HIT Consultant Insightful coverage of healthcare innovation
 

technology white paper

Results 251 - 275 of 320Sort Results By: Published Date | Title | Company Name
Published By: Symantec     Published Date: Jan 10, 2013
Cloud computing is rapidly transforming the IT landscape and the conversation around adopting cloud technology has went from "if" to "when". This white paper is aimed to help enterprises making decisions on where and when to implement cloud.
Tags : 
cloud hosting providers, cloud, hosting, security, implementing cloud
    
Symantec
Published By: Alcatel-Lucent     Published Date: Dec 02, 2013
The question that businesses need to ask themselves is, “Is my data center designed for yesterday’s technology, or tomorrow’s?”. This whitepaper will help you find the answer.
Tags : 
data center, data centre, data center optimization, alcatel lucent, alcatel, lucent, qos, server farm, qos, smart network, smarter network, servers, blades, cloud
    
Alcatel-Lucent
Published By: APTX     Published Date: Nov 05, 2009
This technology white paper introduces the reader to an entirely new scheme for lossless audio compression called apt-X Lossless.
Tags : 
aptx, apt-x lossless, audio processing, audio codec
    
APTX
Published By: Asure Software     Published Date: Nov 06, 2013
Based on third party research and our own experience, we know that organizations that have successfully implemented automated technology and reporting tools to support their HR activities have seen real workforce productivity benefits. This white paper will provide you with an in-depth analysis of the top 8 ways you can improve your workforce productivity using the latest advances in HR technology.
Tags : 
workforce management, workforce management solutions, workforce software solutions, workforce software, workforce productivity
    
Asure Software
Published By: Logicalis     Published Date: Mar 12, 2014
Where’s the data center going? Industry analysts are pointing to modular computing. Designed for rapid deployment, energy efficiency and high-density computing, modular data centers deliver capacity at a lower cost than traditional construction methods. With significantly reduced construction time—from years to just a matter of months—and industry-standard components that are designed to meet immediate needs and slightly more, modular technology offers economies of scale that are particularly important in the new global economy. Learn more about modular computing in this whitepaper from Logicalis.
Tags : 
logicalis, modular computing, data optimization, cloud computing
    
Logicalis
Published By: Logicalis     Published Date: Aug 20, 2014
Today’s IT organizations face huge challenges such as the ever-increasing number of applications, virtualization, the cloud, and the rising value of information stored in data centers. The combined effect of these factors is placing pressure on IT infrastructures to increase performance and operate more efficiently while reducing costs. An emerging technology, flash storage technology, is helping business and technology leaders address these issues by making their IT infrastructures more operationally efficient. Learn more in this white paper from Logicalis.
Tags : 
logicalis, flash storage, flash memory, data storage, solid state drives, solid state storage, it transformation, it efficiency
    
Logicalis
Published By: Viavi Solutions     Published Date: Sep 30, 2016
Organizations planning to migrate all or a portion of their applications or services to a public cloud environment will benefit from the experiences of early adopters. As a leader in hybrid IT monitoring, Viavi Solutions® has been involved at all stages of the cloud-migration life cycle: during assessment, implementation, and after deployment. Based on Viavi’s and our technology partners’ experience and many conversations with customers, prospects, and others in the industry, this white paper offers insight into 6 key questions regarding cloud adoptions: 1. Why Migrate 2. What to Migrate 3. What are the Steps to Cloud Migration 4. When to Migrate 5. Where to Migrate 6. Who to Ask for More Help
Tags : 
    
