HIT Consultant Insightful coverage of healthcare innovation
 

safe

Results 1 - 25 of 847Sort Results By: Published Date | Title | Company Name
Published By: RSM US     Published Date: Feb 08, 2019
As your nonprofit organization grows, your needs grow commensurately, often outpacing your managed service providers’ capabilities. To better safeguard your organization’s future, your managed service providers should exhibit these five key components:
Tags : 
    
RSM US
Published By: HERE Technologies     Published Date: Feb 12, 2019
This is an at-a-glance guide to the key innovation trends in fleet management that leverage location data to improve last-mile efficiency and road safety. Presented to you by HERE, one of the world’s leading location platforms in 2019.
Tags : 
location data, transport & logistics, location services
    
HERE Technologies
Published By: Intel     Published Date: Feb 28, 2019
The confluence of AI and Industry 4.0 is transforming image processing. As image vision becomes widespread, there is an increasing need to transition stand-alone imaging to an integrated driver of automation feeding insights back into the business systems that monitor overall factory performance. Download the whitepaper to learn more about fitting multiple demands into a single platform— • Building an industrial system with advanced functions like machine vision and Industry 4.0 connectivity • Minimizing the footprint of the systems to save space, cost and power consumption • Adhering to principles of long life, safety, reliability, real-time control functionality alongside AI and IIOT capabilities
Tags : 
    
Intel
Published By: Stratasys EMEA     Published Date: Feb 21, 2019
Factory production lines know the right jig or fixture speeds production, which increases productivity. But that’s just the beginning. Well-designed tools are more ergonomic, offering both increased worker safety and productivity, as well as cost savings. Traditional machining produces heavy, costly, multi-piece tools that become an even greater liability as repetitive motion injuries erode line productivity with worker disability. Redesign means even more protracted timelines for machined parts. While essential to efficiency, accuracy and safety, jigs and fixtures are often considered a necessary evil in the overall production process. Costly, protracted timelines for machined jigs and fixtures are the culprit here, especially for the often complex designs necessary to meet unique part needs. This, along with certain complex designs that simply cannot be manufactured using traditional methods are a reality on the production floor. But there is a better way. 3D printed jigs and fixture
Tags : 
    
Stratasys EMEA
Published By: Group M_IBM Q119     Published Date: Jan 10, 2019
It is breathing life into our existing energy resources and creating new opportunities. Better use of data has visible, tangible and immediate results. It is helping energy companies become safer, more reliable and more efficient. This is good for both our wallets and our planet. For more information visit: www.ibm.com/energy or watch our webinar here
Tags : 
    
Group M_IBM Q119
Published By: Fujitsu America, Inc.     Published Date: Oct 22, 2018
Most of the public and its public safety professionals live and work in a digital world of mobile devices instant connectivity, and geo-location. This one powerful fact, is changing the way police and first responders react to incidents and interact with the communities they serve. Types and severity of incidents are also changing, due in part to socio-cultural and environmental factors. Complicated risk scenarios requiring inter-agency coordination are occurring in both urban areas and once-sleepy suburban towns. To perform in this volatile new reality, public safety is undergoing a digital transformation focusing more on predictive and preventive practices. Download this whitepaper today to find out how Fujitsu can help your organisation today. Intel, the Intel logo, Intel Core, Intel vPro, Core Inside and vPro Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
business solutions, integrated management, public sector
    
Fujitsu America, Inc.
Published By: Fujitsu America, Inc.     Published Date: Oct 22, 2018
Crime overall is decreasing, but chaotic events such as extreme weather, domestic terrorist attacks, gun violence, and opioid-related emergencies are increasing, requiring highly coordinated response protocols. From raucous inner cities to sleepy suburbs, the scope and nature of these threats demand a new way of thinking and acting– a new, frictionless collaboration among agencies, departments, and vendor partners. This is the next phase of digital age public safety. As more public safety leaders get introduced to sophisticated surveillance and big data technologies, they realize the benefits are within reach. Find out how by downloading today! Intel, the Intel logo, Intel Core, Intel vPro, Core Inside and vPro Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
smart mobility, technology solutions, integrated management
    
Fujitsu America, Inc.
Published By: Fujitsu America, Inc.     Published Date: Jan 22, 2019
Teachers have always experimented with new technology and how it can be integrated to augment the lessons and content given to students. Classroom sets of books afforded teachers the opportunity to give homework, movie projectors and televisions offered an opportunity to display new content, and calculators transformed computational mathematics. Augmented and virtual reality are new tools that can transition pedagogy to include new materials and content. Students can travel to historical landmarks, world heritage sites, and past events from the safety of their classroom. Books can be scanned to reveal videos and three-dimensional content identified by the teacher to enhance the content available to the student. Download this whitepaper to learn more. Intel, the Intel logo, Intel Core, Intel vPro, Core Inside and vPro Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
    
