HIT Consultant Insightful coverage of healthcare innovation
 

use cases

Results 51 - 75 of 433Sort Results By: Published Date | Title | Company Name
Published By: Dell EMC     Published Date: Oct 08, 2015
This paper discusses how the many Dell | Cloudera Hadoop solutions help organizations of all sizes, and with a variety of needs and use cases, tackle their big data requirements.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: Oct 12, 2015
This business-oriented white paper explains four options for starting your Hadoop journey. This paper also outlines the benefits of Hadoop and highlights some of the many use cases for this new approach to managing, storing and processing big data.
Tags : 
    
Dell EMC
Published By: Zebra     Published Date: Oct 12, 2011
This white paper outlines the requirements for kiosks - optimizing design, placement and component selection - in order to help you and your business meet specific use cases, various environments and goals.
Tags : 
zebra industry solutions, barcode industry solutions, barcode business solutions, bar code industry solutions, bar code business solutions, rfid industry solutions, rfid business solutions, rfid industry solutions, rfid business solutions
    
Zebra
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"Existing security controls are outmatched — at best static and reactive. Current layers likely aren’t protecting you against all attack vectors, like the vulnerable back door that is recursive DNS. And security mechanisms that frustrate, impede, or disallow legitimate users, devices, or applications will have low adoption rates and/or will curtail productivity. Benign users may even circumvent these processes, further undermining your corporate security posture and creating more gaps in your defense-in- depth strategy. One of the many use cases associated with a zero trust security strategy is protecting your network — and most importantly, your data — from malware. "
Tags : 
dns, rdns, security, zero trust security, malware, data, network security
    
Akamai Technologies
Published By: TIBCO Software GmbH     Published Date: Jan 15, 2019
Enterprises use data virtualization software such as TIBCO® Data Virtualization to reduce data bottlenecks so more insights can be delivered for better business outcomes. For developers, data virtualization allows applications to access and use data without needing to know its technical details, such as how it is formatted or where it is physically located. For developers, data virtualization helps rapidly create reusable data services that access and transform data and deliver data analytics with even heavylifting reads completed quickly, securely, and with high performance. These data services can then be coalesced into a common data layer that can support a wide range of analytic and applications use cases. Data engineers and analytics development teams are big data virtualization users, with Gartner predicting over 50% of these teams adopting the technology by 202
Tags : 
    
TIBCO Software GmbH
Published By: Sitecore     Published Date: Mar 04, 2016
Start your WCM selection process by documenting your goals and desired outcomes to refine your definition of success. Then prioritize use cases according to your goals, and use this report to identify the WCM system that best matches your needs. Register today!
Tags : 
    
Sitecore
Published By: Dell     Published Date: Dec 12, 2017
Selecting the best computing solutions within K-12 education can be a challenge with so many uses and options available. This use case guide takes into consideration the specific needs within K-12 education environments. Whether seeking the best fit devices for STEM labs, looking to create interactive learning spaces, or fulfilling the design needs of today’s interactive classrooms, the uses are varied and there is not a one size fits all approach. Download this guide to learn how the computing choices made can facilitate the teaching and learning environments via the Dell™ OptiPlex™ family of devices. Learn which solutions are recommended for different use cases within the K-12 education world.
Tags : 
    
Dell
Published By: Dell EMC     Published Date: Feb 23, 2017
Desktop and application virtualization have steadily gained ground to address a broad range of use cases across organizations of all sizes. According to ESG research, over the past few years, desktop virtualization has consistently risen to be included among the five most commonly-identified IT priorities, alongside such perennial corporate objectives as fortifying cybersecurity and managing data growth.
Tags : 
    
Dell EMC
Published By: Oracle EMEA     Published Date: Apr 15, 2019
Oracle Autonomous Data Warehouse Cloud is more than just a new way to store and analyze data; it’s a whole new approach to getting more value from your data. Market leaders in every industry depend on analytics to reach new customers, streamline business processes, and gain a competitive edge. Data warehouses remain at the heart of these business intelligence (BI) initiatives, but traditional data-warehouse projects are complex undertakings that take months or even years to deliver results. Relying on a cloud provider accelerates the process of provisioning data-warehouse infrastructure, but in most cases database administrators (DBAs) still have to install and manage the database platform, then work with the line-of-business leaders to build the data model and analytics. Once the warehouse is deployed—either on premises or in the cloud—they face an endless cycle of tuning, securing, scaling, and maintaining these analytic assets. Oracle has a better way. Download this whitepaper to f
Tags : 
    
