Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

updates

Results 76 - 100 of 157Sort Results By: Published Date | Title | Company Name
Published By: Allscripts     Published Date: May 01, 2014
Virdee Medical, a busy private pediatric practice, traded paper charts for a hosted Allscripts solution in 2010. Now, with the improved efficiencies of Allscripts Professional in a hosted environment, Virdee Medical can focus more intently than ever on providing the highest quality patient care.
Tags : 
allscripts, virdee medical, ehr, practice management, electronic health record, time and investment, pediatric practice, allscripts professional
    
Allscripts
Published By: Tripp Lite     Published Date: May 15, 2018
A Practical Guide to IDF/MDF Infrastructure Implementation Once relegated to early adopters and casual home users, VoIP (voice over Internet protocol) has matured. An essential element of any unified communications (UC) system, it is now the standard method of voice communication in business, education, government and healthcare. If your organization has not already migrated to VoIP, the question is not so much if it will, but when. Cost is the primary driver, since the data network performs double duty by carrying voice traffic as well. VoIP also offers capabilities that far exceed traditional phone systems, with unified communication platforms promising to integrate messaging, mobility, collaboration, relationship management, zoned security, intelligent call routing, disaster recovery, video, teleconferencing, status updates and other advanced features. The transition to VoIP presents a number of challenges, including assessing the ability of your network to handle not only additio
Tags : 
    
Tripp Lite
Published By: Avi Networks     Published Date: Aug 17, 2018
Flexible infrastructure choices and application architectures are changing the way that modern enterprises run their computing. Enterprises have become application-centric, investing significant effort and resources on continuous delivery goals and DevOps practices to achieve automation of routine IT and operations tasks. With application owners seeking public-cloud-like simplicity and agility in their own data centers, IT teams are under pressure to reduce wait times to provision applications and updates.
Tags : 
    
Avi Networks
Published By: Dassault Systèmes     Published Date: Aug 08, 2017
A recent study by Engineering.com indicated there is a significant gap between how Industrial Equipment Manufacturing companies value specific aspects of their project execution and how they judge their performance. In order to address the challenging aspects of product development projects, it was determined that projects with a web-based Product Lifecycle Management (PLM) solution will perform higher. Learn how PLM solutions with embedded project management can uniquely provide the following operational best practices: • Full alignment between projects and the product portfolio in order to leverage common technology platforms and launch products to market faster • Coordination of a project’s schedule and resources, with its scope as defined by requirements and development constraints, in order to meet market expectations • Automatic project task updates as development work is completed to provide a real-time understanding of project status and progress
Tags : 
product development, engineering, companies, plm, product lifecycle management, market, designs, budget
    
Dassault Systèmes
Published By: Red Hat     Published Date: Jun 19, 2019
The days of monolithic application development are over. And while “digital transformation” may sound like a fancy buzzword that ranks alongside blockchain, agile, and cloud, it’s not all hype. With transformation comes unprecedented levels of speed, consistency, and efficiency that are fundamentally changing the way developers do their jobs. Yes, that includes you. Much of the burden and pressure to deliver on the promises made by the business falls on the shoulders of IT developers. In a world where users demand new applications, features, and updates across all their devices in real time, container technology is your secret weapon. Containers let you work smarter by creating consistent development environments to rapidly develop and deliver cloud-native applications that can run anywhere. With containers, you can also deliver microservices that eliminate lengthy regression testing cycles, deploy without disruption, and provide a mechanism for patching or rolling back code on a featu
Tags : 
    
Red Hat
Published By: Sponsored by HP and Intel® Xeon® processors     Published Date: May 07, 2012
HP ProLiant Gen8 server features capabilities that speed and simplify 3 critical phases of the server lifecycle: configuration and provisioning, daily operational health monitoring and ongoing updates and maintenance. Download this short paper!
Tags : 
lifecycle, operations, flexibility, serviceability, data center, redefine, expectations, productivity
    
Sponsored by HP and Intel® Xeon® processors
Published By: ForeScout     Published Date: Aug 14, 2012
Information security has undergone a sea change in the past 10 years. Compliance mandates in the form of industry standards and Federal rules like NERC, FFIEC, HIPAA/HITECH and PCI-DSS are the new norm. To stay in compliance, IT teams need to be able to keep up with updatesand changes to existing mandates while also being prepared for new ones. To maximize efficiency, manage risk and reduce potential violations due to compliance failure, organizations need to implement security tools whose features support multiple specifications within and across different compliance frameworks.
Tags : 
forescout, counteract, compliance, independent, assesment, network, access, control
    
ForeScout
Published By: McAfee     Published Date: Mar 08, 2013
McAfee® Virtual Patching for Databases shields databases from the risk presented by unpatched vulnerabilities by detecting and preventing attempted attacks and intrusions in real time without requiring database downtime or application testing.
Tags : 
database security, database virtual patching, database vulnerability management, pci dss, hipaa, critical patch updates, database vulnerability detection
    
McAfee
Published By: VMware, Inc     Published Date: Dec 05, 2013
VMware® Horizon Mirage™ is a layered image management solution that separates a PC into logical layers that either IT or the user own and manage. IT-owned layers are typically OS and corporate applications while user-owned layers consist of their own files and applications. The Horizon Mirage solution enables: • Updates to individual IT-managed layers, such as core operating system files and common business applications, without disrupting other layers, all while maintaining user data and installed applications. • Simpler backup by taking snapshots of layered images, enabling desktop disaster recovery and helping to ensure continued end-user productivity.
Tags : 
vmware, horizon mirage, image management solutions, it-owned layers, corporate applications, it-manged layers, core operating system files, desktop disaster recovery
    
VMware, Inc
Published By: Infosys     Published Date: Jun 12, 2018
Testing is often a major pain point for enterprises when taking new products to market, and can make or break customer loyalty. Testing speed impacts how fast the product can be rolled out to markets, with regular updates, while the quality of testing can determine the product’s success. So how can product testing be done better, faster, and in a more agile manner? A global CPG giant was looking to solve the same problem when it wanted to take its customer loyalty app to 18 countries. See how Infosys helped and the five key takeaways from the project.
Tags : 
brand, customer, loyalty, market, infosys
    
Infosys
Published By: Okta APAC     Published Date: Dec 19, 2018
Cost savings, storage, ease of updates. The allure of the cloud is hard to ignore, with some reports citing over 90% of organizations using cloud services in some manner. But all the benefits of the cloud disappear if you can't keep your data and users safe. In a perimeter-less world, it's identity that becomes the heart of security. Join us to discover why modern security starts with identity first and how identity can help overcome cloud frustrations. We would like to keep you in our database in order to send you product, service, and event announcements from Okta, and to share your information with certain service providers and partners, as described in detail here You may unsubscribe from Okta’s mailing list at any time, by following this process. Additional details about Okta’s privacy practices are available in our Privacy policy.
Tags : 
    
Okta APAC
Published By: Marketo     Published Date: Mar 22, 2018
Advertising on social media platforms has changed tremendously. Recent updates to many social networks' algorithms give users a better experience—one with less promotional content and more relevant content that they want to see. This means that, as a marketer, you need to supplement your organic posts with paid promotion to get your posts seen by your audience. Download this eBook to learn more!
Tags : 
    
Marketo
Published By: Success Factors     Published Date: Feb 06, 2014
Keeping up with the speed of business is rarely easy, but with iContent, your organization can keep pace with its learning needs. Don’t wait to make a move until courses fail to load or slow down, course completions and scores aren’t tracked, or critical content updates don’t occur, jeopardizing compliance.
Tags : 
successfactors, learning management system, lms, e-learning, icontent, human resources, employee performance, human resource technology
    
Success Factors
Published By: Dell     Published Date: Mar 02, 2012
By now the fundamentals of computer and network security are familiar to almost everyone who interacts with a PC on a regular basis: install antivirus software, choose good passwords and protect them and download and install software updates. Despite these measures, businesses of all sizes continue to suffer security breaches.
Tags : 
dell, mobile data, mobile devices, smartphones, it planning, technology, it management, small business
    
Dell
Published By: CDW Symantec     Published Date: Aug 02, 2012
Read how chief information security officers (CISOs) view the state of mobile computing. This whitepaper discusses the importance of mobile enablement, policy updates, pertinent security practices and what organizations have done to secure their business mobility.
Tags : 
ciso, mobile, computing, security, idg, symantec, managers, enterprise
    
CDW Symantec
Published By: VMware     Published Date: Nov 07, 2016
In today’s digital economy, the ability to bring new software applications and updates to market quickly is a key to competitive advantage. For companies in diverse industries, the goal is the same: Get high-quality software into production as fast as possible. In this quest to accelerate release cycles, organizations must get beyond historical barriers that impede the rapid delivery of the software that keeps an enterprise competitive. In too many cases, processes tend to be inefficient, slow, and prone to failed releases. Much of the blame for the problem can be laid at the feet of organizational structures that mandate conflicting goals for the two key departments at either end of the application development chain: development/testing (dev/test) and operations. Where dev/test teams want to push their applications and updates into production quickly, operations teams want to go more slowly in order to maintain control and keep applications and systems available.
Tags : 
    
VMware
Published By: IBM Software     Published Date: Feb 07, 2011
Read about how Mayflex used IBM Cognos Express to replace a complex spreadsheet system, improve time-consuming budgeting and forecasting processes, compare actuals against budgets at various levels and save time for end-users through automatic system updates.
Tags : 
ibm cognos express, dashboard, business intellligence, automatic system update, business analytics
    
IBM Software
Published By: Lumension     Published Date: Jan 22, 2013
In this age of APTs you can’t leave a single PC unpatched and vulnerable. In this on-demand webcast, Randy Franklin Smith from Ultimate Windows Security will deal with this whole topic.
Tags : 
software updates, security, patch, network security, patch management, remediation solutions
    
Lumension
Published By: IBM Software     Published Date: Jul 06, 2011
Harish Grama updates us on how IBM Rational leverages its own tools to add value to the Rational business strategy and succeeds in measured improvements in software delivery through effective organizational collaboration, automation, and reporting.
Tags : 
rational, subscription & support, harish grama, software delivery, automation, collaboration
    
IBM Software
Published By: Workfront     Published Date: Jun 25, 2014
Is your IT organization plagued by overburdened resources, too many meetings and work request interruptions? Download this eBook to learn about 10 problems preventing your IT team from doing their best work and how to solve them. Get the eBook now.
Tags : 
at task, it organizations, work requests, technology changes, project updates, status reports, project management, enterprise applications
    
Workfront
Published By: Flexera     Published Date: Apr 17, 2019
How can you avoid vulnerabilities on non-Microsoft software? This white paper is essential.
Tags : 
    
Flexera
Published By: Symantec.cloud     Published Date: Oct 11, 2012
Symantec has established some of the most comprehensive sources of Internet threat data in the world through the Symantec Global Intelligence Network, which is made up of more than 64.6 million attack sensors and records thousands per second.
Tags : 
symantec, internet security, malware, identity theft, data security, security
    
Symantec.cloud
Published By: Trend Micro SaaS     Published Date: Sep 01, 2009
This comprehensive hosted service blocks email threats before they can touch the network, integrating powerful anti-spam and anti-phishing with award-winning antivirus and anti-spyware. Security leader Trend Micro updates and tunes the solution to keep the customer's network secure while saving valuable IT resources.
Tags : 
saas, trend, trend micro, software as a service, trendlabs, email security, security, interscan messaging
    
Trend Micro SaaS
Published By: Lumension     Published Date: Aug 29, 2014
Server systems are, by definition, more important than individual endpoints. They must provide services to hundred, or even thousands, of endpoints and, naturally, must be secure. Traditional anti-virus (AV) solutions can provide protection for servers. However, constantly running AV processes, along with potentially frequent signature updates, can consume resources that could otherwise be used to provide application services to users. Read this evaluation by Tolly, commissioned by Lumension, as the dive into the impact on server resources of the alternative application control solution compared with traditional AV solutions from Microsoft Corp, Symantec Corp, and Trend Micro, Inc.
Tags : 
server, security, anti-virus, endpoint security
    
Lumension
Published By: Success Factors     Published Date: Jul 10, 2014
Keeping up with the speed of business is rarely easy, but with iContent, your organization can keep pace with its learning needs. Don’t wait to make a move until courses fail to load or slow down, course completions and scores aren’t tracked, or critical content updates don’t occur, jeopardizing compliance.
Tags : 
successfactors, learning management system, lms, e-learning, icontent, human resources, employee performance
    
Success Factors
Start   Previous    1 2 3 4 5 6 7    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.