HIT Consultant Insightful coverage of healthcare innovation
 

issues

Results 76 - 100 of 899Sort Results By: Published Date | Title | Company Name
Published By: Box     Published Date: Jan 16, 2015
Has your organization been dealing with storage latency and performance issues? With a population of nearly 10 million people, Los Angeles County is the most populous county in the United States. It's no surprise that with 1.5 million people taking public transportation every day to help ease some of LA County's infamous traffic, making sure passengers get where they're going is a monumental task. At the heart of it all is the organization's IT department. The LA Metro infrastructure consists of 600 servers, 500 of which are virtualized. When the city's IT team began receiving user complaints and experiencing performance issues with their Virtual Desktop Infrastructure (VDI) environment, they began looking for alternatives. Download the case study now and learn how replacing the city's existing storage solution helped solve a wide range of technical problems and eliminated unnecessary latency, ensuring all 1.5 million passengers got where they needed to be.
Tags : 
nexgen, flash, la metro, vdi, vmware, vdi
    
Box
Published By: Box     Published Date: Jan 16, 2015
Looking for the right Flash Array for you? Tired of all data being treated the same but want to save time and budget? Flash storage is helping to address the latency inherent with disk drives, enabling you to virtualize more, and reduce application response times. It's an inescapable fact that the $/GB of flash is much higher than disk drives. So why do the majority of storage vendors indiscriminately accelerate all data, regardless of its value to your business? All-flash arrays waste money by storing non-critical data in flash, and hybrid arrays can't control whether mission-critical or non-critical data accesses flash, leading to unpredictable performance. So what do you do to find a solution that addresses both of these issues? Download now and see NexGen's approach to value-driven data management. Make it simple to control what data is stored in flash and affordably tailor application performance to match your organizations priorities now!
Tags : 
nexgen, hybrid, flash, cisco, nexus, vmware
    
Box
Published By: Box     Published Date: Feb 13, 2015
Many CISOs admit to trepidation about the state of cybersecurity within their organizations. Why? Aside from the increasingly dangerous threat landscape, many large organizations face other security challenges, including personnel shortages, an overwhelming number of manual processes, and technology complexity. Beyond these issues however, CISOs also face the progressively difficult responsibility of securing the distributed enterprise. Aside from PCs, departmental file servers, and remote office equipment, the distributed enterprise now includes recent IT additions like mobile computing, SaaS applications, and hybrid cloud infrastructure. In aggregate, this increasingly distributed infrastructure makes information security more cumbersome.
Tags : 
ciso, cybersecurity, esg, it/security, it architecture
    
Box
Published By: Brainloop     Published Date: Oct 25, 2011
External collaboration is a major source of information risk. New tools make document collaboration much easier, but may have serious security issues. Learn more about industry trends and demands for security and compliance in online collaboration.
Tags : 
cloud collaboration, cloud security, collaboration application, collaboration environment, data protection, data room, digital rights management, file protection, it risk management, mergers acquisition due diligence, mobile collaboration, online collaboration, online document storage, password protect documents, saas collaboration, saas security, secure collaboration, secure document, secure file sending
    
Brainloop
Published By: Brainloop     Published Date: Nov 09, 2011
This white paper by Cheryl Klein, CPA, CISA, CITP, analyzes 10 questions that help identify compliance risks in your company. The 10 scenarios illustrate smart, cost-effective strategies for SOX, PII, HIPPA and security policy issues.
Tags : 
brainloop, security, compliance risks, sharing information, security management, data protection
    
Brainloop
Published By: Brainloop     Published Date: Jan 04, 2012
This white paper by Cheryl Klein analyzes 10 questions that help you identify potential compliance risks in your company. The 10 different scenarios illustrate smart, cost-effective strategies for SOX, PII, and HIPPA compliance issues where information must be kept confidential.
Tags : 
brainloop, technology, security, compliance
    
