HIT Consultant Insightful coverage of healthcare innovation
 

trends and information

Results 26 - 38 of 38Sort Results By: Published Date | Title | Company Name
Published By: Microsoft Office     Published Date: Oct 09, 2008
Living in a connected world, many of the economic and intellectual barriers that once separated the world’s businesses no longer exist. Free trade, growing labor markets, increased capital, and business and technology standards contribute to a worldwide information-based economy. People and businesses work together in ways never before possible. As local economies adapt to this new world of work, certain worldwide trends emerge. These trends define how your company conducts business and how you work with information and other people.Learn more by downloading this paper.
Tags : 
microsoft, office, content management
    
Microsoft Office
Published By: Cyveillance     Published Date: Apr 03, 2015
In this white paper, we recap notable trends and events in information security from 2014 and look forward to what information security professionals should expect in 2015. The past year was a landmark one in the information security field, with massive data breaches capturing the public’s attention, powerful bugs causing headaches for IT teams and end users, DDoS attacks breaking records, and phishing remaining a general annoyance – or worse – for all Internet users. In this whitepaper, we discuss these trends as well as key areas of concern for 2015, including: - The impact of the Internet of Things - The growing importance of threat intelligence - The increasing influence of BRICS nations - The evolution of encryption standards - The changing role of the CISO
Tags : 
information security threat, information security, protection, security breach, internet security
    
Cyveillance
Published By: Webtrends     Published Date: May 03, 2010
Join Webtrends' Rachel Charlton and Peter Thelen from the Ad Director team for this information-packed webinar as they explain the benefits of bid optimization and demonstrate the results using real life examples from actual clients. This is a can't miss webinar for any marketer who uses paid search.
Tags : 
webtrends, mobile strategy, app downloads, apps, performance indicators
    
Webtrends
Published By: Riverbed     Published Date: Apr 27, 2011
This paper examines the trends towards server consolidation and virtualization, and how WAN optimization can help IT organizations address the challenges of application performance and information availability within these environments.
Tags : 
riverbed, virtualization, server consolidation, wan optimization, application performance, information availability, disaster recovery, infrastructure consolidation
    
Riverbed
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
The cyberattacks of 2017 proved more numerous, sophisticated, and ruthless than in years past. Threat actors, armed with knowledge stolen from the CIA and tools lifted from the NSA, demonstrated an elevated level of proficiency. WannaCry and NotPetya, two prominent threats from last year, successfully exploited these stolen assets in their assault on systems worldwide. As 2017 progressed, new opportunities developed in ransomware-as-a-service (RaaS), opening the gates of malware-for-profit to everyone. Advancements in fileless attacks provided new ways for threats to hide from once reliable detection methods. Malware features such as polymorphism continued to play a powerful role in evading traditional defenses. The victims of cybercrime ranged from private businesses to the fundamental practices of democracy. France and the United States saw significant data breaches during their recent presidential elections. Several high-profile companies lost their customers’ personally identifiable information to cyberattacks, blemishing their brands and costing them untold millions in recovery operations. This report contains an overview of the threat trends and malware families Cylance's customers faced in 2017. This information is shared with the goal of assisting security practitioners, researchers, and individuals in our collective battle against emerging and evolving cyberthreats.
Tags : 
cyber attacks, cia, nsa, wannacry, notpetya
    
BlackBerry Cylance
Published By: Webroot Inc     Published Date: Aug 27, 2015
In the past year, Webroot encountered tens of millions of instances of malware and potentially unwanted applications (PUAs), monitored billions of IP addresses and URLs, analyzed millions of new and updated mobile apps for malicious behavior, and studied major malware trends based on data from millions of endpoints. This report contains insights, analysis, and information on how collective threat intelligence can protect organizations from sophisticated attacks.
Tags : 
malware, unwanted applications, malicious behavior, threat intelligence
    
Webroot Inc
Published By: IBM     Published Date: Jan 02, 2014
This study highlights the phases of the big data journey, the objectives and challenges of midsize organizations taking the journey, and the current state of the technology that they are using to drive results. It also offers a pragmatic course of action for midsize companies to take as they dive into this new era of computing.
Tags : 
ibm, analytics, global business service, big data, business value, it professionals, volume, velocity
    
IBM
Published By: IBM     Published Date: Sep 18, 2008
Retailers regularly adapt to customer trends by investing in new systems technology. But they may not be aware that a system's initial purchase price is only 20 to 45% of the total cost of ownership of their system, and there's more to understand about the true cost of your purchase. Find out more on investing in the information system for your unique business.
Tags : 
ibm, ibm mmdg, infrastructure, networking, tco, total cost of ownership
    
IBM
Published By: Motorola, Inc.     Published Date: Feb 20, 2009
The purpose of this research and market trends study was to better understand the Information Technology (IT) environment and business strategy concerning enterprise mobility systems and mobility applications.
Tags : 
motorola, mobility, enterprise mobility
    
Motorola, Inc.
Published By: Adobe     Published Date: Jun 06, 2013
The Forrester 2013 Mobile Trends for Marketers report breaks down the mobile trends for the year and gives marketers concrete ways to become more strategic with their mobile initiatives. Download the report for more information.
Tags : 
marketing trends, mobile marketing, online marketing, video marketing, content marketing, strategic marketing, adobe
    
Adobe
Published By: CDW     Published Date: Sep 17, 2014
You are being buried by data. Multimedia including videos, audio and photos. Unstructured data in presentations, documents and social media feeds. Even the voicemails and databases that used to be the primary residents of your storage system are growing beyond your ability to manage them effectively. How can you keep it all under control without buying an endless stream of disk and storage devices? Experts from EMC and other leading storage manufacturers discuss the very latest trends in storage solutions and how an effective application of storage strategy can help tame the information beast and keep performance and availability issues at bay. Attendees will learn: - What are the hidden drivers in storage growth - How businesses of all sizes can benefit from a tiered storage strategy - Why virtualization is penetrating every level of IT - What role SSD and flash will play in every storage environment - What to do now to improve storage utilization and save costs
Tags : 
storage, tiering, performance, availability, media, feeds, system, netgear
    
CDW
Published By: Symantec     Published Date: Jul 29, 2014
This paper analyses the emerging trends, malicious code activity, phishing and spam to help present essential information to help you secure your systems.
Tags : 
website security, website protection, website threats, symantec, norton
    
Symantec
Published By: Drillinginfo     Published Date: Nov 20, 2015
OFS companies in and around the Marcellus Play need fast, accurate rig intelligence from one comprehensive source to stay competitive. With Drillinginfo (DI) you’ll gain an edge in the Marcellus Play by using the best data and the broadest intelligence available. Tracking prospects can be a lucrative opportunity, but since rigs move on a daily basis it’s important to have updated information. Learn how DI can drive a company’s success by gathering up-to-the-minute rig intelligence from a single, comprehensive software solution. The Marcellus Shale is seeing an increase in drilling every day, and with Drillinginfo you’ll have the products and solutions to help gain an edge on everything from permitting and leasing information to rig locations and pricing trends. Is your oilfield service team working from the right playbook? Find out how to get the most accurate, timely drill-site and well event information while making the most out of each and every opportunity.
Tags : 
ofs companies, leads, data, analytical tools, oilfield, leasing information, mobile app, rig intelligence
    
Drillinginfo
Previous    1 2     Next   
Search      

Add Research

Get your company's research in the hands of targeted business professionals.