HIT Consultant Insightful coverage of healthcare innovation
 

second

Results 276 - 300 of 348Sort Results By: Published Date | Title | Company Name
Published By: McAfee     Published Date: Feb 06, 2013
Today’s threats to endpoints and data are more complex, more numerous, more varied —and changing every second. McAfee understands next-generation security in the context of your devices, additional protection technologies, and central management.
Tags : 
endpoint security, mac security, linux security, real time security, anti malware protection, hips, desktop firewall, endpoint encryption, device control, host web filtering, email server security, policy auditor, hipaa, pci
    
McAfee
Published By: STANLEY Healthcare     Published Date: Mar 24, 2015
State University of New York Upstate Medical University faces the same challenges as many other hospital organizations—increased pressure to improve efficiency and preserve capital. Read this case study to learn how SUNY Upstate increases efficiency and reduces costs with STANLEY Healthcare’s AeroScout® Solutions, making every second and dollar count for patient care.
Tags : 
efficiency, cost reduction, patient care, healthcare, medicine, hospital organizations, wi-fi, asset management, information technology, practice management
    
STANLEY Healthcare
Published By: Dell Cloud Marketplace     Published Date: Jan 07, 2015
In a second-quarter 2014 Gigaom Research survey of 500 IT decision-makers at large U.S. companies, we identified strategic buyers as those who report using cloud resources for new business and revenue streams as opposed to those who don’t.
Tags : 
    
Dell Cloud Marketplace
Published By: Symantec     Published Date: Nov 21, 2014
The monthly intelligence report, provides the latest analysis of cyber security threats, trends, and insights from the Symantec intelligence team concerning malware, spam, and other potentially harmful business risks. Key Findings • The .doc file type was the most common attachment type used in spear-phishing attacks, making up more than 52.9 percent of all attachments in September. • The largest data breach reported in September actually took place in April, and resulted in the exposure of 56 million identities. • There were 600 vulnerabilities disclosed in the month of September, the highest number so far in 2014 and second-highest in the last 12 months.
Tags : 
cyber security threats, harmful business risks, malware, spam, intelligence team
    
Symantec
Published By: Domino     Published Date: May 14, 2019
Lasers have been around since the 1960s, and the technology has proven to be transformative across a wide range of applications and industries. From cutting steel and reshaping retinas to storing and reading data, lasers have become so commonplace that it’s easy to forget the word itself is an acronym that describes the process by which this amazing light is created: Light Amplification by Stimulated Emission of Radiation
Tags : 
    
Domino
Published By: Domino     Published Date: Apr 06, 2018
Domino provides a broad portfolio of innovative industrial coding and marking solutions developed in collaboration with customers in food and beverage, life sciences, manufacturing and other industries. Beyond delivering the latest printing technologies and Industry 4.0 connectivity, Domino brings four decades of knowledge and expertise to help companies maximize productivity and OEE with agility to meet the changing needs of today’s fast-paced world. Domino is more than a mark. Domino printing technologies include thermal transfer overprinting, thermal ink jet, continuous ink jet, print-and-apply labeling, large character inkjet and laser.
Tags : 
domino, food, beverage, manufacturing, customers
    
Domino
Published By: Oracle     Published Date: Jul 05, 2017
Improve the performance, security and reliability of your DNS infrastructure by adding a supplemental DNS service to your IT environment. Best-of-breed managed DNS service providers have the global DNS infrastructure and deep DNS network operations expertise to ensure your success. Adding a secondary DNS service can help you deliver consistent, high-quality user experiences across the world and mitigate outage risk. To learn more read our white paper: High Availability DNS Reduces Downtime Risk and Improves End-User Experience
Tags : 
dns, service, serve traffic, corporate firewall, service features, api daemon
    
