HIT Consultant Insightful coverage of healthcare innovation
 

cases

Results 251 - 275 of 585Sort Results By: Published Date | Title | Company Name
Published By: Polycom     Published Date: Jun 29, 2017
Law firms are under increasing pressure to respond quickly – often within hours – to client demands. Failure to increase agility can result in costly client churn, but law firms are often ill-equipped to be so nimble. As a result, it may be time to consider a technology that has been proven integral to law firms around the world - video collaboration. In under 30 minutes, we'll explain: Common use cases for video collaboration - going way beyond team meetings to the tasks at the heart of practicing law The types of solutions deployed - if you think an expensive, wall-mounted, on premise solution is your only option, you may be surprised by what's available From the meeting room to the courtroom - hear how a this technology is proliferating the courtroom and how the best lawyers will be equipped to take full advantage
Tags : 
video collaboration, law technology, client satisfaction, response time
    
Polycom
Published By: Oracle + Dyn     Published Date: Jun 29, 2017
DNS Speed and reliability are fundamental to the performance of your website and essential to the growth of your business. In order to overcome outages and ensure digital success it’s important to evaluate your DNS infrastructure and determine which configuration is best for your IT environment at this layer. Discover how you can use Secondary or Multi-DNS architecture to promote business continuity, and optimal DNS resolution performance. Download this Technical Brief on Secondary/Multi-DNS patterns and learn: How multi-DNS patterns can significantly improve security, reliability, and performance of your infrastructure The advantages and limitations of Primary-Secondary, Hidden Master and Primary-Primary configurations The best use cases for implementing a supplemental or secondary DNS service
Tags : 
    
Oracle + Dyn
Published By: Oracle + Dyn     Published Date: Jun 27, 2017
"DNS Speed and reliability are fundamental to the performance of your website and essential to the growth of your business. In order to overcome outages and ensure digital success it’s important to evaluate your DNS infrastructure and determine which configuration is best for your IT environment at this layer. Discover how you can use Secondary or Multi-DNS architecture to promote business continuity, and optimal DNS resolution performance. Download this Technical Brief on Secondary/Multi-DNS patterns and learn: • How multi-DNS patterns can significantly improve security, reliability, and performance of your infrastructure • The advantages and limitations of Primary-Secondary, Hidden Master and Primary-Primary configurations • The best use cases for implementing a supplemental or secondary DNS service Learn more! "
Tags : 
    
Oracle + Dyn
Published By: MarkLogic     Published Date: Jun 21, 2017
Remember Y2K – the IT “problem” that should have brought businesses to a screeching half? Despite the hype, the preparation led to widely documented business benefits and uncovered new opportunities that transformed organizations worldwide. Similarly in today’s highly regulated Financial Services industry, enabling GRC by integrating data from silos can be the driver for future business use cases like machine learning and anti-fraud detection services. GRC can be your catalyst for new opportunities. Listen in as our panel of financial services experts discuss the keys to reinventing your data strategy. We’ll cover: How to align your GRC strategy with a business transformation agenda How to ensure your organization’s approach to data management isn’t just a one-off solution, but a comprehensive one adaptable to changing regulations How to navigate the increasing regulatory demands for granular data security How to turn your compliance spend into new opportunities to earn revenue
Tags : 
banking, financial services, data management, silos, data strategy, transparency, data governance, regulation, data architecture, compliance, reporting, business transformation, fraud, digital transformation
    
MarkLogic
Published By: IBM     Published Date: Jun 21, 2017
NoSQL databases and Apache Spark are a potent combination for rapid integration, transformation and analysis of all kinds of business data. With its data syncing and analytics capabilities, IBM Cloudant offers unique advantages as a NoSQL database for many Spark use cases. IT decision-makers, data scientists and developers need to know how and when to apply these technologies most effectively. IBM can offer a host of resources and tools to help your organization gain value from Cloudant and Spark quickly, and with minimal up-front investment.
Tags : 
ibm, ibm cloudant, apache spark, nosql, database
    
IBM
Published By: 8x8 Inc.     Published Date: Jun 16, 2017
In today’s highly competitive business environment, top companies will be the ones that have developed innovative ways to create stellar communications experiences that keep the end users engaged—employees and customers alike. Video and Web conferencing have become well-established tools to drive rich internal as well as external communications. However, to make an impact, these collaboration tools must be reliable and intuitive to use. Continuous communication offers hassle-free integrated user experiences that fit today’s mobile work styles. Technology advancements and changing perceptions are opening up innovative opportunities, which offer businesses new avenues to create a competitive edge. Smart companies must catch on or get left behind.
Tags : 
market shaping trends, consumerization, user-driven it, web conferencing, solution spotlight, 8x8 virtual office meetings, use cases, customer examples
    
