HIT Consultant Insightful coverage of healthcare innovation
 

rum

Results 426 - 450 of 482Sort Results By: Published Date | Title | Company Name
Published By: Texas Instruments     Published Date: Aug 21, 2009
Download this whitepaper now and read how WLAN technology embedded in CE devices offers consumers a glimmer of hope that someday soon they will be free to experience their media content on their terms.
Tags : 
wireless, wlan, ce device, consumer electronics, electronics, digital media, vcr, tivo
    
Texas Instruments
Published By: Texas Instruments     Published Date: Aug 21, 2009
Designing wireless local area networking (WLAN) capabilities into stationary customer electronics (CE) systems is most successful when certain design issues are considered early in the development cycle.
Tags : 
wireless lan, wlan, wlans, consumer electronics, ce systems, vcr, consumer electronic, ce design
    
Texas Instruments
Published By: Texas Instruments     Published Date: Nov 06, 2006
Read how the Next Generation Residential Gateway (RG) is capable of supporting the ever increasing need for higher data throughput rates, signaling range that covers the whole house and robustness capable of mitigating the sources of interference found in the home.
Tags : 
bandwidth, residential gateways, bandwidth management, home networking, wireless networking, consumer electronics, texas instruments
    
Texas Instruments
Published By: Texas Memory Systems     Published Date: Feb 25, 2012
It is common knowledge that PCIe SSD is faster, right? Maybe not, says George Crump from Storage Switzerland. Read on to find out why.
Tags : 
pcie, pcie ssd, ssd, architecture, design, zero-latency, retrieval, solid state storage
    
Texas Memory Systems
Published By: Thawte     Published Date: Jan 19, 2016
In „Erste Schritte mit Thawte SSL/TLS“ erläutern wir in leicht verständlicher Form, wie SSL/TLS diese Vertrauenswürdigkeit herstellt und warum nicht alle SSL/TLS-Zertifikate und die ausstellenden Zertfizierungsstellen (Certificate Authority, CA) gleich sind.
Tags : 
    
Thawte
Published By: The Starr Conspiracy     Published Date: Mar 29, 2013
Message is the most important of all marketing elements. Great messages change the destinies of companies and people. Without message, brand and promotion are crude instruments. Read and learn how the best messages are bold, compelling and polarizing
Tags : 
message manifesto, brand, promotion, white paper, polarizing, bold, compelling, starr conspiracy
    
The Starr Conspiracy
Published By: Trend Micro Inc.     Published Date: Jun 06, 2012
Includes "Top 5 Reasons Why Companies Allow Employees to Use Personal Devices for Work," and "3 Steps Toward Consumerization"
Tags : 
trendmicro, trend micro, trend, threat, security, security challenges, mobility, spectrum
    
Trend Micro Inc.
Published By: Trend Micro Inc.     Published Date: Jun 06, 2012
TrendLabs Q1 2012 report highlights Trend Micro's success in predicting and stopping new threats.
Tags : 
trendmicro, trend micro, trend, threat, security, security challenges, mobility, spectrum
    
Trend Micro Inc.
Published By: Trend Micro Inc.     Published Date: Jun 06, 2012
Introduces Trend's Threat Research Group and provides a look at tomorrow's threats and security challenges that cover the Spectrum of Computing including mobility from the perspective of an industry leader.
Tags : 
trendmicro, trend micro, trend, threat, security, security challenges, mobility, spectrum
    
Trend Micro Inc.
Published By: Trend Micro SaaS     Published Date: Apr 02, 2009
Gehostete (d. h. webbasierte) Lösungen für Messaging-Sicherheit finden bei Unternehmen aller Größen immer mehr Anklang. Einige haben sich bereits für gehostete Services entschieden, während andere sich langsam mit der Idee anfreunden und nun eher Services von Dritten zur Verwaltung ihrer Sicherheits-infrastruktur nutzen als noch vor einem Jahr. Entscheidungsträger erkennen gerade jetzt im Zuge der aktuellen Wirtschaftskrise, dass gehostete Lösungen für E-Mail-Sicherheit eine kostengünstige Alternative darstellen und gleichzeitig die Sicherheit erhöhen.
Tags : 
trend micro, messaging-sicherheit, lösungen, osterman research, messaging-services, prozentsatz
    