Oracle
Published By: Limelight Network     Published Date: Aug 12, 2019
Live streaming is attracting viewers online to watch major sports events, play games, participate remotely in educational opportunities, and bid at live auctions. But today, the latency of online video stream delivery is typically too long to provide the viewing experience users expect, resulting in unhappy viewers and lost revenue. Fortunately, new live streaming technology makes it possible to deliver live streams in less than a second, enabling exciting new experiences that engage viewers in multiple ways. For organizations that need to distribute live streams, it’s about increasing audience size and revenue. For viewers, watching streams in realtime with interactive data integrated with the live video enables new possibilities for how they can interact with you and each other. Read this brief to learn how sub-second latency streaming enables new business opportunities by making live viewing a more interactive social experience.
Tags : 
    
Limelight Network
Published By: Oracle + Dyn     Published Date: Jun 27, 2017
"DNS Speed and reliability are fundamental to the performance of your website and essential to the growth of your business. In order to overcome outages and ensure digital success it’s important to evaluate your DNS infrastructure and determine which configuration is best for your IT environment at this layer. Discover how you can use Secondary or Multi-DNS architecture to promote business continuity, and optimal DNS resolution performance. Download this Technical Brief on Secondary/Multi-DNS patterns and learn: • How multi-DNS patterns can significantly improve security, reliability, and performance of your infrastructure • The advantages and limitations of Primary-Secondary, Hidden Master and Primary-Primary configurations • The best use cases for implementing a supplemental or secondary DNS service Learn more! "
Tags : 
    
Oracle + Dyn
Published By: Oracle + Dyn     Published Date: Jun 29, 2017
DNS Speed and reliability are fundamental to the performance of your website and essential to the growth of your business. In order to overcome outages and ensure digital success it’s important to evaluate your DNS infrastructure and determine which configuration is best for your IT environment at this layer. Discover how you can use Secondary or Multi-DNS architecture to promote business continuity, and optimal DNS resolution performance. Download this Technical Brief on Secondary/Multi-DNS patterns and learn: How multi-DNS patterns can significantly improve security, reliability, and performance of your infrastructure The advantages and limitations of Primary-Secondary, Hidden Master and Primary-Primary configurations The best use cases for implementing a supplemental or secondary DNS service
Tags : 
    
Oracle + Dyn
Published By: Cisco     Published Date: Sep 15, 2015
Wi-Fi is about to get a reboot. New 802.11ac Wave 2 products will make it possible to deliver LAN-like multigigabit speeds over the wireless network for the first time, enabling previously unimagined scale and flexibility in the enterprise workspace. But how will businesses capitalize on this new capacity when most current Ethernet access cabling maxes out at 1 Gigabit per second (Gbps)? This white paper: ? Introduces the new generation of Cisco® Catalyst® switches with Multigigabit Ethernet technology, the first platforms to combine support for multigigabit wireless speeds with full power over Ethernet (PoE) in an easy-to-deploy solution ? Shows how Cisco Catalyst Multigigabit Ethernet switches use NBASE-T technology to empower you to deliver 5-Gbps speeds over your existing access cabling ? Details how Cisco Catalyst Multigigabit Ethernet switches gives you the scale and capacity you need today, while protecting your network investments for the future Are you ready to learn more?
Tags : 
migration, ethernet, deploy, wireless, network
    
Cisco
Published By: Cisco     Published Date: Jan 08, 2016
How can businesses capitalize on new wireless network capacity when most current Ethernet access cabling maxes out at 1 Gigabit per second (Gbps)?
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jun 21, 2016
Wi-Fi is about to get a reboot. New 802.11ac Wave 2 products will make it possible to deliver LAN-like multigigabit speeds over the wireless network for the first time, enabling previously unimagined scale and flexibility in the enterprise workspace. But how will businesses capitalize on this new capacity when most current Ethernet access cabling maxes out at 1 Gigabit per second (Gbps)? This white paper: ? Introduces the new generation of Cisco® Catalyst® switches with Multigigabit Ethernet technology, the first platforms to combine support for multigigabit wireless speeds with full power over Ethernet (PoE) in an easy-to-deploy solution ? Shows how Cisco Catalyst Multigigabit Ethernet switches use NBASE-T technology to empower you to deliver 5-Gbps speeds over your existing access cabling ? Details how Cisco Catalyst Multigigabit Ethernet switches gives you the scale and capacity you need today, while protecting your network investments for the future
Tags : 
    
Cisco
Published By: Rosetta Stone     Published Date: Nov 02, 2017
English Language Learners (ELLs), are a vastly diverse group of approximately 5 million students who speak a primary language other than English and who are not yet proficient in English, which is a second or additional language for them. In order to keep up with their native English speaking peers, ELLs need more instructional time and specialized instruction, including specially designed material and state-of-the-art educational tools to accelerate their learning.
Tags : 
    
Rosetta Stone
Published By: Wasabi     Published Date: Oct 26, 2017
Kim Komando, “America’s Digital Goddess,” is a leading radio host and web entrepreneur. Every month her video-taped three-hour weekly radio show adds 2.8 TB of video content to its extensive playback library. Switching from their current storage solution, a combination of NAS Arrays and Tape Drives, to Wasabi not only generated huge savings it was simpler and faster. Plus, since Cloudberry works seamlessly with Wasabi, the show also enjoys efficient and cost-effective remote data protection. In this Case Study read in detail how the ‘Kim Komando Show’ made the transition to next generation cloud storage.
Tags : 
data protection, multimedia content, cloud storage, backup, recovery, secondary storage platform
    
Wasabi
Published By: Keynote     Published Date: Apr 23, 2014
In the world of digital interactions, the margin between success and disengagement or abandonment is measured in milliseconds. With the exploding adoption of advanced smartphones and tablets, you need a mobile-first approach to engaging with customers and employees. And as your mobile initiatives are delivered at increasingly rapid rates, the quality and reliability of the mobile apps, mobile web and connected services that support them has become critically important. For the technology teams delivering customer and employee services in the mobile channel, it is important to understand that performance monitoring solutions which work for the desktop cannot be simply applied to mobile. Managing the mobile end user experience requires an understanding of the challenges posed by the complexities of the mobile environment. This paper will reveal the 4 pillars of mobile performance, plus offer strategies for accurately monitoring mobile end user experience so you can continuously improve.
Tags : 
mobile application monitoring, mobile application monitoring system, mobile app performance, mobile application performance, app monitoring, monitor mobile applications, web performance monitoring tools, performance monitoring, web application monitoring, mobile website performance, mobile website optimization, mobile web monitoring, keynote
    
Keynote
Published By: Datastax     Published Date: Nov 07, 2017
Regular customer experience solutions just segment and stereotype their customers and perform in a sort of action-reaction, request-response manner, rather than being instantly responsive. Being responsive means adjusting to each additional interaction and observed behavior, and making every action, every click, every scroll, every email, every second spent on your app part of a larger conversation. You need to have the systems in place that can effectively engage a customer in that conversation and not just analyze it with historical data or after the fact.
Tags : 
    
Datastax
Published By: Jebbit     Published Date: Jun 12, 2018
As marketers, we use data at every level, from determining Facebook targeting to timing a major product launch. But how often do we take a look under the hood at the quality and usefulness of our data? In this playbook, we’ll cover the strengths and weaknesses of third-party, second-party, and first-party data and where declared data fits into the current data landscape. You’ll learn plays for activating declared data for: Qualified lead generation 1-to-1 email personalization Custom audiences and personalized retargeting Audience building and profiling In this section, we’ll cover the definitions, sources, and strengths and weaknesses of third-, second-, and first-party data.
Tags : 
data, jebbit, remarketing, audiences, omnichannel
    
