HIT Consultant Insightful coverage of healthcare innovation
 

mobile software

Results 176 - 200 of 232Sort Results By: Published Date | Title | Company Name
Published By: Red Hat     Published Date: Sep 25, 2014
Today’s mega IT trends – cloud computing, big data, mobile and social media –have dramatically altered how enterprises work, requiring datacenters to find new, more flexible and cost effective ways to meet computing demands. For most datacenters, the path toward tomorrow's compute paradigm mandates an investment in standardization and consolidation as well as a more robust adoption of enterprise virtualization software, along with cloud system software to extend that virtualized infrastructure into a true private cloud environment. Linux has emerged as one of the key elements to a modernization program for a datacenter.
Tags : 
datacenter, modernization, enterprise virtualization, infrastructure, private cloud enviornment
    
Red Hat
Published By: Riverbed     Published Date: Aug 22, 2014
The Riverbed Optimization System (RiOS™) is the software that powers Riverbed’s unique award-winning line of Steelhead™ application acceleration appliances and Steelhead Mobile client software. RiOS is based on patented technologies that solve a range of problems affecting wide area networks (WANs) and application performance.
Tags : 
optimization, rios, technical, software, application, acceleration, technologies, solve problems, networks, performance
    
Riverbed
Published By: Riverbed     Published Date: Aug 19, 2014
Riverbed Optimization System (RiOS™) is the software that powers Riverbed’s unique award-winning line of Steelhead™ application acceleration appliances and Steelhead Mobile client software.
Tags : 
optimization, wan bandwidth, high-latency, traffic, wan
    
Riverbed
Published By: Riverbed DE     Published Date: Oct 16, 2017
What is the key benefit of SD-WAN? To provide seamless access to digital services for end-users. But IT is more distributed, fragmentary, and dynamic than ever, with hybrid apps, hybrid networks, and remote and mobile users everywhere. Hardware-bound legacy networks can never fulfill the promise of seamless access. Taming the chaos of today’s IT requires a new approach to networking. This is the promise of software-defined wide area networks (SD-WAN)—the ability to use plain-language business policies to automate and orchestrate all the components of digital access. Read this white paper to learn how SD-WAN lets you: • Manage centrally from a cloud console with a comprehensive view of your connectivity fabric that spans and unifies datacenter/cloud apps, branch/mobile users, and enterprise/cloud networks. • Orchestrate globally using business policy-based automation to define quality of service and access privileges for all apps/users. • Deploy locally with zero touch via automated
Tags : 
cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
Riverbed DE
Published By: SafeNet     Published Date: Jul 20, 2010
This paper compares the strengths and weaknesses of hardware- and software-based authentication approaches, and offers five key considerations for evaluating which approach is right for the specific needs of your organization.
Tags : 
safenet mobile, hardware and software authentication, teleworker, smart phone, remote access, deployment, tco, security
    
SafeNet
Published By: SAP     Published Date: Mar 29, 2011
Explore the latest thinking on use of mobile technology to deliver business value by enabling sales and service processes - and transform processes across the enterprise. Business software vendors can best support their customers by collaborating with strategic partners to co-innovate and foster a mobile ecosystem.
Tags : 
sap crm, enterprise mobility suite, enterprise mobility
    
SAP
Published By: SAP     Published Date: Dec 04, 2015
Download this whitepaper to see how advanced technologies such as big data, cloud computing, mobile devices, and enterprise access to in-memory platforms, predictive analytics, and planning software can help CFOs make better and more sophisticated use of data, influence decisions, and take practical, timely action.
Tags : 
finance function, finance, cfo, big data, cloud computing, mobile, in-memory platforms, predictive analytics, planning software
    
SAP
Published By: SAS     Published Date: Apr 25, 2017
Today, data is constantly flowing in and out of organizations from electrical and mechanical sensors, RFID tags, smart meters, scanners, mobile devices, vehicles, live social media, machines and other objects. Did you know that a modern plane with more than 10,000 sensors just in the wings is expected to generate more than 7 terabytes a day? And Bain predicts that by 2020 annual revenues could exceed $470 billion for the internet of things (IoT) vendors selling hardware, software and comprehensive solutions. Analysts believe that all of this data will drive a new type of industrial revolution – one that’s driven by highly accurate, real-time analysis, alerts and actions. Increasingly, machines will automate decisions and simply notify humans with instructions. Consider the promise of the IoT, where any object can be connected to the internet and continuously send and receive data. Gartner says that by 2020, 21 billion IoT devices will be in use worldwide.
Tags : 
    
