HIT Consultant Insightful coverage of healthcare innovation
 

think data

Results 126 - 150 of 201Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Sep 30, 2016
See how thinking smartly about identity and access management deployment can make all the difference when it comes to securing your enterprise’s data on the cloud. Learn common mistakes made when attempting to utilize security measures on Office 365, synchronizing data with its directories, and more
Tags : 
ibm, security, office 365, access management deployment, access management, enterprise data, cloud, security measures
    
IBM
Published By: Veritas     Published Date: Sep 30, 2016
Learn how having one backup and recovery solution on a converged platform that can unify, manage and protect mixed workloads across the enterprise allows IT to reduce administration and infrastructure costs, even in the most complex environments.
Tags : 
    
Veritas
Published By: SAS     Published Date: Aug 03, 2016
Imagine that you are in a meeting with several department heads discussing issues around enrollment. As people begin to share their thoughts, you quickly realize that each person in the room is working from conflicting information – and everyone thinks their information is correct. The group spends most of the meeting arguing over whose data and reports are correct rather than understanding the problem and making decisions. Sound familiar? When organizations have their data fragmented across many systems and departments, these situations are all too common. Without a single, trusted source of truth and easyto- use tools to interpret and understand the data, conversations are limited by everyone’s departmental perspectives and resources.
Tags : 
best practices, enterprise, competitive advantage, technology, data
    
SAS
Published By: Druva     Published Date: Aug 03, 2016
Will your company will lose data in the cloud? Many organizations think SaaS providers will recover their data but that is not the case. Gartner assesses backup and recovery shortcomings of SaaS providers and provides considerations to close the gap.
Tags : 
    
Druva
Published By: Druva     Published Date: Aug 03, 2016
Will your company will lose data in the cloud? Many organizations think SaaS providers will recover their data but that is not the case. Gartner assesses backup and recovery shortcomings of SaaS providers and provides considerations to close the gap.
Tags : 
    
Druva
Published By: Druva     Published Date: Aug 03, 2016
Will your company will lose data in the cloud? Many organizations think SaaS providers will recover their data but that is not the case. Gartner assesses backup and recovery shortcomings of SaaS providers and provides considerations to close the gap.
Tags : 
    
Druva
Published By: Druva     Published Date: Aug 03, 2016
Will your company will lose data in the cloud? Many organizations think SaaS providers will recover their data but that is not the case. Gartner assesses backup and recovery shortcomings of SaaS providers and provides considerations to close the gap.
Tags : 
druva, gartner, best practices, technology, data, cloud
    
Druva
Published By: Okta     Published Date: Jul 27, 2016
The shift to the cloud is changing how companies think about their IT infrastructure and what they must do to manage it. The on-demand applications and services that comprise a cloud services network enable companies to rapidly deploy powerful capabilities to a broad set of users at very low costs. However, they also introduce challenges associated with securing and controlling users and access, simplifying adoption and scaling of these applications, and providing insight into utilization to ensure the business is optimizing its cloud investments. Okta’s on-demand identity management service enables companies to address these challenges head-on by being designed from the ground up as a scalable, secure, multi-tenant service that protects your data through centralized access control. This whitepaper details Okta’s focus on security and reliability, how Okta enhances security and how Okta itself stays secure.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security
    
Okta
Published By: Okta     Published Date: Jul 25, 2016
The shift to the cloud is changing how companies think about their IT infrastructure and what they must do to manage it. The on-demand applications and services that comprise a cloud services network enable companies to rapidly deploy powerful capabilities to a broad set of users at very low costs. However, they also introduce challenges associated with securing and controlling users and access, simplifying adoption and scaling of these applications, and providing insight into utilization to ensure the business is optimizing its cloud investments. Okta’s on-demand identity management service enables companies to address these challenges head-on by being designed from the ground up as a scalable, secure, multi-tenant service that protects your data through centralized access control.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security
    