8x8 Inc.
Published By: Mitto     Published Date: Jun 09, 2017
A2P (Application to Person) messaging has underpinned this transformation, across a wealth of new use cases and new verticals. Historically, A2P was used for alerts and, as PSMS (Premium SMS), as a billing mechanism and carrier for simple content and services, both for one-off downloads or actions (eg voting) and for recurring payments. The latter use case has declined markedly in the past 5 years, due largely to the transition to an app-based economy, largely driven by card billing and by regulatory action (in markets such as the US and UK) against fraudsters.
Tags : 
    
Mitto
Published By: Akamai Technologies     Published Date: May 05, 2017
Web application and DDoS attacks hit enterprises without warning or reason. Most Distributed Denial of Service (DDoS) attacks require little skill to launch with attackers can simply rent resources from DDoS-for-hire sites at a low cost.. In comparison, DDoS attacks typically result in: • Operational disruption • Loss of confidential data • Lost user productivity • Reputational harm • Damage to partner and customer relations • Lost revenue Depending on your industry, that could add up to tens of thousands of dollars in damage – and in some cases it could be millions. Only 2% of organizations said their web applications had not been compromised in the past 12 months – 98% said they had.
Tags : 
ddos, technical support, data security, application security
    
Akamai Technologies
Published By: Entrust Datacard     Published Date: Apr 26, 2017
Document signing certificates enable organizations to digitally sign Adobe®, Microsoft Office® and other document types, marking them with visual trust indicators that verify the publisher’s identity—an indication that the document has not been altered. With document signing certificates organizations can authenticate documents, allowing for secure and efficient electronic transmission of official papers including legal documents, invoices, engineering plans and diagrams, diplomas, charters and more while reducing costs associated with printing and maintaining paper files. This white paper will discuss: The history of document signing What digital signatures are and how they function The benefits and objectives of implementing document signing certificates Real world use cases of document signing certificates
Tags : 
    
Entrust Datacard
Published By: Alteryx, Inc.     Published Date: Apr 21, 2017
The traditional multiple-step, multi-tool legacy approach is a slow, time-consuming, and in most cases, a costly process that prevents organizations from making faster decisions with confidence. Data analysts today need an agile solution that empowers them to take charge of the entire analytics process. Download The Definitive Guide to Self-Service Data Analytics to: Understand why traditional analytic tools designed for data scientists are not ideal for data analysts like you Learn how self-service data analytics delivers the ease of use, speed, flexibility, and scalability you require See how Alteryx stacks up against traditional data prep and analytics tools
Tags : 
    
Alteryx, Inc.
Published By: Genesys     Published Date: Apr 07, 2017
Contact center infrastructure (CCI) evaluation is a technically complex process. This challenge is further complicated by the different requirements for omnichannel, high availability and integration as part of a customer engagement center (CEC). Get this report now to learn: - 9 critical capabilities for evaluating contact center infrastructure - 3 use cases that reflect most decisions organizations need to make when looking at CCI – multichannel compact suite, high volume call center and customer engagement center - Which vendor scores the highest in 3 use cases across 9 capabilities
Tags : 
genesys, contact center infrastructure, cci, contact center engagement, cec
    
Genesys
Published By: CA Technologies     Published Date: Apr 06, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders.1 There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : 
cyber security, cyber attack, it security, threat analytics, risk mitigation, data security
    
CA Technologies
Published By: Datastax     Published Date: Apr 04, 2017
Graph databases are changing how we use data. But first, an example – you're (probably) a human working on a project and looking at graph databases as a potential solution. While we're a company that has a graph database that hopefully solves your problem. Now we could store that data in a boring relational database, but how do we do more than that? For instance, using that data, when combined with other data points, to find other people like you and recommend our solution to them? This is where a graph can come in handy. The friendly graph data model makes it easy to use patterns of relationships within large data sets. By leveraging those relationships we can analyze, or create better real-time experiences. Why Graph explores why this graph database 'thing' is really a thing, how they compare to other database systems, and the use cases they best support.
Tags : 
graph, database, datastax
    
Datastax
Published By: McAfee     Published Date: Mar 31, 2017
Data Protection is no longer just a problem that resides at the endpoint. This ebook takes you through the top use cases, ranging from visibility and control of sanctioned/unsanctioned cloud applications to demonstrating compliance across cloud environments.
Tags : 
data protection, cloud data protection, cloud applications, visibility of data, unauthorized sharing data, device proliferation, data protection strategy, cloud visibility, shadow it, compliance
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
This paper reviews five use cases, ranging from accidental policy violations by an insider to malicious thefts by unknown applications or stolen credentials, and presents the measurable benefits of an integrated security solution and the capabilities of pervasive data protection.
Tags : 
unified data protection, data protection, pervasive data protection, optimized data lifecycle security, optimized data security
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
The Adwind Remote Administration Tool is a backdoor Trojan written in Java language that targets various platforms that support Java files. Adwind does not exploit any vulnerabilities. In most cases, for an infection to succeed, the user must run the malware by double-clicking the .jar file that is usually distributed as an attachment, or opening an infected Microsoft Word document. The infection spreads if the Java Runtime Environment is installed on the user's computer. After the malicious .jar file is executed on the target system, the malware installs silently and connects to a remote server via a preconfigured port to receive commands from a remote attacker and perform other illegal operations.
Tags : 
backdoor trojans, trojan protection, malware, malware protection
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
The Adwind Remote Administration Tool is a backdoor Trojan written in Java language that targets various platforms that support Java files. Adwind does not exploit any vulnerabilities. In most cases, for an infection to succeed, the user must run the malware by double-clicking the .jar file that is usually distributed as an attachment, or opening an infected Microsoft Word document. The infection spreads if the Java Runtime Environment is installed on the user's computer. After the malicious .jar file is executed on the target system, the malware installs silently and connects to a remote server via a preconfigured port to receive commands from a remote attacker and perform other illegal operations.
Tags : 
backdoor trojans, trojan protection, malware, malware protection
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
The Adwind Remote Administration Tool is a backdoor Trojan written in Java language that targets various platforms that support Java files. Adwind does not exploit any vulnerabilities. In most cases, for an infection to succeed, the user must run the malware by double-clicking the .jar file that is usually distributed as an attachment, or opening an infected Microsoft Word document. The infection spreads if the Java Runtime Environment is installed on the user's computer. After the malicious .jar file is executed on the target system, the malware installs silently and connects to a remote server via a preconfigured port to receive commands from a remote attacker and perform other illegal operations.
Tags : 
backdoor trojans, trojan protection, malware, malware protection
    
McAfee
Published By: Polycom     Published Date: Mar 28, 2017
Engineering firms are under increasing pressure to deliver on billable ratios, while the IT teams that support them are asked to minimize their administrative burden on the firm. What if a lead engineer could visit a job site without leaving the office? What if you could meet face-to-face with clients, partners, or subcontractors more frequently while budgeting less for travel costs? Watch this video to learn how collaboration technology allows you to be more agile, efficient, and effective. In under 30 minutes, we'll explain: • Common use cases for video collaboration - going way beyond team meetings to the tasks at the heart of engineering • Collaboration solution innovations - if you think an expensive, wall-mounted, on-premises solution is your only option, you may be surprised by what's available • Success stories - hear how a leading engineering firm is putting these solutions to use and the impact it has on their business
Tags : 
engineer, engineering, collaboration, billable, video, communication, content-sharing, client, contractor, consulting, consultant, technology, polycom, microsoft, skype, lync, project
    
Polycom
Published By: Polycom     Published Date: Mar 27, 2017
Engineering firms are under increasing pressure to deliver on billable ratios, while the IT teams that support them are asked to minimize their administrative burden on the firm. What if a lead engineer could visit a job site without leaving the office? What if you could meet face-to-face with clients, partners, or subcontractors more frequently while budgeting less for travel costs? Watch this video to learn how collaboration technology allows you to be more agile, efficient, and effective. In under 30 minutes, we'll explain: • Common use cases for video collaboration - going way beyond team meetings to the tasks at the heart of engineering • Collaboration solution innovations - if you think an expensive, wall-mounted, on-premises solution is your only option, you may be surprised by what's available • Success stories - hear how a leading engineering firm is putting these solutions to use and the impact it has on their business
Tags : 
engineer, engineering, collaboration, billable, video, communication, content-sharing, client, contractor, consulting, consultant, technology, polycom, microsoft, skype, lync, project
    
Polycom
Published By: Sitecore     Published Date: Mar 27, 2017
Gartner’s Critical Capabilities report helps you understand the evolving role of WCM, five use cases to consider, and how 19 WCM vendors score on each of the use case criteria.
Tags : 
    
Sitecore
Published By: Tracx     Published Date: Mar 08, 2017
"With more than 2.3 billion active users worldwide, social media has officially gone from a ""nice-to-have"" to a ""must-have"" — and not just for consumer-facing companies. Listen as a panel of experts has a no-holds-barred discussion of how B2B CMOs can build A+ social businesses from the top down. In this webinar, you'll learn: *The biggest areas of opportunity for B2B social media *The 3 types of social CMOs *How to manage expectations and find your internal champions *Real-world use cases and best practices from CMOs just like you Hear from three socially savvy CMOs with a diverse range of experiences at companies large and small: Nick Panayi, Head of Global Brand & Digital Marketing at CSC; Jason Jue, CMO at Triblio; and Jenifer Kern, CMO at Tracx."
Tags : 
b2b social media, b2c social media, enterprise social, media engagement, media listening, media platform, media technology, social analytics, social analytics media, social engagement, social listening, social marketing, social media, social monitoring, social monitoring media, social optimization, social publishing, social roi tool, social software, social software media
    
Tracx
Published By: VMware     Published Date: Mar 03, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: Sitecore     Published Date: Feb 24, 2017
Gartner’s Critical Capabilities report helps you understand the evolving role of WCM, five use cases to consider, and how 19 WCM vendors score on each of the use case criteria.
Tags : 
gartner critical capabilities, wcm, web content management, digital business strategy, digital roadmap
    
Sitecore
Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.