Viavi Solutions
Published By: Oracle     Published Date: Jan 13, 2014
Oracle, Leader Networks, and Social Media Today recently conducted an online survey of over 900 marketing and technology leaders at more than 500 organizations from around the world to explore what it means to be a socially enabled enterprise. Technology and Marketing executives from Chubb & Son, Shell and Whole Foods Market participated in in-depth interviews as part of the study and share lessons learned and provide practical insights from their perspective. Paul Gillin, veteran technology journalist and co-author of the bookAttack of the Customers, adds perspective based on his experience with applying social media to marketing, customer service and internal communications Download this exclusive White Paper, The Socially Enabled Enterprise to learn more about the opportunities and challenges global organizations are facing in the transition to becoming socially enabled enterprises.
Tags : 
socially enabled enterprise, social business, social media monitoring, social marketing, social media management, social relationship management, social marketing platform, social marketing tools, social media tools, customer experience, customer insight
    
Oracle
Published By: Hewlett-Packard Company     Published Date: May 15, 2014
Traditional server management and provisioning can create unnecessary burdens for many organizations. Information technology (IT) administrators in today’s business environments need a more streamlined process to manage servers throughout the IT life cycle, including tools to help them diagnose problems and procedures for efficiently resolving errors. This white paper provides an in-depth look at the key capabilities of HP Integrated Lights-Out (iLO) embedded in every ProLiant Gen8 server, the solution’s scalable licensing offerings, and mobile-app features that support IT staff—anywhere, anytime.
Tags : 
server management, ilo, proliant gen8 server
    
Hewlett-Packard Company
Published By: OpenText     Published Date: Aug 19, 2014
Maintaining regulatory compliance is a major business issue facing organizations around the world. The need to secure, track and store information for compliance purposes is critical. For years businesses have relied on fax communications in day-to-day operations. More pressure is now placed on the need to closely manage fax communications and document processes. It’s not surprising that organizations are turning to enterprise fax technology to meet compliance requirements. This white paper addresses the area of fax communications and the steps you can take to help keep your organization compliant.
Tags : 
opentext, security, fax, document delivery, workflow improvements, automation systems, transactional paper documents
    
OpenText
Published By: Riverbed     Published Date: Sep 05, 2014
Storing data in the cloud using a Whitewater™ cloud storage gateway from Riverbed Technology overcomes what is becoming a serious challenge for IT departments: how to manage the vast, and ever-growing, amount of data that must be protected. Whitewater eliminates concerns about data security, data transmission speeds over the Internet, and data availability, while providing great flexibility and a favorable return on investment. Moving data to the cloud replaces the high costs of tape and disk storage systems with a pay-as-you-go cloud storage tier. This paper makes the business case for cloud storage, outlining where capital and operational costs can be eliminated or avoided by using the cloud for backup and archive storage.
Tags : 
data storage, cloud, it departments, security, transmission speeds
    
Riverbed
Published By: DocuSign     Published Date: Mar 23, 2016
According to Forrester Research, the new age of the customer has arrived. Driven by cloud technology and advances in mobility, the power of business has shifted to consumers. This white paper demonstrates how you can enhance the signing experience for new hires and employees alike in recruiting and in HR.
Tags : 
docusign, client satisfaction, technology, electronic contract, paperless, reduce costs, human resources
    
DocuSign
Published By: LeftHand Networks, Inc.     Published Date: Jan 15, 2009
Carefully protecting and managing the storage that holds a company’s data has become one of the most important missions of today’s Information Technology (IT) organizations. With data being a company’s most valuable asset, many are turning to Storage Area Networks (SANs) as a way to meet a number of challenges.  This White Paper looks at how a well built SAN can provide real benefits to your organization and improve overall efficiency within you network.
Tags : 
lefthand networks, san, storage area networks, simplification of storage, central data storage
    
