RSS feed Get our RSS feed

News by Topic

state

Results 251 - 275 of 1185Sort Results By: Published Date | Title | Company Name
By: Aerohive     Published Date: Jun 01, 2015
This whitepaper provides details about cloud networking, the state of the cloud market, and its benefits.
Tags : networks, cloud, cloud networking, network infrastructures, networking
     Aerohive
By: Arbor     Published Date: Sep 15, 2014
DDoS attacks are the primary threat to the availability of your network. In 2014, the number of DDoS attacks continues its trend upward in both size and complexity. Today, attacks topping 100Gbps have become common. So have complex threats such as application-layer attacks against DNS and encrypted Web services. Taxing security teams even more is the rise in multi vector attacks which target applications, existing stateful infrastructure like Firewalls and IPS devices and upstream connectivity, all in a single sustained attack.
Tags : ddos attacks, it security, application layer attacks
     Arbor
By: RelayHealth     Published Date: Apr 01, 2013
Statements can be a great opportunity to improve the patient experience and expedite collections, or they can lead to frustrated patients, lower self-pay revenue and increased bad debt. As pioneers of the healthcare industry’s patient-friendly initiative nearly 10 years ago, RelayHealth continues to research and innovate. Its most recent patient focus group provided input on how statement design impacts their satisfaction with the hospital, post-discharge experience and willingness to pay. Learn the critical components to creating patient statements that get results and help compel patients to pay: Download the 10 Keys to Creating Engaging Patient Statements today.
Tags : statements, patient statements, healthcare, collection, patient experience
     RelayHealth
By: Mimecast     Published Date: Aug 16, 2018
Email. You use it constantly. And it’s the number-one application to keep your organization functioning, lines of communication flowing, and productivity seamless. Organizations need email to stay up-and running all the time. After all, it’s supposed to just work, right? This is where trouble often sets in. Cybercriminals use email constantly, too. It’s the number-one vector used to initiate attacks like malware delivery (think ransomware), impersonations and phishing attacks. In fact, almost 90% of organizations* have seen the volume of phishing attacks either rise or stay the same over the past 12 months. Internal threats have also been on the rise: Most organizations have encountered internal threats driven by careless employees (88%), compromised accounts (80%) or malicious insiders (70%) over the last year.
Tags : 
     Mimecast
By: ETQ     Published Date: Jul 10, 2019
According to Gartner, "supply chain leaders responsible for quality management are shifting to software solutions that standardize processes, optimize data and ensure compliance. This research provides guidance for structuring a process for QMS software selection." Download this Gartner Analyst Guide to learn: Key challenges in the QMS software selection processes What to expect from different QMS solutions across the market Analysis of the current state of quality management to help define software requirements Self assessment questions and commonly sought QMS system functionalities to use in your decision making process
Tags : 
     ETQ
By: VMware     Published Date: Jun 28, 2019
With the benefits quickly stacking up, it’s easy to understand why Gartner stated HCI (Hyper-Converged Infrastructure) as one of the hottest trends in data centre infrastructure. HCI is intended to reduce infrastructure complexity and cost, whilst enhancing scalability, agility and operational efficiency. This consolidated infrastructure enables organizations to leverage the software layer by using low cost commodity hardware, while reducing concerns around vendor lock-in, to form a seamless software- defined IT infrastructure environment well suited to today’s IT challenges. Simple to use and manage, without specialists and more cost-effective than most traditional solutions, it’s easy to understand why more organisations are making the move from traditional architecture to Hyper-Converged Infrastructure. Submit the form to view the infograph to discover the benefits and whether this solution is right for you.
Tags : 
     VMware
By: IBM     Published Date: Apr 24, 2017
The perimeter continues to dissolve, and the definition of endpoint is evolving, according to results of the SANS 2016 Endpoint Security Survey, now in its third year. As we might expect, 90% or more consider desktops, servers, routers, firewalls and printers to be endpoints that need to be protected. After that, respondents include other less-typical devices in their definition of endpoints that warrant protection: 71% include building security (access/ surveillance), 59% include employee-owned mobile devices and 40% consider industrial control systems as endpoints that need to be protected. Some respondents also consider POS devices, smart cars, emulated endpoints in the cloud and wearables as endpoints needing protection, highlighting the diversity of thinking among respondents.
