HIT Consultant Insightful coverage of healthcare innovation
 

virtual world

Results 76 - 100 of 106Sort Results By: Published Date | Title | Company Name
Published By: NetApp     Published Date: Sep 24, 2013
"The performance, availability, and data protection associated with tier-1 applications were easy to meet when one application mapped to one server and a dedicated storage system. But to carry these features into a virtual world with pooled, shared storage systems and unpredictable workloads creates new demands. In order to reach an agile state in your business, access this white paper now to gain insight into innovative solutions catered to these new challenging demands."
Tags : 
performance, availability, data protection, storage systems, virtualization, innovative solutions, technology, netapp
    
NetApp
Published By: NetIQ     Published Date: Jan 12, 2011
Addressing the potential for insider threats is an often overlooked security imperative for virtually all organizations worldwide.
Tags : 
netiq, insider threat, security, audits, access control, enterprise software
    
NetIQ
Published By: Oneupweb     Published Date: Jun 24, 2008
Uncover the social marketing secrets of the hottest holiday products with Oneupweb's white paper, Secrets of Social Marketing Success: How 2007 Hot Holiday Products are Being Marketed Online.
Tags : 
oneupweb, social media marketing, social marketing, online advertising, online marketing, search engine optimization, seo, search engine marketing
    
Oneupweb
Published By: Oneupweb     Published Date: Jun 24, 2008
Learn from the mistakes and successes of others in part 2 of Oneupweb's landmark social media marketing study, Social Media Marketing Hits and Misses: How 2007 Hot Holiday Brands and Products Performed Online.
Tags : 
oneupweb, social media marketing, social marketing, online advertising, online marketing, search engine optimization, seo, search engine marketing
    
Oneupweb
Published By: Online Marketing Summit     Published Date: Apr 21, 2010
Register for this free virtual event on Thursday, May 27th with the best and latest online marketing educational content including best practices, case studies, research and more. You can expect: *Seven tracks covering all major domain of online marketing, including Social Media, Search Engine Marketing and Optimization, Web Analytics, Mobile, Email and Demand Generation; * Content for all skill levels from the online novice to the eMarketing expert, there are sessions that will benefit all corporate, brand and online marketers; *Online marketing education kiosks and learning centers provide you additional access to 1-on-1 consultations, whitepapers and webcasts; *Live Q&A at the end of each session. Speakers and expert practitioners further explain the tactics learned in the session, answering questions and providing live support. Virtual Peer Networking gives you the opportunity to network, collaborate and share ideas with strategic marketers from leading companies around the world, so register now!
Tags : 
oms, online marketing summit, online marketing, emarketing, strategic marketing
    
Online Marketing Summit
Published By: Oracle     Published Date: Oct 20, 2017
Virtually every business-oriented conversation Wikibon has with senior IT leaders includes a discussion of digital transformation. The relevance to this research is the increasing interdependency between organizations and the data they use, create, access, share and store. Digital means data and lots of it; and this data must be protected. The data requirements facing organizations today as a direct result of digital initiatives are unprecedented and require new approaches for protecting and enabling recovery for high value data assets. Governments around the world are trying to keep pace with the digital tsunami and new/evolving regulations will further pressure data protection and recovery requirements. For example, the EU’s General Data Protection Regulation (GDPR) states that organizations must take appropriate measures to ensure the ability to restore personal data “in a timely manner in the event of a physical or technical incident.” Beginning in May of 2018, penalties for non-co
Tags : 
    
Oracle
Published By: Panasonic     Published Date: Oct 01, 2019
For manufacturers, the transition to Industry 4.0 has meant the accumulation of data, massive data. Indeed, the accumulation, distribution and evaluation of data are driving virtually every decision on the manufacturing plant floor and supply chains shaping those decisions. Given the striking fact that ninety percent of the data in the world has been created over the last two years, it isn’t surprising that more than 60 percent of large companies report having a Chief Data Officer. But what has opened the floodgates to this deluge of information in manufacturing? Ordinary sensors have been transformed into smart sensors with the advent of IoT technologies and are being deployed by manufacturers along every step of the supply chain. Sensors are now detecting everything from when a piece of equipment will need maintenance to controlling energy costs inside factories.
Tags : 
    
Panasonic
Published By: PDF Tools     Published Date: Aug 21, 2009
PDF files are prevalent in virtually all market segments worldwide. Most people know and use the term "PDF" but have misconceptions what it can and can't do. The purpose of this White Paper is to explain what PDF actually is and what it's strengths and limitations are.
Tags : 
content delivery, document management, information management, ebusiness, enterprise software, pdf, portable document format, adobe
    
