HIT Consultant Insightful coverage of healthcare innovation
 

use cases

Results 251 - 275 of 433Sort Results By: Published Date | Title | Company Name
Published By: Dell Software     Published Date: Feb 20, 2014
Short: Evaluate seven cloud integration platforms from leading vendors for the value they offer organizations in cloud-to-cloud, cloud-to-on-premise and on-premise-to-on-premise application integration use cases.
Tags : 
integration, platforms, application integration, cloud, cloud to cloud
    
Dell Software
Published By: VMware SD-WAN by VeloCloud     Published Date: May 20, 2019
With over 40 vendors in the hot SD-WAN market, it can be difficult for customers to determine which one they should choose. In this report, Futuriom aggregates its extensive interviews with customers and service providers and details the top drivers for SD-WAN today, use cases and features, architectures and strategies, key differentiators, and then details the top vendors in the market and their respective strengths. Read the report
Tags : 
    
VMware SD-WAN by VeloCloud
Published By: Dell EMC     Published Date: Mar 18, 2016
EMC has recently enhanced its VNX block-based deduplication technology enabling flexible data reduction across a wide variety of use cases from virtual desktops to virtual servers and databases. While block-based deduplication is not new for VNX, this latest enhancement, according to EMC, offers up to a 3x better performance at half the response time.
Tags : 
emc, vnx, hybrid flash, deduplication, block-based, data reduction
    
Dell EMC
Published By: AWS     Published Date: Sep 18, 2017
This eBook will introduce you to the compliance capabilities that can be achieved by using AWS services and its featured partners in healthcare and life sciences. In this eBook, you can learn how to build cloud-based healthcare solutions for HIPAA and other frameworks, as well as how to regulate workloads on the cloud for life sciences organizations. Download this eBook to learn more and to read actual customer use cases illustrating how healthcare and life sciences organizations can leverage AWS to help them with their compliance requirements.
Tags : 
    
AWS
Published By: AWS     Published Date: Aug 06, 2019
Old-guard database providers are expensive, proprietary, have high lock-in costs, and impose restrictive licensing terms. The challenge to date has been to achieve the same performance and availability of commercial-grade databases on open source databases such as MySQL, PostgreSQL, and MariaDB. Examine key considerations that go into any database migration decision and specific use cases—in Financial Services and Healthcare Analytics implementations—where Datavail carefully managed database migrations from traditional database providers to the cloud—and in particular Amazon Aurora. Download the eBook to learn about: Migration considerations and strategies including lift and shift, re-platforming, and re-factoring Security and compliance functionality enabled by Amazon Aurora Performance and scalability opportunities enabled by AWS
Tags : 
    
AWS
Published By: Genesys     Published Date: Apr 07, 2017
Contact center infrastructure (CCI) evaluation is a technically complex process. This challenge is further complicated by the different requirements for omnichannel, high availability and integration as part of a customer engagement center (CEC). Get this report now to learn: - 9 critical capabilities for evaluating contact center infrastructure - 3 use cases that reflect most decisions organizations need to make when looking at CCI – multichannel compact suite, high volume call center and customer engagement center - Which vendor scores the highest in 3 use cases across 9 capabilities
Tags : 
genesys, contact center infrastructure, cci, contact center engagement, cec
    
Genesys
Published By: LogRhythm     Published Date: Aug 08, 2016
Security information and event management technologies vary widely in their focus and functionalities, with vendors offering divergent security monitoring visions. This research helps IT security managers align their needs with one of the three most common use cases to choose the best SIEM solution.
Tags : 
security, technology, best practices, information technology
    
LogRhythm
Published By: LogRhythm     Published Date: Jun 19, 2018
SIEM deployments may stall or fail if not implemented with the right scope, use cases, data sources, architecture, expertise or staff size. Security and risk management leaders deploying a SIEM solution should follow this structured approach to ensure a successful implementation.
Tags : 
siem, gartner, risk, management, implementation
    
