HIT Consultant Insightful coverage of healthcare innovation
 

rum

Results 51 - 75 of 470Sort Results By: Published Date | Title | Company Name
Published By: Akamai Technologies     Published Date: Aug 17, 2017
Warum cloudbasierte Sicherheit für Unternehmensanwendungen so wichtig ist
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jul 25, 2019
Das Customer Identity and Access Management (CIAM) spielt für Marken, die ihren anspruchsvollen Kunden ein nahtloses, sicheres digitales Erlebnis bieten wollen, eine immer größere Rolle. Als Teil des Identity and Access Management Playbook bietet Forrester Research Unterstützung beim Aufbau eines kundenorientierten IAM-Teams, das über die nötigen technischen Fähigkeiten, Geschäftspraktiken und zwischenmenschlichen Eigenschaften verfügt, um eine CIAM-Strategie zu entwerfen und sie über verschiedene Funktionsgruppen hinweg zu implementieren. Lesen Sie den vollständigen Bericht, um zu erfahren, was Sie bei der effektiven Gestaltung eines CIAM-Teams berücksichtigen sollten. Die Kernpunkte des Berichts: ? Vier wichtige Rollen für Ihr CIAM-Team ? Warum die gemeinsame Nutzung und Integration von Kundendaten über Unternehmensgrenzen hinweg entscheidend für den Erfolg ist ? Die wichtigsten technischen, geschäftlichen und zwischenmenschlichen Fähigkeiten, die die Mitglieder Ihres CIAM-Teams mit
Tags : 
    
Akamai Technologies
Published By: DellEMC and Intel®     Published Date: Sep 25, 2017
Durch eine rechtzeitige Aktualisierung von Servern kann die IT die in den Jahren 4 bis 6 der Lebensdauer eines Servers deutlich steigenden Betriebskosten vermeiden und gleichzeitig von einer besseren Performance und mehr Flexibilität profitieren. Tatsächlich steigen die Betriebskosten in den Jahren 4 bis 6 der Serverlebensdauer auf das 10-Fache der anfänglichen Anschaffungskosten des Servers an. Intel Inside®. Neue Möglichkeiten Outside. Intel® Xeon® processor Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel logotyp, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside logotyp, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi och Xeon Inside är varumärken som tillhör Intel Corporation eller dess dotterbolag i USA och/eller andra länder
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logotyp, intel atom, intel atom inside
    
DellEMC and  Intel®
Published By: VMware AirWatch     Published Date: Nov 12, 2015
Es ist noch nicht einmal ein Jahr her, dass analytische Prognosen für den Bereich Mobile Device Management (MDM) nichts Gutes verhießen. Auf einer Veranstaltung im Jahr 2013 verkündete ein Ausschuss von Analysten, dass das BYOD-Phänomen (Bring Your Own Device) zu stark herabgesetzten Preisen führen würde, was wiederum Umsatzeinbußen und schlussendlich den Untergang der gesamten Branche zur Folge haben könnte. "Die Mobile Device Management-Branche befindet sich in einem chaotischen Zustand und ich denke, dieser Markt wird untergehen“, teilte Gartner-Analyst John Girard (laut Bericht von CRN.com) dem Publikum mit. Girard prognostizierte einen Trend zum Management auf Anwendungsebene, verursacht durch das BYOD-Phänomen und die ablehnende Haltung von Mitarbeitern gegenüber dem Management ihrer persönlichen Geräte.
Tags : 
mdm, containerization, security, enterprise mobility
    
VMware AirWatch
Published By: Jamf     Published Date: Aug 12, 2019
Since its origin, Mac has been an instrumental tool in helping K-12 schools provide the right resources to students and staff. As the must-have technology for teachers and computer labs, Mac and its wealth of available apps help ensure success in elementary schools all the way through high school graduation. Now, with more Mac computers making their way into school environments than ever before, the need to properly deploy, manage and secure Apple is at an all-time high. This white paper examines how purpose-built management solutions are essential to a successful Apple strategy.
Tags : 
    
Jamf
Published By: MuleSoft     Published Date: Sep 09, 2019
Im Geschäftsleben herrscht ein außerordentlich harter Wettbewerb. Kein Unternehmen – egal wie groß oder in welcher Branche – ist sicher vor Disruption. Um die damit einhergehenden Risiken zu mindern, ist es äußerst empfehlenswert, bewährte Microservices-Methoden zu implementieren, um Änderungen und innovative Neuerungen schnell und einfach umsetzen zu können und im Wettbewerb jederzeit Schritt zu halten. Organisationen, die bereits über ein Fundament für fortlaufende Innovationen verfügen, haben Microservices-Architekturen eingeführt, um schnell und effektiv auf die ständig neuen Anforderungen reagieren zu können. In diesem Whitepaper erfahren Sie mehr zu folgenden Themen: Warum Microservices zu den bedeutendsten Software-Trends gehören Design-Grundlagen für Microservice-Architektur So erleichtert die Anypoint Platform die Implementierung von Best Practices für Microservices innerhalb von Unternehmen
Tags : 
    