Okta
Published By: Okta     Published Date: Jul 19, 2016
With a secure foundation in place to manage internal IT, many IT leaders are thinking about a foundation for the entire business. In the new world of mobile apps, cloud services, and the Internet of Everything, people, processes, data, and devices are all converging to reshape how day-to-day business is done. Companies are reaching out to customers and partners—and even intelligent objects like connected cars and monitoring systems—and modifying the products and services they bring to market as a result. To an unprecedented degree, the future of an enterprise lies in the hands of the CIO and her IT staff who orchestrate these connections and act on the benefits they bring. IT leaders are finding new opportunities in an era of digital disruption. This executive brief provides a quick overview of how they are driving growth and increasing efficiency by securely connecting the digital enterprise with customers, partners, suppliers and distributors.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security
    
Okta
Published By: Cisco     Published Date: Jul 08, 2016
So what do end-users—companies in the process of building or upgrading their data centers today—think of the security problems they face? We conducted this survey to answer key questions about buyers’ plans for security in their data centers.
Tags : 
    
Cisco
Published By: IBM     Published Date: Jul 08, 2016
Read this Forrester whitepaper to learn more about the critical, yet often overlooked, role that data classification and data discovery can play in reducing your organization’s risk and enhancing security.
Tags : 
ibm, forrester, data discovery, big data, data, analytics, information governance
    
IBM
Published By: Commvault     Published Date: Jul 06, 2016
Think of a wildfire that quickly spreads as it increases in speed and power. That is what is happening today as data growth increases the volume and management complexity of storage, backup and recovery. Now think of trying to stop that fire with a garden hose. Your traditional backup and recovery process is equally under-equipped to manage and facilitate operations that need more speed, efficiency, scalability and reliability to handle today’s 24/7, always-on environment. Here we examine the benefits of moving from a solution comprised of multiple point products to a holistic data protection platform designed to serve today’s enterprise.
Tags : 
commvault, data protection, storage, backup, recovery, holistic data protection, singe pane of glass, common code base
    
Commvault
Published By: Flexera     Published Date: Jun 14, 2016
How much does your organization know about the software vulnerabilities that put data and users at risk? Chances are it is less than you think. Software vulnerability management can significantly reduce enterprise risk, and this paper offers a risk reduction plan, demonstrates why vulnerability management is important today, and offers eye-opening statistics as to the nature and breadth of the issue. It is not surprising that keeping data secure and keeping users safe continues to challenge organizations of every size and type. There has been an explosion in the number of applications used to conduct business in recent years. This multidimensional expansion includes continued growth in mobile devices and enterprise application spending exposing new attack surfaces that malware can prey upon.
Tags : 
software, vulnerability, intelligence, data, statistics, application, attacks, action strategy
    
Flexera
Published By: FICO     Published Date: Jun 07, 2016
As any line of business (LOB) leader knows, making customer level decisions that balance risk and profit just keeps getting harder. And even when you think you have the right decisions, turning them into actions can be even trickier. You also need to consider the factors that make smart decisions difficult. Big data. Regulations. Customers who want an offer, fast, or else you’re going to lose them.
Tags : 
    
FICO
Published By: FICO     Published Date: Jun 07, 2016
As any line of business (LOB) leader knows, making customer level decisions that balance risk and profit just keeps getting harder. And even when you think you have the right decisions, turning them into actions can be even trickier. You also need to consider the factors that make smart decisions difficult. Big data. Regulations. Customers who want an offer, fast, or else you’re going to lose them.
Tags : 
    
FICO
Published By: IBM     Published Date: Jun 07, 2016
In a multi-database world, startups and enterprises are embracing a wide variety of tools to build sophisticated and scalable applications. IBM Compose Enterprise delivers a fully managed cloud data platform so you can run MongoDB, Redis, Elasticsearch, PostgreSQL, RethinkDB, RabbitMQ and etcd in dedicated data clusters.
Tags : 
ibm, analytics, database, ibm compose enterprise
    