SAS
Published By: Secure Computing     Published Date: Jan 25, 2008
This paper discusses the value of two-factor authentication systems that provide vital access security for today's mobile workforces, who can now be productive from numerous remote locations: the home office, the airport, hotels, and customer sites. Moreover, the ubiquitous nature of mobile phones has now given rise to a new, convenient form factor for the software-based authenticator that resides right on the mobile phone/device.
Tags : 
cell phone, cell phones, wireless security, mobile security, mobile workers, authentication, 2-factor authentication, iam, identity management, access control, securecomputing, secure computing
    
Secure Computing
Published By: ServiceNow     Published Date: Mar 24, 2015
Technology has become the heart and soul of every business. The hardware boundaries of IT have exploded beyond data centers, with mobile devices in the hands of both employees and customers alike. Application options have blossomed, from traditional to open source to software-as-a-service. Business has become global, bringing with it a demand for round-the-clock agility. Employees expect that the applications they use at work should be as easy to use the Web apps they use at home. Integration remains difficult, because it's sometimes impossible to know what will happen when someone tries to pluck one strand out of the pile. IT workload and system complexity will only get more challenging, bringing the need for disintermediation through service automation.
Tags : 
future it, service automation, it workload, integration, data centers, mobile devices, software-as-a-service, web apps
    
ServiceNow
Published By: ServiceNow     Published Date: Oct 02, 2015
Technology has become the heart and soul of every business. The hardware boundaries of IT have exploded beyond data centers, with mobile devices in the hands of both employees and customers alike. Application options have blossomed, from traditional to open source to software-as-a-service. Business has become global, bringing with it a demand for round-the-clock agility. Employees expect that the applications they use at work should be as easy to use as the Web apps they use at home. Integration remains difficult, because it’s sometimes impossible to know what will happen when someone tries to pluck one strand out of the pile. IT workload and system complexity will only get more challenging, bringing the need for disintermediation through service automation.
Tags : 
    
ServiceNow
Published By: STANLEY Healthcare     Published Date: Mar 24, 2015
When four of its hospitals needed to transition from manual to automated temperature monitoring, Allina Health sought a solution that would meet its core requirements: timely alerts to problems and automatic data capture for compliance reporting requirements. Ultimately, it was also looking for an enterprise solution that could form the standard for its entire health system. Read this case study to learn why Allina Health chose STANLEY Healthcare’s Wi-Fi-based AeroScout® Environmental Monitoring solution, including MobileView software, as its system-wide standard to build an enterprise foundation for asset tracking, environmental monitoring, and other RTLS capabilities.
Tags : 
healthcare, medicine, asset tracking, environmental monitoring, rtls, hospital, information technology, practice management
    
STANLEY Healthcare
Published By: StrikeIron     Published Date: Aug 01, 2013
For internal and external applications, Web API’s provide flexibility and unlock the value of your data and software. However, ongoing API development, deployment and delivery require extensive domain knowledge in operating an enterprise-class infrastructure. Without this expertise, scalability, reliability, and security are compromised.
Tags : 
cloud computing, colocation and web hosting, web service security, soap web development, web services, web service security, xml, mobile computing, mobile data system, wireless application software, content integration, application integration, content delivery, edi
    
StrikeIron
Published By: sweetiQ     Published Date: Oct 29, 2012
Smartphones and the social, local, mobile ecosystem are the future of retail. Where once there was the yellow pages, today's mobile consumer has much more access to information. Read on to learn how to presence on the social local and mobile web.
Tags : 
local listing management, google+ local, google places, location-based marketing, local search, local search optimization, business listings, solomo, social local mobile, local search analytics, local marketing, local marketing analytics, local listing presence, local search optimization analytics, local search optimization software, local search optimization tools, local venue listings, local marketing recommendation, local search analytics, local seo analytics
    
