HIT Consultant Insightful coverage of healthcare innovation
 

rum

Results 326 - 350 of 470Sort Results By: Published Date | Title | Company Name
Published By: Micro Focus     Published Date: Aug 17, 2011
Migrating apps to more contemporary platforms is a proven modernization strategy that reduces costs and makes IT more agile in supporting business.
Tags : 
micro, cobol, rumba, für arbeit, rumba, server express, server express, express server, rentenversicherung, handelsbanken, dwa, micro focus, terminal emulator, rumba mainframe, vax emulation, pc terminal emulator, windows terminal server software, ga run, gaload, cobol unix
    
Micro Focus
Published By: Texas Instruments     Published Date: Nov 06, 2006
Download this free whitepapers to learn how Remote Management can transform this challenge into an opportunity to stand apart from other service providers in a very competitive market.
Tags : 
access control, remote access, remote management, remote support, service provider, service providers, ip networks, ip tv, customer service, customer satisfaction, texas instruments
    
Texas Instruments
Published By: Act-On     Published Date: Apr 29, 2016
Top-performing marketing leaders understand the need to allocate their time and resources across the entire spectrum of marketing, acknowledging that an effective marketing strategy goes well beyond just driving demand for sales.
Tags : 
marketing, business development, sales, business practices
    
Act-On
Published By: Veeam '18     Published Date: May 01, 2019
Il ransomware è al primo posto nei pensieri dei leader di molte organizzazioni poiché queste ultime devono affrontare le conseguenze potenzialmente disastrose degli attacchi riusciti. ESG ha intervistato i leader e le organizzazioni IT per scoprire la reale portata del problema ransomware, quali sono le conseguenze economiche delle interruzioni causate da questi attacchi e quali sono le best practice e le capacità che le organizzazioni devono applicare per essere protette. Secondo la ricerca ESG, quasi i due terzi delle organizzazioni intervistate in tutto il Nord America e l'Europa occidentale hanno subito un attacco ransomware a un certo punto dell'anno scorso, e il 22% ha riportato attacchi settimanali. Gli attacchi hanno contribuito a rendere la sicurezza informatica un obiettivo dell'investimento IT e la spesa in questo senso sta accelerando. Ciò che è necessario per respingere questa epidemia sono le best practice e gli strumenti per: • Prevenire o almeno mitigare gli attacchi •
Tags : 
    
Veeam '18
Published By: Riverbed     Published Date: Feb 26, 2015
The Riverbed SteelCentral network performance management suite of products provides considerable advantages over those of JDSU Network Instruments because of its breadth, depth and ease of use to quickly understand and pinpoint the root cause of performance problems.
Tags : 
network performance management, performance issues, performance management, end-user experience management, cloud computing, mobile device
    
Riverbed
Published By: Micro Focus     Published Date: Sep 12, 2014
Where green screen apps meet modern interfaces, accelerating efficiency and enhancing the user experience. Provide core system access from Windows, iPad or your web browser – without the risks of new code or reprogramming.
Tags : 
green screen apps, modern interfaces, user experience, cores system access
    
Micro Focus
Published By: Lenovo UK     Published Date: Sep 10, 2019
Savez-vous où vous courez le plus de risque ? Dans la course à la compétitivité et à la transformation digitale, les entreprises font face à de nouvelles menaces. Avec ThinkShield de Lenovo, vous bénéficiez d’une solution de sécurité complète et personnalisable qui vous protège de bout en bout. Sachant qu’il faut en moyenne 23 jours pour se remettre d’une attaque par ransomware1, découvrez pourquoi la sécurité informatique constitue la priorité des priorités. Téléchargez notre guide de solutions > Wissen Sie, wo Sie am meisten gefährdet sind? Im Wettrennen mit Ihren Mitbewerbern um die digitale Transformation Ihres Unternehmens treten neue Bedrohungen auf. Mit ThinkShield von Lenovo erhalten Sie eine anpassbare, umfassende Lösung, die Ihr Unternehmen rundum schützt. Es dauert durchschnittlich 23 Tage, um die Folgen eines Ransomware-Angriffs zu beheben1. Erfahren Sie, warum IT-Sicherheit ganz oben auf der Prioritätenliste stehen sollte. Lösungsübersicht herunterladen > 1 IBM : 2
Tags : 
lenovo
    
