HIT Consultant Insightful coverage of healthcare innovation
 

drive by

Results 51 - 75 of 527Sort Results By: Published Date | Title | Company Name
Published By: AWS     Published Date: Jun 04, 2019
Description Organizations are shifting to containers for its many benefits, including increased developer productivity and an improved, modernized environment for customized applications. While Kubernetes helps organizations get the most out of those benefits, it is complex by nature and can be difficult to manage on your own. Developers need a solution that drives productivity without needing to worry about managing infrastructure. SUSE Cloud Application Platform on Amazon Web Services (AWS) provides a lean and fast platform to accelerate containerized application delivery. By leveraging a managed Kubernetes environment, SUSE makes it easier for DevOps teams to deliver applications, accelerate innovation, and improve IT responsiveness.
Tags : 
    
AWS
Published By: AWS     Published Date: Jun 04, 2019
Description Zendesk is a customer service software company that serves over 125,000 organizations around the world. Wanting to create better experiences for its end users and their customers, Zendesk realized that operating on-premises made it difficult for their developers to provision the resources needed to innovate. To simplify the developer experience, Zendesk migrated to AWS and used containers to bolster portability between on-premises and the cloud. Now operating a massive, distributed container-based environment, Zendesk needed an all-in-one monitoring solution that matched their environment's scale and agility.
Tags : 
    
AWS
Published By: AWS     Published Date: Aug 26, 2019
Empower your developers and drive productivity by leveraging Kubernetes. Carmen Puccio, Principal Solutions Architect, Amazaon Web Services, Inc. Michael Gerstenhaber, Director of Product, Datadog Jon Moter, Senior Principal Engineer, Zendesk
Tags : 
    
AWS
Published By: bigtincan     Published Date: Oct 10, 2014
Understanding content value and unlocking the tribal knowledge that exists among mobile workforces is one of the key drivers that can improve how an organization operates in the age of mobile computing. By implementing Content Intelligence, mobile users can easily learn from their colleagues and leverage the domain expertise and the content that works best. It’s the ultimate way to get people working together to improve the productivity of every user within the organization.
Tags : 
mobile content, b2b, content intelligence, content value
    
bigtincan
Published By: BlackBerry     Published Date: Aug 03, 2009
This paper looks at some of the challenges that CIOs are facing in managing mobility. This is clearly becoming more complex for large enterprises as mobility penetrates more deeply into their organisations, driven by changing working practices and supported by rapidly evolving technology.
Tags : 
blackberry, mobile applications, cio, pim, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, mobility management, wireless applications software, wireless computing
    
BlackBerry
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Matthew Coy, Safelite’s Vice President of Information Technology, is responsible for overseeing all aspects of the company’s IT infrastructure, including selecting, administering, and supporting technology products. The company handles personally identifiable information, including credit card information and insurance data collected from several sources, and must comply with insurance industry regulations and the Payment Card Industry Data Security Standard. Safelite is the target of constant external attacks. The organization experienced ongoing security issues stemming from infected software, drivebys and other malicious downloads. According to Matthew, “A lot of malware and email viruses were making it through the environment, all bypassing our email security and AV.” Not only were the security controls ineffective, the previous AV platform required nearly 150 hours per week to manage. Matthew knew Safelite needed to make a change, and fast. Having worked with Cylance® at two previous companies, he was confident CylancePROTECT® could significantly improve Safelite’s endpoint security. Read the full case study to learn about the results Cylance was able to deliver.
Tags : 
safe, lite, cybersecurity, data
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Fileless attacks surged in 2017, largely due to their ability to bypass traditional antivirus solutions. Last year was host to several fileless malware victories. OceanLotus Group infiltrated Asian corporations during Operation Cobalt Kitty, and conducted nearly six months of fileless operations before detection. Ransomware hall-of-famers Petya and WannaCry both implemented fileless techniques in their kill chains. Every major player in information security agrees that fileless attacks are difficult to stop, and the threats are growing worse. Abandoning files is a logical and tactical response to traditional AV solutions which have overcommitted to file-intensive and signature-based blacklists. What can security solutions offer when there are no infected files to detect? How will a blacklist stop an aggressor that only uses legitimate system resources? The security landscape is changing and the divide between traditional AV products and next-generation security solutions is growing wider by the day. Cylance® has built a reputation on security driven by artificial intelligence and provides a frontline defense against fileless malware. This document details how Cylance protects organizations.
Tags : 
malware, predictive, test, response
    
BlackBerry Cylance
Published By: BlackLine     Published Date: Aug 06, 2018
BlackLine Account Reconciliations drives financial close accuracy by automating and standardising the reconciliation process. Quickly import transactions and balances from any ERP and compare it to source data to ensure completeness and accuracy. Automatically identify differences and focus your attention on discrepancy research and resolution. Consolidate all comments and supporting documents in one centralised repository, and gain visibility into your reconciliation process. Eliminate the manual financial close process and work smarter with BlackLine’s automated account reconciliation system.
Tags : 
    
