HIT Consultant Insightful coverage of healthcare innovation
 

solution architect

Results 176 - 200 of 239Sort Results By: Published Date | Title | Company Name
Published By: Webroot Inc     Published Date: Mar 05, 2014
In this paper we will look at factors favoring cloud and SaaS solutions in general, reasons why secure web gateways in the cloud can provide better security than appliances and local servers, and how the Webroot Web Security Service can maximize security and minimize costs using a cloud-based architecture.
Tags : 
web threat, security, could, saas solutions, webroot
    
Webroot Inc
Published By: K2     Published Date: Jan 07, 2016
BPM platforms help solution architects and business outcome owners accelerate application development, transform business processes, and digitalize business processes to exploit business moments. This research provides an overview of many of the products used to address these needs.
Tags : 
gartner market, business process management, bpm
    
K2
Published By: IBM     Published Date: May 20, 2015
Today’s customers are well-informed and empowered by information. They use other people and online experts as information sources. They interact with companies by multiple methods and expect a relevant dialogue with each brand. This paper introduces the IBM Predictive Customer Intelligence solution, which is designed to help your company create personalized, relevant experiences for individual customers with a focus on driving new revenue. Along with explaining the architecture of the solution, this paper covers how the solution works.
Tags : 
ibm, software, business analytics, database
    
IBM
Published By: IBM     Published Date: Jul 27, 2015
Read this whitepaper to look at why network service quality matters to customer loyalty and CSP attitudes to improve it
Tags : 
customer loyalty, network service quality, communications service providers, service quality metrics, operational performance, customer experience management, cem, cem solution, cem architecture
    
IBM
Published By: IBM     Published Date: Mar 18, 2015
IBM open-standards-based service delivery and management solutions can control costs, enhance performance and increase security to help organizations achieve the full benefits of cloud and virtualization - while maintaining service quality, security and performance.
Tags : 
the cloud, cloud computing, transitioning, virtualization, cloud solutions, smartcloud, resource optimization, cloud architecture, application
    
IBM
Published By: IBM     Published Date: Apr 09, 2015
This buyer’s guide can help you select the right identity and access management solution to successfully manage and control user access within, across and between organizations. The guide outlines the most common identity and access management challenges organizations face from the perspective of CSOs, IT operations staff, line-of-business managers and enterprise architects. It then provides a checklist for evaluating solutions and defines the capabilities required to address security complexity, compliance and cost.
Tags : 
access management solution, ibm, security risk, security compliance
    
IBM
Published By: IBM     Published Date: Jan 04, 2016
Join Steve Mirman, IBM MobileFirst solution architect, for this deep-dive intro into how you can speed development, simplify deployment and actively manage all of your mobile apps with a single, analytics-based console using our Platform in the cloud.
Tags : 
ibm, mobile, application, development, mobilefirst platform
    
IBM
Published By: IBM     Published Date: Dec 07, 2016
This IBM Redguide™ publication introduces Cloud Brokerage and highlights the business value of the solution. It provides a high-level architecture, identifies key components of the architecture, and discusses the hybrid cloud implementation framework, which includes other IBM product offerings. The guide describes example scenarios that use Cloud Brokerage to resolve common business problems.
Tags : 
ibm, cloud, broker, ibm cloud brokerage, broker software
    
IBM
Published By: IBM     Published Date: Oct 13, 2017
IBM Security offers one of the most advanced and integrated portfolios of enterprise security products and services. The portfolio, supported by world-renowned X-Force research, provides security intelligence to help organizations holistically protect their infrastructures, data and applications, offering solutions for identity and access management, database security, application development, risk management, endpoint management, network security and more. These solutions enable organizations to effectively manage risk and implement integrated security for mobile, cloud, social media and other enterprise business architectures. IBM operates one of the world’s broadest security research, development and delivery organizations, monitors 15 billion security events per day in more than 130 countries, and holds more than 3,000 security patents.
Tags : 
it security, malware, malware protection, virus prevention, ibm, threat intelligence
    
IBM
Published By: Unica Corporation     Published Date: Jan 19, 2010
Most web analytics solutions were initially architected to generate reports using only aggregate data. Next generation web analytics solutions use both aggregate and individual level data to achieve interactive marketing success. This free interactive infographic, includes live links that will guide you through a valuable framework for web analysis and gives insight into your overall website performance and visitors' behaviors. Learn how to optimize your visitors' website experiences and turn those experiences into actions.
Tags : 
interactive web analytics map, next generation web analytics, website optimization, multi-channel analytics, aggregate level analytics, individual level analytics, website performance, behaviorial targeting, website personalization
    
Unica Corporation
Published By: SAS     Published Date: Aug 28, 2018
With the widespread adoption of predictive analytics, organizations have a number of solutions at their fingertips. From machine learning capabilities to open platform architectures, the resources available to innovate with growing amounts of data are vast. In this TDWI Navigator Report for Predictive Analytics, researcher Fern Halper outlines market opportunities, challenges, forces, status and landscape to help organizations adopt technology for managing and using their data. As highlighted in this report, TDWI shares some key differentiators for SAS, including the breadth and depth of functionality when it comes to advanced analytics that supports multiple personas including executives, IT, data scientists and developers.
Tags : 
    
SAS
Published By: SAS     Published Date: Nov 16, 2018
Medicaid fraud is prevalent, costly and difficult to prevent. With a combination of more integrated data and advanced analytics, state agencies can turn the tables on fraudsters. They can accelerate the transition from detection to prevention, as new forms of fraud are recognized faster and fewer improper payments go out the door. This IIA Discussion Summary explores the challenges and opportunities in preventing Medicaid fraud in an interview with SAS’ Ellen Joyner-Roberson, Principal Marketing Manager for Fraud and Security Intelligence, and Victor Sterling, Principal Solutions Architect.
Tags : 
    
SAS
Published By: SilverSky     Published Date: Apr 16, 2013
SilverSky operates a major hosted infrastructure dedicated to providing world-class enterprise messaging solutions. This whitepaper is an in-depth overview of our Hosted Microsoft Exchange architecture and how we implement best practices across systems management, testing, application deployment, infrastructure and security to provide increased productivity and reduced costs.
Tags : 
microsoft exchange, architecture, silversky, hosted infrastructure, enterprise messaging, best practices, application deployment
    
SilverSky
Published By: IBM     Published Date: Jul 22, 2014
At the heart of a successful agile development team is a skilled group of developers. Agile software professionals continuously deliver on their objectives, but they need robust development tools and practices to maximize their productivity. If you’re a software developer or solution architect, you'll gain the insights you need to ensure your team has the right tools and practices to maximize your effectiveness in agile development.
Tags : 
ibm, devops, developement, product development, agile, software, agile software, agile software professional, agile development, productivity, software development, solution architect
    
IBM
Published By: IBM     Published Date: Jul 07, 2014
This analyst paper highlights X6 business benefits that include dramatically reduced database cost with X6 deployment, application transparency, and superior price/performance.
Tags : 
ibm, ibm x6 solutions, enterprise architecture, database management, database cost, application management, application transparency, x6 deployment, servers, x6 server
    
IBM
Published By: Cisco     Published Date: Sep 16, 2015
Solutions like Cisco's Common Platform Architecture based on UCS with Intel Xeon processors provide a predictable, flexible, and open infrastructure on which companies can build a broad portfolio of BDA solutions while minimizing capital and operating costs.
Tags : 
unified computing system, virtualization, networking, storage
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
To better understand the benefits, costs, and risks associated with Cisco TrustSec, Forrester interviewed two companies. Company A is an organization that provides senior housing for over 22,000 residents in the US. This organization used Cisco TrustSec to provide highly secure segmented mobile network services to its residents. Company B is an international packaging and paper group company experiencing rapid growth. It used Cisco TrustSec as an innovative solution to quickly integrate the infrastructure of new acquisitions into its own and standardize security architecture across its wide area network (WAN) globally. While the case study will talk about the experiences of these two companies, the financial analysis focuses on the impact that Cisco TrustSec had on one organization.
Tags : 
    
Cisco
Published By: IBM     Published Date: Feb 13, 2015
With its Application Ready solutions, IBM is outflanking competitors in Technical Computing and fast-tracking the delivery of client business value by providing an expertly designed, tightly integrated and performance optimized architecture for several key industrial applications.
Tags : 
ibm, technical computing, application development, application architecture, architecture, business workflow
    
IBM
Published By: VMware AirWatch     Published Date: Sep 16, 2015
This infographic shows how AirWatch help enterprises meet new challenges as they cater to an increasingly mobile workforce by offering new solutions – such as content collaboration and consistency with any app on any device - and address the increased demand for mobile-cloud architecture.
Tags : 
mobile empowerment, airwatch, mobile, cloud
    
VMware AirWatch
Published By: IBM     Published Date: Jul 25, 2014
Successful cloud implementations not only require the best solutions, they also necessitate proper execution to realize your business objectives and yield the greatest results. Join this session to hear IBM Distinguished Engineers describe the key considerations and guidelines for architecting private and hybrid clouds.
Tags : 
ibm, cloud, cloud solutions, private cloud, hybrid cloud, it architecture, eaas, deployment, application management, cloud computing, cloud infrastructure, infrastructure
    
IBM
Published By: IBM     Published Date: Nov 03, 2014
Successful cloud implementations not only require the best solutions, they also necessitate proper execution to realize your business objectives and yield the greatest results. Join this session to hear IBM Distinguished Engineers describe the key considerations and guidelines for architecting private and hybrid clouds.
Tags : 
ibm, cloud, private cloud, hybrid cloud, cloud solutions, best practices cloud solutions, architecting cloud solutions, cloud deployment, development
    
IBM
Published By: Symantec     Published Date: Aug 09, 2013
As virtualization-aware endpoint security solutions continue to evolve, more and more functionality is offloaded from a single VM to its supporting infrastructure in the form of Virtual Appliances (VA). In addition to considering the performance impact of this re- architecting, administrators must also ensure that the protection offered remains fully-functional, even in virtual environments. Learn More.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec
Published By: Citrix     Published Date: Jul 18, 2014
This Citrix Key Project Design Guide provides an overview of the solution architecture and implementation used in the key project on remote access for enterprise PCs.
Tags : 
citrix, enterprise pc, remote access, remote network management, network architecture, mobile workers, xendesktop
    
Citrix
Published By: Logicalis     Published Date: Sep 22, 2014
Watch this live dicussion between Eric Brooks, Logicalis Solution Architect, and 20-year technology industry veteran, Jeff Raylea, to learn more insight on the topic.
Tags : 
cisco, logicalis, iaas, infrastructure-as-a-service, iaas market, it management, infrastructure management
    
Logicalis
Published By: AlienVault     Published Date: Oct 21, 2014
Do you feel alone? No resources? No help? If you are like many security practitioners faced with a mountain of tasks each day and a small (or non-existent) team to help, prioritization and efficiency are key. Join Joe Schreiber, Solutions Architect for AlienVault for this practical session outlining habits to get the most out of your limited resources. In this session, you'll learn how to develop routines to efficiently manage your environment, avoid time-sucks, and determine what you can do by yourself and where you need help.
Tags : 
alienvault, limited resources, it time management, it prioritization, it management
    
AlienVault
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.