reliable

Results 126 - 150 of 539Sort Results By: Published Date | Title | Company Name
Published By: Ciena     Published Date: Nov 15, 2016
"In healthcare, as the trends supporting eHealth accelerate, the need for scalable, reliable, and secure network infrastructures will only grow. This white paper describes the key factors and technologies to consider when building a private network for healthcare sector enterprises, including: Transport Network Equipment Outside Fiber Plant Converged Platforms Reliability, Redundancy, and Protection Reconfigurable Networks Management Software Security Services, Operation, Program Management, and Maintenance Download our white paper to learn more."
Tags : 
packet networking, packet networking portfolio, packet optical hie network, packet-optical transport, patient data security, private and hybrid cloud, private optical network for healthcare, private optical network for hospitals, rapidly growing bandwidth, real-time telesurgery video and data, remote imaging and diagnosis, simplify healthcare network operations, telehealth and telemedicine, telesurgery and video diagnosis, transfer massive imaging files, transmitting full-body mri images, transmitting genome data, transport network equipment, value-based care models, wan and lan convergence reduces
    
Ciena
    
Ciena
Published By: Endace     Published Date: Aug 20, 2012
Organizations don't know what's going on inside their networks, and that's costing them real money. Deploying an intelligent recording fabric with guaranteed 100% packet capture, accuracy, and storage is fundamental to solving the problem. But how do you embrace the new paradigm? To get started, create a list of the system criteria that are mandatory to delivering reliable and complete visibility information to your engineers, so you can be sure their decision-making is on target.
Tags : 
endace, technology, white paper, network, intelligent recording fabric, infrastructure, business risk, intelligent network, business technology
    
Endace
Published By: Red Hat     Published Date: Jan 07, 2019
Many organizations are discovering that traditional storage methods can be the bottleneck that slows their agility and scalability. This has led to the development of containers, built to permit applications to scale rapidly, be more reliable, and offer better performance than more conventional means or methods. Read the e-book to learn how container-native storage is the key to your organization running more efficiently and cost?effectively.
Tags : 
    
Red Hat
Published By: Memorial Hermann     Published Date: Sep 19, 2014
Health care costs are already out of control. You’ve tried everything you can think of to reduce costs, but nothing seems to work. Learn where the real problem lies and what you can do about it by rethinking your approach. • Learn why the usual tactics do little to contain costs • See how carrier choice and location impact cost • Get educated on new approaches that contain costs
Tags : 
healthcare costs, approach, carrier, choice, location, impact, educated, reliable, providers, solution, business, manager, organization, employees, negotiations
    
Memorial Hermann
Published By: Electric Cloud     Published Date: Aug 07, 2009
Drive quality earlier in the development process with continuous testing. Large development organizations have increasingly been adopting select agile practices to enable faster development, create more reliable software, and reduce costs. Chief among these practices is providing developers early and frequent feedback from users, from other developers, and especially from the programming, build, and test tools. In the latter category, continuous integration and continuous testing are emerging as valuable techniques for identifying errors early so they can be corrected immediately by the developer who made the code changes.
Tags : 
software development, electriccommander, electric cloud, continuous testing, development, coding, testing, production, errors, ci cycle, intuit, defect tracking, integrated solution
    
Electric Cloud
Published By: HPE     Published Date: Feb 11, 2015
Protecting your business-critical applications without impacting performance is proving ever more challenging in the face of unrelenting data growth, stringent recovery service level agreements (SLAs) and increasingly virtualized environments. Traditional approaches to data protection are unable to cost-effectively deliver the end-to-end availability and protection that your applications and hypervisors demand. A faster, easier, more efficient, and reliable way to protect data is needed.
Tags : 
    
HPE
Published By: Fiserv     Published Date: Mar 02, 2018
Corporate governance. Capital Requirements. Information Security. Identifying and measuring potential risks help you connect the dots to create a sound ERM program for your organization. In today’s environment of security regulations and requirements, organizations must take a comprehensive approach to ERM to identify and mitigate potential threats. Risk is cumulative, and unidentified weaknesses can quickly spiral out of control, resulting in costly solutions that can lead to reputational damage. The first step in designing a sound ERM program is to understand which components are needed and how to implement them. Ten Steps to Enterprise Risk Management: A Comprehensive Approach Reveals the Big Picture, provides a straight-forward approach to creating a reliable, yet flexible program to address existing threats with the ability to adapt to emerging ones. In the end risk management is everybody’s job – do you have a plan in place to help your employees manage unpredictable threats and
Tags : 
corporate governance, capital requirements, information security, erm program, enterprise risk management
    
Fiserv
Published By: HP     Published Date: Aug 03, 2009
Crest Animation, a full-service animation studio based in India, has been growing rapidly and expanding its market by working on full-length feature movies. In order to take on an increased workload, the company needed to upgrade its storage infrastructure. The company was looking for a storage solution that was robust and scalable, that would eliminate bottlenecks, and that could grow quickly. Read this case study to learn how Crest Animation implemented a scalable storage solution with a unified, high-performance, highly reliable infrastructure that is bottleneck-free.
Tags : 
crest animation, hp storageworks, roi, storage, iscsi, san
    
HP
Published By: Cisco     Published Date: Nov 30, 2016
CureSeq’s mission is to “revolutionize next-generation sequencing in the oncology space.” To accomplish this, the company must reach as many researchers and clinical oncologists as possible to help them identify and treat cancer. CureSeq, whose work has been published in scientific journals, needed a reliable online meeting solution to communicate effectively with critical stakeholders around the world. After struggling with several other solutions, the company selected Cisco WebEx to take advantage of the platform’s presentation and document-sharing capabilities and audio quality.
Tags : 
    
Cisco
Published By: IBM     Published Date: Jun 19, 2008
Built-in virtualization and proven IBM POWER technology make the IBM BladeCenter JS22 Express blade ideal for organizations of any size. Coupled with the IBM BladeCenter S chassis, this complete solution is compact, reliable and extremely energy efficient. Find out how innovative EnergyScale technology cuts energy costs when you use the IBM BladeCenter JS22 Express blade and BladeCenter S chassis.
Tags : 
blade, blade server, ibm, express seller
    
IBM
Published By: VMware AirWatch     Published Date: Jul 20, 2017
Many Windows applications are traditional x86/x64 apps, which can be several GBs in size. To package and deploy apps to remote worker and branch office endpoints, organizations mostly rely on costly distribution servers, which are both capital and labor intensive. New Windows Software Distribution capabilities in AirWatch create a more efficient and enterprise scalable deployment experience that reduces bandwidth, infrastructure, and labor costs. • Manage the full lifecycle of Win32 apps - including deploying apps, dependencies and patches • Eliminate the challenges of complex app packaging, unreliable app installs and recurring OS imaging with App Stacks delivery • Distribute apps to remote and branch users with CDN and P2P capabilities and eliminate your distribution server footprint • Deliver apps in a unified app catalog and provide a consistent single sign-on experience for the user
Tags : 
    
VMware AirWatch
Published By: Dell Brought to you by Intel     Published Date: Dec 09, 2013
Academy of Art University uses high-performing, reliable workstations, servers, and PCs to help design students get ready for the workforce.
Tags : 
dell, nvidia, quadro, k5000, and nvidia, tesla, k20, academy of art university, fashionlab laboratory, 3d technology, networking, software development, it management
    
Dell Brought to you by Intel
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
The cyberattacks of 2017 proved more numerous, sophisticated, and ruthless than in years past. Threat actors, armed with knowledge stolen from the CIA and tools lifted from the NSA, demonstrated an elevated level of proficiency. WannaCry and NotPetya, two prominent threats from last year, successfully exploited these stolen assets in their assault on systems worldwide. As 2017 progressed, new opportunities developed in ransomware-as-a-service (RaaS), opening the gates of malware-for-profit to everyone. Advancements in fileless attacks provided new ways for threats to hide from once reliable detection methods. Malware features such as polymorphism continued to play a powerful role in evading traditional defenses. The victims of cybercrime ranged from private businesses to the fundamental practices of democracy. France and the United States saw significant data breaches during their recent presidential elections. Several high-profile companies lost their customers’ personally identifiable information to cyberattacks, blemishing their brands and costing them untold millions in recovery operations. This report contains an overview of the threat trends and malware families Cylance's customers faced in 2017. This information is shared with the goal of assisting security practitioners, researchers, and individuals in our collective battle against emerging and evolving cyberthreats.
Tags : 
cyber attacks, cia, nsa, wannacry, notpetya
    
BlackBerry Cylance
Published By: Group M_IBM Q119     Published Date: Jan 10, 2019
It is breathing life into our existing energy resources and creating new opportunities. Better use of data has visible, tangible and immediate results. It is helping energy companies become safer, more reliable and more efficient. This is good for both our wallets and our planet. For more information visit: www.ibm.com/energy or watch our webinar here
Tags : 
    
Group M_IBM Q119
Published By: Group M_IBM Q4'19     Published Date: Sep 27, 2019
It is breathing life into our existing energy resources and creating new opportunities. Better use of data has visible, tangible and immediate results. It is helping energy companies become safer, more reliable and more efficient. This is good for both our wallets and our planet. For more information visit: www.ibm.com/energy or watch our webinar here
Tags : 
    