Jebbit
Published By: Entrust Datacard     Published Date: Jul 23, 2019
In years past, device functionality was enough to sell most embedded products without much concern for cybersecurity. Of course there were exceptions, such as in critical infrastructure, aviation, and military, for which security was always of importance. But today’s environment has evolved on several fronts. First, organizations across nearly all markets are demanding Internet connectivity to monitor and control devices as well as to aggregate and analyze data. Second, the magnitude of security threats has exploded, driven by highly sophisticated hackers including organized criminal gangs seeking financial returns, creating a constantly evolving threat landscape. Third, the increasingly complex nature of connected systems makes them ever more challenging to protect. The more complex a system, the more potential vulnerabilities it may contain. And fourth, the data generated by connected devices represent an asset that is becoming increasingly valuable for organizations to derive insigh
Tags : 
    
Entrust Datacard
Published By: Unitrends     Published Date: Nov 03, 2010
When Yogi Berra said "The future ain't what it used to be" he could have been talking about backup rather than baseball. Despite enormous progress in backup technologies over the last decade, the"secondary" technology of backup as a whole has barely kept up when compared to the incredible gains in the "primary" technologies associated with computer and storage platforms
Tags : 
unitrends, backup, recovery, disaster recovery, capacity, storage
    
Unitrends
Published By: Taleo     Published Date: Jan 25, 2012
This first paper articulates and frames the key drivers of change. The second paper explores the resulting impacts to talent management processes and technologies.
Tags : 
taleo, talent management, talent acquisition, employees, recruitment, human resources, hr management
    
Taleo
Published By: Acrolinx     Published Date: Apr 01, 2015
Content marketing is one of the highest priorities for today’s marketers, with growth rates for content development and distribution skyrocketing. According to the Content Marketing Institute, for example, 70 percent of marketers are investing more in content marketing than ever before. A recent research report from global market intelligence firm IDC further underscores the point, noting that “building out content marketing as an organizational competency” is one of CMOs’ most important initiatives, second only to measuring ROI. Read this white paper to learn more about the Global Content Impact Index.
Tags : 
global content impact index, brands, web pages, analysis, content marketing, roi
    
Acrolinx
Published By: SAP     Published Date: Nov 22, 2017
Consumer industries are facing once in a lifetime changes in the way they engage and interact with their customers and consumers. Whether consumer products, retail, or wholesale, there are two broadly unifying trends. First, consumers have both heightened influence and increased expectations. Second, several largely untapped digital technologies have the potential to enable new capabilities to better satisfy customer needs. For the key consumer industries of agribusiness, consumer products, life sciences, retail, and wholesale, the Internet of Things (IoT) will enable many new opportunities. These industries have a shared goal and challenge: to be able to create and offer engaging end consumer and/or customer experiences at scale. Part of the way that companies will achieve this goal and respond to this challenge is by developing digital transformation (DX) strategies. Such strategies enable new and potentially disruptive capabilities with a broad range of technologies.
Tags : 
consumer, industries, interactions, customers, products, retails, wholesale, influence, digital, technologies
    
SAP
Published By: CA Technologies     Published Date: Jan 06, 2014
As most European organisations open up their applications for external users, Identity Access Management (IAM) is becoming ever more critical to drive business growth.
Tags : 
mediacom, byoid, identity access management, iam, business growth, directories of identities, it professionals, external business users, primary motivator, secondary motivator, implementing iam, security goals, regional perceptions, it management, cloud resource, enforcement, iam adoption, deploy iam
    
CA Technologies
Published By: OneSource     Published Date: Sep 14, 2010
As we enter into the final months of 2010, our hopes that the economy would be a major factor in improving sales results this year are fading. "Uncertainty" is still the word of the day, and this is reflected in sales performance. Our research this year has seen win rates drop below 45% for the first time in the 16 years of our studies, and the percentage of reps making quota is below 50%, for only the second time.
Tags : 
relationship selling, onesource, sales cycle, sales performance, crm, sales tools, win rates
    
OneSource
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.