monitoring, and it allows your company to maximize agility in software delivery without assuming undue risks. This e–book explains how you can achieve agility and stability at the same time to streamline the path to digital transformation and innovation by shifting monitoring to the left of your software delivery workflow.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
La sfida Come ci si può aspettare, le aziende che intraprendono un percorso di digital transformation devono affrontare maggiori problemi correlati a rischi e sicurezza. Le iniziative di digital transformation aumentano inevitabilmente il numero dei punti di accesso all'infrastruttura aziendale che sfuggono ai controlli esistenti, sono accessibili a un numero superiore di set di identità diversi e proliferano all'interno di un'infrastruttura distribuita e dinamica. L'opportunità Conoscere i propri utenti con privilegi significa conoscere i rischi. Di per sé, gli strumenti di privileged access management devono essere in grado di supportare l'automazione nel processo di autorizzazione e garantire la scalabilità attraverso il supporto di operations dinamiche e infrastrutture effimere, come gli account amministrativi Amazon Web Services (AWS) per le identità umane.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Una concorrenza efficace si basa sulla continuous delivery di software di qualità. Nel mondo di oggi, le applicazioni sono uno strumento indispensabile e ogni azienda deve trasformarsi in un'azienda di software, a prescindere dal settore in cui opera.
Tags : 
    
CA Technologies EMEA
Published By: Riverbed     Published Date: Feb 26, 2015
The Riverbed SteelCentral network performance management suite of products provides considerable advantages over those of JDSU Network Instruments because of its breadth, depth and ease of use to quickly understand and pinpoint the root cause of performance problems.
Tags : 
network performance management, performance issues, performance management, end-user experience management, cloud computing, mobile device
    
Riverbed
Published By: F5 Networks Inc     Published Date: Aug 25, 2017
DDoS attacks seem to constantly be in the news, continually evolving and growing in complexity. You may have heard about the big, volumetric attacks that took down Donald Trump’s campaign website and Brazilian government sites during the Olympics. But while volumetric attacks still reign supreme, there are other, more insidious, low-level DoS attacks that can also damage your site, your applications, and your business. If you think you’re ready for a DDoS attack—or that you don’t need to worry about one—make sure you’re not buying into some of these popular myths.
Tags : 
    
F5 Networks Inc
Published By: Amazon Web Services     Published Date: Sep 05, 2018
Amazon Redshift Spectrum—a single service that can be used in conjunction with other Amazon services and products, as well as external tools—is revolutionizing the way data is stored and queried, allowing for more complex analyses and better decision making. Spectrum allows users to query very large datasets on S3 without having to load them into Amazon Redshift. This helps address the Scalability Dilemma—with Spectrum, data storage can keep growing on S3 and still be processed. By utilizing its own compute power and memory, Spectrum handles the hard work that would normally be done by Amazon Redshift. With this service, users can now scale to accommodate larger amounts of data than the cluster would have been capable of processing with its own resources.
Tags : 
    
Amazon Web Services
Published By: Raritan Inc.     Published Date: Mar 19, 2009
Learn what instrumentation helps calculate your data center power efficiency and how to set standards to align with the Green Grid.
Tags : 
raritan, power, processing, instrumentation, green, green computing, efficiency, power load, it equipment, pts, datacenter, cooling
    
Raritan Inc.
Published By: Raritan Inc.     Published Date: May 21, 2009
This white paper discusses why power should be measured, where it should be measured, what to do with the data once it is gathered, as well as some of the new technologies available.
Tags : 
raritan, power, processing, instrumentation, green, green computing, pue, efficiency, power load, it equipment, pts, datacenter, cooling
    
Raritan Inc.
Published By: Raritan Inc.     Published Date: Feb 23, 2009
This white paper explores the challenges of increasing computing power in resource-constrained physical spaces and data centers experiencing high growth. We also explore how intelligent rack PDUs can meet these challenges and address critical uptime and capacity planning issues.
Tags : 
raritan, power, processing, instrumentation, green, green computing, efficiency, power load, it equipment, pts, datacenter, cooling
    
Raritan Inc.
Published By: Raritan Inc.     Published Date: Aug 04, 2010
This Case Study explores how they installed energy management software and intelligent rack PDUs with outlet-level power monitoring to add remote energy management, power monitoring of individual devices, environmental monitoring, and sophisticated and accurate power usage reports and analytics.
Tags : 
raritan, power, processing, energy management, data center efficiency, power management, instrumentation, green, green computing, efficiency, power load, it equipment, pts, datacenter, cooling
    
Raritan Inc.
Published By: Entrust Datacard     Published Date: May 15, 2014
On November 22, 2011, the CA/Browser Forum adopted “Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates, Version 1.0” (hereafter referred to as the “BR 1.0”) to take effect on July 1, 2012. This document explains the differences between non-qualified and Fully-Qualified Domain Names (FQDN), the reasons behind the CA/Browser Forum’s change and suggests alternatives for affected subscribers.
Tags : 
entrust, non fqdns, certificates, forum changes, publicly trusted certificates
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jul 21, 2014
This document explains the differences between non-qualified and Fully-Qualified Domain Names (FQDN), the reasons behind the CA/Browser Forum’s change and suggests alternatives for affected subscribers.
Tags : 
non-fqdns, depreciation, internal server names, reserved ip addresses
    
Entrust Datacard
Published By: Quorum Labs     Published Date: Nov 10, 2011
Download this paper to learn about virtual recovery solutions that SMBs need to bring an application back online in a matter of minutes.
Tags : 
backup, recovery, recover, best practices, quorum, smb, small and medium business, application, virtualization, on-site appliances, customers, online backup, disaster recovery, high availability, disaster recovery solutions, it recovery plan, online recovery solution
    
Quorum Labs
Published By: Skillsoft     Published Date: Oct 03, 2014
To compete in today’s global marketplace, employees at every level of your organization need to understand the risks associated with a broad spectrum of compliance issues and feel empowered to make the right decisions — even when no one is watching. Sixty-two percent of organizations cite risk management and assessment as a top-three concern when asked about elements of success. Many companies struggle to meet this challenge, but an effective compliance training program can foster a culture of workplace best-practices from the boardroom all the way to the shop floor. Here are 10 questions that you may find useful to consider when planning or reviewing your code of conduct program.
Tags : 
skillsoft, compliance, conduct program, compliance training program, workplace culture, risk
    
Skillsoft
Published By: ADP     Published Date: May 02, 2018
Software, outsourcing, service bureau, ASO, PEO… it’s little wonder the market for payroll solutions has a reputation for being confusing and hard to navigate. Where does one solution end and the other begin? And how do you know which one you need? This complexity is the reason we’ve created a comparison guide. Businesses have a wide spectrum of payroll options to choose from, and there are big differences between them, so like-for-like comparisons aren’t possible across categories. Before you start comparing vendors head-to-head, you need to decide which payroll style is best for you. And before you make that decision, you need to know what you want in return. Are you looking to save money? Save time? Eliminate errors? Do you want help minimizing tax compliance risks? There are plenty of options available, and they all come with different pros and cons.
Tags : 
    
ADP
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.