Tags : device management, data solutions, system solutions, data breach, mobile management
     IBM
By: IBM     Published Date: Jul 26, 2017
Fear of data misuse has led to both general and industry-specific data-privacy regulations worldwide that many organizations now must meet, and it’s important to embrace their requirements. The role of data-holding organizations has increasingly shifted to being stewards of information, in particular in the United States and the European Union (EU). And failure to comply with regulations can mean not only reputational damage, but substantial fines and even jail time. Just meeting compliance mandates, though, may not help you actively spot and stop a data breach.
Tags : data misuse, security, privacy regulations, data breach, compliance mandates
     IBM
By: IBM     Published Date: Oct 26, 2017
There’s no getting around it. Passed in May 2016, the European Union (EU) General Data Protection Regulation (GDPR) replaces the minimum standards of the Data Protection Directive, a 21-year-old system that allowed the 28 EU member states to set their own data privacy and security rules relating to the information of EU subjects. Under the earlier directive, the force and power of the laws varied across the continent. Not so starting May 25, 2018.
Tags : gdpr, data protection, right to access, data breach, personal data
     IBM
By: Group M_IBM Q1'18     Published Date: Jan 16, 2018
Are you up-to-speed with the latest trends in mobile and Internet of Things (IoT) application security testing? Our recent Ponemon Institute study reveals key findings about organizations' ability to protect their mobile and IoT apps. Read our report to learn how well you stack up against your peers in securing your most critical mobile and IoT applications.
Tags : iot, ponemon institute, mobile application security, application security
     Group M_IBM Q1'18
By: Kaspersky Lab     Published Date: Oct 30, 2014
Businesses today are faced with the almost insurmountable task of complying with a confusing array of laws and regulations relating to data privacy and security. These can come from a variety of sources: local, state, national, and, even, international law makers. This is not just a problem for big businesses. Even a small business with a localised geographic presence may be subject to laws from other states and, possibly, other nations by virtue of having a presence on the internet. In many instances, these laws and regulations are vague and ambiguous, with little specific guidance as to compliance. Worse yet, the laws of different jurisdictions may be, and frequently are, conflicting. One state or country may require security measures that are entirely different from those of another state or country. Reconciling all of these legal obligations can be, at best, a full time job and, at worst, the subject of fines, penalties, and lawsuits.
Tags : byod, device discovery, data privacy, data security, it security, security
     Kaspersky Lab
By: SumTotal     Published Date: May 24, 2013
Download this abridged version of the Guide that not only shows SumTotal as #1 in Learning, but also includes comprehensive 2013 research covering the role of the Learning Management System, LMS Functionality and Features, The State of Learning Management Systems and more.
Tags : lms, learning management systems, sumtotal, human resources
     SumTotal
By: Allscripts     Published Date: Jun 05, 2013
This paper examines these technologies in the context of a four step process that many successful practices are using to optimize their revenue cycles. The “Four Steps to Transformation” methodology represents the distillation of best practices from thousands of medical groups across the United States who leverage technology to improve their bottom lines.
Tags : physician, revenue cycle, technology, physician compensation, billing, reimbursement
     Allscripts
By: Workday     Published Date: Mar 02, 2018
Running your government agency on aging technology? It’s a costly risk you don’t need to take. Read this GovLoop guide to learn how updating your technology foundation to the cloud can help your agency improve productivity, efficiencies, and services.
Tags : government, govloop. technology
     Workday
By: Workday     Published Date: Mar 02, 2018
: In a mixed media experience, we share a story about how Interstate Batteries moved away from manual processes and transformed HR with Workday
Tags : interstate batteries, transform hr
     Workday
By: Workday     Published Date: Mar 26, 2019
Today’s shifting economy has industries and occupations in a constant state of flux. To prepare students for this changing workforce, higher education must rethink its purpose and structure. Watch this webinar replay to discover what the future of work looks like and how your institution might need to respond.
Tags : shifting economy, future of work, changing workforce
     Workday
By: Workday     Published Date: Jan 10, 2019
Today’s modern institution moves at the speed of information. Asking yesterday’s finance, HCM, and student information systems to keep pace doesn’t really make sense, does it? Leaders from The Ohio State University, University of Rochester, and Vassar College highlight how their move to the cloud increased productivity, improved efficiencies, lowered the total cost of ownership, and—most importantly—gave their staff and students the necessary tools to succeed.
Tags : cloud, higher education, increased productivity
     Workday
By: Salesforce.com     Published Date: Mar 22, 2013
Login and get a quick snapshot of the state of your business.
