RSS feed Get our RSS feed

News by Topic

ca sm

Results 276 - 300 of 1709Sort Results By: Published Date | Title | Company Name
By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Technical Tests are designed to cover specific services. Each security test has its own objectives and acceptable levels of risk. There is not an individual technique that provides a comprehensive picture of an organisation’s security when executed alone. A qualified third party can work with you to determine what combination of techniques you should use to evaluate your security posture and controls to begin to determine where you may be vulnerable.
Tags : cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection
     Secureworks ABM UK 2017
By: IBM     Published Date: Jul 07, 2015
This is the Key technical support considerations for smart IT infrastructures" White Paper.
Tags : infrastructure, big data, data center, scalability, reduce complexity, data management
     IBM
By: IBM     Published Date: Oct 19, 2015
IBM InfoSphere Information Server connects to many new ‘at rest’ and streaming big data sources, scales natively on Hadoop using partition and pipeline parallelism, automates data profiling, provides a business glossary, and an information catalog, plus also supports IT.
Tags : ibm, infosphere, data profiling, business glossary, partition, pipeline parallelism, information server, data sources
     IBM
By: Qualys     Published Date: Jul 19, 2012
Data breaches are bad for business, so every enterprise needs security. In the past this was expensive, because security products were designed for companies with deep pockets and teams of experts. But that's changed. New 'cloud based' services, such as those offered by Qualys, are fast to deploy, safe and easy to use. What's more they're even more affordable. With growing demands from customers and regulators for security, now is a good time to invest in security. Leading cloud-based security services deliver a professional level of security assurance in a form that fits the circumstances and pockets of small businesses.
Tags : technology, firewall, security, cloud, data, anti-virus
     Qualys
By: ipoque     Published Date: Feb 14, 2019
Virtualized Evolved Packet Core (vEPC) is a major breakthrough in network function virtualization (NFV). When asked where they have deployed NFV in production networks, communication service providers (CSPs) consistently name vEPC as one of the top answers. Why is that? In order to maximize their processing capacity, CSPs virtualize a subset of their network applications, including mobile edge computing (MEC), base stations (small/macro cells) and the mobile core, because these systems use a large bandwidth. The mobile packet core builds the foundation of the core network on which mobile CSPs offer IP-based services to their customers. Implementing vEPC solutions can help CSPs obtain the scale necessary to accommodate growing numbers of subscribers and large amounts of traffic or connections while controlling costs and improving on quality of experience (QoE). In the past, evolved packet core (EPC) solutions were deployed on purpose-built hardware. NFV enables operators to deploy EPC c
Tags : dpi, deep packet inspection, vepc, sdn, nfv, network analytics, virtual network
     ipoque
By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
The whitepaper is intended for security practitioners as well as developers and administrators of applications who can benefit from secure communications. The paper presents carious strategies for securing applications using Oracle Solaris 11 security and hardware-assisted cryptographic acceleration features of Oracle's SPARC processors. The paper unveils the core mechanisms, configuration, and deployment strategies, as well as the role of relevance of using Oracle Solaris Cryptographic Framework and Java Cryptography Extension-based techniques for delivering a high-performance, end-to-end security solution. With Oracle's new Software in Silicon capabilities coupled with an innovation cache and memory hierarchy, Oracle's SPARC M7 processor delivers dramatically higher processing speed and revolutionary protection against malware and software errors.
Tags : 
     Oracle PaaS/IaaS/Hardware
By: Optimizely     Published Date: Apr 06, 2018
Getting the most out of A/B and other controlled tests. In the fast-moving digital world, even experts have a hard time assessing new ideas. Case in point: At Bing a small headline change an employee proposed was deemed a low priority and shelved until one engineer decided to do a quick online controlled experiment—an A/B test—to try it out. The test showed that the change increased revenue by an astonishing 12%. That experience illustrates why it’s critical to adopt an “experiment with everything” approach, say Ron Kohavi, the head of the Analysis & Experimentation team at Microsoft, and Stefan Thomke, an HBS professor. In this article they describe: How to properly design and execute A/B and other controlled tests ? Ensure test integrity ? How to interpret results and avoid pitfalls
Tags : 
     Optimizely
By: Rackspace     Published Date: Feb 01, 2019
Nearly nine in 10 enterprises have adopted a multi-cloud strategy, according to the latest RightScale State of the Cloud Report, and these enterprises use eight different clouds, on average. Increasingly, their cloud of choice is a public cloud. Every public cloud, however, is different. GCP is rapidly gaining users among companies of all sizes. Today, GCP’s customers include large global brands like Disney, eBay, HSBC, The Home Depot, Schlumberger and Verizon, and smaller ones like gaming platform Smash.gg and the Rhode Island School of Design, one of the nation’s leading arts and design institutions. Whether GCP is a good fit for your company depends on a multitude of factors. To find out what these are and how Rackspace can help your business, download this whitepaper today.