IBM
Published By: Okta     Published Date: May 09, 2016
With a secure foundation in place to manage internal IT, many IT leaders are thinking about a foundation for the entire business. In the new world of mobile apps, cloud services, and the Internet of Everything, people, processes, data, and devices are all converging to reshape how day-to-day business is done. Companies are reaching out to customers and partners—and even intelligent objects like connected cars and monitoring systems—and modifying the products and services they bring to market as a result. To an unprecedented degree, the future of an enterprise lies in the hands of the CIO and her IT staff who orchestrate these connections and act on the benefits they bring. IT leaders are finding new opportunities in an era of digital disruption. This executive brief provides a quick overview of how they are driving growth and increasing efficiency by securely connecting the digital enterprise with customers, partners, suppliers and distributors.
Tags : 
    
Okta
Published By: Aria Systems     Published Date: May 03, 2016
In the guide, I’ll explain: - Why recurring revenue is an unprecedented opportunity for your business and why this opportunity is available now - How you’ll need to change your thinking to manage a recurring revenue business - Why creating recurring revenue offerings may be as simple as repackaging existing products and services - What business and system capabilities you will need to have in place to support your new business model - How to go about selecting vendors to help you achieve your goals - What elements are necessary for success in a recurring revenue implementation program - How recurring revenue changes the way you look at data and measure success - The steps you need to take to get started on your recurring revenue journey - What the future holds for recurring revenue
Tags : 
    
Aria Systems
Published By: IBM     Published Date: Apr 22, 2016
This white paper explains the value of putting data and insight to work to accelerate an organization’s journey to becoming a Cognitive Business, by enhancing their investments in data and analytics and realizing new opportunities from cognitive systems that understand, reason and learn.
Tags : 
ibm, ibm analytics, cognitive business, watson, think data
    
IBM
Published By: IBM     Published Date: Apr 22, 2016
Developing a data integration and lifecycle management strategy for a hybrid environment This e-book focuses on building and executing a data integration and lifecycle management strategy.
Tags : 
ibm, think data, integration, lifecycle strategy, ibm analytics
    
IBM
Published By: CDW - APC     Published Date: Apr 07, 2016
Open Compute has had a significant impact on the thinking about data center design. Until now, the focus has been on systems at the rack level, leaving unanswered questions about the power infrastructure upstream of the rack. In this paper, we address critical questions about the implications of Open Compute on the upstream power infrastructure, including redundancy, availability, and flexibility. We introduce simplified reference designs that support OCP and provide a capital cost analysis to compare traditional and OCP-based designs. We also present an online TradeOff Tool that allows data center decision makers to better understand the cost differences and cost drivers to various architectures.
Tags : 
data, application performance, data protection, performance optimization, data center, infrastructure management
    
CDW - APC
Published By: CDW     Published Date: Apr 04, 2016
Open Compute has had a significant impact on the thinking about data center design. Until now, the focus has been on systems at the rack level, leaving unanswered questions about the power infrastructure upstream of the rack. In this paper, we address critical questions about the implications of Open Compute on the upstream power infrastructure, including redundancy, availability, and flexibility. We introduce simplified reference designs that support OCP and provide a capital cost analysis to compare traditional and OCP-based designs. We also present an online TradeOff Tool that allows data center decision makers to better understand the cost differences and cost drivers to various architectures.
Tags : 
data, application performance, data protection, performance optimization, data center, infrastructure management
    
CDW
Published By: IBM     Published Date: Apr 04, 2016
When you think about mobile security and policies, do you ever think about all the places your enterprise data is going? We operate in a mobile economy, with an estimated 16M mobile devices infected by malware at any given time. There are more mobile devices connected to the Internet than human beings in the world. The question is: Are we prepared for that?
Tags : 
ibm, ciso, mobility, mobilephobia, mobile security
    
IBM
Published By: Eaton     Published Date: Jan 26, 2016
This white paper discusses the issues making data center cooling more challenging than ever and explains why starting the data center design process with the racks rather than the room can help businesses reduce energy consumption, increase capacity and optimize floor space utilization.
Tags : 
eaton, data center design, data center cooling, floor space utilization, data center solutions
    
Eaton
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.