Brainloop
Published By: Brandwatch     Published Date: Feb 25, 2015
This guide is an introductory overview of best practices for crisis and issues communications in the social media age, focusing on: • What reputation monitoring actually means • How to identify a crisis & assess the damage • Real-world examples from Marriott, United Airlines and Walmart/Asda
Tags : 
social media, social analytics, social media monitoring, crisis management, reputation management, social listening, social business intelligence, brand monitoring, social media management
    
Brandwatch
Published By: Brightcove     Published Date: Sep 17, 2014
6 Billion hours of video are watched EACH MONTH on YouTube .... That's almost 1 HOUR for every person on Earth! There is no denying the power and reach of YouTube. But, are quality issues common with YouTube videos negatively impacting your brand? We investigate.
Tags : 
online video quality, consumer perception, distribution strategies
    
Brightcove
Published By: Brooks Digital Marketing     Published Date: Sep 22, 2010
This white paper brings to light the critical but often hidden issues involved with creating a website that many web designers are not aware of themselves.
Tags : 
website design
    
Brooks Digital Marketing
Published By: Business Assyst     Published Date: Mar 26, 2007
Interest in customer loyalty programs has never been more avid. After a number of years when such programs always seemed to be on the brink of taking off - but never quite managed to reach expectations - recent years have seen a real and dramatic increase in their uptake. This paper explores the issues which need to be addressed in order to cost justify the implementation of a customer loyalty system.
Tags : 
crm, customer relationship management, customer experience management, loyalty, retention, business metrics, affinity, business assyst
    
Business Assyst
Published By: Butler Technologies     Published Date: Jul 02, 2018
The Tenth Annual State of the Network Global Study focuses a lens on the network team’s role in security investigations. Results indicate that 88 percent of network teams are now spending time on security issues. In fact, out of 1,035 respondents, nearly 3 out of 4 spend up to 10 hours per week working exclusively on these types of problems - in addition to managing network upgrades, SDN, cloud, and big data initiatives. When it comes to technology adoption, both cloud and 100 GbE deployment continue to grow aggressively. VoIP adoption is closing in on 60 percent and software-defined networking (SDN) is projected to cross the halfway mark, indicating compounding network complexity amidst the ongoing struggle to ID security threats. With growth comes change and some trends identified in this year’s survey include a rise in email and browser-based malware attacks (63 percent) and an increase in sophistication (52 percent). Nearly 1 in 3 also report a surge in DDoS attacks, signaling a ne
Tags : 
    
Butler Technologies
Published By: Butler Technologies     Published Date: Jul 02, 2018
Increasingly complex networks, require more than a one-size-fitsall approach to ensuring adequate performance and data integrity. In addition to the garden-variety performance issues such as slow applications, increased bandwidth requirements, and lack of visibility into cloud resources, there is also the strong likelihood of a malicious attack. While many security solutions like firewalls and intrusion detection systems (IDS) work to prevent security incidents, none are 100 percent effective. However, there are proactive measures that any IT team can implement now that can help ensure that a successful breach is found quickly, effectively remediated, and that evidential data is available in the event of civil and/or criminal proceedings.
Tags : 
    
Butler Technologies
Published By: CA Mainframe     Published Date: Sep 12, 2008
The CA Performance Management Handbook for DB2 for z/OS by renowned tuning experts Susan Lawson and Dan Luksetich of YL&A covers information to enhance your skills and raise awareness for databases performance management issues and tuning strategies. This supplement to the CA Performance Management Handbook provides specific information on which technologies apply to which issues and how CA Database Management addresses your most pressing database performance management challenges.
Tags : 
ca mainframe, mainframe, apm, application performance management
    
CA Mainframe
Published By: CA Mainframe     Published Date: Sep 12, 2008
Compliance requires strong security controls for mainframe environments also. This white paper discusses some major challenges that mainframes bring to compliance, and some key issues that need to be addressed. It also presents some key technologies and approaches that you can use to help you achieve easier compliance for your mainframe systems.
Tags : 
ca mainframe, mainframe, compliance
    
CA Mainframe
Published By: CA Technologies     Published Date: Jan 06, 2014
This report examines the issues around the adoption of cloud-based services and looks at the security technology that is being deployed by enthusiasts and why the avoiders are holding back.
Tags : 
mediacom, cloud-based services, adopt the cloud, security of data, effective security, security technology, sensitive data, cloud avoiders, in-house deployments, cost of ownership, external interaction, identifiable data, security services, access management, identity governance, drivers and blockers
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 14, 2014
IT luminaries discuss the major issues impacting DevOps today
Tags : 
devops, software, training, project management
    
CA Technologies
Published By: CA Technologies     Published Date: Sep 11, 2014
In this white paper IT Luminaries Discuss the Major Issues Impacting DevOps today.
Tags : 
devops, software, training, project management
    
CA Technologies
Published By: CA Technologies     Published Date: Oct 21, 2014
In this white paper IT Luminaries Discuss the Major Issues Impacting DevOps today.
Tags : 
devops, software, training, project management
    
CA Technologies
Published By: CA Technologies     Published Date: Oct 21, 2014
In this white paper IT Luminaries Discuss the Major Issues Impacting DevOps today.
Tags : 
devops, software, training, project management
    
CA Technologies
Published By: CA Technologies     Published Date: Oct 21, 2014
In this white paper IT Luminaries Discuss the Major Issues Impacting DevOps today.
Tags : 
devops, software, training, project management
    
CA Technologies
Published By: CA Technologies     Published Date: Oct 21, 2014
In this white paper IT Luminaries Discuss the Major Issues Impacting DevOps today.
Tags : 
devops, software, training, project management
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 14, 2015
Whether you were at the forefront of the mobility era or are just now catching up—or, most likely, somewhere in between—you’ve already experienced first-hand the business impact of ubiquitous smartphones and tablets. From employees to customers, mobile devices spawned an explosion in new applications, data, support needs, security concerns, and other issues. They’ve reset expectations for organizational speed and flexibility. They’ve dramatically increased the surface area for potential security attacks. All this, and the mobile era is still just in its infancy.
Tags : 
mobile busienss, smartphones, tablets, applications, data, support needs, security attacks, organizational speed
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 03, 2015
"Industry leaders share insights on DevOps and big data, ITIL, testing and more. Once again, we have spent time talking to leading community figures such as Dave Farley (“Continuous Delivery” author) to discuss the major issues impacting DevOps today. This latest issue features comments from 10 experts and covers many hot topics such as: - Enterprise DevOps transformation - DevOps and big data - DevOps and ITIL - Shadow IT vs DevOps - 6 Habits of Effective DevOps Practitioners - DevOps and Testing
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 04, 2015
Industry leaders share insights on DevOps and big data, ITIL, testing and more. Once again, we have spent time talking to leading community figures such as Dave Farley (“Continuous Delivery” author) to discuss the major issues impacting DevOps today. This latest issue features comments from 10 experts and covers many hot topics such as: - Enterprise DevOps transformation - DevOps and big data - DevOps and ITIL - Shadow IT vs DevOps - 6 Habits of Effective DevOps Practitioners - DevOps and Testing
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 09, 2015
Freeform Dynamics Executive Briefing Guide - Orchestrating the DevOps Tool Chain: An enterprise-level approach to continuous delivery. Dale Vile says that business stakeholders are increasingly looking for faster and more frequent delivery of high-impact, high-quality output from IT teams. DevOps is an approach designed to enable the rapid and continuous delivery of value to the business to support the needs of the digital world, he adds. Open source software tools can help organizations adopt this DevOps approach but can cause efficiency, complexity and scalability issues, so Dale believes it is helpful to create a consistent orchestration layer using an enterprise class release automation solution.
Tags : 
    
CA Technologies
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.