HIT Consultant Insightful coverage of healthcare innovation
 

think data

Results 176 - 200 of 201Sort Results By: Published Date | Title | Company Name
Published By: SAS     Published Date: Mar 14, 2014
Stop to think about how - and how often - your business interacts with customers. Most organizations believe that only a small fraction of data on interactions generated are effectively put to use. Why is that? Check out this whitepaper to see.
Tags : 
sas, voc, voice of customer, visual text analytics, best practices, customer voice, sound of sentiment, text data, customer data, analytical processing, structured data, enriched dataset, reporting, automatic generation, text analytics, text mining, data exploration
    
SAS
Published By: IBM     Published Date: Jan 09, 2014
Forward-thinking organizations are recognizing the superiority of Power Systems* technology. The Power Systems family offers the ultimate system for today’s compute intensive business applications and databases. “Power Systems continues to prove itself as the ultimate system for compute intensive workloads, high performance analytics, high performance UNIX*, and high performance computing.
Tags : 
ibm, ibm power systems, analytics, power 7, big data, decision making, power systems, virtualization
    
IBM
Published By: Cloudant, an IBM Company     Published Date: Nov 13, 2013
Great mobile apps should work well both on- and offline, and require a new way of thinking about data modeling for easy portability across devices — telecom and otherwise. Download now to learn more.
Tags : 
    
Cloudant, an IBM Company
Published By: Varonis     Published Date: Nov 12, 2013
Odds are fairly high that there is sensitive data on your corporate network that is overexposed and itching to escape. But will it ?Forrester thinks so – in a recent survey, 22% of security decision makers reported a data breach in the past twelve months, and at an average cost of $7.2 million per breach, it’s no shock that organizations are constantly working to strengthen their defenses.
Tags : 
varonis, data protection, context awareness, inevitable breach, sensitive data, corporate network, security decision-makers, data breach, it professionals, security professionals, leaked critical data, endpoint protections, network protections, server protections, dlp solutions, metadata
    
Varonis
Published By: Amazon     Published Date: Nov 07, 2013
Until recently, it has been far cheaper and easier to produce and store data than to process it. Companies have the option to buy large, multi-million dollar hardware devices to process their big data, but with budgets under pressure and no clear way to calculate returns on investment, the business case is difficult to make… And when analysts explain to the CTO that they only need the hardware for six months, for one day a week, or for one hour a day, the investment becomes impossible to justify. In this whitepaper, you’ll learn how by eliminating the traditionally high ‘cost of entry’ for big data analysis, Amazon Web Services is enabling customers to convert more raw data into more valuable business insight.
Tags : 
amazon web services, aws, aws cloud, cloud services, cloud computing, big data, data management, data analysis, insights, customer sentiment, big data analysis
    
Amazon
Published By: SumTotal Systems     Published Date: Oct 10, 2013
If you’re like everyone else in HR today, you’re probably thinking about how your organisation can handle data better. Maybe your executives want the power to make data-driven decisions from comprehensive workforce analytics. Perhaps you’d like to streamline the efficiency of your HR operation or put more actionable information in the hands of your line managers and employees. With the elixHR Platform, you can integrate your HR data and processes so your people can access information quickly and easily, and make better decisions. You can also lower your operational costs because you can increase efficiency and eliminate the need to replace HR systems that you already have in place.
Tags : 
sumtotal, sumtotal elixhr, sumtotal elixhr platform, elixhr, human resources, hr data, hr processes, hr systems, hr technology, integration, master data management, mdm, mdm technology, talent expansion
    
SumTotal Systems
Published By: Symantec Corporation     Published Date: Oct 03, 2013
We often think of malware as being designed to sit beneath the radar, collecting data in stealth mode, for the purposes of fraud or corporate espionage. Increasingly however, we’re witnessing attacks on corporations designed to cause substantial economic losses via wholesale destruction. For example, the Shamoon malware that recently hit Saudi Arabia-based Aramco (the world’s largest oil company) and RasGas (a Qatar-based gas company) corrupted files on tens of thousands of workstations, overwriting the Master Boot Records. These malware attacks, which may well have targeted website vulnerabilities, resulted in destruction on an industrial scale. At Aramco, IT professionals were forced to replace 30,000 PCs and laptops. RasGas meanwhile, had to shut down all email communications, and the company’s website was forced offline.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: Enterprise Mobile     Published Date: Sep 23, 2013
Gone are the days when mobility involved simply choosing a standardized device. Today, Enterprise IT leaders have to think about not just devices, but apps, data, storage, management (of devices, apps, content, and telecom expenses), security, and support. If you don’t consider your overall business goals as you develop and refine your mobility strategy, you risk investing in mobile technology for mobility’s sake alone. Smart decisions make it easier to adapt over time while keeping a lid on costs. Skyrocketing mobility costs are a common fear for organizations, but careful planning will help keep your mobility spend safely earthbound.
Tags : 
mobility-as-a service, managed mobility services, byod, bring-your-own-device, enterprise mobile, mobility, mobility planning, enterprise mobility, mobile strategy, mobile security, mobile management, device management, enterprise mobile devices
    
Enterprise Mobile
Published By: HP-Intel®     Published Date: Jul 22, 2013
When it comes to IT risk, most people think in terms of disaster recovery and protecting critical patient data in the event of a natural disaster like a hurricane or an earthquake.
Tags : 
strategy guide, disaster recovery, healthcare, hp healthcare, off-site disaster recovery
    
HP-Intel®
Published By: Sophos     Published Date: Jul 01, 2013
Whether you’re an end user or an IT administrator, Bring Your Own Device (BYOD) is becoming the rule rather than the exception in today’s workplace. Although BYOD may be a convenience to your employees, you need to think about its impact on corporate security models. This whitepaper explains the risks and rewards of BYOD, and shows you how you can adopt BYOD in your workplace while protecting your data.
Tags : 
risk, rewards, byod, security
    
Sophos
Published By: Nutanix, Inc.     Published Date: May 02, 2013
Enterprise data-centers are straining to keep pace with dynamic business demands, as well as to incorporate advanced technologies and architectures that aim to improve infrastructure performance, scale and economics. meeting these requirements, however, often requires a complete rethinking of how data centers are designed and managed. Fortunately, many enterprise IT architects are leading cloud providers have already demonstrated the viability and the benefits of a more modern, software-defined data center. This Nutanix white paper examines eight fundamental steps leading to a more efficient, manageable and scalable data center.
Tags : 
nutanix, data-centers, dynamic business demands, advanced technologies
    
Nutanix, Inc.
Published By: IBM     Published Date: Apr 26, 2013
In the spring of 2012, IBM launched a comprehensive re-thinking and refresh of its IT Service Management (ITSM) offerings. The IT management products formerly known as Tivoli Service Request Manager, IT Asset Management and Change Configuration Management Database have now been combined into a single product, IBM SmartCloud Control Desk 7.5. The products span advanced support for IT and intelligent asset management, change and configuration management, service request management and service catalog, along with Cloud delivery options and built-in support for automation beyond traditional service desk workflow.
Tags : 
smartcloud, control, desk, consolidate, advances, services, management
    
IBM
Published By: Experian QAS     Published Date: Feb 25, 2013
According to a recent Experian QAS survey, 94% of respondents think that they have inaccurate customer data. Find out how respondents perceive data quality and how existing data errors affect the business and particularly the customer experience.
Tags : 
customer-centric, customer experience, data quality, customer data
    
Experian QAS
Published By: McAfee     Published Date: Jan 28, 2013
Re-think your DLP — This white paper discusses how a new DLP model aligns data discovery, classification, policy management, and security controls to your business requirements and processes.
Tags : 
dlp, business-centric dlp, dlp business rules, discovery, classification, policy management, security controls
    
McAfee
Published By: Symantec     Published Date: Jan 11, 2013
We often think of malware as being designed to sit beneath the radar, collecting data in stealth mode, for the purposes of fraud or corporate espionage. Read on to learn more findings by this survey, with stats on security, confidence and more.
Tags : 
survey, usa, corporate america, security in corporations, symantec, security, it management, data management, data security
    
Symantec
Published By: Oracle     Published Date: May 22, 2012
We've all heard both sides of the social commerce debate: "Facebook doesn't work," on the one hand, and "why wouldn't retailers experiment with Facebook" on the other. This whitepaper will teach you how true innovators are thinking beyond the social channel and are building programs that leverage Facebook data to drive conversations and engagement.
Tags : 
oracle, social media, facebook, emerging marketing, social commerce, digital media
    
Oracle
Published By: TreasureData     Published Date: May 14, 2012
Treasure Data is going to change the way that you think about Big Data and Cloud Data Warehousing. We'd like to get your input on how you see Big Data and Cloud Data Warehousing. Please take our 10 question survey and give us your input.
Tags : 
treasuredata, data warehousing, cloud, big data, solution, data-driven, tables, queries, analytics, infrastructure, storage, billing, visualization
    
TreasureData
Published By: HP and AMD     Published Date: Nov 30, 2011
HP Thermal Logic represents a step forward in thinking about and managing the energy consumption of today's datacenter. Find out more now!
Tags : 
network, edge, core, datacenter, energy, energy consumption, smart grid, data center, efficiency, energy efficiency, infrastructure
    
HP and AMD
Published By: Quantum - Quinstreet     Published Date: Aug 10, 2011
This technology brief provides 5 topics to think about as you design your long-term data retention plans.
Tags : 
    
Quantum - Quinstreet
Published By: Ogilvy - IBM UK     Published Date: Aug 08, 2011
This whitepaper explores the latest challenges and innovations in data protection and retention.
Tags : 
ibm uk, data protection, information systems, information management, business continuity, business resiliency, business availability, dp&r, dp+r, dp and r
    
Ogilvy - IBM UK
Published By: HP Virtualization     Published Date: Mar 22, 2010
Virtually every organization understands that its successful operation depends on the continuous availability of its applications. Most companies rely on internal applications-ranging from enterprise resource planning to payroll systems-to keep the wheels of their enterprise turning. They also depend on external-facing applications for everything from selling products to their customers to automating the supply chain with suppliers and partners. The failure of any of these mission-critical applications could be catastrophic to a business.
Tags : 
business continuity
    
HP Virtualization
Published By: Vertica     Published Date: Mar 15, 2010
In a world of growing data volumes and shrinking IT budgets, it is critical to think differently about the efficiency of your database and storage infrastructure. The Vertica Analytic Database is a high-performance, scalable and cost-effective solution that can bring dramatic savings in hardware, storage and operational costs.
Tags : 
vertica, ec2, cdr, elastic, saas, cdr, cloud computing, data management, ad-hoc, business intelligence, cloud, cloudbased applications, analytic, saas, dbms, mpp
    
Vertica
Published By: Trend Micro SPN     Published Date: Sep 23, 2009
To keep ahead of the threats, you need to rethink your security and ask whether traditional security technologies are up to today's challenges. This eBook explains how correlating web, email and file reputations within a smart protection network is core to Outthinking the cyber criminals.
Tags : 
trend micro, trend, cloud-client, malware, anti-virus, hijacked, fraud, virus, security, data leakage protection, dlp, smart security, data-stealing
    
Trend Micro SPN
Published By: Ounce Labs, an IBM Company     Published Date: Jul 08, 2009
The Business Case for Data Protection, conducted by Ponemon Institute and sponsored by Ounce Labs, is the first study to determine what senior executives think about the value proposition of corporate data protection efforts within their organizations. In times of shrinking budgets, it is important for those individuals charged with managing a data protection program to understand how key decision makers in organizations perceive the importance of safeguarding sensitive and confidential information.
Tags : 
ounce labs, it securitym it risk, software applications, ciso, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography
    
Ounce Labs, an IBM Company
Published By: VMware     Published Date: Mar 16, 2009
Mid-sized businesses have long struggled to protect their IT systems. Many firms are inadequately protected and mistakenly think that a disaster is rare and won’t happen to them anytime soon. This custom Yankee Group Report uses customer interviews, statistical data and Yankee Group SMB survey results to examine disaster recovery (DR) issues.
Tags : 
vmware, disaster recovery, smb, it system, it infastructure, virtualization, storage replication, ups, power outage, uninterruptible power supplies, circuit failure, human error, business continuity, time critical, mission critical, bcdr maturation, backup, data backup, data recovery, hgih availability
    
VMware
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.