HIT Consultant Insightful coverage of healthcare innovation
 

use cases

Results 301 - 325 of 433Sort Results By: Published Date | Title | Company Name
Published By: Flexera     Published Date: Feb 19, 2019
As the technology landscape grows and evolves with new devices, new software, and new platforms, keeping tabs on an organization's IT assets is a moving target. How can you gain accurate visibility of software assets to drive strategic and financial decisions that impact finance and reduce security risk? A commissioned study conducted by Forrester Consulting on behalf of Flexera shows the potential return on investment for a Data Platform customer. Through their research, Forrester found that customers achieved a 302% ROI with their investment, with payback within months by benefiting from multiple use cases throughout the organization in the following areas: -Cost savings from reduction in licenses -Avoided increases in licenses from audit activities -Hardware maintenance savings -Improved productivity -Reduced effort for divestiture activities Get the full study to learn how your business can benefit from Flexera solutions.
Tags : 
    
Flexera
Published By: Avaya     Published Date: Jan 04, 2017
This white paper describes a sampling of popular use cases for video collaboration—expert anywhere, training, project management, remote eyes, and customer meetings—and the benefits of these applications.
Tags : 
avaya, video collaboration, communications solutions, unified communications, contact center, collaboration, midsize business solutions
    
Avaya
Published By: CrowdStrike     Published Date: Nov 28, 2018
Learn how cyber threat intelligence (CTI) helps you bolster defenses, hunt down adversaries, investigate incidents and make better security decisions. While once considered a “nice to have”, Cyber Threat Intelligence (CTI) is now widely considered an essential weapon against breaches. A recent study by Enterprise Strategy Group (ESG) found that 72 percent of organizations plan to increase CTI spending — further validation of its important role in your security strategy. Yet, because threat intelligence comes in many shapes and forms, it is often misunderstood. This white paper, “Threat Intelligence: Cybersecurity’s Best Kept Secret,” offers in-depth coverage of CTI, including the different categories of threat intelligence and use cases that demonstrate CTI’s effectiveness in thwarting today’s most dangerous and sophisticated attackers. You’ll also learn how the right CTI can empower better security and executive decisions, while dramatically improving your organization's security post
Tags : 
    
CrowdStrike
Published By: McAfee     Published Date: Mar 31, 2017
Data Protection is no longer just a problem that resides at the endpoint. This ebook takes you through the top use cases, ranging from visibility and control of sanctioned/unsanctioned cloud applications to demonstrating compliance across cloud environments.
Tags : 
data protection, cloud data protection, cloud applications, visibility of data, unauthorized sharing data, device proliferation, data protection strategy, cloud visibility
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
This paper reviews five use cases, ranging from accidental policy violations by an insider to malicious thefts by unknown applications or stolen credentials, and presents the measurable benefits of an integrated security solution and the capabilities of pervasive data protection.
Tags : 
unified data protection, data protection, pervasive data protection, optimized data lifecycle security, optimized data security
    
McAfee
Published By: Zebra Technologies     Published Date: Oct 01, 2018
Enterprise vendors providing indoor location services must offer multiple technologies to satisfy diverse use cases. I&O leaders should evaluate vendors based on their ability to meet end-user granularity requirements and address the usage scenarios across the entire targeted vertical market.
Tags : 
    
Zebra Technologies
Published By: Sigstr     Published Date: Oct 18, 2017
The average American worker sends more than 10,000 emails each year - for a company of 500, that's more than 5 million emails sent from your domain. That's 5 million brand impressions and clickable calls-to-action you could be missing out on. Employee email signatures are a massive marketing channel you've been missing out on. Here are 28 creative email signature examples used by some of the world's leading brands.
Tags : 
    
Sigstr
Published By: AI Business     Published Date: Mar 11, 2019
LOOK TO RELEVANT USE CASES FOR YOUR BUSINESS. While use cases vary across industries, the most common ones fall into these categories and are usually associated with the listed neural network: • Image classification or object detection: convolutional neural network (CNN) • Time-series predictions: long short-term memory (LSTM) • Natural language processing: recurrent neural network (RNN) • Unlabeled data classification and data labeling: autoencoder (AE) • Anomaly detection: autoencoder (AE) • Recommender systems: multilayer perceptron (MLP) Work with your deep learning talent or consultants to identify which use cases best match your organization and desired solutions. Then recreate a successful, already proven method.
Tags : 
    
AI Business
Published By: 3M     Published Date: Aug 30, 2019
The prevalent use of paints and coatings across many industries and organizations presents a variety of workplace hazards. In many cases, selection and use of appropriate personal protective equipment (PPE) is necessary to help control exposures. Respiratory and skin contact hazards are common across most applications. Depending on the type of paint or coating and the specific use conditions, other hazards may be present. These can include fire and explosion hazards, electric shock, fall hazards, excessive noise and other. Prior to selecting PPE for any painting operation, a hazard assessment completed by a qualified health and safety professional is necessary to evaluate exposure risks potentially present.
Tags : 
    
3M
Published By: Qualys     Published Date: Nov 05, 2013
Continuous Monitoring has become an overused and overhyped term in security circles, driven by US Government mandate (now called Continuous Diagnostics and Mitigation). But that doesn’t change the fact that monitoring needs to be a cornerstone of your security program, within the context of a risk-based paradigm. This paper from Securosis discusses Continuous Security Monitoring, including how to do it, and the most applicable use cases they have seen in the real world. It also provides a step-by-step guide for things to do for each use case to move forward with a monitoring initiative.
Tags : 
qualys, securosis, secuirty monitoring, continuous monitoring, continuous security monitoring, cms< security, security programs, risk management
    