Tags : 
     Rackspace
By: AppDynamics     Published Date: Sep 20, 2017
A microservice architecture provides benefits in the areas of service isolation and deployment as well as independent scalability. These benefits lead to more rapid release cycles and better use of available resources. But a microservice architecture also presents a host of new challenges in both deployment as well as performance management. The benefits to microservices far outweigh their challenges and, by identifying them early, you can plan for and ensure that your adoption of a microservices architecture goes smoothly.
Tags : microservice, management, business transactions, hybrid cloud, docker, environment
     AppDynamics
By: AppDynamics     Published Date: Sep 20, 2017
Larger organizations run into problems when monolithic architectures cannot be scaled, upgraded or maintained easily as they grow over time. Microservices architecture is an answer to that problem. It is a software architecture where complex tasks are broken down into small processes that operate independently and communicate through language-agnostic APIs.
Tags : mobile devices, web apps, operating systems, ram, server utilization, multi-core services, ethernet
     AppDynamics
By: HP - Enterprise     Published Date: Jun 04, 2013
HP Business Services Management (BSM), which includes HP Network Management Center, HP Systems Management, and HP Application Performance Management, is a comprehensive performance management solution designed to enable IT organizations to manage a diversity of in-house and cloud based services at a lower cost to the business. HP commissioned Dimensional Research to interview customers who have deployed HP BSM solutions to obtain detailed feedback on the real world benefits provided by these solutions. Dimensional Research conducted 26 in-depth interviews with HP customers as well as researched documented case studies. This report summarizes those findings.
Tags : business service, management solutions, bsm, business services management, network management, systems management
     HP - Enterprise
By: HP - Enterprise     Published Date: Jun 05, 2013
When asked how important technology is to driving innovation in their organizations, 100 percent of CEOs indicated it was important, with 80 percent pointing out that it’s very important, according to HP sponsored research. Even CIOs agree with their CEOs. According to the same research, when asked whether or not technology will be the innovation engine or administrative engine for a business or government, approximately two out of three CEOs said it would be the “innovation engine.” This represents a significant shift in the role that technology is playing in enterprises. Today, organizations demand new applications and more functionality delivered more quickly, and at a lower cost than ever before. Many organizations either want a mobile application or are already using one. In fact, according to analysts, by 2016 350 million employees will use smartphones at work and businesses will increase spending on mobile projects over 100 percent in the same time.
Tags : mobile, cloud, applications, apps, mobile apps
     HP - Enterprise
By: UL EduNeering     Published Date: Jul 05, 2012
SOPs are critical to efficient manufacturing operations, quality control, and regulatory compliance. This paper reviews best practices for the Life Science industry for training on SOPs, and how learning management technology has the potential to improve learner retention through automated assessments.
Tags : fda, gmp, gcp, gxp, cms, osha, qsr, 21 cfr part 11
     UL EduNeering
By: iCims     Published Date: Feb 02, 2017
f there’s one thing we know about the world of talent acquisition, it’s that it’s always evolving. Staying ahead of the latest trends can give employers the edge they need to hire smarter in the year to come.
Tags : 
     iCims
By: TriNet     Published Date: Sep 13, 2016
This factual guide covers ACA definitions, regulations, mandates, forms that need filing, deadlines for filing, and potential penalties for employers. Whether you’re a small or midsize business, this complex law presents challenges that TriNet can help you manage and comply with.
Tags : trinet, hr technology, minimize risk, hr employment recruitment, co-employment, three-point relationship, talent market
     TriNet
By: CAST     Published Date: May 06, 2013
Download the paper to learn about CAST Application Intelligence Platform (AIP), the only enterprise-grade software quality assessment and performance measurement solution available.
Tags : architecturally complex violation, architectural hotspot, architecture of decay, cast, cast aip
     CAST
By: CEB     Published Date: Oct 30, 2013
Analysis on the key challenges, developments, and innovations affecting corporate and business finance.
Tags : management reporting, cost savings, demand planning, product forecasting, resource allocation, performance assessment, cost assessment, finance talent brand
     CEB
By: NetApp     Published Date: Aug 08, 2014
El siguiente caso técnico le proporciona más información en cuanto a cómo una organización de reputación global logró duplicar su productividad y eliminar a todos los problemas de almacenamiento de manera sencilla al implementar una solución inteligente con infraestructura hecha a la medida de sus necesidades. Infórmese acerca de cómo NetApp puede hacer lo mismo por su empresa al hacerla más rentable, sin necesidad de incrementar el espacio de su almacenamiento actual.
Tags : storage
     NetApp
By: Infomatica     Published Date: Mar 05, 2014
It’s no secret—healthcare is transforming. The transition to value-based care is well underway; healthcare players are feeling the impact and each has a role to play, including you! Moving to a value-driven model demands agility from every person, process and technology. These changes are generating more data than ever, there is a lot of data, in fact IDC Global Health Insights predicted that over the next 10 years, the amount of digital healthcare data created annually will grow 44 fold. Organizations that lead the pack and succeed will be those where clinicians, business leaders and patients are empowered with access to clean, safe and connected data. Learn more about your role in putting information to work…
Tags : healthcare, technology, business, manage data, hospitals, performance management, value based care, consumerism
     Infomatica
By: Castlight Health     Published Date: Apr 13, 2016
With the growing adoption of high-deductible health plans (HDHPs) and increased employee cost sharing, unlocking the value of your benefits for your employees and your business critically depends, now more than ever, on engaging your employees to make smart healthcare decisions. The good news is that innovative benefits technologies are starting to deliver on a proven recipe for success.
Tags : castlight health, employee, health benefits, hdhp, healthcare
     Castlight Health
By: Castlight Health     Published Date: Apr 21, 2016
According to American Society of Addiction Medicine (ASAM), opioid abuse costs employers approximately $10 billion from absenteeism and presenteeism alone. Despite the breadth and seriousness of this crisis, America’s employers lack a true understanding of how it impacts individuals in the workforce and their families. Castlight developed this first-of-its-kind study on opioid abuse by examining de-identified and anonymous health data reporting from Americans insured by large employers who use our product.
Tags : castlight health, workforce, asam, addiction medicine, opioid
     Castlight Health
By: Castlight Health     Published Date: Feb 14, 2017
Help employees get the most from their health benefits — with Castlight Health. Their health benefits platform helps employees make smarter healthcare decisions. Castlight Health’s software recommends and shares only information, processes and tasks that are relevant to the employee. This gives employees the information they need, when they need it — without overwhelming them with unnecessary clutter.
Tags : 
     Castlight Health
By: Extreme Networks     Published Date: Feb 23, 2017
ABI Research’s Securing Medical Devices Technology Analysis Report analyzes the current risks posed by medical devices, noting various security issues, potential vulnerabilities, and the threat landscape. It reviews implementation mechanisms and efforts in medical device cybersecurity and safety. The final section looks at how the healthcare ecosystem is responding to the issues and the vendors driving change.
Tags : abi. healthcare, cybersecurity, medical
     Extreme Networks
By: Extreme Networks     Published Date: Feb 23, 2017
The network has never been as critical to the healthcare sector as it is today. Electronic health records, Wi-Fi-connected medical devices, and clinician smart phones are among a plethora of healthcare technologies that depend on a stable network. The consistent development of this infrastructure is key for the healthcare sector to continue its successes in creating new possibilities for management, patient and family experience, and patient outcomes. Extreme Networks posed key questions to Nolan Greene, a senior research analyst with IDC’s Network Infrastructure group, who highlights the critical issues healthcare IT professionals must consider when building a network that maintains industry needs. Download this report to learn about: • Why having a modern healthcare infrastructure is so important • The major challenges IoT brings to healthcare networks • How IEC 80001 is impacting compliance • Trends that confront a network IT professional in healthcare • Risks Healthcare IT must eli
Tags : healthcare, iot, iec 800001, extreme networks, healthcare it
     Extreme Networks
By: CA Technologies     Published Date: Mar 06, 2015
OAuth offre all'utente il pieno controllo sulla delega dell'accesso a un'API. Questo consente l'integrazione tra servizi per conto di tale utente. Gli stessi fornitori web social che hanno reso popolare il modello costituito dall'esposizione di un'API per consentire agli sviluppatori di terze parti di arricchire le loro piattaforme, sono stati i primi ad applicare questi meccanismi di autorizzazione delegati. OAuth è stata definito nel 2006, per standardizzare i meccanismi di questo tipo.
Tags : 
     CA Technologies
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics