HIT Consultant Insightful coverage of healthcare innovation
 

systems

Results 276 - 300 of 3882Sort Results By: Published Date | Title | Company Name
Published By: Dell     Published Date: Nov 04, 2013
In an ever-changing world, DBAs are managing more complex, business-critical systems. The problem is the business isn’t slowing down, and budgets are getting smaller. Advanced performance management is the answer. Learn more – read this Dell Software white paper.
Tags : 
dell, dba, business-critical, service level
    
Dell
Published By: Dell Software     Published Date: Feb 19, 2014
In an ever-changing world, DBAs are managing more complex, business-critical systems. With demands of high performance and around-the-clock uptime, how can they keep providing maximum service levels? Advanced performance management is the answer. Learn more – read this Dell Software white paper.
Tags : 
oracle performance, dbas, database management, database performance, advanced performance, maximum service levels, software
    
Dell Software
Published By: HP     Published Date: Jul 29, 2008
This case study highlights how one of the world's leading manufacturing companies employed a Mission Critical architecture to protect their most important systems. Learn how this customer achieved 99.99% availability of their systems for 4 straight years. As a result of adopting a high availability strategy, this HP customer saved 97 million Euros, by avoiding lost downtime.
Tags : 
mission critical, manufacturer, manufacturing, high availability
    
HP
Published By: Ecora Software     Published Date: Aug 15, 2007
21 CFR Part 11 continues to cause confusion. Recent FDA guidance documents help, but many IT departments still struggle to establish appropriate validation processes with limited time and resources. Ecora's FREE in-depth guide, "Achieving Sustainable IT Compliance to 21 CFR Part 11," gives you an overview of the regulation from an IT perspective. It also outlines how you can accurately and cost-effectively implement a systems-based best practices approach that will help you meet FDA requirements.
Tags : 
21 cfr part 11, compliance, electronic records, electronic data, electronic signatures, information management, pharm, pharmaceuticals
    
Ecora Software
Published By: IBM US Smarter Buildings     Published Date: Jan 10, 2012
Download this white paper to understand how these changes create a need for new processes and systems to achieve compliance and drive the need for new and broader skills within financial and real estate personnel.
Tags : 
ibm, smarter buildings, lease accounting, finance, financial accounting, business
    
IBM US Smarter Buildings
Published By: IBM     Published Date: Apr 24, 2012
Download this white paper to understand how these changes create a need for new processes and systems to achieve compliance and drive the need for new and broader skills within financial and real estate personnel.
Tags : 
ibm, manucaturing, facilities, lease, lease accounting, paperwork
    
IBM
Published By: IBM     Published Date: Nov 04, 2014
Organizations are shifting to Cloud to improve agility, reduce costs and increase IT efficiency. To achieve the benefits promised by Cloud, your storage infrastructure needs to be virtualized and provide the required automation and management capabilities. Join this session to learn how you can quickly convert existing storage to Cloud storage, standardize advanced data protection capabilities, and utilize advanced data-driven analytics to optimize tiering across storage systems --- reducing per unit storage costs up to 50% and freeing up valuable IT budget.
Tags : 
cloud computing, it efficiency, cloud storage, data protection
    
IBM
Published By: IBM     Published Date: Jan 23, 2015
Organizations are shifting to Cloud to improve agility, reduce costs and increase IT efficiency. To achieve the benefits promised by Cloud, your storage infrastructure needs to be virtualized and provide the required automation and management capabilities. Watch this webinar to learn how you can quickly convert existing storage to Cloud storage, standardize advanced data protection capabilities, and utilize advanced data-driven analytics to optimize tiering across storage systems --- reducing per unit storage costs up to 50% and freeing up valuable IT budget.
Tags : 
storage environment, cloud storage, it efficiency, cloud agility, data-driven analytics
    
IBM
Published By: Active Power     Published Date: Aug 30, 2011
Learn why energy efficiency for UPS equipment is so important, what can influence energy UPS efficiency and how it can directly impact energy costs.
Tags : 
backup power, backup power supply, battery backup, flywheel ups, green backup power, green power, uninterruptible power supply, critical power systems
    
Active Power
Published By: BillingPlatform     Published Date: Apr 18, 2019
Digital transformation, typically associated with front-office changes like sales and marketing, has begun to revolutionize billing practices for forward-leaning enterprises. This infographic highlights the importance of evolving your billing for the digital economy. Discover the 4 survival tactics offered by cloud-based billing platforms.
Tags : 
    
BillingPlatform
Published By: Qualys     Published Date: Nov 05, 2013
A zero-day threat is a vulnerability that becomes known to the vendor on the same day it becomes known to the public, meaning IT assets targeted by a zero-day threat won't have a patch available when it's needed. However, zero-day attacks operate in a realm of the probable - they work only because there are exploitable vulnerabilities within IT systems. Many of these can, and should be prevented. This guide describes why organizations are vulnerable to zero-day attacks, and what you can do to add a zero-day offense to your existing vulnerability management processes to protect your organization's assets and data.
Tags : 
qualys, qualys zero-day risk analyzer, zero-day, zero-day offense, vulnerability, vulnerability management, zero-day threat, patch availablity
    
Qualys
Published By: Group M_IBM Q3'19     Published Date: Aug 29, 2019
Today's automotive engineers are faced with rising product complexity and the need to innovate their methods in order to remain competitive. This infographic will help to paint a picture of the impact of rising complexity on the auto industry and provide a roadmap for embracing digital transformation.
Tags : 
    
Group M_IBM Q3'19
Published By: Schneider Electric     Published Date: Oct 17, 2016
This paper describes key security aspects of developing and operating digital, cloud-based remote monitoring platforms that keep data private and infrastructure systems secure from attackers.
Tags : 
    
Schneider Electric
Published By: Schneider Electric     Published Date: Feb 17, 2017
This paper describes key security aspects of developing and operating digital, cloud-based remote monitoring platforms that keep data private and infrastructure systems secure from attackers. This knowledge of how these platforms should be developed and deployed is helpful when evaluating the merits of remote monitoring vendors and their solutions.
Tags : 
cyber security, energy efficiency, power and cooling systems, mean time to recovery, mttr, data privacy, cloud-based platforms, digital remote monitoring
    
Schneider Electric
Published By: IBM     Published Date: Mar 17, 2009
CPDA’s Product Lifecycle Management (PLM) research programs target the critical decisions in Product Lifecycle Management challenging Design, Engineering, Manufacturing, and Information Technology managers and executives. CPDA’s PLM collaborative research programs provide indepth analysis of strategies, products, issues, processes, technologies, trends, case studies, and surveys for assessing technology, business goals and objectives, and implementation road maps.
Tags : 
ibm, telelogic, addressing future automotive needs, model-driven systems, product value management, plm, computer-aided design, cad
    
IBM
Published By: Tail-f Systems     Published Date: Sep 16, 2008
This paper reviews the business cost of major outages. It also details some of the reasons that network architecture has become so complex, discusses current approaches to the problem and finally presents NETCONF as a powerful building block solution to the network management problem.
Tags : 
network management, netconf, network architecture, ietf standard, tail-f, tailf
    
Tail-f Systems
Published By: IBM MaaS360     Published Date: Apr 15, 2015
Federal: This white paper reviews requirements from the National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) about Mobile Device security for usage in Federal affairs.
Tags : 
mobile device security, byod, application security, data security
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Jul 09, 2015
Federal: This white paper reviews requirements from the National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) about Mobile Device security for usage in Federal affairs.
Tags : 
nist requirements, dod requirements, mobile device management, federal affairs, government
    
IBM MaaS360
Published By: IBM MaaS360     Published Date: Oct 08, 2015
Federal: This white paper reviews requirements from the National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) about Mobile Device security for usage in Federal affairs.
Tags : 
ibm, nist, dod, mobile device management, data security, server security
    
IBM MaaS360
Published By: IBM     Published Date: Apr 20, 2017
The National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) have taken leading roles in exploring requirements for Mobile Device Management (MDM) systems for government agencies. Mobile devices, particularly smartphones, are exceptionally vulnerable to security breaches. They are easily lost, are filled with unknown applications, communicate over untrusted networks, and are often purchased by users without regard to IT standards and security features.
Tags : 
mobile security, mobile device management, enterprise data, application security, information security, communication interception, business data, app security
    
IBM
Published By: Cisco     Published Date: Nov 17, 2014
Recent changes in hacking combined with the emergence of the Internet of Everything have profoundly changed how we protect our systems, driving us to think about a new approach to cybersecurity. In this paper, learn about the challenges that created the need for a new threat-centric security model spanning the full attack continuum: before, during and after an attack.
Tags : 
spyware, rootkits, hacking, cisco, advanced threat protection
    
Cisco
Published By: Adobe Systems     Published Date: Mar 04, 2011
Adobe Acrobat X can help give your team the power to turn unrealistic deadlines into realistic deadlines. Join the Adobe Acrobat X software webinar and go from under pressure to overachieving.
Tags : 
adobe, pdf, portfolio, acrobat, pro, rich media, acrobat x
    
Adobe Systems
Published By: ADTRAN     Published Date: Jun 16, 2011
Small and medium enterprises are increasingly upgrading to a UC system, which can improve customer service, streamline product development and speed response to new opportunities. Learn the key steps of UC adoption.
Tags : 
adtran, telecomm, communication, uc adpotion, ivr application, response time, roi, infrastructure
    
ADTRAN
Published By: McAfee EMEA     Published Date: Nov 15, 2017
Machine learning offers the depth, creative problem-solving capabilities, and automation to help security organizations gain significant ground against attackers. It’s a powerful tool for processing massive amounts of data for the purpose of malware classification and analysis, especially for unknown threats. Through supervised learning, human researchers can continually develop new training models that expand the understanding and competency of machine learning systems.
Tags : 
analytics, security, problem solving, creative, data, researching, malware
    
McAfee EMEA
Published By: Palo Alto Networks     Published Date: Dec 02, 2016
Microsoft® announced Windows Server® 2003 End-of-Support (EOS) on July 14, 2015. Many businesses are forced by circumstance to leave these systems in service for some time. Retiring a major enterprise component has always been a challenge for IT departments.
Tags : 
palo alto, advanced enpoint protection, strategy works, company protection, security, microsoft
    
Palo Alto Networks
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.