Fujitsu America, Inc.
Published By: 3M     Published Date: Mar 19, 2019
3M acts as a partner in preparedness for all Healthcare and Emergency professionals. Download this guide to learn more.
Tags : 
    
3M
Published By: Yokogawa Electric Corporation     Published Date: Feb 28, 2019
Combustion systems (furnaces and fired heaters) are an essential part of your fired assets. Are you using the most efficient and cost-effective analyzer technology to maximize output and safety, and reduce costs? Download our free Combustion and Fired Heaters eBook In this eBook, we explain how to improve fired heaters safety and efficiency by controlling combustion using TDLS technology. Download it now and learn? Main challenges for operations managers Technical problems to resolve that will maximize output, minimize costs and create safer operations How Yokogawa's TDLS technology improves your operations
Tags : 
    
Yokogawa Electric Corporation
Published By: Yokogawa Electric Corporation     Published Date: Feb 28, 2019
Fire and explosion are the biggest inherent hazards facing the chemicals industry. The combination of flammable raw fuel, open flames and the presence of gas components such as oxygen (O2) methane (CH4) and carbon monoxide (CO) can make chemical processing a hazardous activity, particularly in combustion. Not only is there a potential safety risk with burning combustible materials, but their by-products are often combustible too. Download our Safety for Process Asset eBook to Learn How modern technology helps maintenance and instrument engineers enhance safety How to control fire and see improved safety in every stage of operations How to overcome the main challenges that maintenance and instrument engineers face How Yokogawa’s TDLS analyzers provide a safe alternative to conventional analyzer technologies
Tags : 
    
Yokogawa Electric Corporation
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jan 24, 2019
The increase of SSL/TLS traffic indicates that organizations are more and more focused on safeguarding the integrity of the data that flows through their Internet-facing applications. However, the concurrent growth of malware hidden within that encrypted traffic is cause for concern. Without visibility into your SSL/TLS traffic, you’ll have some serious blind spots in your security, and these blind spots could lead to financial losses, data breaches, and damage to your corporate reputation. That’s why it’s essential to regain visibility into that encrypted traffic and allow your malware-scanning and prevention devices to protect your apps and your network. The most efficient way to get that visibility is by orchestrating your outbound SSL/TLS traffic. With a robust SSL/TLS orchestration solution, you’ll enjoy better visibility, increased performance, and more flexibility—so you can stop worrying about hidden malware and focus on developing and supporting new apps to drive your business
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Ounce Labs, an IBM Company     Published Date: Jul 08, 2009
The Business Case for Data Protection, conducted by Ponemon Institute and sponsored by Ounce Labs, is the first study to determine what senior executives think about the value proposition of corporate data protection efforts within their organizations. In times of shrinking budgets, it is important for those individuals charged with managing a data protection program to understand how key decision makers in organizations perceive the importance of safeguarding sensitive and confidential information.
Tags : 
ounce labs, it securitym it risk, software applications, ciso, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography
    
Ounce Labs, an IBM Company
Published By: ASG Software Solutions     Published Date: Feb 18, 2010
Configuration Management is at the heart of the IT Infrastructure Library (ITIL®) and forms the foundation for Business Service Management (BSM). In fact, it is safe to say that neither the ITIL IT Service Management (ITSM) processes nor the BSM functions that leverage ITSM can be efficiently carried out without accurate configuration and dependency information.
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, asg ddm, cab, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce, bpm, workflow, itsm, critical application, cms
    
ASG Software Solutions
Published By: ASG Software Solutions     Published Date: Mar 10, 2010
Configuration Management is at the heart of the IT Infrastructure Library (ITIL) and forms the foundation for Business Service Management (BSM). In fact, it is safe to say that neither the ITIL IT Service Management (ITSM) processes nor the BSM functions that leverage ITSM can be efficiently carried out without accurate configuration and dependency information.
Tags : 
asg, cmdb, bsm, itil, ema, configuration management, itsm, bsm, itil, asg, ddm, cms, bsm, bsp, metacmdb, configuration management, metadata, metacmdb, lob, sdm
    
ASG Software Solutions
Published By: MIT Academy of Engineering, Pune     Published Date: Mar 05, 2013
A Java application that will successfully be able to retrieve, insert & delete data from our database which will be implemented in HBase along with.Basically the idea is to provide much faster, safer method to transmit & receive huge amounts of data
Tags : 
    