sweetiQ
Published By: sweetiQ     Published Date: Jan 23, 2014
Successful brands, whether big or small, need ambassadors to trumpet their products and services. Finding the right people to represent you is a task - they are more than influencers. Download this whitepaper and you'll discover that while the best brand ambassadors are loyal customers, developing them may require significant work.
Tags : 
local listing management, google+ local, google places, location-based marketing, local search, local search optimization, business listings, solomo, social local mobile, local search analytics, local marketing, local marketing analytics, local listing presence, local search optimization analytics, local search optimization software, local search optimization tools, local venue listings, local marketing recommendation, local search analytics, local seo analytics
    
sweetiQ
Published By: sweetiQ     Published Date: Jan 23, 2014
So you're looking for more places to get your website listed? There are thousands of them out there, but finding those truly relevant sites that can help bring traffic and possibly impact your rankings in the search engines usually takes work. Now sweetiQ offers you a way to accomplish this in less than a week. Download the paper to learn more about how you can get access to these listings and ensure that your information is accurate.
Tags : 
local listing management, google+ local, google places, location-based marketing, local search, local search optimization, business listings, solomo, social local mobile, local search analytics, local marketing, local marketing analytics, local listing presence, local search optimization analytics, local search optimization software, local search optimization tools, local venue listings, local marketing recommendation, local search analytics, local seo analytics
    
sweetiQ
Published By: Symantec     Published Date: Oct 02, 2012
The Latest Code Signing Technology
Tags : 
mobile, application, market, software, code, signing, technology
    
Symantec
Published By: Symantec Corporation     Published Date: Feb 25, 2014
Due to recent innovations in the mobile device industry, demand for mobile applications has soared. Meanwhile, malware continues to infect sites at an explosive rate. Mobile application developers need to secure their code and content to protect the integrity of their software and the reputation of their business. This business guide discusses how the latest code signing technology works to secure software code and content for mobile applications, along with why code signing platforms need to be flexible, scalable, user-friendly, and easily adaptable to different mobile operating platforms.
Tags : 
symantec, mobile, mobile applications, security
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Feb 25, 2014
The explosive growth of the mobile apps market presents a tremendous opportunity for software developers and cybercriminals alike.  Infected apps are not only a threat to mobile device users, but also to network and platform providers, device manufacturers, and the reputation of the industry as a whole. Fortunately, developers can protect their code – and their customers – with a straightforward and easy-to-manage technology: code signing certificates. This white paper details the rise of mobile applications and why code signing certificates are essential to protecting the entire mobile apps ecosystem.
Tags : 
mobile apps, symantec, cybercriminals, security, mobile applications, code signing, malware
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Feb 25, 2014
The explosive growth of the mobile apps market presents a tremendous opportunity for software developers and cybercriminals alike.  Infected apps are not only a threat to mobile device users, but also to network and platform providers, device manufacturers, and the reputation of the industry as a whole. Fortunately, developers can protect their code – and their customers – with a straightforward and easy-to-manage technology: code signing certificates. This white paper details the rise of mobile applications and why code signing certificates are essential to protecting the entire mobile apps ecosystem.
Tags : 
symantec, mobile, mobile applications, security, code signing certificates
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Jun 24, 2014
The explosive growth of the mobile apps market presents a tremendous opportunity for software developers and cybercriminals alike.  Infected apps are not only a threat to mobile device users, but also to network and platform providers, device manufacturers, and the reputation of the industry as a whole. Fortunately, developers can protect their code – and their customers – with a straightforward and easy-to-manage technology: code signing certificates. This white paper details the rise of mobile applications and why code signing certificates are essential to protecting the entire mobile apps ecosystem.
Tags : 
security, mobile, mobile app, code, mobile application, code signing
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Jun 24, 2014
Due to recent innovations in the mobile device industry, demand for mobile applications has soared. Meanwhile, malware continues to infect sites at an explosive rate. Mobile application developers need to secure their code and content to protect the integrity of their software and the reputation of their business. This business guide discusses how the latest code signing technology works to secure software code and content for mobile applications, along with why code signing platforms need to be flexible, scalable, user-friendly, and easily adaptable to different mobile operating platforms.
Tags : 
security, software, mobile, mobile application, malware, code signing
    
Symantec Corporation
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.