MuleSoft
Published By: iShares by BlackRock     Published Date: Jun 15, 2018
While the accumulated knowledge of a portfolio manager should not be undervalued, a move toward more systematic instrument selection could ultimately enhance fund returns. This material is provided for educational purposes only and is not intended to constitute investment advice or an investment recommendation within the meaning of federal, state, or local law. Investing involves risk, including possible loss of principal. This study was sponsored by BlackRock. BlackRock is not affiliated with Greenwich Associates, LLC, or any of their affiliates. iSHARES and BLACKROCK are registered trademarks of BlackRock, Inc., or its subsidiaries. All other marks are the property of their respective owners. Prepared by BlackRock Investments, LLC, member FINRA. BlackRock, Inc. is not affiliated with The Economist. 530180
Tags : 
    
iShares by BlackRock
Published By: IBM     Published Date: Apr 09, 2015
Driven by demands to unify and extend protection across a broad spectrum of threats, EMA sees in this trend the rise of Converged Network Security (CNS) systems that integrate a wide range of capabilities and break down silos in network defense more than ever before. Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research highlights specific examples of the ways in which these converged security systems put today’s more advanced capabilities to work in practical application. The IBM Security Network Protection XGS 5000 is profiled as an example of this trend, delivering not only intelligence driven, application aware defense against a variety of threats, but also the extensibility required to equip today’s organizations to confront whatever may come tomorrow.
Tags : 
data security, ibm, converged network security, security risk
    
IBM
Published By: Spectrum Enterprise     Published Date: May 15, 2017
Read this case study to learn how CIG leverages blazing Internet speeds and capacity to engage players directly in creating the movie-quality gaming world of Star Citizen.
Tags : 
    
Spectrum Enterprise
Published By: Spectrum Enterprise     Published Date: Oct 05, 2017
After developing the blockbuster video games Wing Commander and Freelancer, Chris Roberts spent 10 years in Hollywood making movies. In 2012, Roberts founded Cloud Imperium Games (CIG) and launched development of Star Citizen using crowd funding from fans eager to participate in shaping the new game. To facilitate Roberts' disruptive model for video game development, CIG needed ultra high-speed Internet connectivity. Read this case study to learn how CIG leverages blazing Internet speeds and capacity to engage players directly in creating the movie-quality gaming world of Star Citizen.
Tags : 
    
Spectrum Enterprise
Published By: Bloomberg     Published Date: Dec 14, 2010
An open symbology framework for financial instrument identifiers can automate and accelerate transaction processes while driving out costs and introducing higher levels of transparency for effective risk management. Bloomberg explores open symbology in the securities industry. *Whitepaper content is specific to Financial Industry Executives*.
Tags : 
bloomberg, open symbology, market identifiers, financial instruments, analytics
    
Bloomberg
Published By: Bloomberg     Published Date: Nov 29, 2010
An open symbology framework for financial instrument identifiers can automate and accelerate transaction processes while driving out costs and introducing higher levels of transparency for effective risk management. Bloomberg explores open symbology in the securities industry. *Whitepaper content is specific to Financial Industry Executives*.
Tags : 
bloomberg, open symbology, market identifiers, financial instruments, analytics
    
Bloomberg
Published By: BMC     Published Date: Sep 11, 2012
Hear VPs from Forrester Research and BMC Software discuss the results of our 2012 job scheduling survey in "Workload Automation Survey Results: Peer Insights and Expert Analysis.
Tags : 
job scheduling software, job scheduling, workload automation, workload automation forum, workload automation job scheduling, best file transfer software, job scheduler, workload automation
    
BMC
Published By: CA Technologies     Published Date: Apr 06, 2017
Privileged identity, accounts and credentials are core, critical assets for enterprises that must be highly protected through a combination of technology and processes which are enabled by privileged access management. Delivering that protection is instrumental in breaking the data breach kill chain, helping to prevent attacks and mitigating the impact of those that do occur.
Tags : 
data breach, it security, malicious spyware, security management, cloud security, system protection
    
CA Technologies
Published By: SAS     Published Date: Jun 06, 2018
The Internet of Things (IoT) is rapidly emerging as a core transformational technology of the digital era. The ability to gather data from sensors embedded throughout an enterprise can drive insights and operational efficiencies from the supply chain to the customer. But IoT and Industrial IoT (IIoT) implementations require high degrees of IT/OT convergence - collaboration and integration between information technology and operational technology groups - to succeed. These two groups, however, often have different goals, performance metrics, and perspectives on both the collaboration and the outcome. This SAS/HPE-sponsored paper helps readers get a better understanding of the relationship, either real or perceived, between these two groups. Futurum Research surveyed the state of the relationship between IT and OT teams as it pertains to the design, implementation, and creation of value through IoT technologies.
Tags : 
    