MIT Academy of Engineering, Pune
Published By: SAP     Published Date: Aug 14, 2018
As legacy ERP data structures and technology begin winding down, they are making way for a whole new generation of technology that brings exponential performance and dramatically new problem-solving capabilities. Download the whitepaper to discover the demands driving this evolution, explore the potential promised by next-gen ERP, and learn why ‘playing it safe’ is no longer an option.
Tags : 
    
SAP
Published By: HERE Technologies     Published Date: Jan 22, 2019
To improve safety and mobility across its 5,600km road network, the City of Toronto forged a partnered with HERE Technologies for the provision of traffic, incident, and historical traffic data. Access to this data allows the city authority to see exactly what’s happening on its roads and more easily and affectively run studies on improvement projects. This case study details how HERE Technologies enabled the City of Toronto’s transportation team to: Work smarter with comprehensive network coverage and accurate data to aid analysis Examine the impact of city projects without significant forward planning or expenditure Ensure travel volume models used to drive decision making are calibrated to represent real-world truths
Tags : 
public sector, urbanization, traffic management
    
HERE Technologies
Published By: HERE Technologies     Published Date: Jan 24, 2019
This is an at-a-glance guide to the key innovation trends in fleet management that leverage location data to improve last-mile efficiency and road safety. Presented to you by HERE, one of the world’s leading location platforms in 2019.
Tags : 
location data, transport & logistics, location services
    
HERE Technologies
Published By: HERE Technologies     Published Date: Mar 13, 2019
In today’s interconnected world you need to future-proof the integrity and reputation of your business. Your company’s network remains the Achilles heel of the whole enterprise because once compromised, your company’s reputation is compromised as well. Banks, credit card brands, payment processors, and e-commerce companies regularly launch new products and services that have new, unforeseen fraud risk factors. HERE can provide an additional layer of security and safeguard your company's reputation. As one of the world’s leading location platforms in 2018, HERE shares insights and solutions to preventing mobile payment fraud, credit card fraud and identity fraud.
Tags : 
location data, location technology solutions, security
    
HERE Technologies
Published By: Cisco EMEA     Published Date: Jun 01, 2018
What if defenders could see the future? If they knew an attack was coming, they could stop it, or at least mitigate its impact and help ensure what they need to protect most is safe. The fact is, defenders can see what’s on the horizon. Many clues are out there—and obvious. The Cisco 2018 Annual Cybersecurity Report presents our latest security industry advances designed to help organizations and users defend against attacks. We also look at the techniques and strategies that adversaries use to break through those defenses and evade detection. The report also highlights major findings from the Cisco 2018 Security Capabilities Benchmark Study, which examines the security posture of enterprises and their perceptions of their preparedness to defend against attacks.
Tags : 
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Jun 01, 2018
It’s time to make working together what it should be—intuitive. Cisco Webex Teams enables teams to meet, create and communicate continuously on a single easy-to-use platform. Tools adapt, so teams don’t have to. The same page? Everyone is on it, no matter what device or apps they like to use or where they are. Innovation and work keep moving forward, even after a meeting ends. And everyone enjoys an exceptional experience safeguarded by enterprise-grade security no matter how big the business scales.
Tags : 
cisco, webex, collaboration
    
Cisco EMEA
Published By: BigCommerce     Published Date: Oct 16, 2018
Whether your company has been selling online for 20 minutes or 20 years, you are undoubtedly familiar with the PCI DSS (Payment Card Industry Data Security Standard). It requires merchants to create security management policies and procedures for safeguarding customers’ payment data. Originally created by Visa, MasterCard, Discover, and American Express in 2004, the PCI DSS has evolved over the years to ensure online sellers have the systems and processes in place to prevent a data breach.
Tags : 
    
BigCommerce
Published By: Hewlett Packard Enterprise     Published Date: Aug 15, 2016
To overcome the challenges and risks of the digital era, while positioning their businesses for success, SMBs need to partner with professional services organizations with the expertise that can safely guide them through achieving the following six key IT business initiatives: Data mobility A strong information security framework (for external and internal threats) 24x7 application availability Scalable infrastructure Pervasive, end-to-end data protection End-to-end professional services
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Oct 24, 2017
As the use of cloud solutions in government increases, both business and IT leaders are recognizing that the safety and success of their business depend on finding ways to take full advantage of cloud innovation while ensuring consistent service levels, data management and privacy, and user experiences. Hybrid IT management includes aligning the organization around service levels, cost control, security, and IT-enabled innovation.
Tags : 
cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
Hewlett Packard Enterprise
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.