Qualys
Published By: Sitecore     Published Date: Feb 24, 2017
Gartner’s Critical Capabilities report helps you understand the evolving role of WCM, five use cases to consider, and how 19 WCM vendors score on each of the use case criteria.
Tags : 
gartner critical capabilities, wcm, web content management, digital business strategy, digital roadmap
    
Sitecore
Published By: Druva     Published Date: Jan 06, 2016
Compiled from real life use cases, Blue Hill Research examined how organizations are gaining greater value from their archive of user data, converging data availability, archiving and governance to meet their wider data management needs.
Tags : 
druva, blue hill, enterprise, archive, data, user data
    
Druva
Published By: Ensighten     Published Date: Aug 01, 2013
Advanced Use Cases
Tags : 
ensighten, marketing, roi, digital ecosystem, sony electronics, case study
    
Ensighten
Published By: IBM     Published Date: Dec 17, 2012
Combines industry-leading IBM System z server with Tivoli software and IBM services to create a service automation and management framework used for cloud computing workloads and use cases within the enterprise.
Tags : 
system z, ibm, cloud computing, service automation, management framework, framework
    
IBM
Published By: Quinstreet - Infosec     Published Date: Jun 11, 2012
There are wide variations in the level of SIEM technology support for specific use cases, so understanding them is a prerequisite for selecting the best product in a given situation
Tags : 
    
Quinstreet - Infosec
Published By: ClearSlide, Inc     Published Date: Feb 25, 2015
Organizations treat customer data as a key component of CRM. Many organizations see an effective customer data management strategy as an important cornerstone of their CRM strategy. Most organizations are moving beyond tactical CRM initiatives focused on saving cost and driving efficiency to making their organization more effective and focused on driving better customer engagement and experience. Customer data is used to enhance customer experiences, improve service quality, target marketing efforts, capture customer sentiment, increase upsell opportunities and trigger product and service innovation.
Tags : 
crm, big data, customer engagement, customer service
    
ClearSlide, Inc
Published By: E-SignLive by Silanis     Published Date: Oct 23, 2013
What is the best or ideal type of electronic signature? There is no one-size-fits-all answer. It all depends on the process being automated. In this 7-page article, we start out by defining the steps in a typical e-signature process and identify what options there are for each step. Download your complimentary copy now.
Tags : 
    
E-SignLive by Silanis
Published By: Actiance, Inc.     Published Date: Nov 13, 2014
The overall archiving market was $1.76 billion in 2013 and is expected to grow at an 11.4% compound annual growth rate (CAGR) through 2019. EIA is emerging as a commonly used technology underpinning for higher-level use cases supporting compliance, information governance, e-discovery and historical preservation of data. Read the report now and learn more!
Tags : 
actiance, gartner, magic quadrant, enterprise information archiving, cagr, eia, compliance, e-discovery
    
Actiance, Inc.
Published By: Rackspace     Published Date: Mar 08, 2016
Join our featured speakers, Rackspace and 10th Magnitude on a round table discussion on the concepts of cloud form factors leading to hybrid cloud, the advantages of using hybrid cloud technologies, and a look at how the Microsoft Azure platform enables efficient and effective hybrid cloud computing.
Tags : 
rackspace, azure, hybrid cloud, cloud, cases
    
Rackspace
Published By: Rackspace     Published Date: Aug 15, 2016
Choosing and building a Microsoft Private Cloud is just the first step. Once you have the Microsoft® Cloud Platform infrastructure up and running, then you have to figure out what you’re going to do with it and how you’re going to monitor and manage all of the resources. This white paper examines the technology stack. use cases and scenarios on how businesses can leverage the benefits of a Microsoft Private Cloud by using Rackspace to host and manage their Microsoft® Cloud Platform environment.
Tags : 
    
Rackspace
Published By: AWS     Published Date: Oct 09, 2019
Businesses are often challenged with the complexities of protecting their physical, virtual, and cloud workloads while also meeting their part of the Amazon Web Services (AWS) Shared Responsibility Model. IT security leaders are inundated with too many security tools that aren’t built for their specific environments. Additionally, these responsibilities often entail large amounts of manual processes and people to administer them. As such, there is a need for a solution that provides a secure environment for you to transact your business without slowing you down. Trend Micro™ Deep Security™ is optimized to support the broadest set of platforms and environments (on-premises, virtual, on AWS, or containers) while delivering multiple threat defense techniques to help DevOps teams rapidly detect security incidents, fulfill compliance requirements, and securely deploy containers. In this webinar, you’ll learn real customer use cases that have successfully leveraged Trend Micro Deep Securit
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 14, 2019
Containers have become the new infrastructure standard for development teams. While the “DIY container approach” (un-orchestrated containers) still has its use cases (e.g. low latency, longer compute jobs, predictable traffic), production-grade deployments require orchestration. DevOps teams are increasingly leveraging the benefits of Kubernetes and accelerating its adoption, taking it from a 27% adoption rate in 2018 to a 48% adoption rate in 2019 according to the RightScale “2019 State of the Cloud Report,” from Flexera. The same report also positions Amazon Elastic Kubernetes Service (Amazon EKS) as one of the fastest-growing managed Kubernetes offerings available, with a 44% adoption rate. Previously, containers were a technology deployed by individual teams – and were typically used for “application testing” in the enterprise world. Today, many organizations are now not only seeing the benefits of operationalizing containers to deploy production applications, but also re-positioni
Tags : 
    
AWS
Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.