BlackLine
Published By: Bluecore     Published Date: Oct 26, 2018
In an effort to grow its eCommerce business, the Pendleton marketing team began looking for new ways to innovate and immediately saw an opportunity to drive sales by bringing personalization to email by workimg with Bluecore.
Tags : 
    
Bluecore
Published By: Box     Published Date: Jan 16, 2015
Looking for the right Flash Array for you? Tired of all data being treated the same but want to save time and budget? Flash storage is helping to address the latency inherent with disk drives, enabling you to virtualize more, and reduce application response times. It's an inescapable fact that the $/GB of flash is much higher than disk drives. So why do the majority of storage vendors indiscriminately accelerate all data, regardless of its value to your business? All-flash arrays waste money by storing non-critical data in flash, and hybrid arrays can't control whether mission-critical or non-critical data accesses flash, leading to unpredictable performance. So what do you do to find a solution that addresses both of these issues? Download now and see NexGen's approach to value-driven data management. Make it simple to control what data is stored in flash and affordably tailor application performance to match your organizations priorities now!
Tags : 
nexgen, hybrid, flash, cisco, nexus, vmware
    
Box
Published By: BrightEdge     Published Date: Nov 13, 2014
BrightEdge tapped into its massive Data Cube repository to provide a comprehensive view into the channels that drive traffic and the types of content that perform best. BrightEdge created this report to help brands understand the actual performance of site content by channel and by industry.
Tags : 
brightedge, content marketing, data analytics, marketing data, marketing platform, market intelligence, business intelligence
    
BrightEdge
Published By: Bronto     Published Date: Aug 14, 2014
Retail marketing is in a state of constant evolution, driven forward by the availability of disruptive technologies and the emergence of all new marketing channels. These changes happen all over the world, and in recent years, Canadian retailers have been able to capitalize on many of them. Using research gathered at the 2014 eTail Canada Conference, this study evaluates the state of retail marketing in Canada. It assesses how well retailers are leveraging these new technologies and marketing channels, and also looks at how company structures are adapting to these changes.
Tags : 
retail marketing, digital marketing, marketing channels, canadian retail, e-commerce, multichannel offerings
    
Bronto
Published By: Bulldog Solutions     Published Date: May 20, 2013
This executive overview focuses on one of these drivers--program effectiveness--defined by leading marketers as programs that drive a high level of conversion and prospect engagement throughout the buyer's journey. in this executive overview, we'll take a look at the current buyer landscape, and then at five five best practice areas that need to be optimized in order for your programs to reach their full potential.
Tags : 
program effectiveness, b2b, b2b buyers, message alignment, buyer insights, audience acquisition, performance monitoring, campaign, campaign effectiveness
    
Bulldog Solutions
Published By: CA Technologies     Published Date: Jun 03, 2015
"Enterprises that depend heavily on IT to deliver services to customers are constantly driven by market pressures to better develop and release new software features to meet growing demands. Facilitating the collaboration between development and IT operations and bringing application to market faster with high quality are crucial to today’s business success. This solution brief provides insights into the DevOps movement, why it matters and how you can cross the chasm to achieve better collaboration to deliver business value rapidly. You’ll learn how CA Technologies solutions for DevOps bring your portfolio of IT technology forward in a cadence of faster, more predictable releases, letting you confirm the results of each phase of the software life cycle toward positive business outcomes."
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 04, 2015
Enterprises that depend heavily on IT to deliver services to customers are constantly driven by market pressures to better develop and release new software features to meet growing demands. Facilitating the collaboration between development and IT operations and bringing application to market faster with high quality are crucial to today’s business success. This solution brief provides insights into the DevOps movement, why it matters and how you can cross the chasm to achieve better collaboration to deliver business value rapidly. You’ll learn how CA Technologies solutions for DevOps bring your portfolio of IT technology forward in a cadence of faster, more predictable releases, letting you confirm the results of each phase of the software life cycle toward positive business outcomes.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 09, 2015
Today’s organizations are challenged to be the first to market with ‘The Next Big Thing’. They must innovate with new and unique services to satisfy customer demands and differentiate themselves in the marketplace. Software drives that innovation and has turned every organization into a software organization. This Executive Brief describes how the efficient collaboration between the development and IT operations teams can bring high-quality applications to market as quickly as possible. The CA Application Delivery suite helps organizations achieve collaborative DevOps through innovative technology tools used to: •Accelerate application development by removing constraints with CA LISA® Service Virtualization. •Expedite release time with CA LISA® Release Automation. •Improve application testing and quality with CA LISA® Pathfinder
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Apr 06, 2017
Privileged credentials have served as a major attack vector in the successful execution of many breaches. Protecting privileged access is an imperative to successfully defend an organization from a breach and is a core requirement of multiple compliance regimes. CA Privileged Access Management helps drive IT security and compliance risk reduction and improves operational efficiency by enabling privileged access defense in depth—providing broad and consistent protection of sensitive administrative credentials, management of privileged identity access and control of administrator activity.
Tags : 
it security, security breach, it infrastructure, cyber crime, risk management, password management, incident response, audits, user authentication
    
