Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

critical

Results 2276 - 2300 of 2636Sort Results By: Published Date | Title | Company Name
Published By: Imprivata     Published Date: Jul 09, 2014
Efficient communication and collaboration amongst physicians, nurses and other providers is critical to the coordination and delivery of patient care, especially given the increasingly mobile nature of today’s clinicians and the evolution of the accountable care organization (ACO) model. Download to learn more!
Tags : 
imprivata, economic impact, patient care, healthcare it, protected health information, phi, it management
    
Imprivata
Published By: Workday     Published Date: Mar 02, 2018
Read this report from Workday and HMG Strategy to learn the critical strategies CIOs need to lead digital transformation in their organizations.
Tags : 
digital transformation, strategies, cio, hmg
    
Workday
Published By: Workday     Published Date: Mar 02, 2018
Read this report from Workday and HMG Strategy to learn the critical strategies CIOs need to lead digital transformation in their organizations.
Tags : 
cio, digital transformation, organizations
    
Workday
Published By: Great Bay Software     Published Date: Jan 04, 2018
IoT device capabilities are constantly evolving and enterprise adoption is increasing at a rapid pace. As adoption grows, these connected devices provide additional entry points for external threats, thus broadening the organizations' attack surface. The enterprise must now look for solutions to address an increasingly complex problem: how to detect, monitor and control unmanaged devices that are connecting to the network and may lack consistent security protocols, putting critical business data at risk.
Tags : 
iot, iot security, iot endpoint security
    
Great Bay Software
Published By: 123Together     Published Date: May 27, 2008
Email has become THE mission critical application for businesses large and small. As a growing business continually striving to increase productivity, collaboration and corporate success, you understand the important role that Microsoft Exchange Server plays in any profitable business. Small and mid-size businesses alike see the productivity benefits of utilizing an enterprise-class solution but since many do not have the financial or human resources to bring it in house, more and more of them are turning to a hosted solution.
Tags : 
123together, it strategies, economy, stability, migration, collaboration, green it, outsourcing
    
123Together
Published By: Comcast Business     Published Date: Feb 06, 2019
The technology landscape in the financial services sector is vast, ranging from cutting-edge to mission-critical, each having an impact on the industry as a whole. Customer-facing services and back-end operations alike are seeing real benefits from innovation, including greater efficiencies and higher levels of customer satisfaction.
Tags : 
network, technology, digital transformation, tech future, enterprise technology, networking, sd_wan, internet
    
Comcast Business
Published By: Oracle     Published Date: Aug 01, 2018
Your enterprise runs its critical applications on Oracle Databases, and as an enterprise IT leader, maintaining the performance and availability of your databases is among your top priorities. Any degradation in performance or loss of data could result in serious business disruption and loss of revenue, so protecting this vital asset is a must. There are many causes of data loss— administration errors, system or media failures, cyberattacks, and more—but we often overlook design flaws in the very systems meant to protect data: general-purpose backup systems.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Oct 20, 2017
Your enterprise runs its critical applications on Oracle Databases, and as an enterprise IT leader, maintaining the performance and availability of your databases is among your top priorities. Any degradation in performance or loss of data could result in serious business disruption and loss of revenue, so protecting this vital asset is a must. There are many causes of data loss— administration errors, system or media failures, cyberattacks, and more—but we often overlook design flaws in the very systems meant to protect data: general-purpose backup systems. Many existing data protection solutions fail to meet the demands of critical databases because they treat them as generic files to copy as opposed to specialized resources. Taking a generic approach to database backup and recovery not only exposes you to the risk of data loss, it also negatively impacts performance and makes it difficult to recover within acceptable timeframes.
Tags : 
    
Oracle
Published By: SAS     Published Date: Oct 18, 2017
With the support of SAS, the Internet of Things Institute developed the 2017 Internet of Things ROI Research Study to gather real-world insights, lessons learned and future guidance from current users of IoT technology and advanced analytics. This selective sample of IoT users offers valuable insights to both IoT innovators and organizations still waiting to see how the technology evolves before investing. Multiple business layers and functions have input into IoT decision making. Discover which layer was most critical to success for those organizations that have achieved the highest percentage of their targeted ROI. Learn about the main drivers of success for IoT users achieving higher returns. Lastly, the results highlight six primary factors that can undermine an IoT initiative and how they can be prevented.
Tags : 
    
