HIT Consultant Insightful coverage of healthcare innovation
 

technology management

Results 751 - 775 of 783Sort Results By: Published Date | Title | Company Name
Published By: Dell Windows Server     Published Date: Jan 16, 2009
Windows Server 2008 Hyper-V, Microsoft’s next generation hypervisor technology, adds an exciting new dimension to the server virtualization market. With Hyper-V and Microsoft’s integrated Server Management suite, you can take advantage of a powerful set of tools to help simplify infrastructure management and better utilize your hardware investments.
Tags : 
dell, windows server 2008, hyper-v, hypervisor technology, virtualization, server management, server virtualization
    
Dell Windows Server
Published By: NetApp Backup & Recovery     Published Date: Dec 31, 2008
Download this exclusive report to learn how NetApp direct-to-tape technology can reduce the number of media servers required to support a solution, which can reduce hardware, software, and management costs by utilizing the VTL to perform tape exports.
Tags : 
netapp backup recovery, symantec, esg, virtual tape library, raid
    
NetApp Backup & Recovery
Published By: Platform Computing     Published Date: Dec 11, 2008
Studies show that data centers are doubling their total power consumption every 5 years.  But have most data centers optimized their energy consumption with the current available solutions? Platform Computing knows there is room in data centers to reduce energy costs by 10-30%. This paper describes strategies for dynamically managing the energy consumption to achieve similar results.
Tags : 
platform computing, high performance computing, power & cool servers, data centers, blade technology, system management, green strategies
    
Platform Computing
Published By: Quocirca     Published Date: Nov 05, 2008
Unsurprisingly, research shows that the majority of organizations see their future predicated on how well they can innovate. However, just throwing IT technology at issues in the hope that innovation will happen is not viable. Ideas are ephemeral and are easily crushed within the wrong environment. Creating a suitable culture, allied with a well implemented ideas management approach combined with strong leadership, is required.
Tags : 
quocirca
    
Quocirca
Published By: ASG Software Solutions     Published Date: Nov 03, 2008
The Information Technology Infrastructure Library (ITIL) provides guidance for the management of IT, and has quickly become the worldwide standard for IT Service Management (ITSM).
Tags : 
asg, sla, cmdb, bsm, metadata, itsm, metacmdb, lob
    
ASG Software Solutions
Published By: Dell     Published Date: Oct 20, 2008
Dell has improved PC deployment activities through patent-pending automation technology and offers an array of services from planning a Windows Vista migration to post-deployment management.
Tags : 
dell, deploying vista, dell deployment framework, dell deployment model, deployment automation toolset, optimized deployment
    
Dell
Published By: Lumension     Published Date: Oct 17, 2008
Vulnerability management can be a powerful means toward reducing the threat surface within an enterprise IT environment. But because vulnerability management technology has been around in some form or another for so long there has been plenty of time for the din of marketing-speak from various vendors to confuse users about the true nature of vulnerability management tools and practices.
Tags : 
lumension, it environment
    
Lumension
Published By: LogRhythm     Published Date: Sep 26, 2008
Find out more about how LogRhythm can help organizations fulfill The Federal Information Security Management Act (FISMA) requirements in documentation and implementation of controls for IT systems that support operations and assets.
Tags : 
fisma, nist compliance, comply, security, information technology, information security management, log management, log analysis
    
LogRhythm
Published By: LogRhythm     Published Date: Sep 26, 2008
Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;} The Gramm-Leach-Biley Act (GLBA) was enacted to ensure protection over customer’s records and information. LogRhythm can help financial institutions implement and perform procedures to indentify risks, eliminate or reduce these risks, and to monitor and maintain the implemented processes and procedures to ensure that the identified risks are effectively managed. Please read this whitepaper for more details…
Tags : 
glba, glba compliance, gramm-leach-biley act, compliance, financial technology, finance, comply, security
    
LogRhythm
Published By: LogRhythm     Published Date: Sep 26, 2008
Is your organization adequately meeting the rules and regulations set forth in the Accountability Act of 1996 (HIPAA)? Learn how LogRhythm’s comprehensive log management and analysis solution can help your organization meet or exceed HIPAA regulatory requirements.
Tags : 
hipaa, hipaa compliance, health it, health regulations, compliance, comply, security, information technology
    
LogRhythm
Published By: LogRhythm     Published Date: Sep 26, 2008
This whitepaper highlights some of the key areas in which LogRhythm, the leader in Log and Security Event Management Solutions, can help companies adequately meet the PCI Data Security Standards. The whitepaper also details the compliance requirements along with ways in which LogRhythm meets and exceeds those regulations.
Tags : 
pci, pci compliance, pci-dss compliance, payment card industry, payment card, comply, security, information technology
    
LogRhythm
Published By: LogRhythm     Published Date: Sep 26, 2008
Do you need to simplify your financial reporting process to ensure that you are meeting the Sarbanes Oxley requirements? Read this whitepaper to learn more…
Tags : 
sox, sarbanes oxley, sox compliance, sarbanes oxley compliance, compliance, comply, information technology, security
    
LogRhythm
Published By: LogRhythm     Published Date: Sep 26, 2008
LogRhythm, the leader in Log and Security Event Management Solutions, has prepared a "Quick Read" whitepaper to help you understand what's required to ensure compliance with: CIP- 003-1 – Cyber Security – Security Management controls; CIP- 005-1 – Cyber Security – Electronic Security Perimeter(s); CIP- 006-1 – Cyber Security – Physical Security of Critical Cyber Assets; CIP -007-1 – Cyber Security – Systems Security Management; CIP -008-1 – Cyber Security – Incident Reporting and Response PlanningThe whitepaper also contains a compliance reference chart with the specific CIP requirements matched with recommended steps to ensure compliance.
Tags : 
nerc, nerc cip, nerc cip requirements, critical cyber assets, electronic security perimeter, critical cyber assets, compliance, comply
    
LogRhythm
Published By: LogRhythm     Published Date: Sep 26, 2008
Get the facts you need to know about how the collection, management and analysis of log data are integral to meeting many GCSx requirements. Read this whitepaper to learn more…
Tags : 
uk gcsx, uk compliance, gcsx, government connect secure extranet, compliance, comply, security, information technology
    
LogRhythm
Published By: Marketo, INC.     Published Date: Sep 25, 2008
In this free marketing Webcast, learn how two very different companies used lead management technology to significantly increase conversion rates—by as much as 500 percent!  Discover: key criteria for selecting a lead management solution... how to get up and running quickly, while avoiding needless costs... how to achieve the marketing results you want—and make it easy to access those numbers anytime.  Find out what lead management can do for your company. View this free Webcast now.
Tags : 
lead management, marketo, conversion
    
Marketo, INC.
Published By: CA ITAM     Published Date: Sep 09, 2008
Robin Bloor addresses the business value to be derived by evaluating key client management processes such as asset management, service management, change management, security and integration/automation against four maturity levels. Read this white paper to learn how to align your people, processes and technology to elevate the maturity of your client management.
Tags : 
    
CA ITAM
Published By: IBM     Published Date: Aug 21, 2008
Today’s operations teams are faced with more pressure than ever to ensure high service availability and performance. They must keep pace with the growing array of service demands, soaring costs, the rapid evolution of technology and an increasingly competitive marketplace. However, many organizations suffer from an obscured view into key business services and supporting technology, because they lack the closed-loop, cross-domain management that’s needed.
Tags : 
ibm, ibm mi, ibm grm, service management, desktop management, it management
    
IBM
Published By: IBM     Published Date: Aug 21, 2008
For a growing business, it’s increasingly difficult to integrate technological solutions and services to improve service management. So various frameworks have been created to help today’s IT professionals optimize their use of technology in managing IT processes. The third version of the Information Technology Infrastructure Library (ITIL) provides the latest set of process best practices for any service management improvement effort.
Tags : 
ibm, ibm mi, ibm grm, itil, service management, it management
    
IBM
Published By: Quocirca     Published Date: Jul 03, 2008
Technology is no longer a nice to have, or a tool for the few. With many organizations now being completely dependent on their IT systems, the need for the IT department to be seen to be responding to the organization's requirements is of critical importance.  Business Service Management, or BSM, can help in providing underpinnings to the IT function. This paper looks at how the changing processes and market conditions within an organization can be augmented through the use of a Business Service Management (BSM) approach, creating a flexible and responsive technology infrastructure aimed at supporting a rapidly changing commercial landscape and enabling greater competitiveness in the markets.
Tags : 
quocirca, business service management, bsm, service management, business management
    
Quocirca
Published By: BlackBerry     Published Date: May 22, 2008
Over the past decade, wireless technology has made huge strides in security, reliability and throughput. Companies that are moving forward with business mobility initiatives must plan for wireless security and mobile device management from the start. Learn about many of the notable trends and key issues associated with Business Mobility and where to find additional resources for consideration.
Tags : 
blackberry, mobile applications, cio, pim, voip, smartphones, it communication, microsoft exchange
    
BlackBerry
Published By: Clarus Systems     Published Date: Mar 18, 2008
Clarus Systems, Inc. has collaborated with IQ Services to deliver technology independent testing solutions that enhance end-to-end voice process lifecycle management within the contact center. The goal is to ensure a positive customer experience by incorporating voice testing and monitoring into every step of your contact center's life cycle - resulting in confidence that your solution works as designed.
Tags : 
itil, clarus systems, ipt, ip telephony, unified communications, cisco, callmanager, best practices
    
Clarus Systems
Published By: Quocirca     Published Date: Mar 13, 2008
The Average Inc. could do quite a lot to improve the ways it uses technology in order to reduce risk, ensuring business continuity, and to cut unnecessary cost. If Average Inc. needs to improve its use and management of its ICT infrastructure, then that means most real companies do as well.
Tags : 
ict, quocirca, communications, infrastructure, business continuity
    
Quocirca
Published By: NetIQ Corporation     Published Date: Nov 27, 2007
Learn how to successfully extend your deployment of Group Policy to your servers by implementing end-to-end management of this pervasive technology, including advanced offline management and real-time monitoring of authorized and unauthorized changes.
Tags : 
group policy, policy management, security management, servers, server management, netiq, net iq
    
NetIQ Corporation
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
CCU sought to encrypt its backup tapes for keeping customer data secure in transit and in storage at the offsite tape-vault vendor’s facility. As a financial institution, CCU was subject to stringent government regulations. With nearly 60 gigabytes of data to encrypt each night, CCU knew that a software solution was out of the question.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management
    
Neoscale Systems, Inc.
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
Given Payformance’s longstanding commitment to protecting the privacy of its clients’ information, the company has decided to investigate data encryption solutions for its primary hard drive storage and secondary backup tape storage. With its multi-vendor interoperability, NeoScale’s CryptoStor storage security appliances emerge as the obvious choice.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management
    
Neoscale Systems, Inc.
Start   Previous    18 19 20 21 22 23 24 25 26 27 28 29 30 31 32    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.