Trend Micro SaaS
Published By: TriNet     Published Date: Nov 08, 2017
Human resource outsourcing is a complex industry with a broad spectrum of products and services that can be bundled or delivered a la carte. This paper identifies the complexities and potential risks for small businesses considering outsourcing HR.
Tags : 
    
TriNet
Published By: Tripwire     Published Date: Jun 30, 2009
Understand the compliance requirements of the European Union's Markets in Financial Instruments Directive (MiFiD), and how controlling IT change addresses many of those requirements.
Tags : 
tripwire, mifid, compliance, requirements, europe, markets, european union, financial
    
Tripwire
Published By: Turn     Published Date: Mar 09, 2016
This webinar will look at how a smart approach to viewability can drive better campaign results and optimize marketing ROI. Guest speaker Susan Bidel of Forrester Research and Lori Gubin of Turn will examine how viewability can support digital branding in display and video, where viewability fits in the spectrum of brand metrics, and how advertisers can avoid common viewability-related pitfalls.
Tags : 
programmatic, video advertising, impression quality, dsp, demand side platform, viewable campaigns, viewability, measurement
    
Turn
Published By: Turn     Published Date: Mar 09, 2016
This webinar will look at how a smart approach to viewability can drive better campaign results and optimize marketing ROI. Guest speaker Susan Bidel of Forrester Research and Lori Gubin of Turn will examine how viewability can support digital branding in display and video, where viewability fits in the spectrum of brand metrics, and how advertisers can avoid common viewability-related pitfalls.
Tags : 
programmatic, video advertising, impression quality, dsp, demand side platform, viewable campaigns, viewability, measurement
    
Turn
Published By: Uberall     Published Date: Aug 26, 2019
Besuchen Kunden Ihre Website, sollen sie möglichst das bekommen, was sie suchen: Die Produkte oder die Services, für die Ihre Marke steht. Aber wie kommen sie dahin, wenn sie diese nicht online kaufen können – oder wollen?
Tags : 
kunden, filialen, produkten, produkte
    
Uberall
Published By: Veeam '18     Published Date: May 01, 2019
Il ransomware è al primo posto nei pensieri dei leader di molte organizzazioni poiché queste ultime devono affrontare le conseguenze potenzialmente disastrose degli attacchi riusciti. ESG ha intervistato i leader e le organizzazioni IT per scoprire la reale portata del problema ransomware, quali sono le conseguenze economiche delle interruzioni causate da questi attacchi e quali sono le best practice e le capacità che le organizzazioni devono applicare per essere protette. Secondo la ricerca ESG, quasi i due terzi delle organizzazioni intervistate in tutto il Nord America e l'Europa occidentale hanno subito un attacco ransomware a un certo punto dell'anno scorso, e il 22% ha riportato attacchi settimanali. Gli attacchi hanno contribuito a rendere la sicurezza informatica un obiettivo dell'investimento IT e la spesa in questo senso sta accelerando. Ciò che è necessario per respingere questa epidemia sono le best practice e gli strumenti per: • Prevenire o almeno mitigare gli attacchi •
Tags : 
    
Veeam '18
Published By: Veeam '18     Published Date: May 01, 2019
VMware Cloud su Amazon Web Services (AWS) è un servizio on-demand che ti consente di eseguire applicazioni in ambienti cloud basati su vSphere con l’accesso a un’ampia gamma di servizi AWS. Supportato dalla VMware Cloud Foundation, questo servizio integra vSphere, vSAN e NSX insieme alla gestione di VMware vCenter ed è ottimizzato per l’esecuzione su un’infrastruttura AWS, dedicata, elastica e bare metal. Grazie a VMware Cloud su AWS, i team IT possono gestire le risorse basate sul cloud con strumenti VMware a loro familiari. Questa panoramica della soluzione offre una descrizione di come il supporto Veeam su AWS consente ai clienti di accelerare l’adozione delle implementazioni di cloud ibrido con la possibilità di copiare, replicare o migrare i carichi di lavoro sul cloud AWS in modo semplice ed efficiente e sfruttare gli investimenti esistenti nelle tecnologie Software-Defined Data Center (SDDC) di VMware.
Tags : 
    
Veeam '18
Published By: Veeam '18     Published Date: May 07, 2019
Die mechanische Art der Produktion ist eine Illusion. Die Produkte von heute sind sehr stark auf die Datenverfügbarkeit angewiesen, wobei die Produktionslinie im Zentrum eines expandierenden digitalen Netzwerkes befindet, das Lieferanten, Vertriebshändler, Partner und Kunden miteinander verbindet. Kundenanpassung, Just-in-Time-Bestandsführung, Rechte des geistigen Eigentums und Wettbewerb sind in einem modernen Produktionsunternehmen miteinander verflochten.
Tags : 
    
Veeam '18
Published By: Veeam '18     Published Date: May 07, 2019
In diesem fünfminütigen, leicht lesbaren Dokument wird erläutert, warum Unternehmen Office 365-Daten schützen müssen. Dieser Bericht zeigt Ihnen: • Das große Missverständnis zwischen der Verantwortung von Microsoft und den IT-Organisationen • 6 Gründe, warum die Sicherung von Office 365 von entscheidender Bedeutung ist • Wer kontrolliert Office 365-Daten?
Tags : 
    
Veeam '18
Published By: VeriSign Incorp.     Published Date: Jan 15, 2008
Provide your users with visual cues that indicate your site is secure. Extended Validation SSL can facilitate online commerce by increasing visitor confidence and reducing the effectiveness of phishing attacks.
Tags : 
shopping online, ssl certificate, extended validation, ca/browser forum, ssl certification authorities, certificate authority, ssl certificates, identity authentication
    
VeriSign Incorp.
Published By: Veritas     Published Date: Oct 03, 2016
Dieses Whitepaper fasst zusammen, warum Backup- und Wiederherstellungslösungen dringend modernisiert werden müssen und beschreibt wichtige Anforderungen an mögliche Lösungen sowie den einzigartigen Funktionsumfang der Veritas NetBackup™-Appliances für eine einfache, vollständige und kostengünstige Lösung.
Tags : 
    
Veritas
Published By: Viavi Solutions     Published Date: Oct 11, 2013
Network teams are increasingly being told by management to track and manage the end user's experience without any clear guidance as to its meaning.
Tags : 
monitoring metrics, user experience, it managers, user experience metrics, essential monitoring, network teams, track users, network world
    
Viavi Solutions
Published By: Viavi Solutions     Published Date: Oct 11, 2013
Managing UC means delivering streaming video fluidly, transmitting voice with clarity, moving IM's briskly, and send emails promptly. Easier said than done. To succeed from setup to show time, take these three tips to achieve the high performance end-users expect.
Tags : 
us applications, shortcuts to success, uc success, network instruments, achieve high performance, end-users, user expectations, network environment
    
Viavi Solutions
Published By: Viavi Solutions     Published Date: Oct 11, 2013
The background of IPv6 is well known. Given how long OS vendors and Cisco have been ready for the change, you would think upgrading VoIP systems would be an easy thing.
Tags : 
voip system, ipv6, system hardware, ipv6 impact, voip vendors, security, isp and network translating, voip security threats
    
Viavi Solutions
Published By: Viavi Solutions     Published Date: Jan 06, 2014
Are Agents Necessary For Accurate Monitoring?
Tags : 
network instruments, network performance, infrastructure health, tracking the network
    
Viavi Solutions
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.