HIT Consultant Insightful coverage of healthcare innovation
 

implementation

Results 276 - 300 of 646Sort Results By: Published Date | Title | Company Name
Published By: XO Communications     Published Date: Apr 13, 2015
Use this step-by-step guide from enterprise technology expert David Linthicum to help improve your network to handle services delivered from multiple clouds. With the right network infrastructure, it is much easier to connect, secure and speed up delivery of all of the cloud applications and services consumed by your organized. No matter where you are in your cloud implementations, learn best practices and strategies in this eBook series focused on Building the Network that Empowers Digital Business. Part 2 of the series, this guide focuses on best practices and creating a master implementation plan. Interested in crafting your strategy and business case for using multiple clouds, watch for Part 1 in the series "The Evolution from Network to Multi-Clouds."
Tags : 
    
XO Communications
Published By: XO Communications     Published Date: Apr 13, 2015
One of the leading ways that today’s organizations are providing secure, reliable and scalable answers for their networking needs is through MPLS IP-VPN network usage. However, businesses are also looking to create Intelligent WAN that integrates security, application performance management, and cloud services in order to create more intelligent wide area networks. This paper examines how to use the attributes of MPLS-based VPNs to enable enterprises to create a truly intelligent WAN, discussing key planning, implementation and management considerations to pave the way for a more intelligent and cloud-enabled WAN.
Tags : 
    
XO Communications
Published By: Cisco     Published Date: Apr 10, 2015
The Cisco Intelligent WAN (IWAN) solution provides design and implementation guidance for organizations looking to deploy wide area network (WAN) transport with a transport-independent design (TID), intelligent path control, application optimization, and secure encrypted communications between branch locations while reducing the operating cost of the WAN. IWAN takes full advantage of cost-effective transport services in order to increase bandwidth capacity without compromising performance, reliability, or security of collaboration or cloud-based applications.
Tags : 
cisco, wan, iwan, network transport, path control, cloud computing
    
Cisco
Published By: Cyveillance     Published Date: Apr 03, 2015
Protecting a business – including its information and intellectual property, physical infrastructure, employees, and reputation – has become increasingly difficult. Online threats come from all sides: internal leaks and external adversaries; domestic hacktivists and overseas cybercrime syndicates; targeted threats and mass attacks. And these threats run the gamut from targeted to indiscriminate to entirely accidental. Like many security trends and frameworks, the early stages of adoption often involve inconsistent definitions, challenges with justification and management communication and an unknown path to implementation. In this white paper, we: • Review the current threatscape and why it requires this new approach • Offer a clarifying definition of what cyber threat Intelligence is • Describe how to communicate its value to the business and • Lay out some concrete initial steps toward implementing Intelligence-Led Security
Tags : 
intellectual property, hackers, protection, leaks, security, threatscape
    
Cyveillance
Published By: Altiscale     Published Date: Mar 30, 2015
Implementing and scaling Hadoop to analyze large quantities of data is enormously complicated. Unforeseen, very challenging problems are to be expected. However, if you can learn to recognize the problems before a fire starts, you can prevent your hair (and your Hadoop implementation) from igniting. From the Hadoop experts at Altiscale, here are some of the danger signs and problems you should watch out for, as well as real-world lessons learned for heading them off.
Tags : 
implementing and scaling, data analysis, hadoop scaling
    
Altiscale
Published By: Altiscale     Published Date: Mar 30, 2015
This industry analyst report describes important considerations when planning a Hadoop implementation. While some companies have the skill and the will to build, operate, and maintain large Hadoop clusters of their own, a growing number are choosing not to make investments in-house and are looking to the cloud. In this report Gigaom Research explores: • How large Hadoop clusters behave differently from the small groups of machines developers typically use to learn • What models are available for running a Hadoop cluster, and which is best for specific situations • What are the costs and benefits of using Hadoop-as-a-Service With Hadoop delivered as a Service from trusted providers such as Altiscale, companies are able to focus less on managing and optimizing Hadoop and more on the business insights Hadoop can deliver.
Tags : 
hadoop implementation, hadoop cluster, hadoop-as-a-service, managing and optimizing
    
Altiscale
Published By: Storiant     Published Date: Mar 16, 2015
This Technology Spotlight examines the issues that are driving organizations to replace older archive and backup-and-restore systems with business continuity and always-available solutions that can scale to handle extreme data growth while leveraging a cloudbased pricing model.
Tags : 
storiant, data growth, data center, online data, data storage, storiant, big data, analytics implementations, cloudbased pricing model, long-term storage services solution, long-term storage market
    