SAS
Published By: SAP     Published Date: Jun 23, 2009
Is your company seeking to incorporate finance as a core line of business? This SAP Executive Insight examines the changing role of the finance organization in today's business environment - and describes how companies can develop best-run finance organizations.
Tags : 
finance, sap, business realities, best-run finance organizations, executive insight, sox, agile, metric
    
SAP
Published By: CollabNet     Published Date: Mar 30, 2012
Strategies on how to build and maintain a good product backlog. She describes the overall concepts and techniques for backlog management and how each of the project contributors can contribute to its overall effectiveness.
Tags : 
agile, scrum, teams, software dev, swdev, product backlog, backlog, success
    
CollabNet
Published By: IBM     Published Date: Oct 31, 2013
IBM Business Analytics help managers in different areas of the marketing organization do their jobs more effectively. Watch this video to see how: 1. Demand generation managers can target the most profitable customers with the right offer at the right time. 2.Marketing operations managers can review the results of multiple campaigns from a single marketing performance dashboard. 3. Brand managers can blend data from blogs, forums and social websites with CRM data to see how people really regard the company’s brand. Watch this video to see how IBM helps you make smarter marketing decisions, faster.
Tags : 
roi, return on investment, marketing analytics, performance analytics, business analytics, metrics, data, driver-based campaign
    
IBM
Published By: Spectrum Enterprise     Published Date: Jun 05, 2017
Follow the steps of industry peers to turn technology challenges into outstanding success.
Tags : 
    
Spectrum Enterprise
Published By: CA Technologies EMEA     Published Date: Sep 13, 2018
Introduzione CA Project & Portfolio Management (CA PPM) 15.3 consente di personalizzare i progetti per qualsiasi business unit, con la semplicità del drag-and-drop. Dal complicato workflow per HR o alla semplice gestione delle attività per le vendite, oggi i lavoratori riescono ad avviare i progetti in pochi minuti, anziché in giorni. È possibile integrare la collaborazione all'interno dell'applicazione per eliminare riunioni ridondanti, una familiare griglia di tipo Microsoft Excel® per la gestione dei budget, una nuova connessione per strumenti di Business Intelligence (BI) di terze parti che consentono di trovare risposte, e si ottiene la più moderna app di Project Portfolio Management attualmente sul mercato.
Tags : 
    
CA Technologies EMEA
Published By: PdMA Corporation     Published Date: Jun 23, 2008
In this paper we present three case studies using online and offline motor analysis to prevent catastrophic motor failures. The online and offline analysis in our case studies use a battery of standard electrical tests including Current Signature Analysis (CSA) and Demodulated Current Spectrum Analysis (DCSA).
Tags : 
scm, battery, production, pdma
    
PdMA Corporation
Published By: Rackspace     Published Date: May 28, 2019
Tokio Marine Life Insurance Singapore (TMLS), an established general and life insurance firm, and subsidiary of the first insurance company in Japan, Tokio Marine Holdings, envisioned an e-services portal to improve user experience by providing a single platform for all customer interactions. For its infrastructure and environment development, the insurer engaged the professional managed security and managed public cloud services of Rackspace, to help with the optimization of its Azure cloud platform, as well as to ensure that the migration is compliant to Singapore’s strict regulations on public cloud use by financial services institutions. The new portal that went live recently had Rackspace instrumentally involved in its building, running, managing and optimizing for the Azure cloud, including a best-practice infrastructure design with the latest resiliency and security features. Building on the success of this year-long project, a future collaboration to tap Rackspace’s PCI DSS
Tags : 
    
Rackspace
Published By: Raritan Inc.     Published Date: Aug 04, 2010
This Case Study explores how they installed energy management software and intelligent rack PDUs with outlet-level power monitoring to add remote energy management, power monitoring of individual devices, environmental monitoring, and sophisticated and accurate power usage reports and analytics.
Tags : 
raritan, power, processing, energy management, data center efficiency, power management, instrumentation, green
    
Raritan Inc.
Published By: Viavi Solutions     Published Date: Jun 30, 2014
The City of Jacksonville put their hunch to work and not only solved a mystery, but found a new and innovative use for a popular UC solution that saved them $30,000.
Tags : 
network instruments, uc solution, network, network issues
    
Viavi Solutions
Published By: IBM     Published Date: Oct 01, 2013
Continual and timely upgrades of UNIX systems can enable growth and lower costs. But for some Sun/Oracle and HP customers, expected upgrade plans have hit major hurdles. Read this Clipper Group white paper to see how only IBM continues to provide a plan, and a predictable drumbeat, for the future. Read it now.
Tags : 
ibm, ibm power7, ibm power7 systems, data center, it infastructure, data center, enterprise applications, consolidation
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.