LeftHand Networks, Inc.
Published By: Symantec Corporation     Published Date: Feb 25, 2014
The explosive growth of the mobile apps market presents a tremendous opportunity for software developers and cybercriminals alike.  Infected apps are not only a threat to mobile device users, but also to network and platform providers, device manufacturers, and the reputation of the industry as a whole. Fortunately, developers can protect their code – and their customers – with a straightforward and easy-to-manage technology: code signing certificates. This white paper details the rise of mobile applications and why code signing certificates are essential to protecting the entire mobile apps ecosystem.
Tags : 
mobile apps, symantec, cybercriminals, security, mobile applications, code signing, malware
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Feb 25, 2014
The explosive growth of the mobile apps market presents a tremendous opportunity for software developers and cybercriminals alike.  Infected apps are not only a threat to mobile device users, but also to network and platform providers, device manufacturers, and the reputation of the industry as a whole. Fortunately, developers can protect their code – and their customers – with a straightforward and easy-to-manage technology: code signing certificates. This white paper details the rise of mobile applications and why code signing certificates are essential to protecting the entire mobile apps ecosystem.
Tags : 
symantec, mobile, mobile applications, security, code signing certificates
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Jun 24, 2014
The explosive growth of the mobile apps market presents a tremendous opportunity for software developers and cybercriminals alike.  Infected apps are not only a threat to mobile device users, but also to network and platform providers, device manufacturers, and the reputation of the industry as a whole. Fortunately, developers can protect their code – and their customers – with a straightforward and easy-to-manage technology: code signing certificates. This white paper details the rise of mobile applications and why code signing certificates are essential to protecting the entire mobile apps ecosystem.
Tags : 
security, mobile, mobile app, code, mobile application, code signing
    
Symantec Corporation
Published By: Symantec     Published Date: Oct 01, 2015
The foundation of trusted Internet communications are Secure Socket Link (SSL) certificates, an encryption technology installed on Web servers that permits transmission of sensitive data through an encrypted connection. Using a public-key infrastructure (PKI), SSL certificates authenticate the end-use Website and the endpoint server, making it difficult for those sites to be imitated or forged.The acquisition of SSL certificates should always be a relatively easy experience; however, the purchasing decision should never be regarded lightly. When businesses consider SSL certificates; there six Golden Rules a purchaser should keep in mind. This whitepaper provides an overview of the SSL certificated market, the six golden rules of purchasing SSL certificates and how Symantec addresses each of the golden rules. At the end of the day, people want to make sure their Web sites are secured with as little friction as possible—Symantec gives businesses every opportunity to achieve that goal.
Tags : 
ssl certificates, public-key infrastructure, web servers, website security, sensitive data, encrypted connection
    
Symantec
Published By: NEC     Published Date: Aug 12, 2014
Server virtualization is revolutionizing the datacenter by making applications mobile, increasing application uptime, and allowing IT admins to allocate computing resources more efficiently. The technology has been deployed widely enough that the role of the computer server has evolved from directly hosting operating systems and applications to hosting fully virtualized environments. Server that can support more virtualized machines (VMs - complete application stacks) allow their users to gain higher return on their IT investments. Private Cloud can extend the virtualization benefits in ways that broaden the benefits of virtualization to all parts of the organization. In this white paper, you will learn how Corporate IT uses these tools to meet the increasing demand for IT services.
Tags : 
tier 1, cloud, machines, datacenter, servers, virtualization, customer value, analytics, application owners, system integrators, big data, reliability, enterprise, availability, serviceability, processor
    
NEC
Published By: NEC     Published Date: Aug 12, 2014
As virtualization technology evolves and improves, the server performance and power requirements for supporting a virtualized data center increase. Your aging servers are struggling to meet increasing virtual workload demands. These older, lower-performing servers further tax your data center by consuming valuable space and power. You want to update, upgrade, and consolidate to a powerful new server solution that will provide an excellent virtualization platform. In this white paper, you’ll learn how the NEC Express5800/A2040b enterprise server, powered by the Intel® Xeon® processor E7-4890 v2, offers just that.
Tags : 
consolidation, lab validation, report, servers, virtualization, analytics, application owners, system integrators, big data, reliability, enterprise, availability, serviceability, processor, workload
    
NEC
Published By: ZIGZAG Marketing, Inc.     Published Date: Feb 13, 2007
According to a 2005 survey from the CMO Council and KnowledgeStorm, prospects value white papers more than any other content produced by technology companies. And while most technology companies regularly publish white papers, they fail to get the maximum marketing value for their efforts.
Tags : 
emerging marketing, white paper, whitepaper, whitepaper marketing, white paper marketing, lead generation, zigzag
    
