HIT Consultant Insightful coverage of healthcare innovation
 

rum

Results 276 - 300 of 469Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Sep 10, 2009
As the demands for data capacity and higher service levels grow, protecting corporate data becomes more challenging. Continuous Data Protection, as discussed in this white paper by Evaluator Group and IBM, can cost-effectively improve security with As the demands for data capacity and higher service levels grow, protecting corporate data becomes more challenging. Continuous Data Protection, as discussed in this white paper by Evaluator Group and IBM, can cost-effectively improve security with minimal impact to operations.
Tags : 
new data protection strategies, ibm, data capacity, evaluator group, continuous data protection, tsm fastback, cdp technology, delicate balance
    
IBM
Published By: Orchid Technologies Engineering & Consulting     Published Date: Oct 07, 2008
As electronic product designs age, component parts become increasingly difficult to obtain.  Component buyers may experience difficulty in obtaining key parts within the design.  Component part prices may increase.  A point comes when component parts begin going end-of-life at an alarming rate.  Quick fixes are no longer sufficient.  Sometimes an OEM will procure a 'life-time' supply of problem parts – but this supply can be quickly wiped out should unforeseen demand develop.  Lack of component parts puts an end to production.There is an alternative.  Profitable, old products can be redesigned.  Either preserving the original form fit and function, or adding new features. Product redesign is a cost effective means by which to extend the life of a marketable product.
Tags : 
orchid technologies, texas instruments, original equipment manufacturers, (oem’s)
    
Orchid Technologies Engineering & Consulting
Published By: Vision Solutions     Published Date: Jun 10, 2009
Journaling? RAID? Vaulting? Mirroring? High availability? Know your data protection and recovery options! Download this information-packed 29-page report that reviews the spectrum of IBM i (i5/OS) and AIX resilience and recovery technologies and best practices choices, including the latest, next-generation solutions.
Tags : 
aix, i5/os, vision, resilience, recovery, recovery solutions, os/400, ibm i
    
Vision Solutions
Published By: Texas Instruments     Published Date: Nov 06, 2006
Read how the Next Generation Residential Gateway (RG) is capable of supporting the ever increasing need for higher data throughput rates, signaling range that covers the whole house and robustness capable of mitigating the sources of interference found in the home.
Tags : 
bandwidth, residential gateways, bandwidth management, home networking, wireless networking, consumer electronics, texas instruments
    
Texas Instruments
Published By: Spectrum Enterprise     Published Date: Jun 05, 2017
Download this case study to learn how Spectrum Enterprises has provided the scalability, reliability and security to support Hagadone Corporation’s ongoing drive for excellence including: - Productivity driven by the network’s ability to handle day-to-day work flow quickly and with little latency, especially during spikes in usage - Reliable connectivity for sharing large files for electronic publishing Flexibility to innovate and create an interactive hospitality guest experience - Ability to scale bandwidth to support diverse business needs and expand Hagadone’s influence as a media company
Tags : 
    
Spectrum Enterprise
Published By: Workday     Published Date: Mar 26, 2019
How can a single cloud-based finance, HR, and supply chain system for healthcare from Workday improve all spectrums of care? View the interactive infographic to see how we help some of the largest healthcare providers and integrated delivery networks improve operations, reduce costs, and retain the best talent.
Tags : 
    
Workday
Published By: Workday APAC     Published Date: Jul 30, 2019
How can a single cloud-based finance, HR, and supply chain system for healthcare from Workday improve all spectrums of care? View the interactive infographic to see how we help some of the largest healthcare providers and integrated delivery networks improve operations, reduce costs, and retain the best talent.
Tags : 
    
Workday APAC
Published By: Schneider Electric     Published Date: Jun 03, 2019
Industrial process safety management has evolved beyond simple functional safety. Some companies are at risk because management and business process aspects are not integrated into the overall safety plan. Such gaps can impact both operational integrity and profitable performance. Explore the change drivers affecting plant process safety management and learn how operators can find, measure, and manage gaps to maintain safe conditions and improve profitability. Download the white paper to learn more.
Tags : 
smart control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability
    