Tags : salesforce, crm, salesforce app, customer service, cloud, salesforce cloud, crm solutions/software, customer experience/engagement
     Salesforce.com
By: NetApp     Published Date: Sep 24, 2013
"The performance, availability, and data protection associated with tier-1 applications were easy to meet when one application mapped to one server and a dedicated storage system. But to carry these features into a virtual world with pooled, shared storage systems and unpredictable workloads creates new demands. In order to reach an agile state in your business, access this white paper now to gain insight into innovative solutions catered to these new challenging demands."
Tags : performance, availability, data protection, storage systems, virtualization, innovative solutions, technology, netapp
     NetApp
By: Aon Hewitt     Published Date: Jan 20, 2015
Today in the United States, employer-sponsored health benefits are the source of coverage for more than 149 million individuals.1 Fueled by many factors, including rising costs, legislative changes, new provider models, and evolving market forces, the health care industry is undergoing a transformation. And as health care evolves, so must the employer’s role in it. What has not changed, however, is employers’ belief that health benefits are a key differentiator for talent. In fact, most large employers plan to continue offering coverage in spite of the uncertainties in the health care market.2 To keep pace with the changing environment, employers must rethink their role in health coverage: how they sponsor, structure, and deliver health benefits, and how they manage costs while keeping employees healthy, productive, and satisfied.
Tags : aon, health care strategy, health benefits, health care industry, employee benefits, market forces, legislative changes
     Aon Hewitt
By: NetApp     Published Date: Dec 09, 2014
NetApp Flash Pool is a storage cache option within the NetApp Virtual Storage Tier product family, available for NetApp FAS storage systems. A Flash Pool configures solid state drives (SSDs) and hard disk drives (HDDs) into a single storage pool, known as an “aggregate” in NetApp parlance, with the SSDs providing a fast response time cache for volumes that are provisioned on the Flash Pool aggregate.
Tags : netapp, hybrid, flash pool, ssd, hdd, iops, oltp, demartek
     NetApp
By: NetApp     Published Date: Dec 09, 2014
The NetApp EF550 all-flash array provides a robust platform for delivering exceptional performance to mission-critical applications. The EF550 flash array leverages the latest in solid-state disk technologies along with a strong heritage of handling diverse workloads and providing superior business value through the acceleration of latency-sensitive and high-I/O applications.
Tags : netapp, flash, netapp ef550, raid levels, ssd, ef-series, it management
     NetApp
By: NetApp     Published Date: Dec 09, 2014
This paper examines that there are all sorts of elements—differing applications, attitudes, budgets, outcomes for the business—that go into the decision of how much and what type of solid-state storage to use. And how this large range of use cases inherently means that users are going to need a portfolio of solid-state deployment options because no single product is going to solve everything for everyone. The paper then examines NetApp’s flash portfolio and belief that the right storage solution at all times balances performance, capacity, functionality and manageability: this means that for flash too, multiple approaches will become the standard for enterprises as they evolve their long-term IT strategies.
Tags : flash storage, flash solutions, it-strategies, netapp, business objectives, solid-state storage, it strategies
     NetApp
By: Polycom     Published Date: Oct 17, 2016
With demand for video conferencing growing rapidly, solutions need to provide a robust, resilient, scalable, and manageable infrastructure that delivers unparalleled quality of experience. The Polycom RealPresence Platform is the software infrastructure that underlies Polycom’s video conferencing, and binds it together by integrating with core networking and security infrastructure. This enables secure collaboration for any number of users across heterogeneous networks, with up to 50% less bandwidth consumption than other competitor solutions. By delivering an architecture based upon open standards, Polycom has created a flexible, state of-the-art video conferencing platform that provides superior investment protection, at the lowest total cost of ownership. Download to learn more!
Tags : 
     Polycom
By: McAfee     Published Date: Dec 04, 2014
The attacks continue. The breaches occur. Penalties are assessed. While most universities manage to keep pace with the latest digital trends, they have been far less timely when it comes defending their networks and sensitive data against the latest targeted attacks and threats. This lack of protection is evident as recent headlines expose costly data breaches of student records and research, state and federal compliance violations, and a raft of other privacy and security issues that put students, alumni, staff, and the institutions themselves at considerable risk.
Tags : mcafee, security crisis, higher education, breaches, digital trend, privacy, security issues, sensitive data
     McAfee
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics