HIT Consultant Insightful coverage of healthcare innovation
 

tbr

Results 1 - 25 of 28Sort Results By: Published Date | Title | Company Name
Published By: Lenovo and Intel®     Published Date: Feb 29, 2016
Since acquiring the x86 line of business from IBM in 2014, Lenovo has been a top vendor in the category.
Tags : 
lenovo, server, data management, laptop, reliability
    
Lenovo and Intel®
Published By: Equinix     Published Date: Jul 06, 2016
This paper revelas how Equinix empowers a leading provider of digital supply chain solutions to transform your industry’s business model via a scalable and robust interconnection solution.
Tags : 
customer experience, customer relationship, content management, content digital media
    
Equinix
Published By: Equinix     Published Date: Jul 08, 2016
This paper revelas how Equinix empowers a leading provider of digital supply chain solutions to transform your industry’s business model via a scalable and robust interconnection solution.
Tags : 
customer experience, customer relationship, content management, content digital media
    
Equinix
Published By: Equinix     Published Date: Jul 13, 2016
This paper revelas how Equinix empowers a leading provider of digital supply chain solutions to transform your industry’s business model via a scalable and robust interconnection solution.
Tags : 
customer experience, customer relationship, content management, content digital media
    
Equinix
Published By: Rosetta Stone     Published Date: Mar 22, 2012
MarketBridge, a leading global provider of sales and marketing services, surveyed 493 senior and upper management-level business professionals in a variety of functional roles at leading international corporations to learn more about their company's language-learning needs. Please download this free white paper for more information.
Tags : 
bilingual, human resources, rosetta stone, global human resources, business research
    
Rosetta Stone
Published By: AWS     Published Date: Dec 19, 2018
Cisco and Amazon Web Services (AWS) believe not only in making it simple to connect to the cloud, but also to protect your cloud services. Security is not just an on-premises or a cloud thing. It’s every-“thing” and everywhere. Gaining pervasive security means you need visibility across your entire IT environment to help you effectively identify and mitigate security threats. Cisco Stealthwatch Cloud provides scalable visibility and delivers secure network behavioral analysis across on-premises and AWS environments to help identify anomalous activity that could indicate a security threat. This self-learning security solution continually refines its behavioral models as it monitors your environment, ultimately improving its functionality and reducing the costs required for manual security checks and updates. Watch our webinar to learn how JetBrains increased transparency and reduced threat exposure by deploying Stealthwatch Cloud on AWS. Along with increased infrastructure protection,
Tags : 
    
AWS
Published By: Menlo Security     Published Date: Jun 05, 2018
"2017 was marked by a significant number of high-profile cyber breaches. Web malware and phishing played a critical role in the vast majority of these attacks. Watch this webinar to learn from two of the industry’s leading experts – Gartner Research Analyst Peter Firstbrook and Menlo Security CTO Kowsik Guruswamy: *Why web malware and phishing are so pervasive in today's cyber attacks *What the shortcomings of today’s reactive security philosophy are *Why the web continues to present a risk to businesses *How organizations rethink their security strategy moving forward"
Tags : 
    
Menlo Security
Published By: ProfitBricks     Published Date: Jan 01, 2013
Performance testing and benchmarking of cloud computing platforms is a complex task, compounded by the differences between providers and the use cases of cloud computing users. IaaS services are utilized by a large variety of industries and, performance metrics cannot be understood by simply representing cloud performance with a single value. When selecting a cloud computing provider, IT professionals consider many factors: compatibility, performance, cost, security and more. Performance is a key factor that drives many others including cost. In many cases, 3 primary bottlenecks affect server performance: central processing unit (CPU) performance, disk performance, and internal network performance.
Tags : 
cloud computing, iaas, profitbricks, amazon ec2, rackspace cloud, central processing unit, disk performance, internal network performance
    
ProfitBricks
Published By: ProfitBricks     Published Date: Apr 01, 2013
The value of conventional on-premises servers is eroding. As with all decay, it starts slowly and declines steadily. Bits and pieces of the physical server market are peeling off as businesses turn away from conventional data center and IT closet deployments in favor of cloud-based infrastructure-as-a-service (IaaS). And there’s no shortage of IaaS; hosting and service-provider companies are flooding the market with low-cost access to hosted servers. The challenge for adopting businesses is leveraging hosted assets that guarantee data security and integrity with fine-grained levels of adjustable capacity, high performance and price predictability.
Tags : 
iaas, solution, cloud-based
    
ProfitBricks
Published By: ProfitBricks     Published Date: Jun 28, 2013
What it means, and why we need it now
Tags : 
iaas, cloud computing
    
ProfitBricks
Published By: Polycom     Published Date: Mar 13, 2015
For those suffering from chronic or long-term health problems, there is often nothing quite as relieving as being sent home from the hospital—but also nothing quite as heartbreaking as readmission. Unfortunately, it is not unusual. Patients are sent home with instructions to continue improving their health, but few manage to do everything they need to do for a variety of reasons. Thankfully, there are ways to prevent this readmission.
Tags : 
health problems, social care, readmission, hospital, video solutions, telehealth, improving costs, aging population
    
Polycom
Published By: McAfee EMEA     Published Date: Nov 15, 2017
Private cloud is one of the critical deployment architectures IT teams are adopting as they transition to a service-centric delivery model. More than 75% of organizations? already use private clouds to lower costs, increase agility and exert greater control over security, data protection and compliance. The transition to private cloud represents a paradigm shift in how IT is provisioned and data centers are deployed. Virtualization is expanding beyond servers into storage and networking, while software-defined models allow new levels of agility through advanced automation and orchestration. https://www.eventbrite.com/e/mpower-emea-cybersecurity-summit-2017-tickets-36893006977?aff=kp4
Tags : 
cloud, security, guide, privacy, architectures, organizations, compliance, protection
    
McAfee EMEA
Published By: DataMotion     Published Date: Oct 01, 2008
After years of transferring many business activities online to take advantage of the benefits of the Internet, companies have now spent billions of dollars on antivirus software and other security measures. High-profile outbreaks and breaches reported in the international media have helped drive them to implement security measures that protect their customers and their brands while still growing their businesses...Download this paper to read more.
Tags : 
certifiedmail technology, email security, message security, encryption
    
DataMotion
Published By: Comcast Business     Published Date: Mar 24, 2015
Hotels and the travelers who frequent them bear little resemblance to their counterparts from just a few years ago. The explosion of new technologies has allowed hotels to change the way they operate and has made the average traveler more techsavvy and connected than ever. Mobile devices are driving this innovation. Not only have mobile devices changed how people interact with each other, they also have changed how people expect businesses to engage with them. According to SmartBrief, 40 percent of hotel guests carry three or more mobile devices. And with global mobile data traffic growing 30 percent every year according to Cisco, there will be an estimated 4.9 billion mobile users by 2018. When these mobile users travel, will they choose your hotel? Only if you have the mobile amenities they demand. In this white paper, we will review three mobile trends that every hotelier should address, and we’ll offer recommendations on how to best address them.
Tags : 
travel, hotel technology, mobile devices, mobile trends, hospitality
    
Comcast Business
Published By: IBM Corp     Published Date: Jun 21, 2011
The IBM System x server brand has long been recognized for exceptional products and service - find out more about why IBM earned significantly higher numbers of perfect customer satisfaction ratings versus the competition.
Tags : 
ibm system x server, products, customers, satisfaction, exceptional products and service, tbr, study, dynamic marketplace
    
IBM Corp
Published By: Cyveillance     Published Date: Apr 06, 2015
In this white paper, we examine notable trends and events in physical security from 2014 and assess what security professionals should expect in 2015. 2014 was truly an unpredictable year in the physical security and executive protection worlds, as large scale events targeted for disruption were executed relatively smoothly, while unforeseen developments in Ukraine and the Ebola outbreak caught many off guard. Looking ahead to 2015, we predict that local issues will continue to gain global importance, threat actors and activists will find new ways to utilize social media to spread their messages, and the lines between physical and digital threats will continue to converge. We also highlight ongoing developments in France, Mexico, Ukraine, and Germany.
Tags : 
information security threat, information security, protection, security breach, internet security
    
Cyveillance
Published By: CDW-Lenovo     Published Date: Oct 15, 2015
In TBR’s 2Q15 CSAT x86-based Servers Study, Lenovo customers reported higher levels of satisfaction with their x86 servers compared to Dell and HP customers. For the 2Q15 study, TBR measured 22 customer satisfaction attributes; Lenovo was the outright leader or tied for the lead in rolling six-month mean satisfaction scores.
Tags : 
    
CDW-Lenovo
Published By: SmartBrief     Published Date: Apr 26, 2011
Find out the role that employment brands play in SmartBrief on Workforce readers' recruiting efforts, how top companies use their employment brand to attract top talent, and how recruiting strategies are changing.
Tags : 
smartbrief, recruiting report, employment brands, workforce, key talent, employment branding, recruiting climate, employment brand perception
    
SmartBrief
Published By: Intel Security     Published Date: Jan 12, 2016
Wondering how to decode vendor hype as you evaluate your next endpoint protection platform? Gartner analysts Peter Firstbrook and Neil MacDonald have created a comprehensive buyer’s guide for endpoint protection: what to look for, what to avoid, and why.
Tags : 
gartner, buyers guide, endpoint security
    
Intel Security
Published By: SurveyMonkey     Published Date: Oct 26, 2015
Check out our latest on-demand webinar with Eventbrite’s Global Director of Metro Marketing, Eric Meyerson, to hear how Eventbrite successfully uses data to track brand awareness and monitor the competition.
Tags : 
surveymonkey, customer experience, customer care, reputation
    
SurveyMonkey
Published By: Symantec     Published Date: Nov 30, 2015
ALWAYS ONSSLComo uma das principais fornecedoras de certificados SSL, a Symantec está aqui para ajudar você a descobrir tudo o que é preciso saber sobre os benefícios do Always On SSL e como implementá-lo com sucesso.
Tags : 
    
Symantec
Published By: Symantec     Published Date: Nov 30, 2015
A confiança naqueles com quem fazíamos transações e a confiança de que as informações de compra que fornecíamos estariam seguras. Afinal, como sempre acontece, onde houver dinheiro haverá criminosos ansiosos por tirar proveito das crescentes oportunidades.
Tags : 
    
Symantec
Published By: Symantec     Published Date: Nov 30, 2015
O Natal está chegando; não facilite a vida dos hackers
Tags : 
    
Symantec
Published By: Symantec     Published Date: Nov 30, 2015
Seja você um indivíduo ou uma empresa, a segurança online deve ser abordada da mesma forma como você abordaria a segurança física da sua casa ou escritório. Ela não somente o faz se sentir mais seguro, mas protege também as pessoas que visitam sua casa, seu local de trabalho ou site. É importante entender os riscos potenciais e então garantir a proteção total contra eles. No rápido mundo da tecnologia, nem sempre é fácil se manter a par dos avanços mais recentes. Por isso, a formação de parcerias com empresas conceituadas de segurança na Internet é uma estratégia inteligente.
Tags : 
    
Symantec
Published By: Symantec     Published Date: Nov 30, 2015
A Symantec possui a mais abrangente fonte de dados do mundo sobre ameaças na Internet, com a Symantec™ Global Intelligence Network, composta por mais de 41,5 milhões de sensores de ataque e capaz de registrar milhares de eventos por segundo.
Tags : 
    
Symantec
Previous   1 2    Next    
Search      

Add Research

Get your company's research in the hands of targeted business professionals.