Storiant
Published By: Okta     Published Date: Mar 09, 2015
Many companies believe Active Directory Federation Services (AD FS) is the best choice for applications to integrate with AD. After all, both Active Directory and AD FS are from Microsoft and AD FS is 'free,' so that should be the best choice, right? Not quite. it’s important to realize that not all Active Directory integration solutions are created equal, and IT departments should examine all aspects of implementation when considering a solution. Read this whitepaper and learn what to examine when integrating cloud applications to AD via AD FS.
Tags : 
active directory federation services, integration, it departments, cloud-based identity, access management service, web-based application integrations
    
Okta
Published By: Coupa Software     Published Date: Mar 05, 2015
For mid-size and larger organizations, it's critical to have efficient eProcurement and Procure-to-Pay (P2P) solutions that work closely with their installed financial structure (most likely ERP systems, like those from Oracle and SAP). This report provides guidance not only around the technical steps involved in integrations, but also the human and organizational readiness required to make cloud P2P and ERP integration a success - along with a real-life implementation case study.
Tags : 
sap, erp integration, eprocurement, financial structure, cloud p2p
    
Coupa Software
Published By: Skillsoft     Published Date: Mar 03, 2015
With smartphones and tablets becoming more commonplace in enterprise environments, the interest in mobile learning is growing. Many organizations see the promise of mobile learning, but actual implementations are still relatively rare. Is now the time to take the plunge into mobile learning? Is your organization prepared? It’s important for organizations to focus on some basic issues before making this important decision.
Tags : 
skillsoft, development, programs, processes, business management, mobile learning, corporate education, courses, courseware, technology, resources, access, devices, support
    
Skillsoft
Published By: Tripp Lite     Published Date: Mar 02, 2015
VoIP is rapidly becoming the standard for voice communications in business, government, education, government and healthcare. It offers capabilities that far exceed traditional phone systems, with unified communication platforms promising to integrate messaging, mobility, collaboration, relationship management, teleconferencing and other advanced features. The transition to VoIP presents a number of challenges like the need to install new equipment in the MDF and the IDFs dispersed throughout your organization's network/telecom wiring closets. Typical closet designs can't handle the increased wattage and heat output of the PoE switches used to power IP phones. In this white paper you'll learn: • The basics of VoIP migration and implementation • What issues to consider when upgrading network/telecom wiring closets for VoIP • What cost-effective solutions are available to power and protect a VoIP network wiring closet
Tags : 
voice traffic, teleconferencing, messaging, mobility, network, platforms, communication, voip, internet protocol, video, call routing, recovery
    
Tripp Lite
Published By: CompareBusinessProducts     Published Date: Feb 27, 2015
Our new infographic, Step-by-Step Phone System Implementation, gives you an honest look into the successes and challenges at every stage of the phone systems implementation process
Tags : 
system implementation, communication structure, infographic, phone system, implementation process
    
CompareBusinessProducts
Published By: Riverbed     Published Date: Feb 26, 2015
Insurance organizations are constantly replacing legacy systems and practices with streamlined ones that help them compete better. In the area of billing, policy and claims management, Guidewire is broadly adopted.
Tags : 
performance management, quality service, network performance, application performance, vendor profile, implementation
    
Riverbed
Published By: Epicor Software     Published Date: Feb 26, 2015
The 2014 Mint Jutras ERP Solution Study collected more than 800 qualified responses. The purpose of this study was to investigate ERP goals, challenges and status and also to benchmark performance of ERP implementations.
Tags : 
distribution challenges, erp, erp goals, erp implementations, wholesale distributor
    
Epicor Software
Published By: Server Technology     Published Date: Feb 10, 2015
WebEx elected to pursue a course of investigation and analysis that required a granular picture of its application-centric hardware implementations and corresponding power usage profiles. To accomplish this, WebEx decided to retool their datacenters with intelligent power strips having the ability to remotely report power consumption.
Tags : 
server technology, power consumption, power and cooling, energy costs, roi
    
Server Technology
Published By: Mimecast     Published Date: Feb 10, 2015
Download this whitepaper to learn 4 critical risks facing Microsoft Office 365 implementations.
Tags : 
mimecast, migration, microsoft office 365, data protection, storage, cloud backup, security
    
Mimecast
Published By: Tribridge     Published Date: Feb 09, 2015
Cornerstone is among the world’s most powerful talent management platforms. But you’ll benefit from molding and shaping it to meet your unique needs and ensure you optimally deploy, integrate, and manage your TMS or LMS.
Tags : 
cornerstone ondemand partners, csod, cornerstone ondemand, tms implementation, cornerstone integration, talent management solutions, talent management software, talent management system, learning management system software, learning management software, learning management system, cornerstone support, cornerstone help, lms integration, lms implementation, tms help, tms integration
    
Tribridge
Published By: Great Bay Software     Published Date: Feb 04, 2015
The majority of companies have a difficult time deploying NAC across the enterprise. No existing NAC solution provides access control for all endpoints and operating systems – leaving vulnerable blind spots on the network. Some company leaders spend hundreds of thousands – even millions – of dollars on a NAC solution only to spend years trying to implement the technology. As a result, this can turn into a very frustrating process. However, the solution intended to help you better secure and manage your network shouldn’t wind up creating greater risk and chaos. There are ways to set your network and your team up for success. Here are some tips to help you when considering deploying a NAC solution.
Tags : 
great bay, software, network, access, control, implementation, nac, enterprise, technology, security, software, deployment, process, attacks, visibility, security, policies, beacon, functionality
    
Great Bay Software
Published By: Netsuite DWASF Leads Display Q1 2015     Published Date: Feb 03, 2015
In his latest paper, Tom Kelly offers real-world anecdotes from cloud implementations at a selection of more than 25 companies, from Fortune 500 to private equity-backed companies, showing examples on how the cloud provides fast- growing companies a scalable infrastructure that supports their growth while improving efficiency and reducing costs.
Tags : 
cloud leverage, cloud implementations, fortune 500, private equity-backed companies, scalable infrastructure, efficiency
    
Netsuite DWASF Leads Display Q1 2015
Published By: Dell     Published Date: Feb 02, 2015
While Windows 7 and Windows XP continue to dominate the market, Windows 8 adoption has been fairly slow, especially in the enterprise. The end of support for Windows XP now creates a season of needed change. Prepare now to address both the challenges and opportunities of this wave of OS migrations by downloading this IT handbook. Read it for insights into planning and preparation, hardware and software compatibility considerations, as well as end user training and implementation.
Tags : 
dell, windows, productivity, security, apps, integration, platforms, microsoft, business, management, budget, training, windows 7, windows 8, mobility, security, compatibility, support, training, byod
    
Dell
Published By: Teradata     Published Date: Jan 30, 2015
Enterprise Hadoop Implementation with Teradata and Hortonworks
Tags : 
ncr, big data, data warehouse, enterprise hadoop, hadoop implementation, teradata, hortonworks, performance data
    
Teradata
Published By: Aria Systems     Published Date: Jan 28, 2015
In the guide, you'll learn: Why recurring revenue is an unprecedented opportunity for your business and why this opportunity is available now How you’ll need to change your thinking to manage a recurring revenue business Why creating recurring revenue offerings may be as simple as repackaging existing products and services What business and system capabilities you will need to have in place to support your new business model How to go about selecting vendors to help you achieve your goals What elements are necessary for success in a recurring revenue implementation program How recurring revenue changes the way you look at data and measure success The steps you need to take to get started on your recurring revenue journey What the future holds for recurring revenue
Tags : 
recurring revenue, repackaging existing products, system capabilities, business model, revenue implementation program
    
Aria Systems
Published By: CareCloud     Published Date: Jan 21, 2015
Watch this on-demand webinar to learn how one scenario can help get the most from its PM and EHR.
Tags : 
carecloud, pm and ehr, boost revenue, ehr too expensive, practice ehr, revenue cycle management, ehr installation, system implementation, access financial reports, access data, practice management, health analytics
    
CareCloud
Published By: CareCloud     Published Date: Jan 21, 2015
Watch this free webinar to hear how one general surgery practice increased billing by 11%, boosted revenue by 6% and streamlined productivity in just six months with its new practice management and EHR system. In this recorded webinar you will learn more about: •The biggest challenges to improving profitability and how to overcome them •How to increase productivity with your EHR •What the practice would have done differently—and how you can benefit from their experience •How to use your PM to improve profitability, productivity and more… Fill out the form on the right to begin watching this webinar right away!
Tags : 
carecloud, pm and ehr, boost revenue, ehr too expensive, practice ehr, revenue cycle management, ehr installation, system implementation, access financial reports, access data, information technology, practice management
    
CareCloud
Published By: Entrust Datacard     Published Date: Jan 16, 2015
Google is phasing out SHA-1, a secure hash algorithm for SSL certificates that has proven susceptible to collision attacks. But upgrading is complex. Entrust navigates you through the rapid sun-setting of SHA-1 certificates for a seamless, secure experience for your end users.
Tags : 
entrust, sha-2, chrome, security, certificate, b2b, application, browser, applications, saas, hack, web, website, sha-2, migration, implementation, ssl
    
Entrust Datacard
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.