HIT Consultant Insightful coverage of healthcare innovation
 

cis

Results 351 - 375 of 4252Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Mar 17, 2009
CPDA’s Product Lifecycle Management (PLM) research programs target the critical decisions in Product Lifecycle Management challenging Design, Engineering, Manufacturing, and Information Technology managers and executives. CPDA’s PLM collaborative research programs provide indepth analysis of strategies, products, issues, processes, technologies, trends, case studies, and surveys for assessing technology, business goals and objectives, and implementation road maps.
Tags : 
ibm, telelogic, addressing future automotive needs, model-driven systems, product value management, plm, computer-aided design, cad, design/simulation council, product value management, software level modeling, model-driven systems, automotive trends, sysml, csrs, mechatronics
    
IBM
Published By: Cisco     Published Date: Sep 12, 2014
Traditional point-in-time defenses aren’t adequate protection from today’s sophisticated advanced malware and advanced persistent threats (APTs.) Get this white paper to learn how you can evolve your security strategy to address advanced threats before, during, and after attacks.
Tags : 
cybercrime, damage, landscape, sophisticated, infrastructure, attack, resources, network, disruption, operations, organizations, national
    
Cisco
Published By: Cisco     Published Date: Sep 08, 2016
This white paper shows why it's time for a new security model.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Nov 17, 2014
Recent changes in hacking combined with the emergence of the Internet of Everything have profoundly changed how we protect our systems, driving us to think about a new approach to cybersecurity. In this paper, learn about the challenges that created the need for a new threat-centric security model spanning the full attack continuum: before, during and after an attack.
Tags : 
spyware, rootkits, hacking, cisco, advanced threat protection
    
Cisco
Published By: Cisco     Published Date: Jul 08, 2016
Today’s threat landscape is nothing like that of just 10 years ago. Simple attacks that caused containable damage have given way to modern cybercrime operations that are sophisticated, well-funded, and capable of causing major disruptions to organizations and the national infrastructure. Not only are these advanced attacks difficult to detect, but they also remain in networks for long periods of time and amass network resources to launch attacks elsewhere. Traditional defenses that rely exclusively on detection and blocking for protection are no longer adequate. It’s time for a new security model that addresses the full attack continuum—before, during, and after an attack.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Aug 24, 2015
Download this white paper to learn why traditional defenses that rely exclusively on detection and blocking for protection are no longer adequate. It’s time for a new security model that addresses the full attack continuum—before, during, and after an attack.
Tags : 
traditional security, detection, blocking, protection, security model, threat landscape, cybercrime
    
Cisco
Published By: Cisco     Published Date: Feb 16, 2016
Today’s threat landscape is nothing like that of just 10 years ago. Simple attacks that caused containable damage have given way to modern cybercrime operations that are sophisticated, well-funded, and capable of causing major disruptions to organizations and the national infrastructure. Not only are these advanced attacks difficult to detect, but they also remain in networks for long periods of time and amass network resources to launch attacks elsewhere.
Tags : 
cisco, threat, cybercrime, infrastructure
    
Cisco
Published By: EMC Corporation     Published Date: Aug 05, 2014
Roland Cloutier, CISO of ADP, describes how the largest single payer in the US tax system leverages RSA Security Analytics as the foundation of their Trusted Platform Security Initiative.
Tags : 
case study, adp, best practices, security analytics, rsa, trusted platform security initiative
    
EMC Corporation
Published By: SAP     Published Date: Nov 22, 2011
Analytics has moved from the specialty of a dedicated few to a necessity for broad groups of business professionals to do their job. This white paper considers the use of analytics and business intelligence in the banking industry for improving decision making and the benefits of prebuilt analytic applications for achieving this objective across many functions in a banking organization.
Tags : 
idc, finance, technology, business, banking, analytics, decision making
    
SAP
Published By: Cisco DWA Security     Published Date: Sep 14, 2018
NSS Labs performed an independent test of the Cisco AMP for Endpoints v6.0.5. The product was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Advanced Endpoint Protection (AEP) Test Methodology v2.0, which is available at www.nsslabs.com. This test was conducted free of charge and NSS did not receive any compensation in return for Cisco’s inclusion. This report provides detailed information about this product and its security effectiveness. Additional comparative information is available at www.nsslabs.com. As part of the initial AEP test setup, products were configured in a deployment mode typical to enterprises. As such, products were configured to mimic an enterprise environment by applying typical applications such as exclusion policies and tuning requirements. All product-based configurations are reviewed, validated, and approved by NSS prior to the test. Every effort is made to ensure optimal security effectiveness, as would be the aim of a typi
Tags : 
    
Cisco DWA Security
Published By: Cisco     Published Date: Sep 07, 2016
This white paper goes through the best methods of malware protection.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jul 08, 2016
What You Will Learn: This document will identify the essential capabilities you need in an advanced malware protection solution, the key questions you should ask your vendor, and shows you how Cisco combats today’s advanced malware attacks using a combination of four techniques: • Advanced analytics • Collective global security threat intelligence • Enforcement across multiple form factors (networks, endpoints, mobile devices, secure gateways, and virtual systems) • Continuous analysis and retrospective security
Tags : 
    
Cisco
Published By: Cisco     Published Date: Feb 16, 2016
This document will identify the essential capabilities you need in an advanced malware protection solution, the key questions you should ask your vendor, and shows you how Cisco combats today’s advanced malware attacks using a combination of four techniques.
Tags : 
cisco, malware, data security, analytics, global security threat
    
Cisco
Published By: Cisco     Published Date: Apr 11, 2016
En este documento se identifican las funcionalidades esenciales necesarias en una solución de protección contra malware avanzado y las preguntas clave que debe formularle a su proveedor, y se muestra cómo Cisco combate los ataques de malware avanzado actuales mediante una combinación de cuatro técnicas
Tags : 
    
Cisco
Published By: ASME     Published Date: Oct 22, 2019
In this four-part series, explore how product development is changing, its challenges, and the new technologies being developed to transform design workflows. You will discover the new visualization techniques that drive new levels of collaboration and enable critical product decisions to be made earlier in the design process. Download the latest reports in this series, and learn how to improve design reviews, enhance decision making, and optimize your product designs.
Tags : 
    
ASME
Published By: Brother     Published Date: Nov 23, 2015
The Center for Digital Education (CDE) surveyed over 130 K-12 decision-makers on the classroom use of printer and scanner technologies in September 2014 and found scanning materials for digital use in the classroom is a key concern, with ease of use, cost containment and flexible deployment among the most critical needs. In the context of this study, this white paper will build a case for the use of scanners to revolutionize K-12 teaching, learning and administration.
Tags : 
scanners, brother, scanning solution, digital learning, touchscreen, education technology
    
Brother
Published By: HP and Intel ®     Published Date: May 06, 2013
This paper summarizes and evaluates the prevalence and efficacy of data center virtualization deployments, as well as the hardware that supports them. The conclusions drawn from this report are based on analysis of both quantitative market research and two qualitative interviews with a CIO and CTO in healthcare and finance, respectively. Each customer, referred to ESG by Hewlett-Packard (HP), had extensive experience deploying both server and desktop virtualization. The goal of the study was to determine the IT and business drivers to adoption of virtual technologies, the expected and realized benefits, ensuing infrastructure decisions,future outlook of the data center, and best practices for deployment.
Tags : 
data center, virtualization, data center management, automation, agile, storage, van, virtual application network, infrastructure, desktop virtualization
    
HP and Intel ®
Published By: HP and Intel ®     Published Date: May 02, 2013
This paper summarizes and evaluates the prevalence and efficacy of data center virtualization deployments, as well as the hardware that supports them. The conclusions drawn from this report are based on analysis of both quantitative market research and two qualitative interviews with a CIO and CTO in healthcare and finance, respectively. Each customer, referred to ESG by Hewlett-Packard (HP), had extensive experience deploying both server and desktop virtualization. The goal of the study was to determine the IT and business drivers to adoption of virtualization technologies, the expected and realized benefits, ensuing infrastructure decisions, future outlook of the data center, and best practices for deployment.
Tags : 
    
HP and Intel ®
Published By: RelayHealth     Published Date: Mar 29, 2013
Pharmacies must look beyond automation of traditional processes, like prescriptions and communication toward two-way, interactive connectivity, giving the pharmacy the capability to both view and populate the patient’s community health record.
Tags : 
clinical integration, pharmacy integration, longitudinal patient record, medication adherence, enterprise resource planning, care coordination, claims processing, electronic health records
    
RelayHealth
Published By: SAS     Published Date: Apr 04, 2018
Location analytics is the process of integrating geographical data into business intelligence (BI) and analytics-led decision making. Location analytics creates meaningful insight from relationships found in geospatial data to solve a broad variety of business and social problems. Location data is found everywhere – with an item or a device, in a conversation or behavior, in machines or sensors, tied to a customer or competitor, attached to a database record or recorded from vehicles or other moving objects. Organizations want to take advantage of location data to improve decisions, create better customer engagement and experiences, reduce risks and automate business processes.
Tags : 
    
SAS
Published By: Cisco EMEA     Published Date: Nov 08, 2018
Enterprise IT is changing. It’s evolving from a rigid, static, manually configured and managed architecture to one where connectivity is dynamic, application services are on demand, and processes are automated. Enterprise networking is evolving along with IT. This has been evident in the past several years in initiatives such as enterprise digitization and as-a-service consumption models, as well as their enablers, including BYOD, IoT and cloud. Add to this, all of the security implications of each initiative. The purpose of this paper is to assess the switching requirements for next-generation campus networks incorporating wired switches, wireless LANs and WAN routers in an intuitive, intent-based network supporting cloud, mobility, IoT and digitization, with pervasive security.
Tags : 
    
Cisco EMEA
Published By: Zane Benefits     Published Date: Aug 03, 2015
Learn how savvy business owners are using the ACA offer more affordable heath benefits
Tags : 
affordable care act, small businesses, affordable health benefits, aca, best health insurance decisions, health insurance providers, zane benefits
    
Zane Benefits
Published By: Dell & Microsoft     Published Date: Mar 06, 2014
Small businesses typically keep a sharp focus on cost control and cash conservation, which is good. However, when it comes to the decision to buy new PCs or maintain older ones, many small businesses falsely believe it’s financially advantageous to maintain older PCs rather than replace them. Download this independent, global small business study to learn how: o Older PCs negatively affect operating costs o Older PCs diminish employee productivity o Newer PCs deliver better application performance and improved productivity at a reduced operating cots Download this report today to learn the true direct and indirect costs of maintaining and upgrading older PCs in your small business.
Tags : 
dell, small business, employee productivity, reduce operating costs, productivity, collaboration, older pcs, pc refresh, microsoft, windows 8
    
Dell & Microsoft
Published By: SAS     Published Date: Mar 01, 2012
The traditional managed reporting approach to BI is challenged to keep up with changing demand for business information. This research finds that providing business users with highly visual/interactive tools can help ensure they get what they need.
Tags : 
sas, analytics, business analytics, business intelligence, customer intelligence, data management, fraud & financial crimes, high-performance analytics, it management, ondemand solutions, performance management, risk management, sas® 9.3, supply chain intelligence, sustainability management
    
SAS
Published By: Oracle APAC ZO OD Prime Volume HCM ABM Leads June 2017     Published Date: Jul 12, 2017
Deep-dive analytics tools have completely transformed the way many organizations do business—helping remove the guesswork from major areas of operations, and provide everybody with the clear, actionable answers they need to make informed business decisions. The benefits of sophisticated analytics are being reaped across the business. But according to Deloitte, HR is lagging behind— with only 14 percent of companies using analytics in HR, compared to 77 percent using these tools in Operations1.
Tags : 
human resources, employee engagement, talent management
    
Oracle APAC ZO OD Prime Volume HCM ABM Leads June 2017
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.