Group M_IBM Q4'19
Published By: Datawatch     Published Date: Feb 03, 2016
Some companies estimate that up to 80 percent of their analysts’ time is spent on data preparation. Thorough, automated data preparation, however, can quickly transform raw information into reliable, consistent data sets ready for analysis. This report from Gartner details why information management and business analytics leaders must introduce data preparation into their big data initiatives in order to improve both the understanding of the data, and the productivity of analysts. Read the report now to learn more.
Tags : 
datawatch, data preparation, data analytics, data analysis, analyst productivity, information management, business analytics, big data
    
Datawatch
Published By: IBM     Published Date: Aug 05, 2014
Watson Explorer provides organizations with a combined, trusted 360-degree view of both structured and unstructured data. The solution indexes information from unstructured data sources (PDFs, Microsoft SharePoint, flat files, social media, blogs and so on) as well as structured sources for search and discovery. Organizations can leverage their data in place, respecting existing security models when creating this virtual access point to all information. Watson Explorer requires trusted master data to ensure that links are accurate and reliable, so the end user can confidently leverage a holistic view of a customer or product.
Tags : 
ibm, data, customer, watson explorer, master data, structured, it management, data management
    
IBM
Published By: iDirect     Published Date: Oct 13, 2011
In an insightful report from iDirect, find out why satellite is the best option for delivering cost-effective, reliable, broadband connectivity to any location. Today's satellite networks are enterprise-class platforms built on IP; offering seamless integration with existing communications technology. In addition, satellite now delivers up to 99.99 percent network availability and meets new security regulations, such as AES encryption. Get the facts on satellite for the smart grid and learn how satellite services can deliver the security, latency, and reliability required for all core utility applications. Download the report.
Tags : 
idirect, satellite communications, technology, smart grid, utility companies
    
iDirect
Published By: Pentaho     Published Date: Feb 26, 2015
This eBook from O’Reilly Media will help you navigate the diverse and fast-changing landscape of technologies for processing and storing data (NoSQL, big data, MapReduce, etc).
Tags : 
data systems, data-intensive applications, scalability, maintainability, data storage, application development
    
Pentaho
Published By: Microsoft Azure     Published Date: Apr 11, 2018
Distributed systems enable different areas of a business to build specific applications to support their needs and drive insight and innovation. While great for the business, this new normal can result in development inefficiencies when the same systems are reimplemented multiple times. This free e-book provides repeatable, generic patterns, and reusable components to make developing reliable systems easier and more efficient—so you can free your time to focus on core development of your app. In this 160–page e-book, you’ll find: An introduction to distributed system concepts. Reusable patterns and practices for building distributed systems. Exploration of a platform for integrating applications, data sources, business partners, clients, mobile apps, social networks, and Internet of Things devices. Event-driven architectures for processing and reacting to events in real time. Additional resources for learning more about containers and container orchestration systems. “There are more
Tags : 
    
Microsoft Azure
Published By: CDW Symantec     Published Date: Sep 06, 2012
See how The Cardian and Vascular Institute of Gainesville developed a reliable IT solution and developed a reliable and scalable data center.
Tags : 
case study, data recovery, disaster recovery, backup strategy, symantec
    
CDW Symantec
Published By: VMWare EMEA     Published Date: Oct 23, 2017
The enhanced performance that results from the DevOps approach has been proven to have a big impact on the overall performance of the business, with faster, more reliable software delivery, consequent cost savings, and faster time to value. Now that cloud is an integral element of the enterprise, automation of cloud management is key, and feeds into the DevOps approach. VMware offers your IT organization the opportunity to become DevOps-ready, using the GUI and API-led approach to enable an automated self-service infrastructure.
Tags : 
cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
VMWare EMEA
Published By: Flexera     Published Date: Feb 19, 2019
Flexera’s Software Vulnerability Research allows effective reduction of the attack surface for cybercriminals, providing access to verified vulnerability intelligence from Secunia Research covering all applications and systems across all platforms. It drives a prioritized remediation process by handling vulnerability workflows, tickets and alerts, and describes the steps to mitigate the risk of costly breaches. You Don’t Know What You Don’t Know It’s hard for enterprise security analysts to get reliable and trusted information about software vulnerabilities and then identify and filter that data for just the products that matter to their organization. Those challenges lead to wasted time and effort. Learn more.
Tags : 
    
Flexera
Published By: EMC     Published Date: Nov 06, 2006
By utilizing the speed and reliability of the EMC CLARiiON® AX150 networked storage system and the convenience of EMC Retrospect® 7.5 for Windows backup and recovery software, SMBs can implement fast, effective, reliable data protection that is easy to set up and manage without placing undue strain on IT resources.
Tags : 
data protection, raid, disaster plan, disk-based, tape-based, data backups, disk backup, tape backup, emc, emc clariion, emc insignia, emc retrospect, backup and recovery, data backup, data recovery, storage
    
EMC
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee