HIT Consultant Insightful coverage of healthcare innovation
 

systems

Results 26 - 50 of 3837Sort Results By: Published Date | Title | Company Name
Published By: McAfee     Published Date: Feb 06, 2013
Protect systems from unknown, advanced persistent threats with centrally managed whitelisting
Tags : 
application control, whitelisting, zero day protection, endpoint security, dynamic whitelisting, memory protection
    
McAfee
Published By: Magento     Published Date: Feb 13, 2018
Commerce is permanently altering the way B2B businesses work- from customer acquisition to customer retention, and from order fulfillment to building a relationship with customers. From our experience of working with B2B companies across industries, we have curated a list of 11 most common obstacles to B2B eCommerce success, including: Thinking About eCommerce In Isolation Ignoring Customer Experience No Advanced Analytics Failure Maintain and Improve Systems
Tags : 
    
Magento
Published By: OutSystems     Published Date: Jan 06, 2014
Download this whitepaper to find out the 11 Usability Rules for IT Developers.
Tags : 
outsystems, usability rules, it developers, business solutions, mobile applications, web apps
    
OutSystems
Published By: OutSystems     Published Date: Jan 29, 2014
11 Usability Rules for IT Developers
Tags : 
outsystems, usability, apps, it developers, outsystems platform, usability principles
    
OutSystems
Published By: Active Power     Published Date: Aug 30, 2011
This paper discusses the methods of implementing a short ride through system with higher reliability and predictability than with traditional methods
Tags : 
caterpillar, electrical and electronic, backups, caterpillar inc., high availability, backup power, backup power supply, battery backup
    
Active Power
Published By: Dell & Microsoft     Published Date: Aug 14, 2013
Laying the Cornerstone of the Next Generation of Computing
Tags : 
microsoft windows server, 2013, next generation computing, dell poweredge, storage, networking, systems management
    
Dell & Microsoft
Published By: Dell     Published Date: Sep 12, 2013
Laying the Cornerstone of the Next Generation of Computing
Tags : 
microsoft windows server, 2013, next generation computing, dell poweredge, storage, networking, systems management
    
Dell
Published By: Clarus Systems     Published Date: Mar 18, 2008
In this document, you'll learn to enable the successful execution and completion of IPT Deployment projects through a standardized set of processes and methodologies based upon Information Technology Infrastructure Library (ITIL) standards.
Tags : 
itil, clarus systems, ipt, ip telephony, unified communications, cisco, callmanager, best practices
    
Clarus Systems
Published By: Focus VoIP     Published Date: Jan 19, 2011
NEWLY UPDATED: Save time researching business phones with our free Midrange IP Phone Comparison Guide.
Tags : 
altigen communications, nortel networks, ip phone, cisco systems, shoretel, polycom, avaya, phone system
    
Focus VoIP
Published By: SHL     Published Date: Dec 13, 2011
47 business outcome studies were conducted for clients across multiple industries for the 2011 Business Outcomes Studies Report. It demonstrates the value of online talent measurement solutions against metrics specific to the goals of each organization.
Tags : 
bos, business outcomes study, business outcomes, outcomes study, business study, business objectives, people intelligence, outcomes report
    
SHL
Published By: Blue Coat Systems     Published Date: Jul 07, 2011
This report examines the interactions of malware ecosystems, including user behavior, malware hosting sites and delivery networks and offers effective strategies to build better defenses.
Tags : 
blue coat, wan optimization, secure web gateway, malware, defenses, security, attacks, threats
    
Blue Coat Systems
Published By: ScanLife     Published Date: Feb 25, 2012
The report details information such as overall barcode scanning trends, mobile operating systems scanning shares, representative demographics of users, and activities of overall states and/or countries with the highest scanning utilization.
Tags : 
scanlife, marketing, emerging marketing, mobile marketing, barcode, mobile phones, smart phones
    