ZIGZAG Marketing, Inc.
Published By: Schneider Electric     Published Date: May 03, 2018
Before creating new technologies, we must think about how to create the right values to be also able to sell it. All the technology that is required for “Industry 4.0” is available today already, so in fact Industry 4.0 can be seen more than an innovation driver for new businesses that are not exploited today, than an innovation driver for technology. If these existing technologies are assembled properly together and combined with the right business models, there is really good chance to profit from Industry 4.0. This white paper looks into the ways one can profit from Industry 4.0 by differentiating through new business models.
Tags : 
smart machines, industry 4.0, smart factory, iiot, opc ua, data, analytics, machine services, revenue models, business models, industrial automation
    
Schneider Electric
Published By: Schneider Electric     Published Date: Jun 07, 2019
New digital technology now makes it feasible to integrate process control and SIF within a common automation infrastructure. While this can provide productivity and asset management benefits, if not done correctly, it can also compromise the safety and security of an industrial operation. Cybersecurity and sabotage vulnerability further accentuate the need for securing the safety instrumented system (SIS). Certainly, a common platform approach using similar hardware and software dedicated for control and safety functions, respectively, can provide the potential for cost savings. However, it is widely acknowledged that utilizing separate, independent, and diverse hardware/software for safety and control is the optimal way to protect against potentially catastrophic common cause and systematic design and application errors. Different vendors offer varied degrees of integration and solutions. The question is: how to provide an integrated control and safety solution with advanced functionality and productivity without compromising safety and security? And, where do users draw the line? A third-party (e.g., TÜV) certification of the hardware/software systems to IEC 61508 specifications carries significant advantages, but should this be the only criterion? How does a third-party certificate extend to the plant’s overall assignment of risk reduction credits for all independent protection layers (IPL)? Control system embedded safety logic solvers may actually increase the SIL requirements of the SIF if no credit is allowed for the distributed control system (DCS) as an IPL. Download the white paper to learn more.
Tags : 
smart control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability, ecostruxure plant, process automation, profitable safety, defence in depth, industrial automation, process control, process systems
    
Schneider Electric
Published By: HP     Published Date: Jul 08, 2009
In these days of rampant data growth, a technology that can increase the effective capacity of a disk-based backup system by a ratio of up to 50:1 is big news. Data deduplication allows you to store up to 50 times more backup data into the same disk footprint — giving you a better chance of restoring your users' lost data from exactly the point they need it. This white paper explains how this innovative data deduplication solution works and also establishes how a 50:1 deduplication ratio may be achieved.
Tags : 
dynamic deduplication, 50:1, disk based backup, data, storage, rack, dedupe, data deduplication, hp storageworks, d2d backup systems, backup, data change
    
HP
Published By: HP     Published Date: Jul 08, 2009
Data deduplication technology represents one of the most significant storage enhancements in recent years, promising to reshape future data protection and disaster recovery solutions. Data deduplication offers the ability to store more on a given amount of storage and replicate data using lower bandwidth links at a significantly reduced cost. This white paper explains how deduplication technologies work in practice, the pros and cons of each approach, and when to choose a particular type.
Tags : 
data, data deduplication, data dedupe, disaster recovery, data protection, storage, bandwidth, virtual library system, vls, d2d, disk to disk, san, vtl, virtual tape libraries, pacs, retention, data rate, recovery point objectives, rpos, service level agreements
    
HP
Published By: OutlookSoft     Published Date: Aug 21, 2009
As vendors rush to embrace and exploit predictive analytics, only those with a truly unified solutions will succeed in capitalizing on this powerful and promising technology. Read this insightful white paper to learn more.
Tags : 
analytics, business analytics, performance managment, business process management, bpm, business activity monitoring, metrics, business metrics, activity monitoring, corporate performance management, outlooksoft, outlook soft
    
OutlookSoft
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.