PDF Tools
Published By: Polycom     Published Date: Apr 30, 2013
Video conferencing is an increasingly important technology to improve employee and partner collaboration, especially for increasingly virtual organizations supporting rising numbers of mobile and home workers. But many companies still struggle to justify their investments in video conferencing, and not to understand potential cost differences among competing solutions - not just hardware and software expenses, but also investments required for bandwidth and operational support. Comparing various video conferencing solutions requires examining deployment models, licensing arrangements, network, hardware, and operational costs for leading video conferencing solution vendors in a variety of scenarios, using real-world data gathered from actual buyers of video conferencing products and services. The result: Significant differences in costs across all areas, especially for varying deployment models.
Tags : 
total cost, video, video conferencing, collaboration
    
Polycom
Published By: Reactivity     Published Date: Aug 21, 2009
Load balancers, name servers (e.g. DNS), even stock brokerage services are existing examples of virtual services in the worlds of networking and financial services. This paper will introduce the concept of virtual services for SOAs and provide details of the characteristics of virtual services that enable SOA success.
Tags : 
service provider, service virtualization, virtual machine, soa, service-oriented architecture, service oriented architecture, change management, reactivity
    
Reactivity
Published By: Red Hat APAC     Published Date: Jul 16, 2019
https://asset.madisonlogic.com/production/asset-approval/35341_78975_preview.html?v=1563344610178 Red Hat CTO for global service providers, Ian Hood, and TelecomTV talk about multi edge compute capacity and the fundamental need to have a common platform to deliver future services. ‘If you are not feeling some pain, you are not driving fast enough’, says Red Hat CTO, Global Service Provider, Ian Hood. The race to 5G is definitely on, and the use cases are clear. You can talk about multi edge compute capacity and other technical issues, but the fundamental thing is to have a common platform to deliver future services. We need to get to the point where IoT Everywhere, virtualized video and all the applications that come from new 5G services are delivered seamlessly. Even blockchain has a clear future within the telco environment where the world of eSIMs, secure roaming charges and identity management can alls be based on blockchain technology.
Tags : 
    
Red Hat APAC
Published By: SafeNet     Published Date: Jan 14, 2014
Today’s data resides in a virtualized world, but the risks are all too real, and, in many organizations, too frequently realized. This paper examines the fundamental security implications of cloud services and virtualization, and it details an approach organizations can take to safeguard sensitive assets in a way that is aligned with today’s dynamic environments.
Tags : 
virtualization, cloud services, security, encryption, safenet
    
SafeNet
Published By: SAP     Published Date: Mar 24, 2011
In spite of the growth of virtual business activities performed via the World Wide Web, every business transaction or operation is performed at a physical place. And as handheld GPS devices drive a growing awareness of the concept of "location," people are increasingly looking for operational efficiencies, revenue growth, or more effective management as a result of geographic data services and location-based intelligence. In this white paper, David Loshin, president of Knowledge Integrity, Inc., introduces geographic data services (such as geocoding and proximity matching) and discusses how they are employed in both operational and analytical business applications. The paper also reviews analytical techniques applied across many types of organizations and examines a number of industry-specific usage scenarios.
Tags : 
location-based bi, business value, geographic enhancement
    
SAP
Published By: SAP     Published Date: Jul 17, 2012
In spite of the growth of virtual business activities performed via the World Wide Web, every business transaction or operation is performed at a physical place. And as handheld GPS devices drive a growing awareness of the concept of "location," people are increasingly looking for operational efficiencies, revenue growth, or more effective management as a result of geographic data services and location-based intelligence. In this white paper, David Loshin, president of Knowledge Integrity, Inc., introduces geographic data services (such as geocoding and proximity matching) and discusses how they are employed in both operational and analytical business applications. The paper also reviews analytical techniques applied across many types of organizations and examines a number of industry-specific usage scenarios.
Tags : 
business, sap, white paper, technology, location, intelligence, business value, data services
    
SAP
Published By: SEPATON     Published Date: Jun 23, 2008
This report is a must-read for companies struggling to back up their newly virtualized server environments.  Read this brief to get real-world case studies on how Sterling Testing and Kindred Healthcare have overcome the challenges of protecting VMware environments by implementing high performance virtual tape libraries (VTLs).
Tags : 
backup, recovery, storage, vtl, virtual tape library, virtual storage, storage virtualization, sepaton
    
