HIT Consultant Insightful coverage of healthcare innovation
 

second

Results 176 - 200 of 355Sort Results By: Published Date | Title | Company Name
Published By: Pure Storage     Published Date: May 17, 2017
Alors que le stockage flash se généralise dans le monde de l'informatique, les entreprises commencent à mieux comprendre non seulement ses atouts en termes de performances, mais également les avantages économiques secondaires de son déploiement à grande échelle.
Tags : 
flash, flash technology, storage, storage management, flash adoption, migration, business transformation, flash
    
Pure Storage
Published By: F5 Networks Inc     Published Date: May 03, 2017
Application delivery services are critical for successful applications. Whether such services add scalability, reliability, or security, most applications rely on one or more. Application Delivery Controllers (ADCs), therefore, occupy a critical place in most application, cloud, and data center designs. But what does "performance" actually mean? In general, ADC vendors publish four main types of metrics to demonstrate performance: Requests per second (RPS) Connections per second (CPS) Transactions per second (TPS) Throughput (often measured in gigabits per second, Gbps) Download now to learn more!
Tags : 
application delivery controllers, cloud, data center, performance metrics
    
F5 Networks Inc
Published By: SAS     Published Date: Apr 25, 2017
Digital currency is here. Consumers have demanded more choice in ways to pay merchants, move money to friends and access their accounts. Payment providers have done well to meet these expectations for immediacy and convenience in managing money. The convenience is great for account holders, but it requires financial institutions and merchants to apply fraud safeguards at the same speed, sometimes in less than a second. Each new accelerated service brings new risks.
Tags : 
    
SAS
Published By: Code42     Published Date: Mar 31, 2017
Today’s enterprise is vastly different than five years ago: 75 percent of the workforce is mobile, 90 percent of companies support Mac devices, five malware attacks happen every second and half of enterprise data lives outside the data center. As everything around you changes, you’re expected to support the enterprise with flat budgets and static head counts. Endpoint backup enables you to protect enterprise data and mitigate the growing risk of data loss, ransomware and insider threat.
Tags : 
    
Code42
Published By: Monotype     Published Date: Mar 28, 2017
Your brand may have throngs of fans and followers — people who “Like” or “Follow” a particular page or account. While these metrics are certainly important, they don't always equate to obvious value for your brand. The followers who are so passionate that they're creating branded content and advocating for you are the ones to focus on. Advocates are one of the best, most cost effective ways to drive business, hands down. Advocates are users with a true connection, passion and commitment to a particular brand or product. Advocates drive action, not just awareness, and unlike paid advertisers, they advocate because they want to. The second a customer becomes so invested in your brand that they share the love with their networks, they become your best marketer.
Tags : 
swyft, branding, brand advocates, consumer, purchase intent, content, media
    
Monotype
Published By: ForeScout     Published Date: Mar 28, 2017
Miercom analysts review results of its tests verifying the ForeScout platform’s ability to quickly discover, classify and assess endpoints, including unmanaged BYOD and IoT devices—without agents—and apply network and host-based controls to enforce security policy and remediation.
Tags : 
discover, classify, endpoints, miercom, byod, iot
    
ForeScout
Published By: Swift Navigation     Published Date: Feb 01, 2017
Download the Free White Paper: Piksi Multi for Autonomous Vehicles to learn how Swift Navigation’s centimeter-level accurate GNSS solution improves the performance of autonomous vehicles. Piksi Multi is a centimeter-accurate RTK GPS receiver designed for easy integration in the automotive core sensor suite. Its multiple bands and satellite constellations improve robustness of autonomous vehicle functionality with 99th percentile accuracy and convergence times in seconds.
Tags : 
rtk, gps, gnss, autonomous vehicle, centimeter-accuracy, multi-band, multi-constellation, l1/ l2, automotive sensors, level 3+ autonomy, improve safety, automakers, navigation oems
    
Swift Navigation
Published By: GE Power     Published Date: Jan 30, 2017
Be the first to read the 2017 top digital trend predictions for the (remove second the) the power and utility industry, and gain a competitive edge by understanding what’s next. Across the Electricity Value Network (EVN) - from generation through T&D and end user management, first movers and proactive digital adopters are far more likely to thrive in the future. Read the new Brief and learn how:
Tags : 
2017 top digital trends, power plants, utilities, power producers, electricity value network, top digital trends, power plant cyber attacks, power grids, power industry, grid operators, cloud+edge, power plant software, platform economy
    
GE Power
Published By: Qualys     Published Date: Jan 11, 2017
Continuous monitoring (CM) begets a process of continuous improvement that works to reduce attack surface and improve security posture, according to the 2016 SANS survey on CM conducted during the months of July to September. In it, 63% of respondents said CM was improving their security posture.
Tags : 
information security, it compliance, it audit, it security, network security, web application security, application security
    
Qualys
Published By: Cisco     Published Date: Dec 21, 2016
Wi-Fi is about to get a reboot. New 802.11ac Wave 2 products will make it possible to deliver LAN-like multigigabit speeds over the wireless network for the first time, enabling previously unimagined scale and flexibility in the enterprise workspace. But how will businesses capitalize on this new capacity when most current Ethernet access cabling maxes out at 1 Gigabit per second?
Tags : 
    
Cisco
Published By: Mitel     Published Date: Dec 20, 2016
With unified communications and collaboration (UCC), you can address these challenges by helping people to connect more efficiently and intuitively. You can use UCC to bring together multiple forms of communications, like voice, video and data services, and software applications into a single environment, making it easier to connect. Business processes improve as a result. When you embrace UCC in your business communications, you can increase employee collaboration and productivity in three major ways. First, it can reduce communications latency by making it easier to find the right person and get an answer to a business question. Second, it can help you to manage workflows by making it easier f
Tags : 
    
Mitel
Published By: Dell EMC     Published Date: Nov 04, 2016
With the 'EMC Mission Control' center in Portsmouth, UK and a second at the America’s Cup venue in Bermuda, plus a mobile center travelling worldwide to the preliminary events, Land Rover BAR will have all its data continuously replicated. The team in Portsmouth can analyze race and testing data immediately, as well as identify and make improvements right up to and through the finals in June 2017. This allows the design team and the crew to adapt much faster. With the introduction of the VCE VxRail Appliance powered by Intel® Xeon® processors, Land Rover BAR will be able to flexibly and rapidly scale, irrespective of location, ensuring a seamless experience for the team. To learn more about the impact of the Dell EMC VCE VxRail Appliance, read this brief infographic.
Tags : 
it infrastructure, hyper-convergence, architecture, sql, microsoft exchange
    
Dell EMC
Published By: Dell EMC     Published Date: Nov 04, 2016
With the 'EMC Mission Control' center in Portsmouth, UK and a second at the America’s Cup venue in Bermuda, plus a mobile center travelling worldwide to the preliminary events, Land Rover BAR will have all its data continuously replicated. The team in Portsmouth can analyze race and testing data immediately, as well as identify and make improvements right up to and through the finals in June 2017. This allows the design team and the crew to adapt much faster. With the introduction of the VCE VxRail Appliance powered by Intel® Xeon® processors, Land Rover BAR will be able to flexibly and rapidly scale, irrespective of location, ensuring a seamless experience for the team. To learn more about the impact of the Dell EMC VCE VxRail Appliance, read this brief infographic.
Tags : 
servers, flash storage, modular platforms, software-defined, networking, infrastructure
    
Dell EMC
Published By: Entrust Datacard     Published Date: Oct 24, 2016
Today, mobility is no longer a trend. It’s an established reality, reshaping the enterprise. This white paper is the second in a three-part series on enabling the mobile desktop while securing information and protecting your organization.
Tags : 
    
Entrust Datacard
Published By: MobileIron     Published Date: Oct 21, 2016
Several new mobile attacks have emerged that threaten enterprises. Most are re-using old tactics against mobilespecific services, such as SideStepper’s use of Man-In-The-Middle (MITM) against MDM, rather than employing new techniques or exploiting new vulnerabilities. However, when attacks against users are successful, they can result in the loss of both personal and business data. Download now to learn how to increase your mobile security.
Tags : 
    
MobileIron
Published By: Data Stax     Published Date: Oct 05, 2016
Customers demand speed, convenience, and in-context experiences. Netflix, Mint Bills, and Clear Capital know their customers won’t give them a second chance. Learn how these leaders use DataStax Enterprise to provide an experience their customers can’t get anywhere else.
Tags : 
datastax, netflix, mint bills, digital, personalization
    
Data Stax
Published By: Clicktale     Published Date: Sep 26, 2016
In this second paper of the Clicktale Psychology and Customer Experience Series, we examine how retailers can put inherent differences between the cognitive styles of men versus women to work for online businesses like yours.
Tags : 
clicktale, psychology, customer experience, cognitive styles, gender differences, online business
    
Clicktale
Published By: LifeLock     Published Date: Aug 23, 2016
In an always-on, ever connected world, the risk of identity theft is real. There is a new identity fraud victim every two seconds. LifeLock identity theft protection helps safeguard against identity fraud by monitoring millions of transactions per second provide services that remediation-only or credit monitoring-only services don’t offer – with no benefit deductible or service co-pay.
Tags : 
best practices, identity theft, security, protection
    
LifeLock
Published By: SAS     Published Date: Aug 03, 2016
The financial collapse of 2008 had the greatest impact on the financial services industry since World War II, resulting in consolidation and extensive regulation. The crisis coincided with increased competition from emerging economic powers, nonbanks and fintech organizations. Consumer behavior, from the adoption of mobile banking to P2P payments, forced banks to retool and respond with innovative products and investments in new delivery channels. Technology changed rapidly as well. In the capital markets, trading became fully automated, with pricing, risk decisions and settlement across exchanges made in milliseconds
Tags : 
finance, best practices, productivity, economic power, consolidation, fintech, technology, data, security, risk decision
    
SAS
Published By: MobileIron     Published Date: Aug 03, 2016
In this edition we discuss emerging risks, report OS enterprise share, and list the top blacklisted consumer apps. We conclude with our recommendations for enterprises to protect their assets against mobile risks and threats. Several new mobile attacks have emerged that threaten enterprises. Most are re-using old tactics against mobilespecific services, such as SideStepper’s use of Man-In-The-Middle (MITM) against MDM, rather than employing new techniques or exploiting new vulnerabilities. When attacks against users are successful, they can result in the loss of both personal and business data.
Tags : 
    
MobileIron
Published By: Citrix Systems     Published Date: Jul 25, 2016
For many enterprises, the solution is a centralized single sign-on (SSO) infrastructure that leverages the enterprise directory with federation, multifactor authentication and centralized access control to give users one URL and login to access all their enterprise applications and services--without having to type in another URL or enter credentials a second time. At the same time, it provides IT with a single identity, access control and management infrastructure, closing the inevitable security and management gaps inherent in juggling multiple gateway solutions. Such a solution would offer the best of all worlds, combining enhanced user productivity with IT efficiency, cost effectiveness, security and compliance.
Tags : 
    
Citrix Systems
Published By: IBM     Published Date: Jul 14, 2016
As the focus on internal controls moves into its second decade, it'd be easy to assume that most organizations have mastered their processes. However, with the adoption of the 2013 COSO Framework, increased requirements from the PCAOB, and board focus on risk and compliance processes, many internal control programs are undergoing major modifications in numerous areas. Read this e-book to find out how and why companies have made the move to different platforms, including why companies need to focus on utilizing the most productive tools, several technology approaches used by organizations, and the merits of taking a fresh approach to technology to manage internal control processes.
Tags : 
best practices, technology, risk management, compliance, business management
    
IBM
Published By: IBM     Published Date: Jul 12, 2016
Join IBM and partner Zementis in this webcast to hear how Predictive Model Markup Language (PMML), an industry standard, is helping solve business obstacles and enabling users to: - Drive timely and relevant insights via in-line predictive analytics - Score thousands of data records per second, scaling with business needs to enable instantaneous decisions - Improve performance and cost efficiency by reducing or eliminating movement data off-platform to conduct analysis
Tags : 
ibm, z systems, predictive analytics, analytics tools, zementis, predictive model markup language, pmml
    
IBM
Published By: Cisco     Published Date: Jul 11, 2016
Cisco estimates that the Internet of Everything (IoE) — the networked connection of people, process, data, and things — will generate $19 trillion in Value at Stake for the private and public sectors combined between 2013 and 2022. More than 42 percent of this value — $8 trillion — will come from one of IoE’s chief enablers, the Internet of Things (IoT). Defined by Cisco as “the intelligent connectivity of physical devices, driving massive gains in efficiency, business growth, and quality of life,” IoT often represents the quickest path to IoE value for private and public sector organizations. This paper combines original and secondary research, as well as economic analysis, to provide a roadmap for maximizing value from IoT investments. It also explains why, in the worlds of IoT and IoE, the combination of edge computing/analytics and data center/cloud is essential to driving actionable insights that produce improved business outcomes.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jul 11, 2016
To better understand the service dilemma and the role of digitization within the manufacturing industry, Cisco initiated a comprehensive research study. We surveyed more than 600 senior manufacturing decision-makers in 13 countries,* from a range of manufacturingrelated segments, along with conducting qualitative interviews with key industry thought leaders, in-depth secondary research, and economic analysis. To explore the business and organizational implications of connected machines in particular, we surveyed both industrial machine manufacturers and “end-user” manufacturers.
Tags : 
    
Cisco
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.