HIT Consultant Insightful coverage of healthcare innovation
 

pragmatic

Results 1 - 25 of 49Sort Results By: Published Date | Title | Company Name
Published By: Tripwire     Published Date: Oct 14, 2010
In this white paper, security and compliance expert Dr. Anton Chuvakin explains how to take advantage of this opportunity.
Tags : 
tripwire, siem, compliance, security, log management, log data, real-time monitoring
    
Tripwire
Published By: CA Technologies     Published Date: Oct 21, 2014
This paper acts as a guide to help get you started with DevOps
Tags : 
a guide to getting started with devops, an introduction to devops, starting out with devops
    
CA Technologies
Published By: CA Technologies     Published Date: Oct 21, 2014
This paper acts as a guide to help get you started with DevOps
Tags : 
a guide to getting started with devops, an introduction to devops, starting out with devops
    
CA Technologies
Published By: CA Technologies     Published Date: Oct 21, 2014
This paper acts as a guide to help get you started with DevOps
Tags : 
a guide to getting started with devops, an introduction to devops, starting out with devops
    
CA Technologies
Published By: CA Technologies     Published Date: Oct 21, 2014
This paper acts as a guide to help get you started with DevOps
Tags : 
a guide to getting started with devops, an introduction to devops, starting out with devops
    
CA Technologies
Published By: CA Technologies     Published Date: Oct 21, 2014
This paper acts as a guide to help get you started with DevOps
Tags : 
a guide to getting started with devops, an introduction to devops, starting out with devops
    
CA Technologies
Published By: RedHat     Published Date: May 10, 2017
A practical path to IT modernization powered by Intel and Red Hat This paper discusses the challenges involved in making this decision and offers recommendations as to how to approach IT modernization in a pragmatic, structured way.
Tags : 
intel, red hat, it modernization, agility, efficiency, reduce costs
    
RedHat
Published By: IBM     Published Date: Sep 27, 2013
Analytics: The Real-World Use of Big Data - How innovative enterprises in the midmarket extract value from uncertain data This study highlights the phases of the big data journey, the objectives and challenges of midsize organizations taking the journey, and the current state of the technology that they are using to drive results. It also offers a pragmatic course of action for midsize companies to take as they dive into this new era of computing.
Tags : 
ibm, big data, big data solutions, midmarket businesses, analytics
    
IBM
Published By: IBM     Published Date: Jan 02, 2014
This study highlights the phases of the big data journey, the objectives and challenges of midsize organizations taking the journey, and the current state of the technology that they are using to drive results. It also offers a pragmatic course of action for midsize companies to take as they dive into this new era of computing.
Tags : 
ibm, analytics, global business service, big data, business value, it professionals, volume, velocity, variety, customer analytics, trends and insights, information management, data security, integration, variety of data, analytic accelerator, infrastructure
    
IBM
Published By: HP     Published Date: Mar 15, 2013
HP Webinar: Automate Your Way to the Pragmatic Cloud
Tags : 
    
HP
Published By: Qualys     Published Date: Feb 17, 2016
It’s not easy being today’s CISO or CIO. With the advent of cloud computing, Shadow IT, and mobility, the risk surface area for enterprises has increased dramatically, while IT budgets have shrunk and skilled cyber security talent is virtually impossible to find. Thankfully, the CIS Top 20 Critical Controls provides a pragmatic approach, offering prioritized guidance on the important steps for implementing basic cyber hygiene practices. With the CIS Top 20 Critical Security Controls, CISOs now have a blueprint for reducing risk and managing compliance. By automating each of these controls, CISOs enable their information security teams to do much more with less, essentially operationalizing good cyber hygiene.
Tags : 
qualys, cis, critical security, cloud computing, cyber security
    
Qualys
Published By: The Logic Group     Published Date: Jun 07, 2011
If you are a business that accepts credit or debit card payments then achieving PCI DSS compliance is an industry requirement. But how can you make it work for your business & prevent it becoming an exercise in box ticking?
Tags : 
pci dss, compliance, credit card data, debit card data, customer data, retail, payments
    
The Logic Group
Published By: Monotype     Published Date: Jun 29, 2017
After years spent hidden in the shadows of Millennials, Generation Z is taking over the spotlight and making some serious waves in the process. Gen Zs are the first true digital natives, born between the late 1990’s to the mid 2000’s, and only know a world with Internet access, social media and smartphones. This “YouTube generation” is tech-savvy and pragmatic, drives innovation and the way we consume media, and they’re pushing brands and marketers to catch up in the process. Like, follow, read, repeat In an era of massive information (and advertising) overload, the brand-consumer relationship is a delicate dance. One misstep and a disgruntled customer will gladly find a new partner. Thanks to a mobile-first, visually rich, social and digital world, people expect flexibility, authenticity and consistency in every single interaction with a brand. In order to keep your customers engaged and happy, look to the emerging behaviours and preferences of Generation Z as a beacon for what’s to c
Tags : 
generation z, communication, media, marketing, branding, customer engagement, digital engagement
    
Monotype
Published By: Rackspace     Published Date: Mar 20, 2019
Running an IT backend that is secure, scalable and well-managed is resource draining for any enterprise. Challenger, Singapore’s largest IT retailer, took a more pragmatic route by transforming on a Online to Offline (O2O) model. For the journey, it partnered with Rackspace to accelerate the value of its AWS cloud migration, by tapping its proven AWS expertise, strong managed services portfolio, and familiarity with local regulatory compliance and cloud security demands
Tags : 
    
Rackspace
Published By: VeriSign, Inc.     Published Date: Aug 03, 2011
The goal of this white paper is to help enterprises make pragmatic decisions about where and when to use cloud solutions by outlining specific issues that enterprises should raise with hosting providers before selecting a vendor, and by highlighting the ways in which SSL from a trusted certificate authority can help enterprises conduct business in the cloud with confidence.
Tags : 
verisign, cloud hosting provider, ssl certificates, secure sockets layer, cloud computing, data recovery, business continuity, data access, authentication, encryption
    
VeriSign, Inc.
Published By: Thawte     Published Date: Dec 29, 2015
The goal of this white paper is to help enterprises make pragmatic decisions about where and when to use cloud solutions by outlining specific issues that enterprises should raise with hosting providers before selecting a vendor, and by highlighting the ways in which SSL from a trusted Certificate Authority (CA) can help enterprises conduct business in the cloud with confidence.
Tags : 
    
Thawte
Published By: Symantec     Published Date: Oct 12, 2012
The goal of this white paper is to help enterprises make pragmatic decisions about where and when to use cloud solutions.
Tags : 
ssl certificates, cloud hosting, cloud services, encryption, authentication, certificate validation, secure sockets layer, it security
    
Symantec
Published By: Cisco     Published Date: Aug 28, 2015
Viewing this video you will learn: What is impeding many organizations from adopting cloud–based service delivery How to apply automation across all organizational layers using a stepwise, pragmatic approach with Cisco ONE Enterprise Cloud Suite.
Tags : 
cloud, hybrid, iot, public cloud, service, automation
    
Cisco
Published By: Skillsoft     Published Date: Jul 23, 2014
This ExecBlueprint provides practical advice for developing such a code that will go beyond “window dressing” and inspire leaders and employees alike to build and sustain a compliant and ethical culture. While acting ethically is important for its own sake, the authors also provide pragmatic reasoning for fostering such a culture: ethical organizations earn the trust — and loyalty — of employees, customers, and investors. Accordingly, the code should be simple to understand, widely circulated, and aggressively enforced. But most importantly: adherence starts at the top.
Tags : 
skillsoft, ethical workplace, compliance, code of conduct, industry standards, rules, employee behavior, corporate behavior
    
Skillsoft
Published By: ServiceNow     Published Date: Nov 22, 2013
This document discusses how self-service cloud provisioning can serve as a pragmatic customer-centric approach for managing the proliferation of public and private clouds. It discusses customer expectations, critical success factors, and key metrics required for a successful implementation of such an offering.
Tags : 
servicenow, enterprise it, cloud computing, cloud provisioning, customer-centric cloud, it operations and governance, virtual resources, service catalog, automate everything, it services, put it on the cloud
    
ServiceNow
Published By: ServiceNow     Published Date: Mar 26, 2014
This document discusses how self-service cloud provisioning can serve as a pragmatic customer-centric approach for managing the proliferation of public and private clouds
Tags : 
cloud, slef-service, customer experience, on-demand services
    
ServiceNow
Published By: Incapsula     Published Date: Nov 06, 2017
Distributed denial of service (DDoS) attacks have become a fact of life for any business with a web presence. Whether you’re an enterprise, e-commerce business, local organization, or government offce—it’s merely a matter of time before you’re going to have to deal with the inevitable DDoS attack. The question is what can you do before an attack so you can have adequate defenses already in place. This handbook is a practical guide for planning and executing a DDoS response plan. It outlines pragmatic steps and best practices for choosing and setting up the right mitigation solution for your organization, how to authoritatively respond to an attack, and conduct a thorough post-attack analysis for developing follow-up defense strategies.
Tags : 
    
Incapsula
Published By: CA Technologies     Published Date: Jun 05, 2014
An eBooklet discussing the pitfalls of DevOps, how you can avoid them, and how to get started on your DevOps journey.
Tags : 
devops, a guide to devops, integrated journey
    
CA Technologies
Published By: CA Technologies     Published Date: Sep 11, 2014
An eBooklet discussing the pitfalls of DevOps, how you can avoid them, and how to get started on your DevOps journey.
Tags : 
devops, a guide to devops, integrated journey
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 04, 2015
There has been growing buzz about DevOps. DevOps is a methodology that unites the often separate functions of software development (Dev) and production and operations (Ops) into a single, integrated, and continuous process. DevOps is about breaking down the barriers between Dev and Ops. It leverages people, processes, and technology to stimulate collaboration and innovation across the entire software development and release process. Dev and Ops should always be part of an integrated process, but that’s not always as easy as it sounds. You may be stuck in what we call “Dysfunction Junction.” Read this eBooklet to learn about the pitfalls of DevOps, how you can avoid them, and how to get started on your DevOps journey.
Tags : 
    
CA Technologies
Previous   1 2    Next    
Search      

Add Research

Get your company's research in the hands of targeted business professionals.