LogRhythm
Published By: 8x8 Inc.     Published Date: Jun 16, 2017
In today’s highly competitive business environment, top companies will be the ones that have developed innovative ways to create stellar communications experiences that keep the end users engaged—employees and customers alike. Video and Web conferencing have become well-established tools to drive rich internal as well as external communications. However, to make an impact, these collaboration tools must be reliable and intuitive to use. Continuous communication offers hassle-free integrated user experiences that fit today’s mobile work styles. Technology advancements and changing perceptions are opening up innovative opportunities, which offer businesses new avenues to create a competitive edge. Smart companies must catch on or get left behind.
Tags : 
market shaping trends, consumerization, user-driven it, web conferencing, solution spotlight, 8x8 virtual office meetings, use cases, customer examples
    
8x8 Inc.
Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: Datastax     Published Date: Apr 04, 2017
Graph databases are changing how we use data. But first, an example – you're (probably) a human working on a project and looking at graph databases as a potential solution. While we're a company that has a graph database that hopefully solves your problem. Now we could store that data in a boring relational database, but how do we do more than that? For instance, using that data, when combined with other data points, to find other people like you and recommend our solution to them? This is where a graph can come in handy. The friendly graph data model makes it easy to use patterns of relationships within large data sets. By leveraging those relationships we can analyze, or create better real-time experiences. Why Graph explores why this graph database 'thing' is really a thing, how they compare to other database systems, and the use cases they best support.
Tags : 
graph, database, datastax
    
Datastax
Published By: Datastax     Published Date: Aug 07, 2018
Learn the uses cases for graph databases and how graph databases work.
Tags : 
    
Datastax
Published By: Mitto     Published Date: Jun 09, 2017
A2P (Application to Person) messaging has underpinned this transformation, across a wealth of new use cases and new verticals. Historically, A2P was used for alerts and, as PSMS (Premium SMS), as a billing mechanism and carrier for simple content and services, both for one-off downloads or actions (eg voting) and for recurring payments. The latter use case has declined markedly in the past 5 years, due largely to the transition to an app-based economy, largely driven by card billing and by regulatory action (in markets such as the US and UK) against fraudsters.
Tags : 
    
Mitto
Published By: MemSQL     Published Date: Nov 15, 2017
The Path to Predictive Analytics and Machine Learning This Ebook will be your guide to building and deploying scalable, production-ready machine-learning applications. Inside, you will find several machine learning use cases, code samples to help you get started, and recommended data processing architectures.
Tags : 
data pipelines, analytics, database, machine learning
    
MemSQL
Published By: MemSQL     Published Date: Nov 15, 2017
Data Warehousing in the Age of Artificial Intelligence This Ebook will guide you through building and deploying scalable, production-ready artificial-intelligence applications. Inside, you will find several artificial intelligence use cases, code samples to help you get started, and an outline of high throughput data processing architectures necessary for developing AI applications.
Tags : 
data warehousing, artificial intelligence, data piplelines
    
MemSQL
Published By: Menlo Security     Published Date: Nov 12, 2019
"Protecting organizations from Web threats has typically been done with a proxy or DNS solution but a new approach has emerged. Isolation defends against today’s sophisticated zero-day exploits using an “air-gapped” browsing approach. Identified by Gartner as ""one of the single most significant ways to reduce web-based attacks,"" remote browser isolation has become an important line item in IT budgets around the world. But not all Isolation is created equal. With so many offerings how do you weed through the noise? Learn: - Why remote browser isolation technology adoption is on the rise - Key use cases for Isolation that should be evaluated - 3 critical requirements when selecting a practical browser isolation solution"
Tags : 
    
Menlo Security
Published By: Cisco     Published Date: Apr 08, 2014
Cisco Validated Designs (CVDs) provide the foundation for systems design based on common use cases or current engineering system priorities. They incorporate a broad set of technologies, features, and applications to address customer needs. Cisco engineers have comprehensively tested and documented each CVD in order to ensure faster, more reliable, and fully predictable deployment.
Tags : 
cisco, cvds, vpn wan
    
Cisco
Published By: Cisco     Published Date: Jan 12, 2016
Network readiness is an important factor in any new IT project at companies both large and small. New applications seem to require more bandwidth than the applications that they replace. These applications can also bring in new users, sometimes by the thousands. In some cases, the network services and/or capacity are not ready for these changes, and the IT rollout suffers. This guide covers the following topics: bandwidth, wireless, firewalls, content filtering, proxy servers, and others.
Tags : 
cisco, byod, connectivity, education, networking environment, digital revolution, higher education
    