Oracle EMEA
Published By: Brocade     Published Date: Jun 12, 2015
This paper provides an overview of Software-Defined Networking (SDN), expected use cases, and Brocade contributions to SDN innovation.
Tags : 
software-defined networking, sdn, network, network flexibility, apis, application programming interfaces, sdn innovation
    
Brocade
Published By: Pega     Published Date: Jun 21, 2016
Case management frameworks built on business process management platforms help IT solutions architects deploy case-handling applications and offer an alternative to specialized case management applications and custom coding. According to Gartner, the complex architecture required to support case management has relegated it to the status of a niche application, typically addressed by specialist, commercial off-the-shelf application providers and system integrators. Case management as a process style is being applied in many sectors beyond government, legal and insurance, including healthcare, banking, higher education and retail. Industry and cross-industry case management frameworks are now available. "Adaptive case management" hype exceeds the reality of what buyers need. Gartner evaluated 12 vendors including Pegasystems against nine critical capabilities in four use cases.
Tags : 
    
Pega
Published By: Entrust Datacard     Published Date: Apr 26, 2017
Document signing certificates enable organizations to digitally sign Adobe®, Microsoft Office® and other document types, marking them with visual trust indicators that verify the publisher’s identity—an indication that the document has not been altered. With document signing certificates organizations can authenticate documents, allowing for secure and efficient electronic transmission of official papers including legal documents, invoices, engineering plans and diagrams, diplomas, charters and more while reducing costs associated with printing and maintaining paper files. This white paper will discuss: The history of document signing What digital signatures are and how they function The benefits and objectives of implementing document signing certificates Real world use cases of document signing certificates
Tags : 
    
Entrust Datacard
Published By: CA Technologies     Published Date: Apr 06, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders.1 There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : 
cyber security, cyber attack, it security, threat analytics, risk mitigation, data security
    
CA Technologies
Published By: ForeScout     Published Date: Mar 26, 2014
The report presents a tiered service approach to enterprise mobile security while exploring how NAC and MDM as complementary controls can offer necessary network and device level defenses to enable IT organizations to realize mobility advantages and reduce security and compliance exposures. The report also examines ForeScout's mobile security offering and presents relevant use cases.
Tags : 
forescout, cyberedge, cyberthreat, it security, byod, nac, mdm, reduce security, compliance exposures, mobile security
    
ForeScout
Published By: Oracle Commerce Cloud     Published Date: Sep 06, 2017
Business models are less durable than they used to be… [they] are subject to rapid displacement, disruption, and, in extreme cases, outright destruction. The basic rules of creating and capturing economic value were once very rigid. Companies tried to execute the same business models better than their competitors did. That doesn’t have to be the case anymore. Unlike product and service innovations, business-model innovations travel well from industry to industry
Tags : 
    
Oracle Commerce Cloud
Published By: SolidFire_NetApp     Published Date: May 10, 2016
Quality of service (QoS) is a critical enabling technology for enterprises and service providers wanting to deliver consistent primary storage performance to business-critical applications in a multi-tenant or enterprise infrastructure. The type of applications that require primary storage services typically demand greater levels of performance than what is readily available from traditional storage infrastructures today. However, simply providing raw performance is often not the only objective in these use cases. For a broad range of business-critical applications, consistent and predictable performance are the more important metrics. Unfortunately, neither is easily achievable within traditional storage arrays.
Tags : 
storage management, performance management, best practices, application integration, technology, business intelligence
    
SolidFire_NetApp
Published By: Puppet     Published Date: Aug 03, 2016
After you set up your users and groups, the next thing you’ll want to do is configure the software running on your machines. In this webinar, you’ll get a taste of the many kinds of services and packages Puppet can manage on Windows. We’ll present some common use cases that will help you get some quick wins under your belt, including: - Managing Windows services (Windows Time, Disk Defragmenter, etc.) - Installing packages - Managing Windows maintenance tasks via WMI by executing arbitrary PowerShell code - Creating scheduled tasks in the Task Manager Puppet can do a lot, but we always recommend starting small and building on your success. Make 2016 the year you banish manual configuration for good!
Tags : 
    