SAS
Published By: MCH     Published Date: Jan 29, 2007
Learn how local governments operate, who makes the purchasing decisions, what criteria influence buying decisions, and how timing can play a critical role in the success of your marketing campaigns.
Tags : 
government, local government, mch, mailings.com, database and list managers
    
MCH
Published By: ChannelAdvisor     Published Date: Jan 17, 2019
"Whether you call yourself a company, brand, brand manufacturer, manufacturer, wholesaler, branded manufacturer or one of the other myriad of categorizations out there, there’s never been a better time to focus on direct-to-consumer (D2C) marketplaces as part of your go-to market strategy. Some 60% of consumers are already visiting your website instead of your retailers’ sites, and more than half will opt to buy directly from brand manufacturers when given the option. After years of relying on marketplaces to handle so many mission-critical activities, it can be challenging to build a successful D2C model that thoroughly addresses them all. This process will require a new way of thinking for you, a cultural shift for your employees and a lot of logistics for everyone involved. But how can you know when it’s time to start selling on e-commerce marketplaces? While the benefits of transitioning to a D2C marketplace model are undeniable, it also requires a significant investment of time
Tags : 
    
ChannelAdvisor
Published By: Synnex     Published Date: Oct 31, 2017
The Modern Microsoft Partner Series is a collection of five eBooks designed to help IT solution providers on their journey to success in the cloud. The series is full of insights and best practices that cover a variety of critical business topics. The first eBook sets up the series and focuses mainly on revealing the compelling evidence around the cloud opportunity. If you are interested in learning about the size or pace of the cloud opportunity, this first eBook is meant for you.
Tags : 
    
Synnex
Published By: Aria Systems     Published Date: Sep 21, 2015
This agenda of this research paper is: How is the Digital Revolution impacting business today? What are the threats and opportunities around IoT, and what are their implications to monetization? What are the future directions of Agile Billing? Monetization - necessary evil or critical enabler?
Tags : 
    
Aria Systems
Published By: LifeSize, a division of Logitech     Published Date: Jan 12, 2011
Why Ease of Use and Quality of User Experience Are The Most Critical Criteria for Successful Videoconferencing Deployments.
Tags : 
lifesize, videoconferencing deployment, ip-network, user experience, telecommunication, ip networks, ip telephony
    
LifeSize, a division of Logitech
Published By: HP Data Center     Published Date: Mar 25, 2009
To accommodate increasingly dense technology environments, increasingly critical business applications, and increasingly stringent service level demands, data centers are typically engineered to deliver the highest-affordable availability levels facility-wide. Within this monolithic design approach, the same levels of mechanical, electrical, and IT infrastructure are installed to support systems and applications regardless of their criticality or business risk if unplanned downtime occurs. Typically, high redundancy designs are deployed in order to provide for all eventualities. The result, in many instances, is to unnecessarily drive up both upfront construction or retro-fitting costs and ongoing operating expenses.
Tags : 
hp data center, hybrid data center, dense technology environments, hybrid data center, critical business applications, it infrastructure, high redundancy designs, pods
    
HP Data Center
Published By: Comcast Business     Published Date: Mar 24, 2015
Trends such as big data and BYOD have made the network more critical than ever. Research shows the pain points IT departments are experiencing with network infrastructure - and the investments they're making to improve capacity, scalability, and flexibility. Download this white paper to learn more about network trends.
Tags : 
network, big data, byod, it department, network infrastructure, scalability, capacity, enterprise applications
    
Comcast Business
Published By: CA Technologies     Published Date: Jan 06, 2014
As most European organisations open up their applications for external users, Identity Access Management (IAM) is becoming ever more critical to drive business growth.
Tags : 
mediacom, byoid, identity access management, iam, business growth, directories of identities, it professionals, external business users
    
CA Technologies
Published By: Fluke Networks     Published Date: Nov 05, 2014
This White Paper examines the need for AANPM and how it helps organisations to optimise the performance of business critical applications while speeding up network and application trouble-shooting and minimising downtime.
Tags : 
application trouble shooting, the need for aanpm, benefits of aanpm, networking
    
Fluke Networks
Published By: Anaplan     Published Date: Mar 29, 2018
Disruptive innovation, new business models, and globalization have accelerated the rate of change for every business. To stay competitive, organizations are revising their business models, product sets, and other critical aspects of their operations on a much more frequent and continuous basis. These organizations realize that real-time strategic planning and performance management are not just “nice to have” but “must have” capabilities. Yet many organizations still struggle to implement these capabilities. As a result, they’re unable to quickly revise their strategies, implement plans, and monitor results.
Tags : 
strategic, planning, innovation, business, globalization, organizations
    
Anaplan
Published By: Anaplan     Published Date: Mar 29, 2018
Disruptive innovation, new business models, and globalization have accelerated the rate of change for every business. To stay competitive, organizations are revising their business models, product sets, and other critical aspects of their operations on a much more frequent and continuous basis.
Tags : 
    
Anaplan
Published By: IBM     Published Date: Oct 01, 2013
The new IBM System x3650 servers provide the power midmarket customers need to improve the performance of mission-critical applications, such as Microsoft Exchange, while offering dramatic cost savings and environmental customer benefits.
Tags : 
ibm, ibm system x, ibm system x m4, ibm system x m4 servers, servers, midmarket, applications, storage
    
IBM
Published By: Cisco     Published Date: Dec 21, 2016
Today's datacenter networks must better adapt to and accommodate business-critical application workloads. Datacenters will have to increasingly adapt to virtualized workloads and to the ongoing enterprise transition to private and hybrid clouds. Pressure will mount on datacenters not only to provide increased bandwidth for 3rd Platform applications such as cloud and data analytics but also to deliver the agility and dynamism necessary to accommodate shifting traffic patterns (with more east-west traffic associated with server-to-server flows, as opposed to the traditional north-south traffic associated with client/server computing). Private cloud and legacy applications will also drive daunting bandwidth and connectivity requirements. This Technology Spotlight examines the increasing bandwidth requirements in enterprise datacenters, driven by both new and old application workloads, cloud and noncloud in nature. It also looks at how Cisco is meeting the bandwidth challenge posed by 3rd
Tags : 
    
Cisco
Published By: Hitachi Vantara     Published Date: May 10, 2018
Digitizing communications governance is critical as banks adopt next-generation automation and RegTech solutions to address compliance and risk-mitigation measures. Regulations are changing risk profiles, requiring oversight of the culture of risk-taking, and preventing market abuse. Hitachi Vantara solutions enable you to centrally “capture, curate, consume” all regulated employee communications across the front office, middle office and back office.
Tags : 
    
Hitachi Vantara
Published By: Third Brigade     Published Date: Aug 21, 2009
Healthcare organizations are being targeted by financially motivated attackers that steal and sell valuable data, including identities and computing resources. This white paper defines the new threat, and outlines three important steps that providers can take to protect their critical systems.
Tags : 
hipaa, hipaa compliance, network security, network security appliance, security management, intrusion prevention, intrusion detection, hacker detection
    
Third Brigade
Published By: HireVue     Published Date: Aug 28, 2018
Pre-hire assessments are a proven, scientific way to screen candidates. Today, pre-hire assessments have evolved beyond their legacy standardized-testing roots to measure a candidate’s critical competencies faster, more accurately, and in a way that enhances their candidate experience. EXPECT TO LEARN: Why pre-hire assessments make hiring more data-driven The technologies driving the next generation of pre-hire assessments How the next generation of assessments mitigate bias and control for adverse impact How video-based and game-based assessments provide complementary insight into a candidate’s skills, abilities, and potential Why the multiple-choice pre-employment test is becoming a thing of the past Download the free white paper now
Tags : 
    
HireVue
Start   Previous    85 86 87 88 89 90 91 92 93 94 95 96 97 98 99    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.