Cisco
Published By: Extreme Networks     Published Date: Sep 17, 2014
In this eBook, we will demonstrate specific use cases for how a business intelligence solution can be used effectively by IT operations.
Tags : 
extreme networks, purview, application analytics, wifi/wireless, network solutions, business intelligence solutions, business intelligence, it operations, it management, data mining, networking, network technology, network optimization, business analytics, application, application security
    
Extreme Networks
Published By: McAfee EMEA     Published Date: Nov 15, 2017
The foregoing use cases—all with varying levels of complexity—are an overview of the creative development opportunities afforded by OpenDXL. We hope these have inspired you to start your own OpenDXL project. Bookmark and explore these pages for core resources.
Tags : 
opendxl, integrate, orchestrate, expedite, security, operations
    
McAfee EMEA
Published By: MuleSoft     Published Date: Nov 27, 2018
Across industries, more and more companies are moving to the cloud. According to one study, approximately 93% of businesses are using cloud technologies in order to increase operational efficiency, reduce costs, and improve agility. Today, integration is a strategic component of every digital transformation and initiative that involves moving to the cloud. Read this whitepaper to: The top integration use cases for moving to the cloud––from integrating SaaS applications with on-premise data to migrating existing data to the cloud. Why traditional approaches to the above use cases do not suffice, and the role APIs can play in the process. The success stories of HSBC and the Federal Communications Commission (FCC), and how they used APIs in their “move to the cloud” initiatives.
Tags : 
    
MuleSoft
Published By: Okta     Published Date: Feb 24, 2015
Gartner recently released the Magic Quadrant for Identity and Access Management as a Service (IDaaS) and has named Okta a leader in the space. This Magic Quadrant evaluates vendors on their abilities to be global, general purpose identity and access management (IAM) service providers for multiple use cases.
Tags : 
identity and access management, idaas, service providers, multiple use, vendor evaluation
    
Okta
Published By: Brandwatch     Published Date: Jul 18, 2013
Brandwatch analyzed five retail brands to demonstrate the many ways a business can benefit from social media beyond just marketing: Kmart, Target, H&M & Zappos analyzed; Six different use-cases illustrated; Multiple markets and languages covered.
Tags : 
social media, retail, pr risk mitigation
    
Brandwatch
Published By: Polycom     Published Date: Mar 27, 2017
Engineering firms are under increasing pressure to deliver on billable ratios, while the IT teams that support them are asked to minimize their administrative burden on the firm. What if a lead engineer could visit a job site without leaving the office? What if you could meet face-to-face with clients, partners, or subcontractors more frequently while budgeting less for travel costs? Watch this video to learn how collaboration technology allows you to be more agile, efficient, and effective. In under 30 minutes, we'll explain: • Common use cases for video collaboration - going way beyond team meetings to the tasks at the heart of engineering • Collaboration solution innovations - if you think an expensive, wall-mounted, on-premises solution is your only option, you may be surprised by what's available • Success stories - hear how a leading engineering firm is putting these solutions to use and the impact it has on their business
Tags : 
engineer, engineering, collaboration, billable, video, communication, content-sharing, client, contractor, consulting, consultant, technology, polycom, microsoft, skype, lync, project
    
Polycom
Published By: VMware SD-WAN by VeloCloud     Published Date: Feb 19, 2019
The Wide Area Network (WAN) is in the midst of a significant evolution. Software-defined WAN (SD-WAN) is the key factor driving this evolution and bringing along with it many transformational changes. SD-WAN has enabled several new WAN uses cases, such as enabling reliable, secure and high performance support of software-as-a-service (SaaS), cloud compute, cloud storage, cloud security and the ability to use non-deterministic Internet services to provide business-class transport. The traditional WAN architecture was ill equipped to support these new use cases. As is usually the case with an emerging market, the first entrants into the SD-WAN space were start-ups. However, given the ability of SD-WAN to support both traditional and emerging WAN use cases, the market has recently been flooded with a range of vendors, solutions and technologies offering varying types of SD-WAN solutions. While having differing types of solutions provided by numerous suppliers is potentially beneficial, it
Tags : 
sd-wan, wan, cloud security
    
VMware SD-WAN by VeloCloud
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.