ScanLife
Published By: Blue Coat Systems     Published Date: Jun 30, 2011
This security report provides an overview of the changing ways in which people are using the Internet and the new methods cybercrime is using to target their attacks.
Tags : 
blue coat, wan optimization, secure web gateway, application performance monitoring
    
Blue Coat Systems
Published By: SumTotal     Published Date: May 24, 2013
Forrester Research, Inc.’s 2013 evaluation of Talent Management vendors against 57 criteria named SumTotal Systems a Leader and “the largest of the pure-play talent management vendors” (The Forrester Wave™: Talent Management, Q1 2013). Download the full report to jump-start your knowledge of the talent management solution landscape.
Tags : 
forrester, talent management, talent management solutions, talent management systems
    
SumTotal
Published By: Blue Coat Systems     Published Date: Jun 26, 2013
While mobile threats are still largely mischiefware and have not yet broken the device’s security model but instead more focused on for-pay texting scams or stealing personal information, the dangers are still rife. This white paper from BlueCoat examines the mobile threat landscape and the behavioral patterns of mobile users that make them most vulnerable to data loss, malicious applications, fraud and other mobile threats.
Tags : 
mobile threats, security, malicious applications, data loss prevention, fraud, technology, malware
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
While mobile threats are still largely mischiefware and have not yet broken the device’s security model but instead more focused on for-pay texting scams or stealing personal information, the dangers are still rife. This white paper from BlueCoat examines the mobile threat landscape and the behavioral patterns of mobile users that make them most vulnerable to data loss, malicious applications, fraud and other mobile threats.
Tags : 
mobile, malware, security, scams, bluecoat, data loss
    
Blue Coat Systems
Published By: Oracle     Published Date: Apr 22, 2014
This document focuses on the trends that are driving decision-making on cloud including the growing connection between cloud, mobility, and data; cloud services governance and integration; and continuing development of cloud ecosystems among vendors.
Tags : 
cloud services, trends, cloud services, oracle
    
Oracle
Published By: CompareBusinessProducts     Published Date: Feb 27, 2015
Read on to discover revealing points on the climate of phone systems in 2015
Tags : 
phone system, the cloud, byod, identity phone, integration, business tools, communication value, value pyramid
    
CompareBusinessProducts
Published By: Citrix Systems     Published Date: Jul 28, 2015
CyberEdge Group’s second annual Cyberthreat Defense Report provides a penetrating look at how IT security professionals perceive cyberthreats and plan to defend against them.
Tags : 
    
Citrix Systems
Published By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
Learn how web applications and mobile devices impact IT’s ability to successfully defend against cyberthreats, and find out why SDN may be the solution.
Tags : 
citrix, cyberthreat, report, defense
    
Citrix Systems, Inc.
Published By: Citrix Systems     Published Date: Jul 28, 2015
CyberEdge Group’s second annual Cyberthreat Defense Report provides a penetrating look at how IT security professionals perceive cyberthreats and plan to defend against them.
Tags : 
    
Citrix Systems
Published By: Citrix Systems     Published Date: Jul 28, 2015
CyberEdge Group’s second annual Cyberthreat Defense Report provides a penetrating look at how IT security professionals perceive cyberthreats and plan to defend against them.
Tags : 
    
Citrix Systems
Published By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
Get an overview of the cyberthreat landscape and see key findings from the “2015 Cyberthreat Defense Report.”
Tags : 
citrix, cyberthreat, infographic, 2015 report
    
Citrix Systems, Inc.
Published By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
Take a deep dive into survey data and findings, learn about the evolution of cyberthreats, and find out how you can prepare for cyberattacks in 2015.
Tags : 
citrix, cyberthreat defense, report, 2015
    
Citrix Systems, Inc.
Published By: Cisco     Published Date: Dec 04, 2015
Group video systems primarily serve the need for high-quality video interaction across a range of meeting room sizes.
Tags : 
video, system, high quality interaction, sip
    
Cisco
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.