HIT Consultant Insightful coverage of healthcare innovation
 

outlines

Results 376 - 400 of 516Sort Results By: Published Date | Title | Company Name
Published By: Quantum - Quinstreet     Published Date: Aug 10, 2011
This paper outlines some of the important considerations for encrypting data on tape, and is intended to help IT administrators make the right decision for their environment and their company's data security needs.
Tags : 
quantum, quinstreet, data deduplication, deduplication, nas, network attached storage, remote replication, virtual tape library
    
Quantum - Quinstreet
Published By: McAfee     Published Date: Nov 19, 2013
This technical brief outlines enterprise email sender identity technologies.
Tags : 
spear-phishing, dmarc, spf, dkim, mcafee email protection, saas, email security
    
McAfee
Published By: MobileIron     Published Date: Feb 05, 2016
Recent attacks targeting mobile apps and operating systems have put an unprecedented amount of mobile business data at risk. Many enterprises are unprepared to combat the latest mobile threats: One in 10 enterprises have at least one compromised device. More than 53% have at least one device that is not in compliance with corporate security policies. This white paper outlines how to protect enterprise data while realizing the transformative benefits of mobility.
Tags : 
app security, mobile apps, operating systems, corporate security, enterprise data
    
MobileIron
Published By: IBM     Published Date: Jul 10, 2009
With the economy in constant fluctuation, this white paper is especially timely. “Enhancing your infrastructure in an uncertain economy to support your SOA business initiatives” defines the challenges facing IT executives, and outlines actions they can take now to cut costs, increase productivity and get more out of existing IT investments.
Tags : 
soa, ibm, cost cutting, service oriented architecture, roi, return on investment, plug and play, real time data
    
IBM
Published By: Riverbed DE     Published Date: Oct 16, 2017
Is your IT organization taking the proper steps toward successful cloud adoption? Legacy networking technology is hampering IT agility. Cloud providers have initiated an agility revolution but secure inter- and intra-cloud network connectivity are still very challenging. Easier alternatives are either expensive, worsen application performance and/or hamper network efficiency. Riverbedís unique SD-WAN solution helps unlock agility across the complete enterprise network allowing for easier deployment and management of cloud-centric networks. This cloud adoption Use Case outlines challenges and solutions for cloud-centric enterprise architectures including: ∑†††††† Unlocking cloud agility through simple workflows in the WAN such as single-click secure connectivity to cloud and branch networks ∑†††††† The importance of bandwidth reduction and application acceleration to ensure cloud adoption ∑†††††† Distinguishing between application and network problems through enhanced visibility
Tags : 
cloud analytics, cloud development, cloud storage, cloud management, cloud security, cloud services, storage analytics
    
Riverbed DE
Published By: Fujitsu     Published Date: Dec 22, 2015
This whitepaper outlines how your business can benefit from the new Storage QoS functionality.
Tags : 
storage, storage management software, fujitsu, qos management, quality of service
    
Fujitsu
Published By: IBM     Published Date: Aug 21, 2008
The world has embraced payment cards to support commercial transactions for almost every kind of business. Unfortunately, the data associated with these payment cards is the focus of many identity theft activities. This white paper outlines Payment Card Industry (PCI) requirements, as well as the benefits of compliance and the penalties for noncompliance.
Tags : 
ibm, ibm mi, ibm grm, pci, pci dss, pci-dss, pci compliance, data theft
    
IBM
Published By: Solidcore     Published Date: Aug 21, 2009
This white paper outlines the issues faced by IT managers in meeting their compliance requirements and explains how Solidcore can be a core component of a sustainable and cost-effective SOX compliance program.
Tags : 
sox, sox compliance, sarbox, sarbanes oxley, archiving, finance, cost control, solid core
    
Solidcore
Published By: Certify     Published Date: Sep 13, 2013
Learn the best practice for solution selection as this whitepaper from the Aberdeen Group outlines the Best-In-Class organizations and how they are actively leveraging specific components of technology in order to improve their T&E expense management programs
Tags : 
expense report, expense reporting, expense management, receipt management, employee expense, business travel, online expense management, expense management software
    
Certify
Published By: MBG     Published Date: Aug 21, 2009
Telecommunications expenses are among the largest cost items on the corporate income statement. According to leading industry analysts, many companies can lower their telecommunications costs by 15 percent or more without damaging their service quality. In this white paper, MBG outlines five steps that can lead to these savings.
Tags : 
phone, telecom, telecommunications, phone bill, it spending, cost control, voip, voice over ip
    
MBG
Published By: Scale Computing     Published Date: Sep 24, 2012
This Taneja Group paper outlines a new technology that addresses increasing virtual complexity and radically simplifies IT infrastructure, without sacrificing functionality. Get your complimentary 17-page report now.
Tags : 
virtualization, data storage, virtual infrastructure, it infrastructure, backup and recovery, data migration, data management, scale computing
    
Scale Computing
Published By: SAS     Published Date: Aug 28, 2018
With the widespread adoption of predictive analytics, organizations have a number of solutions at their fingertips. From machine learning capabilities to open platform architectures, the resources available to innovate with growing amounts of data are vast. In this TDWI Navigator Report for Predictive Analytics, researcher Fern Halper outlines market opportunities, challenges, forces, status and landscape to help organizations adopt technology for managing and using their data. As highlighted in this report, TDWI shares some key differentiators for SAS, including the breadth and depth of functionality when it comes to advanced analytics that supports multiple personas including executives, IT, data scientists and developers.
Tags : 
    
SAS
Published By: MapR Technologies     Published Date: Jan 03, 2014
As the demand for Big Data analytics mushrooms, IT decision-makers must prepare for the widespread deployment of Hadoop. This Technical Insight Paper from the Evaluator Group outlines the key requirements that must be met to make Hadoop enterprise data center ready.
Tags : 
big data, big data analytics, hadoop, apache hadoop, structured data, unstructured data, business analytics, metadata
    
MapR Technologies
Published By: Workday UK     Published Date: Apr 25, 2019
Aligning your workforce plan with greater business objectives doesn't have to be a struggle Ė especially when you get the basics right. This whitepaper outlines the 10 fundamental steps for creating an effective strategic workforce plan and how technology can help put it into action.
Tags : 
workday, workforce technology, digital strategy
    
Workday UK
Published By: Workday     Published Date: Apr 30, 2019
Aligning your workforce plan with greater business objectives doesn't have to be a struggle Ė especially when you get the basics right. This whitepaper outlines the 10 fundamental steps for creating an effective strategic workforce plan and how technology can help put it into action.
Tags : 
workday, workforce technology, digital strategy
    
Workday
Published By: Workday     Published Date: May 21, 2019
Aligning your workforce plan with greater business objectives doesn't have to be a struggle Ė especially when you get the basics right. This whitepaper outlines the 10 fundamental steps for creating an effective strategic workforce plan and how technology can help put it into action.
Tags : 
    
Workday
Published By: CA Technologies EMEA     Published Date: Sep 07, 2018
Business applications have become the battleground for customer loyalty. To compete, IT organizations are under pressure to deliver applications faster and with higher quality. Continuous Delivery (CD) of code offers a solution. CD may be paired with DevOps, Agile and other methodologies. However, QA and testing can be an obstacle to CDís rapid development and deployment of high quality code. Testers and developers must engage in Continuous Testing, continuously testing software for performance, quality and user experience as itís being developed. Continuous Testing is not a push button process, though. It requires a comprehensive approach. This paper outlines the common challenges to Continuous Testing and highlights results from real users who have used technology to get to succeed with the Continuous Testing process.
Tags : 
    
CA Technologies EMEA
Published By: Alert Logic and Rackspace     Published Date: Jun 20, 2014
A new version of the PCI DSS standard was released in January of this year, containing some new and updated requirements. This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the new standard.
Tags : 
alert logic, rackspace, pci, dss, compliance
    
Alert Logic and Rackspace
Published By: Alert Logic and Sungard Availability Services     Published Date: Jun 20, 2014
A new version of the PCI DSS standard was released in January of this year, containing some new and updated requirements. This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the new standard.
Tags : 
alert logic, sungard, pci, dss, compliance
    
Alert Logic and Sungard Availability Services
Published By: Gleanster Research     Published Date: Dec 11, 2012
This comprehensive 30pg benchmark report from Gleanster Research outlines exactly how Top Performing companies are embracing Agile BI.
Tags : 
    
Gleanster Research
Published By: Cisco     Published Date: Nov 18, 2015
This e-book describes a hypothetical company, referred to as NeedToChange, which has a traditional approach to WAN design. It then presents Cisco's response to how NeedToChange should evolve its WAN. This e-book presents a summary of the key components of some of the emerging approaches to WAN architecture and design amd concludes with a call to action that outlines a project plan that network organizations can use to evolve their WAN.
Tags : 
applications, systems integration, cloud, platform, wan
    
Cisco
Published By: Cisco     Published Date: Dec 08, 2015
The 2015 Guide to WAN Architecture and Design describes a hypothetical company, referred to as NeedToChange, which has a traditional approach to WAN design. It then presents Cisco's response to how NeedToChange should evolve its WAN. This e-book includes a summary of the key components of some of the emerging approaches to WAN architecture and design and concludes with a call to action that outlines a project plan that network organizations can use to evolve their WAN.
Tags : 
applications, systems integration, cloud, platform, wan
    
Cisco
Published By: Cisco     Published Date: Jun 21, 2016
The e-book describes a hypothetical company, referred to as Need ToChange, which has a traditional approach to WAN design. It then presents Cisco's response to how NeedToChange should evolve its WAN. This e-book includes a summary of the key components of some of the emerging approaches to WAN architecture and design and concludes with a call to action that outlines a project plan that network organizations can use to evolve their WAN.
Tags : 
    
Cisco
Published By: CloudHealth by VMware     Published Date: Aug 22, 2019
Regardless of whether your data resides on-premises, in the cloud, or a combination of both, you are vulnerable to security threats, data breaches, data loss, and more. Security is often cited as a concern for organizations who are migrating to the public cloud, but the belief that the public cloud is not secure is a myth. In fact, the leading public cloud service providers have built rigorous security capabilities to ensure that your applications, assets, and services are protected. Security in the public cloud is now becoming a driver for many organizations, but in a rapidly evolving multicloud environment, you must keep up with changes that might impact your security posture. This eBook outlines the three core recommendations for cloud security across Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform.
Tags : 
    
CloudHealth by VMware
Published By: CloudHealth by VMware     Published Date: Aug 22, 2019
Regardless of whether your data resides on-premises, in the cloud, or a combination of both, you are vulnerable to security threats, data breaches, data loss, and more. Security is often cited as a concern for organizations who are migrating to the public cloud, but the belief that the public cloud is not secure is a myth. In fact, the leading public cloud service providers have built rigorous security capabilities to ensure that your applications, assets, and services are protected. Security in the public cloud is now becoming a driver for many organizations, but in a rapidly evolving multicloud environment, you must keep up with changes that might impact your security posture. This eBook outlines the three core recommendations for cloud security across Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform.
Tags : 
    
CloudHealth by VMware
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.