HIT Consultant Insightful coverage of healthcare innovation
 

virtual world

Results 51 - 75 of 102Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Apr 22, 2008
This IBM white paper discusses how virtualization tools can help you build an infrastructure that is simpler, more cost efficient and more flexible. It covers the basics of virtualization – how it works, how the technologies relate to each other and how they are commonly implemented, including real-world examples.
Tags : 
virtual, virtualization, spend management, it spending, infrastructure, ibm, ibm opt it, opt it
    
IBM
Published By: IBM     Published Date: Oct 13, 2009
To be more competitive, small and medium suppliers are increasingly using Computer Aid Engineering (CAE) solutions. Download this white paper to see how IBM Cluster Solutions, powered by Intel Xeon 5500 Series maximizes the total cost of ownership for CAE environments and extend innovation in virtual products for manufactures and suppliers alike.
Tags : 
ibm cluster solutions, intel, computer aid engineering, cae, xeon processor 5500, computer aided design, cad, independent software vendors, isvs, idataplex
    
IBM
Published By: SEPATON     Published Date: Jun 23, 2008
This report is a must-read for companies struggling to back up their newly virtualized server environments.  Read this brief to get real-world case studies on how Sterling Testing and Kindred Healthcare have overcome the challenges of protecting VMware environments by implementing high performance virtual tape libraries (VTLs).
Tags : 
backup, recovery, storage, vtl, virtual tape library, virtual storage, storage virtualization, sepaton
    
SEPATON
Published By: NetIQ     Published Date: Jan 12, 2011
Addressing the potential for insider threats is an often overlooked security imperative for virtually all organizations worldwide.
Tags : 
netiq, insider threat, security, audits, access control, enterprise software
    
NetIQ
Published By: SafeNet     Published Date: Jan 14, 2014
Today’s data resides in a virtualized world, but the risks are all too real, and, in many organizations, too frequently realized. This paper examines the fundamental security implications of cloud services and virtualization, and it details an approach organizations can take to safeguard sensitive assets in a way that is aligned with today’s dynamic environments.
Tags : 
virtualization, cloud services, security, encryption, safenet
    
SafeNet
Published By: Polycom     Published Date: Apr 30, 2013
Video conferencing is an increasingly important technology to improve employee and partner collaboration, especially for increasingly virtual organizations supporting rising numbers of mobile and home workers. But many companies still struggle to justify their investments in video conferencing, and not to understand potential cost differences among competing solutions - not just hardware and software expenses, but also investments required for bandwidth and operational support. Comparing various video conferencing solutions requires examining deployment models, licensing arrangements, network, hardware, and operational costs for leading video conferencing solution vendors in a variety of scenarios, using real-world data gathered from actual buyers of video conferencing products and services. The result: Significant differences in costs across all areas, especially for varying deployment models.
Tags : 
total cost, video, video conferencing, collaboration
    
Polycom
Published By: VMware     Published Date: Dec 18, 2012
Check out this infographic that explores SMB IT trends in virtualization and cloud computing to better understand the real-world advantage available to your growing business.
Tags : 
virtualization, cloud, server, cost, savings, infographic
    
VMware
Published By: Oneupweb     Published Date: Jun 24, 2008
Uncover the social marketing secrets of the hottest holiday products with Oneupweb's white paper, Secrets of Social Marketing Success: How 2007 Hot Holiday Products are Being Marketed Online.
Tags : 
oneupweb, social media marketing, social marketing, online advertising, online marketing, search engine optimization, seo, search engine marketing, sem, paid search engine marketing, ppc, social media tactics, blogs, podcasts, video, consumer-generated content, social networks, virtual worlds, social media, video podcasting
    
Oneupweb
Published By: Oneupweb     Published Date: Jun 24, 2008
Learn from the mistakes and successes of others in part 2 of Oneupweb's landmark social media marketing study, Social Media Marketing Hits and Misses: How 2007 Hot Holiday Brands and Products Performed Online.
Tags : 
oneupweb, social media marketing, social marketing, online advertising, online marketing, search engine optimization, seo, search engine marketing, sem, paid search engine marketing, ppc, social media tactics, blogs, podcasts, video, consumer-generated content, social networks, virtual worlds, social media, video podcasting
    
Oneupweb
Published By: NetApp     Published Date: Jan 01, 2010
This report examines the impact that virtualization has on data protection and disaster recovery and the need for highly virtualized servers and storage within this context.
Tags : 
netapp, data protection, virtualization deployments, disaster recovery, networked storage, backup
    
NetApp
Published By: SAP     Published Date: Mar 24, 2011
In spite of the growth of virtual business activities performed via the World Wide Web, every business transaction or operation is performed at a physical place. And as handheld GPS devices drive a growing awareness of the concept of "location," people are increasingly looking for operational efficiencies, revenue growth, or more effective management as a result of geographic data services and location-based intelligence. In this white paper, David Loshin, president of Knowledge Integrity, Inc., introduces geographic data services (such as geocoding and proximity matching) and discusses how they are employed in both operational and analytical business applications. The paper also reviews analytical techniques applied across many types of organizations and examines a number of industry-specific usage scenarios.
Tags : 
location-based bi, business value, geographic enhancement
    
SAP
Published By: IBM     Published Date: Apr 09, 2015
The malware industry supplies all the components cybercriminals need to easily perpetrate malware-driven financial fraud and data theft. In today’s virtual world, the scope of organizations vulnerable to malware-driven cybercrime is quite broad. In addition to banks and credit unions that are subject to online banking fraud, financial fraud can be perpetrated on insurance companies, payment services, large e-commerce companies, airlines and many others.
Tags : 
ibm, computer security, network security, malware protection, network security, security organization
    
IBM
Published By: IBM     Published Date: Jul 15, 2016
"The malware industry supplies all the components cybercriminals need to easily perpetrate malware-driven financial fraud and data theft. In today’s virtual world, the scope of organizations vulnerable to malware-driven cyber crime is quite broad. In addition to banks and credit unions that are subject to online banking fraud, financial fraud can be perpetrated on insurance companies, payment services, large e-commerce companies, airlines and many others. "
Tags : 
cybercrime, financial fraud, best practices, finance, banking fraud, e-commerce
    
IBM
Published By: IBM     Published Date: Jan 07, 2016
In today’s virtual world, the scope of organizations vulnerable to malware-driven cybercrime is quite broad.
Tags : 
ibm, malware, industry, cybercrime, fraud
    
IBM
Published By: PDF Tools     Published Date: Aug 21, 2009
PDF files are prevalent in virtually all market segments worldwide. Most people know and use the term "PDF" but have misconceptions what it can and can't do. The purpose of this White Paper is to explain what PDF actually is and what it's strengths and limitations are.
Tags : 
content delivery, document management, information management, ebusiness, enterprise software, pdf, portable document format, adobe, acrobat, document, pdf tools
    
PDF Tools
Published By: Igroup Ltd.     Published Date: Oct 28, 2008
The current gold standard as far as business technology goes is wireless/mobile computing. It’s what business and engineering courses are training the future workplace in using. It’s what provides an income stream and stock value to a whole mushrooming sector of the economy. It’s what makes large-scale projects in virtually any field not only easier to coordinate and complete, but also cheaper and faster all around. Finally, it’s what you and your company need to learn how to use, in order to maintain your lead over the rest of the competitive world.
Tags : 
igroup, mobile computing, wireless computing, mobile computing solutions, wireless strategy, wireless technology, mobile solution
    
Igroup Ltd.
Published By: VMware     Published Date: Mar 08, 2012
The benefits of server virtualization extend far beyond infrastructure savings and server consolidation. An emerging technology trend is for IT managers worldwide to deploy virtualization to keep applications online and protect their businesses.
Tags : 
wmware, server virtualization, workload consolidation, simplified management, disaster protection, spending, data backup, recovery, data growth
    
