HIT Consultant Insightful coverage of healthcare innovation
 

new features

Results 1 - 25 of 192Sort Results By: Published Date | Title | Company Name
Published By: 8x8 Inc.     Published Date: Aug 09, 2017
The 8x8-CCNG survey shows more and more companies are moving their contact centers to the cloud, and for a range of reasons that is appealing to almost every business center. Most prominent among those objectives are better business continuity, scalability, supporting remote workers, and integrating new technologies like multi-channel capabilities. Does your contact center employ remote agents? More than half do or respondents do! Across industries, prioritizing top talent and supporting remote workers is a growing concern. Cloud contact centers support this objective by making the full set of technologies and features available to all users, wherever they are located. Download now to learn more.
Tags : 
8x8, cloud contact center, remote work, scalability, cloud computing
    
8x8 Inc.
Published By: Absolute Software     Published Date: May 31, 2016
The release of a new Microsoft operating system is always an important event for IT departments, and Windows 10 is no exception. IT organizations and end users have been looking forward to a wide range of new features in Windows 10, with interest particularly high as users of Windows 7 and 8 can upgrade for free.
Tags : 
data, security, mobility, mobile computing, best practices
    
Absolute Software
Published By: Adobe     Published Date: Mar 05, 2018
We are fully entrenched in the digital age, so much so that you're probably reading this with a smartphone or mobile device within arms length. Similarly government is also making the shift towards a digital future. But with moving away from paper-based records and towards digital data, there are new opportunities for potential security risks regarding government data and content. As cyberthreats continue to grow in number and sophistication, agencies should be looking at features to secure every level of their digital infrastructure and content. Check out this new pocket guide to learn content security best practices, why it matters, government rules and regulations related to digital data and its associated security and content challenges. You’ll also learn tips and tricks to apply at your agency to make sure your content is secure.
Tags : 
    
Adobe
Published By: Aerohive     Published Date: Feb 06, 2008
Craig Mathias, Principal of the Farpoint Group, explores the advent of cooperative control, an innovative new class of wireless infrastructure from Aerohive Networks. Aerohive’s cooperative control architecture gives you all of the benefits of autonomous access points and controller-based infrastructures, without the high OPEX or CAPEX associated with either approach. Cooperative control architecture represents an innovative approach to wireless LAN systems, one that incorporates a number of interesting features and corresponding benefits.
Tags : 
wireless lan, wlan, wireless architecture, wireless infrastructure, aerohive, wifi, wi-fi
    
Aerohive
Published By: Amazon Web Services     Published Date: Nov 28, 2017
So you’re thinking about moving to the cloud. Which means you’ve got some new (and some old) security issues to think about. Where do you start? What should you look for when you’re planning your cloud migration or expansion, and what features do you need to tick off your list when you compare partners for the project? At AWS, we’ve worked with millions of cloud users in 190 countries, from all kinds of industries – large enterprise, start-ups, non-profits, education and government. Every organisation's needs are different, but we’ve identified the top features of any successful cloud security initiative. Here are six must-haves for cloud security confidence.
Tags : 
integration, security, compliance, visibility, control, privacy, data, marketplace
    
Amazon Web Services
Published By: Apple Corporation     Published Date: Mar 26, 2014
Join Apple Business Experts for a exclusive on-demand online seminar to learn what’s new in iOS7 for business. Learn how iOS and an ever-expanding collection of features and built-in apps make iPhone and iPad even more powerful, innovative, and enjoyable to use for work. You will also see how iOS provides IT with powerful, yet simple ways to deploy and manage iOS devices, secure corporate data, and enable a great user experience. Register Now!
Tags : 
apple, ios7, iphone, ipad, business solutions, it solutions, it management
    
Apple Corporation
Published By: ArborNetworks     Published Date: Feb 12, 2016
Ask any cybersecurity professional and she’ll tell you that her job is getting increasingly difficult. Why? Most will point to a combination of the dangerous threat landscape, IT complexity, and their overwhelming workload. These issues are driving a major transition in enterprise security. Large organizations must move beyond a threat prevention mentality to become proactive cyber-¬-attack “hunters” that constantly monitor their networks for signs of trouble. This shift to proactive hunting will require new technologies that collect, process, and analyze massive amounts of security data, offer intelligent security analytics for real-¬-time incident detection, integrate threat intelligence to align suspicious internal activities with external threats, and provide analysts with the right data analytics features to query and manipulate data for historical investigations.
Tags : 
arbor networks, enterprise, cyber attack, network, data
    
ArborNetworks
Published By: Artemis Health     Published Date: Feb 05, 2019
Artemis Health teamed up with Employee Benefit News to research the current “benefits landscape.” We surveyed self-insured employers to find useful trends, interesting stats, and info on what leaders like you are doing to improve their benefits strategy. In this whitepaper, you'll discover: • Regional differences in benefits offerings and priorities • What benefit leaders believe they can accomplish with benefits data analytics • The features and functionality your peers are looking for when they evaluate a data solution
Tags : 
    
Artemis Health
Published By: Aternity     Published Date: Apr 10, 2012
Report reveals Aternity's version 5.0's new innovative features focused on driving the broadest coverage of end-user experience across almost any type of application or Windows-based desktop (physical or virtual).
Tags : 
aternity, end user experience, end user management, technology, windows, technology platform
    
Aternity
Published By: AWS     Published Date: Jun 03, 2019
cBackground Fulfilling the security and compliance obligations within the AWS Shared Responsibility Model is critical as organizations shift more of their infrastructure to the cloud. Most infrastructure and application monitoring solutions haven’t caught up to meet these new requirements, forcing IT and security teams to resort to traditional monitoring strategies that don’t allow for innovation and growth. Join us for this webinar to learn how Splunk and AWS give you end-to-end visibility across your applications and help quickly detect potential security threats. Find out how Experian leveraged Splunk Cloud to deliver log data in near real-time to their operations teams for analysis and monitoring, roll out new features/updates faster, create reusable features to deploy in multiple customer environments to scale with their business, and ensure adherence to security and compliance standards.
Tags : 
    
AWS
Published By: B Labs     Published Date: Sep 19, 2010
This white paper briefly overviews a functionality of enterprise-level IM systems and describes new features and tasks that can be important to corporate and business users.
Tags : 
chat, instant messaging, communication, server, messenger, messaging, collaboration
    
B Labs
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
The cyberattacks of 2017 proved more numerous, sophisticated, and ruthless than in years past. Threat actors, armed with knowledge stolen from the CIA and tools lifted from the NSA, demonstrated an elevated level of proficiency. WannaCry and NotPetya, two prominent threats from last year, successfully exploited these stolen assets in their assault on systems worldwide. As 2017 progressed, new opportunities developed in ransomware-as-a-service (RaaS), opening the gates of malware-for-profit to everyone. Advancements in fileless attacks provided new ways for threats to hide from once reliable detection methods. Malware features such as polymorphism continued to play a powerful role in evading traditional defenses. The victims of cybercrime ranged from private businesses to the fundamental practices of democracy. France and the United States saw significant data breaches during their recent presidential elections. Several high-profile companies lost their customers’ personally identifiable information to cyberattacks, blemishing their brands and costing them untold millions in recovery operations. This report contains an overview of the threat trends and malware families Cylance's customers faced in 2017. This information is shared with the goal of assisting security practitioners, researchers, and individuals in our collective battle against emerging and evolving cyberthreats.
Tags : 
cyber attacks, cia, nsa, wannacry, notpetya
    
BlackBerry Cylance
Published By: Box     Published Date: Jun 22, 2018
Like other IT leaders, you know you have to modernize your IT infrastructure to become more productive, efficient, agile and competitive. So what's holding you back? Many organizations are still devoting anywhere from 60% to 80% of their time, energy, human resources and budget to supporting legacy systems rather than develop transformative solutions. Our new eBook, Your 3-step roadmap to IT modernization, will help you align your approach to IT with the way your business works today — and the way you will work in the digital age: • Increased mobility, multiple device formats and distributed workgroups • Greater collaboration with outside organizations, including customers, suppliers and partners • Essential enterprise risk management features such as compliance, legal, security and data governance Here you'll learn the three stages of IT modernization — from realigning your infrastructure to updating business processes — so you take the right steps.
Tags : 
    
Box
Published By: CA Technologies     Published Date: Jun 03, 2015
"Enterprises that depend heavily on IT to deliver services to customers are constantly driven by market pressures to better develop and release new software features to meet growing demands. Facilitating the collaboration between development and IT operations and bringing application to market faster with high quality are crucial to today’s business success. This solution brief provides insights into the DevOps movement, why it matters and how you can cross the chasm to achieve better collaboration to deliver business value rapidly. You’ll learn how CA Technologies solutions for DevOps bring your portfolio of IT technology forward in a cadence of faster, more predictable releases, letting you confirm the results of each phase of the software life cycle toward positive business outcomes."
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 04, 2015
Enterprises that depend heavily on IT to deliver services to customers are constantly driven by market pressures to better develop and release new software features to meet growing demands. Facilitating the collaboration between development and IT operations and bringing application to market faster with high quality are crucial to today’s business success. This solution brief provides insights into the DevOps movement, why it matters and how you can cross the chasm to achieve better collaboration to deliver business value rapidly. You’ll learn how CA Technologies solutions for DevOps bring your portfolio of IT technology forward in a cadence of faster, more predictable releases, letting you confirm the results of each phase of the software life cycle toward positive business outcomes.
Tags : 
    
CA Technologies
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
Modern solutions like CA PPM continue to raise the bar above last-generation IT demand management tools, continuously providing new features to ease the burden of the PMO, the financial manager, the resource manager and the product manager. In the last few years, new vendors looking to exploit the large and increasingly influential project and portfolio management (PPM) market have developed modules that “snap” into their SaaS platforms. These vendors claim their tools are easy to install, easy to manage and save customers money. It sounds too good to be true. And for most organizations, it is. Carefully consider whether you need a PPM solution that is only capable of providing low-level functionality for the project manager, or if your organization could benefit from PPM technology that provides 360-degree optics across your organization, delivers actionable business intelligence and enables extensive modeling and forecasting capabilities to make data-driven business decisions.
Tags : 
    
CA Technologies EMEA
Published By: CDW     Published Date: Jul 23, 2013
A CDW Reference Guide.
Tags : 
cdw, unified communication, contact center
    
CDW
Published By: CDW     Published Date: Jul 30, 2013
New features are remaking and improving agent-customer interactions.
Tags : 
cdw, contact center, customer service, customer organization, unified communications
    
CDW
Published By: CDW     Published Date: Jun 30, 2015
Learn how working with Adobe Creative Cloud for teams enhances the creative process with new tools, features, and simplified integration with existing IT infrastructure and applications.
Tags : 
adobe, application, cloud
    
CDW
Published By: CDW Symantec     Published Date: Sep 06, 2012
Great new features like VMware and Hyper-V backup, bare-metal disaster recovery and "no-hardware disaster recovery" all help conveniently keep your backups easily accessible and secure.
Tags : 
data recovery, backup and recovery, backup solutions, symantec, deduplication, virtualization, data storage, data management, disaster recovery
    
CDW Symantec
Published By: Cisco     Published Date: Jun 03, 2015
As demands for “right here, right now” information sharing continue to rise, today's organizations are taking a hard look at their branch and remote locations, where performance and service enablement have always been a primary indicator of companywide productivity. In this episode, the TechWiseTV team takes a dive deep into the innovations and opportunities made possible by Cisco's new 4000 family of Integrated Services Routers. Learn how the architecture and new features that make up this exciting addition to Cisco's router portfolio are bringing more exciting new levels of integration, performance, and productivity to the branch office than ever before.
Tags : 
cisco, techwise, routers, wan, productivity, performance
    
Cisco
Published By: Cisco     Published Date: Apr 10, 2015
The new Cisco Nexus® 9000 Series Switches provide features optimized specifically for the data center: high 10 and 40-Gbps port densities, reliability, performance, scalability, programmability, and ease of management. With exceptional performance and a comprehensive feature set, the Cisco Nexus 9000 Series offers versatile platforms that can be deployed in multiple scenarios, such as layered access-aggregation-core designs, leaf-and-spine architecture, and compact aggregation solutions.
Tags : 
cisco, data center, switches, optimization, scalability, storage, applications, enterprise support
    
Cisco
Published By: Cisco     Published Date: Dec 27, 2017
Cisco HyperFlex™ Systems, powered by Intel® Xeon® processors, deliver a new generation of hyperconverged solutions that are flexible, scalable, and enterprise class. They combine the software-defined networking and software-defined computing of the Cisco Unified Computing System™ (Cisco UCS®) with Cisco HyperFlex HX Data Platform software to provide a single distributed, multitier, objectbased data store with enterprise storage features
Tags : 
    
Cisco
Published By: Citrix     Published Date: Oct 26, 2017
To protect yourself against the new wave of cyber threats, you need an ADC with proven security features, such as a WAF, for all your application deployments.
Tags : 
    
Citrix
Published By: Citrix     Published Date: Jun 15, 2018
To meet the growing challenges of a competitive world economy, a digital transformation is taking place in the enterprise. Organizations realize that to be competitive they need to be more agile. They need to reach their customers wherever they are, and they need to be able to scale their applications to meet customer demands. To meet these challenges, organizations are deploying new microservice applications that are changing the application delivery environment. These applications are agile, configured to enable new features to be added without disrupting applications in production, and designed to automatically instantiate instances in response to increasing user demand. In short, microservices are drastically changing the way that applications are deployed and managed. This introduces a high level of complexity to network infrastructures because traditional applications are not going away. Applications will continue to be designed for both microservices and traditional 3-tier imple
Tags : 
    
Citrix
Start   Previous   1 2 3 4 5 6 7 8    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.