Lenovo UK
Published By: Mimecast     Published Date: Apr 26, 2018
Die alt hergebrachte Archivierung funktioniert nicht mehr für das moderne Unternehmen. Laut einer Umfrage von Vanson Bourne und Mimecast aus dem Jahr 2017 schätzen 88 % der globalen Organisationen ihre vorhandene Archivierungslösung als problematisch ein. Lassen Sie sich die Augen öffnen für die neuesten Erkenntnisse aus dem Bereich der modernen E-Mail-Archivierung. In diesem E-Book lernen Sie: • Warum traditionelle Archivierungssysteme für mobile Anwender nicht funktionieren • Wie Sie in Ihrer Organisation für eine erfolgreiche Archivierung alte Gewohnheiten ablegen müssen • Worauf es bei einem perfekten Archiv ankommt
Tags : 
    
Mimecast
Published By: Mimecast     Published Date: Apr 27, 2018
Die alt hergebrachte Archivierung funktioniert nicht mehr für das moderne Unternehmen. Laut einer Umfrage von Vanson Bourne und Mimecast aus dem Jahr 2017 schätzen 88 % der globalen Organisationen ihre vorhandene Archivierungslösung als problematisch ein. Lassen Sie sich die Augen öffnen für die neuesten Erkenntnisse aus dem Bereich der modernen E-Mail-Archivierung. In diesem E-Book lernen Sie: • Warum traditionelle Archivierungssysteme für mobile Anwender nicht funktionieren • Wie Sie in Ihrer Organisation für eine erfolgreiche Archivierung alte Gewohnheiten ablegen müssen • Worauf es bei einem perfekten Archiv ankommt
Tags : 
    
Mimecast
Published By: Mimecast     Published Date: Apr 27, 2018
Die alt hergebrachte Archivierung funktioniert nicht mehr für das moderne Unternehmen. Laut einer Umfrage von Vanson Bourne und Mimecast aus dem Jahr 2017 schätzen 88 % der globalen Organisationen ihre vorhandene Archivierungslösung als problematisch ein. Lassen Sie sich die Augen öffnen für die neuesten Erkenntnisse aus dem Bereich der modernen E-Mail-Archivierung. In diesem E-Book lernen Sie: • Warum traditionelle Archivierungssysteme für mobile Anwender nicht funktionieren • Wie Sie in Ihrer Organisation für eine erfolgreiche Archivierung alte Gewohnheiten ablegen müssen • Worauf es bei einem perfekten Archiv ankommt
Tags : 
    
Mimecast
Published By: Mimecast     Published Date: Apr 27, 2018
Schicken Sie Ihre Alte Archivierungsslösung In Den Ruhestand White Paper Published By: Mimecast Die alt hergebrachte Archivierung funktioniert nicht mehr für das moderne Unternehmen. Laut einer Umfrage von Vanson Bourne und Mimecast aus dem Jahr 2017 schätzen 88 % der globalen Organisationen ihre vorhandene Archivierungslösung als problematisch ein. Lassen Sie sich die Augen öffnen für die neuesten Erkenntnisse aus dem Bereich der modernen E-Mail-Archivierung. In diesem E-Book lernen Sie: • Warum traditionelle Archivierungssysteme für mobile Anwender nicht funktionieren • Wie Sie in Ihrer Organisation für eine erfolgreiche Archivierung alte Gewohnheiten ablegen müssen • Worauf es bei einem perfekten Archiv ankommt
Tags : 
    
Mimecast
Published By: CollabNet     Published Date: Jan 11, 2013
This document, written by thought leader and certified CollabNet Scrum trainer and coach Michael James, condenses the essence of Scrum into 6 pages. It's a must read for agile enthusiasts and anyone who wants to learn more about Scrum.
Tags : 
scrum, agile, software development, framework, project management
    