Schneider Electric
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
IIDC erwartet, dass bei Unternehmenskunden das Wachstum bei Flash-Speicher weiterhin höher als bei rotierenden Festplatten ist und dass die ausgelieferte SSD-Kapazität jedes Jahr um mehr als 75 % ansteigt.2 Eine mögliche Ursache dafür ist, dass die Preise schneller sinken als erwartet. Eine aktuelle Studie zeigt, dass Flash in Bezug auf die Gesamtbetriebskosten über einen Zeitraum von vier Jahren gesehen das kostengünstigste Medium für alle Speicherumgebungen ab 2016 sein wird.3 Die Gesamtbetriebskosten für Flash werden bis 2020 weiter sinken und einen ROI ermöglichen, bei dem Lösungen mit rotierenden Festplatten nicht mithalten können.
Tags : 
    
Hewlett Packard Enterprise
Published By: Dell EMC EMEA     Published Date: Nov 22, 2018
La tecnología del hardware no dura para siempre. Tiene un ciclo de vida, un comienzo y un final medibles con respecto a su productividad y valor. El departamento de TI se encarga de optimizar el ciclo del ciclo de vida de los PC e impulsar al mismo tiempo avances estratégicos para la organización. Sin embargo, lidiar con el coste alto y la complejidad que impone la gestión de los PC deja poco tiempo para la innovación. Ofrecemos opciones de financiación flexibles que ayudan a garantizar que el departamento de TI siempre tenga todo lo que necesita y cuando lo necesita para que los usuarios finales nunca tengan que interrumpir su trabajo por problemas de este tipo. Obtenga más información acerca de las soluciones Dell con tecnología Intel®.
Tags : 
    
Dell EMC EMEA
Published By: Intel     Published Date: Jul 17, 2019
Managing a large, diverse, and geographically dispersed fleet of client systems can be complex and time-consuming. With the increasing prevalence of smart, connected devices that are beginning to appear within the enterprise across industries, technology service organizations will face an explosive demand for a consistent approach to device management and security. Using Intel AMT, service organizations can take simple and effective steps to enable more manageable client systems. They can streamline operations and create a consistent approach to managing a broad spectrum of devices. Powerful platform capabilities can help service organizations meet user needs, minimize downtime, and safeguard the enterprise. Service organizations can draw upon available solution reference architectures, implementation guides, and readily available tools from Intel and others to successfully activate Intel AMT and begin to realize its major benefits.
Tags : 
    
Intel
Published By: Oracle_Hospitality Hotels     Published Date: Dec 14, 2015
Hear from Nathan Crisp of Trump Hotels as he shares how Oracle Hospitality Solutions is providing efficient, best-in-class property management, point-of-sale, and distribution technology for Trump Hotels’ properties worldwide.
Tags : 
oracle hospitality, trump hotels, hospitality solutions
    
Oracle_Hospitality Hotels
Published By: Quorum Labs     Published Date: Dec 20, 2011
Here is the dilemma - Are your servers really protected in case of a disaster?
Tags : 
quorumlabs, equipment, product, disaster recovery, onq, protection, security, backup
    
Quorum Labs
Published By: OCAI Online     Published Date: Nov 29, 2010
This paper presents the outcome of research in Public Administration: what organizational culture type prevails and is change desired and needed?
Tags : 
organizational culture, corporate culture, change management, public administration, culture survey
    
OCAI Online
Published By: Juniper Networks     Published Date: Aug 07, 2017
Warum maschinelles Lernen entscheidend zur Cybersicherheit beiträgt
Tags : 
    
Juniper Networks
Published By: IBM     Published Date: Jul 26, 2017
Just a few years ago, many organizations turned to private cloud environments to help increase flexibility and control costs—largely because of the immaturity and lack of control within the public cloud environments then available. Today, however, the decision to “go cloud” is less of a binary, and more of a spectrum of choices, spanning different deployment models (public, private and hybrid) and service types, including IaaS, PaaS and SaaS.
Tags : 
cloud, data protection, security, deployment methods, service types
    
IBM
Published By: Dyn     Published Date: Jul 29, 2015
In this O'Reilly report, author Andy Still points out: • How the advantages of using cloud-based systems outweigh the disadvantages • How you can closely monitor system elements that you don’t control, with Real User Monitoring (RUM) and other tools • How to use a CDN and cache data as close to users as possible • How to architect your systems to gracefully handle potential cloud service failures
Tags : 
optimization, cloud, infrastructure, web operations, cloud migration, real user monitoring, cdn, cloud service failures
    
Dyn
Published By: Dyn     Published Date: Mar 30, 2016
Most organizations today are moving at least some of their infrastructure to the cloud. A cloud or hybrid cloud approach often requires constant monitoring, planning, testing and optimizing to keep a consistent, reliable, always available web experience. Read this O’Reilly report to learn the latest rules and recommendations to architecting your cloud instance, debunk the common fears to cloud adoption and discover how to gain back control in areas you didn’t realize you could.
Tags : 
dyn, cloud, performance optimization, cdn, rum
    
Dyn
Published By: Lumesse     Published Date: Feb 13, 2015
This white paper aims to provide an overview of the peculiarities in recruitment and talent management that exist in China, based on best practice and real life case studies.
Tags : 
hr in china, talent management in china, recruitment and talent management, recruitment in china
    
Lumesse
Published By: Adobe     Published Date: Feb 02, 2017
Die Möglichkeit zur schnellen Erstellung und Bereitstellung professioneller Personalunterlagen verschafft Unternehmen einen entscheidenden Wettbewerbsvorteil, wenn es darum geht, Fachkräfte zu gewinnen und zu halten.
Tags : 
    
Adobe
Published By: Viavi Solutions     Published Date: Jan 06, 2014
To learn the top 10 list of key components for a comprehensive APM solution. Download this whitepaper.
Tags : 
network instruments, apm, application performance monitoring, monitoring solution, application performance, troubleshooting applications
    
Viavi Solutions
Published By: Raritan Inc.     Published Date: Feb 23, 2009
This white paper explores the challenges of increasing computing power in resource-constrained physical spaces and data centers experiencing high growth. We also explore how intelligent rack PDUs can meet these challenges and address critical uptime and capacity planning issues.
Tags : 
raritan, power, processing, instrumentation, green, green computing, efficiency, power load
    
Raritan Inc.
Published By: Schneider Electric     Published Date: Jun 07, 2019
New digital technology now makes it feasible to integrate process control and SIF within a common automation infrastructure. While this can provide productivity and asset management benefits, if not done correctly, it can also compromise the safety and security of an industrial operation. Cybersecurity and sabotage vulnerability further accentuate the need for securing the safety instrumented system (SIS). Certainly, a common platform approach using similar hardware and software dedicated for control and safety functions, respectively, can provide the potential for cost savings. However, it is widely acknowledged that utilizing separate, independent, and diverse hardware/software for safety and control is the optimal way to protect against potentially catastrophic common cause and systematic design and application errors. Different vendors offer varied degrees of integration and solutions. The question is: how to provide an integrated control and safety solution with advanced functionality and productivity without compromising safety and security? And, where do users draw the line? A third-party (e.g., TÜV) certification of the hardware/software systems to IEC 61508 specifications carries significant advantages, but should this be the only criterion? How does a third-party certificate extend to the plant’s overall assignment of risk reduction credits for all independent protection layers (IPL)? Control system embedded safety logic solvers may actually increase the SIL requirements of the SIF if no credit is allowed for the distributed control system (DCS) as an IPL. Download the white paper to learn more.
Tags : 
smart control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability
    
Schneider Electric
Published By: LifeLock     Published Date: Mar 02, 2015
Every interaction, every communication, every touch point creates a digital breadcrumb — a piece of data that can put people at greater risk of identity theft. This paper from Forrester Research compares various segments and demographics to understand which groups are at the greatest risk of identity theft.
Tags : 
    
LifeLock
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
La sfida Come ci si può aspettare, le aziende che intraprendono un percorso di digital transformation devono affrontare maggiori problemi correlati a rischi e sicurezza. Le iniziative di digital transformation aumentano inevitabilmente il numero dei punti di accesso all'infrastruttura aziendale che sfuggono ai controlli esistenti, sono accessibili a un numero superiore di set di identità diversi e proliferano all'interno di un'infrastruttura distribuita e dinamica. L'opportunità Conoscere i propri utenti con privilegi significa conoscere i rischi. Di per sé, gli strumenti di privileged access management devono essere in grado di supportare l'automazione nel processo di autorizzazione e garantire la scalabilità attraverso il supporto di operations dinamiche e infrastrutture effimere, come gli account amministrativi Amazon Web Services (AWS) per le identità umane.
Tags : 
    
CA Technologies EMEA
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.