SEPATON
Published By: Sponsored by HP and Intel® Xeon® processors     Published Date: May 07, 2012
This presentation charts the likely evolution of the market for fabric-based infrastructures, to help IT leaders determine the most appropriate vendor approach.
Tags : 
power, cooling, space, lifecycle, operations, flexibility, serviceability, data center
    
Sponsored by HP and Intel® Xeon® processors
Published By: Symantec     Published Date: Jul 29, 2013
Virtualization has been a game-changing technology for IT, providing efficiencies and capabilities that just aren't possible when constrained within a physical world. When searching for a backup and recovery solution for virtual environments, there are a few “must have” features to consider. Learn about the top four in this data sheet!
Tags : 
deduplication, virtual machines, symantec, enterprise, technology, server, virtualization, data protection
    
Symantec
Published By: Symantec     Published Date: Jul 29, 2013
Because of the outstanding economy, flexibility, and service levels it offers, virtualization is transforming data centers at breakneck speed: by 2016, an estimated 80 percent of the world's x86 servers will be Virtual Machines (VMs). But the speed of this transformation, along with the high resource utilization, ease of cloning, moving workloads, and other ways virtualization works its magic, raise challenges for “traditional” IT services and the teams that deliver them.
Tags : 
architect, deduplication, virtual machines, symantec, enterprise, technology, server, virtualization
    
Symantec
Published By: Symantec     Published Date: Dec 13, 2017
Today’s workforce is increasingly nomadic. Employees use personal and company-owned devices – desktops, laptops, tablets, and smartphones with various operating systems – to access corporate resources over different networks from virtually anywhere. Roaming users and cloud-based applications have eroded the network perimeter where enterprises have traditionally focused their security controls. SymantecTM provides a complete endpoint solution powered by the world’s largest civilian Global Intelligence Network (GIN) to help organizations secure their enterprise and mobile workforce across traditional and modern OS devices used over any network and from any location. Read this white paper to find out more.
Tags : 
security, defense, cloud, threats, attack, symantec, enterprise, endpoint
    
Symantec
Published By: ttec     Published Date: Jul 24, 2019
Artificial Intelligence (AI) has officially entered the (contact center) building. However, it’s not in the way most media reports predicted. Instead of replacing human associates, virtual associates are collaborating with them to work faster and more efficiently, and the hybrid duos are wowing customers worldwide.
Tags : 
    
ttec
Published By: vcopious     Published Date: Oct 01, 2010
This paper analyzes the current scenario facing IT departments, where they must focus on maximizing their return from existing IT investments, while also leveraging the best solutions available via a SaaS model.
Tags : 
saas, on-premise, cloud, computing, platform, platforms, virtual
    
vcopious
Published By: VMware     Published Date: Mar 08, 2012
The benefits of server virtualization extend far beyond infrastructure savings and server consolidation. An emerging technology trend is for IT managers worldwide to deploy virtualization to keep applications online and protect their businesses.
Tags : 
wmware, server virtualization, workload consolidation, simplified management, disaster protection, spending, data backup, recovery
    
VMware
Published By: VMware     Published Date: Aug 09, 2012
Small and midsize firms virtualize IT infrastructure to meet real-world challenges: simplifying operations to focus on business issues, speeding up application rollouts to get more done, safeguarding data and operations to stay open and productive,
Tags : 
vmware, virtualization, infrastructure, data protection, data security
    
VMware
Published By: VMware     Published Date: Dec 18, 2012
Check out this infographic that explores SMB IT trends in virtualization and cloud computing to better understand the real-world advantage available to your growing business.
Tags : 
virtualization, cloud, server, cost, savings, infographic
    
VMware
Published By: VMware     Published Date: May 10, 2017
VMware Identity Manager provides single sign-on (SSO) to a broad range of SaaS applications, as well as legacy applications published via virtual desktop platforms from VMware and Citrix, and browser-based and native mobile apps. VMware Identity Manager also provides application provision¬ing and conditional (adaptive, or risk-based) access controls, and can be deployed either on-premises or in the cloud. In this report, 451 Research analyzes VMware’s strategic effort to bridge the legacy on-premises world (which still represents most of its business) with the more highly distributed and heterogeneous worlds of mobile and cloud computing. 451 also examines VMware’s re-entry into the IDaaS market is to extend their market reach beyond what VDI and EMM might accomplish individually.
Tags : 
    
VMware
Start   Previous    1 2 3 4 5    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.