CollabNet
Published By: CollabNet     Published Date: Jan 13, 2013
This list can help you to become a Full-Time Facilitator and not just the guardian of the Scrum process
Tags : 
scrum, software development, productivity, management, agile
    
CollabNet
Published By: Veeam '18     Published Date: May 07, 2019
In diesem fünfminütigen, leicht lesbaren Dokument wird erläutert, warum Unternehmen Office 365-Daten schützen müssen. Dieser Bericht zeigt Ihnen: • Das große Missverständnis zwischen der Verantwortung von Microsoft und den IT-Organisationen • 6 Gründe, warum die Sicherung von Office 365 von entscheidender Bedeutung ist • Wer kontrolliert Office 365-Daten?
Tags : 
    
Veeam '18
Published By: Akamai Technologies     Published Date: May 05, 2017
Security and performance were once considered separate issues requiring very different solutions. But now that malicious hackers have discovered new and better ways to affect both aspects of a website, you need solutions that can plug security holes while enhancing frontend performance. How is that possible? In this report, we explore browser-based solutions that can beef up security and enhance end-user performance in one stroke. This report examines several techniques for dealing with third party content issues in the browser, including HSTS, iframe, and prefetch. It also dives into service workers and browser-based scripts that provide many security and performance options. Download it now and learn how you can jointly improve security and increase performance.
Tags : 
cyber security, security, web linking, performance
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Aug 17, 2017
More often than not, performance and security are thought of as two separate issues that require two separate solutions. This is mainly due to the implications posed behind various performance and security products. We typically have either security solutions or performance solutions, but rarely solutions that offer both. As technology has advanced, so have our attackers, finding newer and better ways to impact both the performance and security of a site. With this in mind, it has become even more critical to come up with solutions that bridge the gap between security and performance. But how do we do that? We need to shift the focus to what we can do at the browser by leveraging various frontend techniques, such as web linking and obfuscation, versus solely relying upon the capabilities of a content delivery network (CDN) or the origin. We can take advantage of all the new and emerging frontend technologies to help provide a secure and optimal experience for users—all starting at the
Tags : 
frontend performance, security, technology, content delivery, web linking
    
Akamai Technologies
Published By: Epicor HCM     Published Date: Sep 20, 2011
Using a fully integrated HR system to streamline and improve overall operations can help companies become leaders in their respective industries. In this white paper, learn the steps to finding the right HRIS for your organization.
Tags : 
hris, hcm, technology, implementation, systems, performance management, epicor hcm, ivantage, spectrum, workforce management, talent management
    
Epicor HCM
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Today, organizations of all sizes recognize the value of an agile software delivery process. Agility is the foundation for cost–efficiency, competitiveness, high team morale and customer satisfaction. Yet most organizations face an agility paradox in that the more agile their software delivery workflow becomes, the higher the risk that instability or unpredictability will be introduced and undercut the investment they make in software production. Fortunately, there is a solution to this conundrum. It’s called shift–left monitoring, and it allows your company to maximize agility in software delivery without assuming undue risks. This e–book explains how you can achieve agility and stability at the same time to streamline the path to digital transformation and innovation by shifting monitoring to the left of your software delivery workflow.
Tags : 
    
CA Technologies EMEA
Published By: IBM     Published Date: Mar 31, 2016
"Is ‘Integration’ becoming a barrier to cloud adoption and preventing you from getting there fast? With Cloud adoption gaining momentum, the diversity as well as complexity of cloud integration use cases is on the rise. The right integration strategy is the single most important determinant of success. IBM’s leading cloud integration offering—IBM Cast Iron—is constantly evolving to address the changing cloud landscape. Cast Iron has been an integration platform of choice for enterprises of all sizes, across different industry verticals. Its simple configuration-based ‘no coding’ approach and extensive pre-built connectors and templates make it suitable for emerging bi-modal IT teams. Cast Iron supports the complete spectrum of Cloud Integration use cases—from data migration to bi-directional sync, from API centric invocation style to eventbased integrations. Join us to learn the newer platform features and enhancements and how IBM Cast Iron can help you embrace cloud, paving the way fo
Tags : 
ibm, cloud integration, websphere, integration, ibm cast iron, middleware
    
IBM
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
This infographic looks at Software Engineers who do awesome ops, ensuring millions of users having super-fast and reliable service from today’s massively complex systems! We look at the key skills and tools required in Modern monitoring and analytics: -Full Stack Visibility -Noise Reduction -Anomaly Detection -Modern Instrumentation -Data- Driven Insights Put your SRE Teams in the Driver's Seat with a new model for application monitoring.
Tags : 
    
CA Technologies EMEA
Published By: Group M_IBM Q119     Published Date: Dec 20, 2018
Over the years, IBM Resilient customers have increased their IR sophistication at various levels across a spectrum of maturity. Maturity levels are often necessitated by industry, available resources, or experience, but most IBM Resilient customers continually look to evolve their IR function into a more advanced phase.
Tags : 
    
Group M_IBM Q119
Published By: Akamai Technologies     Published Date: Jul 25, 2019
Treue- und Prämienprogramme sind effektive Mittel, mit denen Marken die Interaktion, Akquise und Treue von Mitgliedern steigern können. Erfahren Sie, warum führende Marken auf moderne CIAM-Lösungen (Customer Identity and Access Management) setzen und damit ihre Treueprogramme skalieren, das Nutzererlebnis verbessern und den ROI maximieren. In diesem Whitepaper erfahren Sie, welche Herausforderungen Sie bei der Transformation, Erweiterung und Skalierung von Kundenbindungs- und Prämienprogrammen und damit verbundenen Mitgliedschaftsinitiativen meistern müssen. Darüber hinaus stellen wir Ihnen Lösungen vor, die auf tiefgehenden Einblicken in vier praxisnahe Fallstudien basieren. Wir untersuchen die Anforderungen an eine unternehmensweite CIAM-Lösung und sprechen verwandte Themen wie „Entwicklung oder Kauf“ und „CIAM vs. IAM“ an. Anhand von vier verschiedenen Fallstudien – und den daraus resultierenden Identitätsmanagement-Lösungen, die durch das jeweilige Unternehmen implementiert wurde
Tags : 
    
Akamai Technologies
Published By: FICO EMEA     Published Date: Jan 25, 2019
Communications service providers (CSPs) have long recognized the potential of data analytics. Yet their early efforts to pull actionable intelligence from the oceans of data they have access to were largely unsuccessful. Many tried a 'big bang' approach to building a central repository without knowing what they wanted to do with the data in it. The arrival of artificial intelligence (AI) – its machine learning subset in particular – has changed their thinking and approach. For this Quick Insights report, we surveyed 64 professionals from CSPs around the world who are applying, leveraging and/ or planning to deploy advanced analytics in some capacity at various points across the customer lifecycle.
Tags : 
analytics, artificial intelligence, customer lifecycle, insights, telecom credit lifecycle, customer acquisition, optimisation
    
FICO EMEA
Published By: Spredfast, Inc.     Published Date: Sep 05, 2013
Learn how top tech brands like Rackspace, Jive Software, National Instruments, LifeSize, and Intuit deliver business impact through social.
Tags : 
spredfast, social business, social media, social marketing, brand awareness, thought leadership
    
Spredfast, Inc.
Published By: CDW     Published Date: Mar 31, 2015
The new IT conundrum is to decide to rent infrastructure or build out your data center. The data explosion of the past decade has left many enterprises awash in a mixed and disjointed storage environment. With different storage technologies for primary, backup and analytic storage pools and SSD options that can confound rather than help, many in IT are struggling to improve the efficiency, performance and cost structures of what has become a big part of IT's spend. Watch this webinar to learn more.
Tags : 
storage, cloud, infrastructure, data center, storage technologies, backup
    
CDW
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.