HIT Consultant Insightful coverage of healthcare innovation
 

cases

Results 401 - 425 of 606Sort Results By: Published Date | Title | Company Name
Published By: K2     Published Date: Jan 07, 2016
The business context for process excellence and business process management (BPM) has changed dramatically since the 2009-to-2010 recession. During the recession, BPM software and services saw impressive double-digit growth as a result of enterprises slashing costs and boosting worker productivity. Now, executive agendas have shifted to focus on growing revenue, expanding the customer base, and delivering new digital products and services. Enterprise and process architects are reshaping their business cases for BPM around these new drivers. This is not an easy task. However, process excellence will play a critical role for forward-thinking enterprise architects that invest the time to link BPM to new front-office drivers to help the organization drive digital transformation. This report replaces “Building The Case For Your BPM Initiative” in the business process management playbook and provides guidance on developing revenue and customer-focused business cases.
Tags : 
bpm, business process management, process excellence, best practices
    
K2
Published By: Druva     Published Date: Jan 06, 2016
Compiled from real life use cases, Blue Hill Research examined how organizations are gaining greater value from their archive of user data, converging data availability, archiving and governance to meet their wider data management needs.
Tags : 
druva, blue hill, enterprise, archive, data, user data
    
Druva
Published By: Samsung     Published Date: Dec 18, 2015
This paper will outline the value of the Internet of Things, highlight several key use cases, address the issues of privacy and security, and offer best practices for achieving success.
Tags : 
    
Samsung
Published By: Cisco     Published Date: Dec 07, 2015
This part of the CVD describes design considerations to implement a successful BYOD solution and different deployment models to address diverse business cases.
Tags : 
cisco, design, byod, deployment
    
Cisco
Published By: Cisco     Published Date: Dec 04, 2015
This design guide summary provides you with an overview of the Cisco Intelligent WAN Design Guide, the key technology, the use cases it provides, and additional and related resources.
Tags : 
wan, applications, design guide, summary, technology
    
Cisco
Published By: Cisco     Published Date: Dec 04, 2015
This part of the CVD describes design considerations to implement a successful BYOD solution and different deployment models to address diverse business cases.
Tags : 
cisco, design, byod, deployment
    
Cisco
Published By: Looker     Published Date: Dec 03, 2015
Everywhere you look, companies are using external-facing analytics to maximize the value derived from their data assets, by moving customers up the value chain, increasing stickiness, and offering a more competitive product on the marketplace. Listen to learn about embedding BI software, including; • Top uses cases for embedding business intelligence software • Case studies from different companies currently embedding BI • Build vs buy considerations • Evaluating ROI
Tags : 
    
Looker
Published By: Evident.io     Published Date: Nov 23, 2015
AWS is the most widely deployed public cloud infrastructure as a service (IaaS) solution in the world and is a leader in Gartner's Magic Quadrant for IaaS (see "Magic Quadrant for Cloud Infrastructure as a Service"). AWS offers a large number of built-in security capabilities (see Note 1), and questions on the proper practices for securing workloads in AWS are increasing.1 AWS is a not a "consumer grade" IaaS cloud. It is a market leader, with a portfolio of security capabilities and security ecosystem partners unmatched by other IaaS providers. However, simply moving existing workloads to AWS without rethinking security tools, processes and system management will result in workloads that are less secure than they were when located within enterprise data centers. Conversely, a properly managed and secured workload in AWS will be at least as — and, in most cases, more — secure than in an enterprise data center.
Tags : 
security, best practices, web services, amazon, workload, aws, data centers, enterprise
    
Evident.io
Published By: Evident.io     Published Date: Nov 19, 2015
Collaboration services, email, managed services, and backups and disaster recovery are the most common current use cases for cloud services, according to the results of a new SANS survey on cloud security. The 485 IT professionals who participated in the survey reported using a variety of cloud providers and service models, including software-as-aservice (SaaS) cloud offerings, along with a fairly even mix of infrastructure-as-a-service (IaaS) and platform-as-a-service (PaaS) implementations. Most respondents said they are investing in both public and private clouds as needs dictate.
Tags : 
evident, cloud security, collaboration services, 485 it, disaster recovery, cloud services, saas
    
Evident.io
Published By: Cisco     Published Date: Nov 18, 2015
This part of the CVD describes design considerations to implement a successful BYOD solution and different deployment models to address diverse business cases. Other parts of the CVD provide more details on how to implement unique use cases.
Tags : 
cisco, design summary, byod, network
    
Cisco
Published By: Cisco     Published Date: Nov 18, 2015
Cisco® Validated Designs provide the foundation for systems design based on common use cases or current engineering system priorities. They incorporate a broad set of technologies, features, and applications to address customer needs. Cisco engineers have comprehensively tested and documented each Cisco Validated Design in order to ensure faster, more reliable, and fully predictable deployment. This design guide summary provides you with an overview of the Cisco Intelligent WAN Design Guide, the key technology, the use cases it provides, and additional and related resources.
Tags : 
cisco, intelligent wan, validated designs, systems design
    
Cisco
Published By: Cisco     Published Date: Nov 17, 2015
The introduction of innovative new form factors, software infrastructure and cloud services is reshaping enterprise video collaboration. The following vendors offer potential for greater reach, scale and interoperability while addressing the most critical video use cases.
Tags : 
cisco, gartner, magic quadrant, video collaboration, enterprise videos
    
Cisco
Published By: Cisco     Published Date: Nov 17, 2015
“Innovation” is an overused term. The smallest adjustments, the most trivial enhancements, and the least impactful improvements are often trumpeted as innovative. But every once in a while, something truly groundbreaking and transformative comes our way—disrupting longstanding assumptions and norms in the process. This edition of Unleashing IT showcases Cisco’s holistic approach to the future of networking: application Centric Infrastructure (aCI). Promoted by Cisco, Intel®, and ecosystem partners, aCI is a true innovation that changes the way technology is delivered in support of business priorities
Tags : 
cisco, innovation, aci, application centric infrastructure
    
Cisco
Published By: Cisco     Published Date: Nov 17, 2015
Gain Immediate Value from Your Connected Factory Architecture! Imagine if you could reconfigure your production line in days instead of weeks. Or if you could cut long search times for parts in half using factory wireless across a connected factory architecture. These are only a few of the reasons why leading manufacturers deploy Cisco’s Connected Factory Solution. Now you can try out these new technologies and capabilities on a small scale, with low financial risk in your own plant with the Cisco Connected Factory Starter Kit. Create a living lab and test out one or more specific use cases. Use it as a demo to get buy in from stakeholders. Or get one production line up and running immediately and roll out a more comprehensive deployment later on.
Tags : 
cisco, connected factory, starter kit, manufacturing process management, programmable logic controllers, plcs, wireless equipment connectivity, convergence
    
Cisco
Published By: Dell EMC     Published Date: Nov 10, 2015
This paper discusses some of the common myths about flash, new use cases for the technology, and specific solutions that should put flash on your radar, no matter the size of your organization.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: Nov 09, 2015
This business-oriented white paper summarizes the wide-ranging benefits of the Hadoop platform, highlights common data processing use cases and explores examples of specific use cases in vertical industries. The information presented here draws on the collective experiences of three leaders in the use of Hadoop technologies—Dell and its partners Cloudera and Intel.
Tags : 
    
Dell EMC
Published By: Panasonic     Published Date: Nov 09, 2015
This report will discuss which industries are set to gain the most from IoT, which use cases may be the most innovative, and how business leaders can strategically move towards an ever-connected enterprise landscape.
Tags : 
panasonic, data, enterprise, data
    
Panasonic
Published By: Dell EMC     Published Date: Nov 02, 2015
This paper examines enterprise-class snapshot technologies, discussing use cases for snapshots as well as classic challenges associated with using snapshot technologies in pure hard disk drive (HDD)–based arrays.
Tags : 
emc, afa, enterprise, hdd, array
    
Dell EMC
Published By: Intel Security     Published Date: Oct 21, 2015
In this brief, we’ll take a look at common use cases that show how integration between McAfee Advanced Threat Defense and other security controls from McAfee, a part of Intel Security, create a multipronged strategy designed to make enterprise defenses both more effective in detecting previously unknown malware and globally responsive when a new attack occurs.
Tags : 
mcafee, intel, security, threat, strategy
    
Intel Security
Published By: Citrix Systems     Published Date: Oct 16, 2015
Cases for App Virtualization
Tags : 
app virtualization, data, secure access, productivity, corporate resource
    
Citrix Systems
Published By: Dell EMC     Published Date: Oct 12, 2015
This business-oriented white paper explains four options for starting your Hadoop journey. This paper also outlines the benefits of Hadoop and highlights some of the many use cases for this new approach to managing, storing and processing big data.
Tags : 
    
Dell EMC
Published By: LogMeIn     Published Date: Oct 08, 2015
Read this report to find out how remote support tools are used across service disciplines in a variety of use cases.
Tags : 
remote support trends, remote support, web collaboration, support solutions, remote support tools
    
LogMeIn
Published By: K2     Published Date: Oct 08, 2015
This report replaces “Building The Case For Your BPM Initiative” in the business process management playbook and provides guidance on developing revenue and customer-focused business cases.
Tags : 
    
K2
Published By: Cloud Sherpas     Published Date: Oct 08, 2015
Watch this webinar replay to explore common retail uses cases for Google Apps for Work in detail and discover how adopting these solutions can help you create a more collaborative environment for your organisation.
Tags : 
apps for retail, google for work, consumer experiences
    
Cloud Sherpas
Published By: Dell EMC     Published Date: Oct 08, 2015
This paper discusses how the many Dell | Cloudera Hadoop solutions help organizations of all sizes, and with a variety of needs and use cases, tackle their big data requirements.
Tags : 
    
Dell EMC
Start   Previous    16 17 18 19 20 21 22 23 24 25    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.