Puppet
Published By: Schneider Electric     Published Date: Oct 31, 2017
In some cases, adopting cloud IoT platform may make more sense where required processes, communication costs and cloud costs meet sufficient total cost of ownership against deploying MDC. Additionally, in situations that an end-user organization already has a secure room or a modular data center solution where infrastructure can be housed and/or the amount of infrastructure involved may be too small to benefit from power/cooling advantages of being housed in an MDC, the organization may not see a need for an MDC. An MDC is nothing more than a smaller form of a modular data center, and a number of providers have entered the modular data center solutions space in the past. These modular data center solution providers came into the market with high expectations for growth and ROI only to find that high sales were not forthcoming due to limited use cases, so many exited the space.
Tags : 
algorithm analysis, buyer trend, iot, workloads, market, vendors, data centers
    
Schneider Electric
Published By: HPE APAC     Published Date: Feb 23, 2017
Read this extract and the full reports to find out people's perceptions regarding hyperconverged infrastructure and includes overall IT challenges, sentiment around the technology and an in-depth look at key uses cases that are supported by the technology.
Tags : 
hyperconverged infrastructure, data center, storage, it challenges
    
HPE APAC
Published By: Sitecore     Published Date: Mar 27, 2017
Gartner’s Critical Capabilities report helps you understand the evolving role of WCM, five use cases to consider, and how 19 WCM vendors score on each of the use case criteria.
Tags : 
    
Sitecore
Published By: CA Technologies     Published Date: Sep 25, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders. There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : 
threat analytic systems, siems, firewalls, entity optimization, fraud prevention, ca technologies
    
CA Technologies
Published By: Red Hat     Published Date: Feb 22, 2019
4 advanced troubleshooting tasks for Linux experts and beginners As organizations look to modern operating platforms to support their business transformation initiatives, they seek to free up more time from daily troubleshooting tasks. In this webinar, we’ll walk you through four advanced troubleshooting uses cases that will simplify management for both the Linux expert and the beginners. The Red Hat Enterprise Linux cockpit administrator console is an easy-to-use web interface for ongoing management of storage, networking, containers, services, and more. In this session you will learn how to: Investigate an unresponsive VM Set up a Web Server Troubleshoot SELinux with Containers Perform a general health check
Tags : 
    
Red Hat
Published By: Red Hat     Published Date: Feb 22, 2019
4 advanced troubleshooting tasks for Linux experts and beginners As organizations look to modern operating platforms to support their business transformation initiatives, they seek to free up more time from daily troubleshooting tasks. In this webinar, we’ll walk you through four advanced troubleshooting uses cases that will simplify management for both the Linux expert and the beginners. The Red Hat Enterprise Linux cockpit administrator console is an easy-to-use web interface for ongoing management of storage, networking, containers, services, and more. In this session you will learn how to: Investigate an unresponsive VM Set up a Web Server Troubleshoot SELinux with Containers Perform a general health check
Tags : 
    
Red Hat
Published By: Red Hat     Published Date: Feb 25, 2019
4 advanced troubleshooting tasks for Linux experts and beginners As organizations look to modern operating platforms to support their business transformation initiatives, they seek to free up more time from daily troubleshooting tasks. In this webinar, we’ll walk you through four advanced troubleshooting uses cases that will simplify management for both the Linux expert and the beginners. The Red Hat Enterprise Linux cockpit administrator console is an easy-to-use web interface for ongoing management of storage, networking, containers, services, and more. In this session you will learn how to: Investigate an unresponsive VM Set up a Web Server Troubleshoot SELinux with Containers Perform a general health check
Tags : 
    
Red Hat
Published By: Red Hat     Published Date: Feb 25, 2019
As organizations look to modern operating platforms to support their business transformation initiatives, they seek to free up more time from daily troubleshooting tasks. In this webinar, we’ll walk you through four advanced troubleshooting uses cases that will simplify management for both the Linux expert and the beginners. The Red Hat Enterprise Linux cockpit administrator console is an easy-to-use web interface for ongoing management of storage, networking, containers, services, and more. In this session you will learn how to: Investigate an unresponsive VM Set up a Web Server Troubleshoot SELinux with Containers Perform a general health check
Tags : 
    
Red Hat
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.