VMware
Published By: Dell Software     Published Date: May 28, 2013
Protecting virtual data demands different tools. Find out how Dell’s holistic solution can help your IT team backup and recover both virtual and physical data quickly and reliably: Solution Brief: Protecting Applications and Data in a Virtual World with Dell AppAssure.
Tags : 
dell quest, appassure, data protection, dell appassure, protecting virtual data, solution brief
    
Dell Software
Published By: emily.shimell     Published Date: Oct 01, 2013
How is the trend of Virtualisation is impacting on the world of Video Conferencing? This paper looks at IT Virtualisation and traditional Video Conferencing, and discusses how the two worlds are now coming together to combat the main issues that have constrained the growth of video conferencing in the past 20 years, despite the prove benefits of HD video.
Tags : 
    
emily.shimell
Published By: HP     Published Date: Jul 22, 2014
IT has never been more important to doing business, which means that IT infrastructure must be simpler, smarter, faster, more flexible, and more business-aligned than ever. New service delivery models are driving new Tier-1 storage requirements that reveal how the traditional focus on performance and availability are clearly not enough to support virtualization, ITaaS, and new cloud service delivery models. The world is moving rapidly towards a New Style of IT, and will leave behind any business that doesn’t adapt even more rapidly. Is your storage ready?
Tags : 
tier-1, itaas, cloud, technology, infrastructure, storage
    
HP
Published By: Group M_IBM Q2'19     Published Date: Apr 25, 2019
Learn how IBM InfoSphere Virtual Data Pipeline enables developers and DBAs to instantly provision or refresh database copies, regardless of size, on-premises or in any cloud; integrate database copy creation and presentation with developer tools like IBM UrbanCode, Chef, Puppet, Ansible or Salt; and deliver database copies while ensuring that all security policies are maintained including access controls, masking and encryption. With a combination of real-world customer examples and live demonstration, this session will provide a practical understanding of the InfoSphere VDP solution, the business and technical impact delivered, and how to get started quickly.
Tags : 
    
Group M_IBM Q2'19
Published By: IBM     Published Date: Sep 30, 2016
"The malware industry supplies all the components cybercriminals need to easily perpetrate malware-driven financial fraud and data theft. In today’s virtual world, the scope of organizations vulnerable to malware-driven cybercrime is quite broad. In addition to banks and credit unions that are subject to online banking fraud, financial fraud can be perpetrated on insurance companies, payment services, large e-commerce companies, airlines and many others. "
Tags : 
ibm, security, web fraud, malware, cybercrime, cyber security
    
IBM
Published By: VMware     Published Date: Aug 09, 2012
Small and midsize firms virtualize IT infrastructure to meet real-world challenges: simplifying operations to focus on business issues, speeding up application rollouts to get more done, safeguarding data and operations to stay open and productive,
Tags : 
vmware, virtualization, infrastructure, data protection, data security
    
VMware
Published By: IBM     Published Date: Sep 30, 2013
This interactive eBook describes how virtualization is not a device to implement, but rather a journey to realize greater and greater gains. Featuring cases from midsize companies around the world, the eBook details how to get started, the importance of consolidation, tangible ways to fully benefit from virtualization and more.
Tags : 
ibm, virtualization, consolidation, virtualization management
    
IBM
Published By: BlackBerry Cylance     Published Date: Mar 12, 2019
Today’s advanced cyber threats target every computer and mobile device, including enterprise endpoints, especially those that make up critical infrastructure like industrial control systems and embedded devices that control much of our physical world. The modern computing landscape consists of a complex array of physical, mobile, cloud, and virtual computing, creating a vast attack surface. Meanwhile, the cybersecurity industry is prolific with defense-in-depth security technologies, despite a threat landscape that remains highly dynamic, sophisticated, and automated. Cylance, however, takes a unique and innovative approach of using real-time, mathematical, and machine learning threat analysis to solve this problem at the endpoint for organizations, governments, and end-users worldwide.
Tags : 
    
BlackBerry Cylance
Start   Previous    1 2 3 4 5    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.