CA Technologies
Published By: CA Technologies     Published Date: Apr 06, 2017
Managing and protecting privileged credentials is essential to reducing risk and addressing compliance requirements. Organizations need to evaluate privileged password management solutions for the depth of controls, scope of coverage and degree of cloud alignment they provide. CA Privileged Access Manager delivers against all three of these dimensions, providing a next-generation solution for privileged credential management that drives IT risk reduction, improves operational efficiency and protects an organization’s investment by supporting traditional, virtualized and hybrid-cloud infrastructure alike.
Tags : 
cloud security, cloud management, it protection, api integration, credential verification, security efficiency
    
CA Technologies
Published By: CA Technologies     Published Date: Jul 20, 2017
Mainframes continue to provide high business value by combining efficient transaction processing with high-volume access to critical enterprise data. Business organizations are linking mobile devices to mainframe processing and data to support digital applications and drive business transformation. In this rapidly growing scenario, the importance of providing excellent end-user experience becomes critical for business success.This analyst announcement note covers how CA Technologies is addressing the need for providing high availability and a fast response time by optimizing mainframe performance with new machine learning and analytics capabilities.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
The mobile app has become “the” strategic initiative for all digital organizations attempting to drive business forward. “By 2017, mobile apps will be downloaded more than 268 billion times, generating revenue of more than $77 billion — making apps one of the most popular computing tools for users across the globe.”1 The app has become more than a simple method of communication. It is the new critical point of engagement, the face of the organization, and quite possibly the difference maker in customers staying or leaving. Getting the “user experience” (or UX) right in the eyes of the consumer is no longer a nice to have but fundamental to achieving success.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
While some are still adjusting to the idea, you’re well aware that we’re living in an application economy. For the uninformed, an application economy is where everything is driven by a connected, mobile, application-based world where your customers are far more likely to experience your brand and interact with your enterprise through a software application than a live person. But, beyond the benefits, each day you’re feeling the pressure it exerts on your budget, resources and network. You’ve seen this wave swell on the horizon, and now it’s arrived: executives are enthusiastic and asking about strategies, and line-of-business leaders are requesting faster dev times and more complex projects. Staking out your place as a leader in this new landscape will require you to develop and deliver high-impact applications faster than ever before.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 01, 2018
Privileged credentials have served as a major attack vector in the successful execution of many breaches. Protecting privileged access is an imperative to successfully defend an organization from a breach and is a core requirement of multiple compliance regimes. CA Privileged Access Management helps drive IT security and compliance risk reduction and improves operational efficiency by enabling privileged access defense in depth—providing broad and consistent protection of sensitive administrative credentials, management of privileged identity access and control of administrator activity.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 01, 2018
Managing and protecting privileged credentials is essential to reducing risk and addressing compliance requirements. Organizations need to evaluate privileged password management solutions for the depth of controls, scope of coverage and degree of cloud alignment they provide. CA Privileged Access Manager delivers against all three of these dimensions, providing a next-generation solution for privileged credential management that drives IT risk reduction, improves operational efficiency and protects an organization’s investment by supporting traditional, virtualized and hybrid-cloud infrastructure alike.
Tags : 
    
CA Technologies
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Effective Competition Depends on Continuous Delivery of Quality Software In today’s application economy every company is a software company, no matter what industry it is in: • Shipping companies depend on logistics software to efficiently route packages, arrange drivers and automate warehouses. • Retail companies rely on software to manage inventory, engage with customers online and to give in-store associates the tools they need to answer customer questions on the spot. • Marketing firms lean on applications to gather consumer data and parse it, automate communication with prospects and effectively manage advertising campaigns. The examples are endless. The point is that in order to compete today, every business must be able to quickly build and tweak software to adjust to always evolving market demands. Ultimately, business success depends on faster development iterations while still maintaining the high quality of service expected by customers, stakeholders and end users.
Tags : 
    
CA Technologies EMEA
Published By: CDW     Published Date: Apr 04, 2016
The world is increasingly digital, with interactions and experiences delivered to a variety of users across a range of locations and devices. The modern workplace should follow users wherever they roam, deliver a superior experience, and drive productivity. Hewlett Packard Enterprise helps companies deliver rich digital and mobile experiences to users, including employees, customers, and guests, by extending their capabilities in app development, mobile connectivity, and collaboration.
Tags : 
productivity, best practices, business intelligence, business management
    
CDW
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.