Skip to main content
 

safe

Results 301 - 325 of 1071Sort Results By: Published Date | Title | Company Name
Published By: Panaya     Published Date: May 31, 2018
You can succeed in your digital transfomation and deliver applications and services faster, better, and safely. How? With Enterprise Agile Delivery. Enterprise Agile Delivery brings a wealth of benefits to organizations and can be adopted by any Agile hybrid framework: SAFe, LESS, Nexus as well as Agile/lean frameworks like Scrum and Kanban. Yet to achieve Eneterprise Agile Delivery, enterprises need an easy to use modern ALM tool for quick and successful onboarding. Download this white paper to understand how the right solution will help you: › Strategiaclly align feature releases and backlogs with your overall business strategy › Identify and prioritize dev and test activities with visibility into project waves and portfolios › Make data-based decisons for safe releases with real-time insights and multidimensional views into delivery risks › Sync business, dev, QA and release teams around shared objectives with automated coordination and communication
Tags : 
    
Panaya
Published By: Amazon Web Services     Published Date: Nov 28, 2017
You know that moving to the cloud is a huge opportunity for your business do great things. Be more agile, be more responsive, do things better. But convincing everyone in your business isn’t easy, especially your security and compliance people who may well see the cloud as too big a risk. This eBook is about answering those security questions – and communicating the six core benefits a data secure cloud will bring to your organisation.
Tags : 
cloud, aws, security, organizations, visibility, control, networks, platforms
    
Amazon Web Services
Published By: Pure Storage     Published Date: Mar 17, 2017
I&O leaders can no longer rely on the assumption that it is safer to buy from established storage vendors when compared to new suppliers. This research describes what I&O leaders must do to benefit from structural changes in the storage industry.
Tags : 
    
Pure Storage
Published By: IBM     Published Date: Jul 14, 2016
How do you keep 130,000 guests safely entertained, fed, watered and informed in a sustainable way? Roskilde Festival knew that the critical insights lay hidden in huge volumes of real-time data. The Copenhagen Business School used IBM technologies to build a cloud big data lab that correlates information from multiple sources, delivering valuable insight for planning and running the festival. Download to learn more.
Tags : 
ibm, datamart on demand, data, analytics, big data, real-time data, cloud, cloud data analytics
    
IBM
Published By: Concur     Published Date: Aug 15, 2017
Automation is only part of the solution, however. While most systems track clear-cut T&E purchases, the reality is that some T&E costs simply can’t be captured by traditional solutions. And they impact your bottom line whether you track them or not. To truly manage all spending, you have to know what to look for and where to look. And this guide is a great place to start.
Tags : 
researching, booking, data, travel, safety, tax liabilities, concur
    
Concur
Published By: Entrust Datacard     Published Date: Jul 21, 2015
Entrust offers software authentication platforms that strengthen security in a wide range of identity and transaction ecosystems.
Tags : 
internet of things, authentication, security, identity, safety, technology, security technology, security infrastructure, software authentication platforms
    
Entrust Datacard
Published By: Oracle     Published Date: Jan 28, 2019
For more than a decade, Oracle has developed and enhanced its ZFS Storage Appliance, giving its users a formidable unified and enterprise-grade storage offering. The latest release, ZS7-2, boasts upgraded hardware and software and is a timely reminder that more users might do well to evaluate this offering. It has a trifecta of advantages: (1) It’s notable performance, price-performance, and flexibility are all improved in this new release (2) There is a surprisingly inclusive set of functionalities, including excellent storage analytics that were developed even before analytics became a contemporary “must-have” (3) There’s a compelling group of “better together” elements that make ZFS Storage Appliance a particularly attractive choice for both Oracle Database environments and users that want to seamlessly integrate a cloud component into their IT infrastructure. Given the proven abilities of Oracle’s prior models, it’s also safe to assume that the new ZS7-2 will outperform other m
Tags : 
    
Oracle
Published By: KPMG     Published Date: Jul 10, 2018
Digital transformation brings risks and opportunities for internal audit and risk functions. Are you ready to help the business stay safe in an increasingly challenging technology environment? Watch this webinar to understand: • the unique risks from artificial intelligence • the relevance of AI technologies for internal audit and risk functions • what an effective risk and control framework looks like for AI risks • key actions internal audit and risk functions should consider now.
Tags : 
    
KPMG
Published By: Schneider Electric     Published Date: May 04, 2016
This paper discusses how an automated system helps pipeline operators comply with new federal regulations by safely reducing demands placed on controllers and the fatigue often associated with their tasks.
Tags : 
pipeline integrity, oil and gas, pipelines, control room, control room management, leak detection, schneider electric, telvent, lars larrsen, kelly doran
    
Schneider Electric
Published By: BMC Control M     Published Date: Jul 16, 2009
Enterprise job scheduling is a mature and mission-critical IT capability that supports some of the most important business processes throughout a modern enterprise. Areas like accounting, ordering, inventory, and procurement are all likely to rely on job scheduling technology. Most common job scheduling architectures involve deploying agent software on every system in the enterprise. However, depending on the parameters of the situation, these agents may be more expensive to install and maintain. Learn more today!
Tags : 
bmc, ema, tco, security, job, scheduling, agent, faster, cheaper, safer, technology, software, bmc contol-m, enterprise, management
    
BMC Control M
Published By: Znode     Published Date: Jan 10, 2011
Since 1842, The Fechheimer Brothers Company, a Berkshire Hathaway Company, has been manufacturing uniforms for the public safety industry. The company maintains the largest in stock offering of public safety uniforms in the U.S., and also produces custom uniform programs to meet customers' specific requirements.
Tags : 
znode, marketing, ecommerce, online distribution, retail, development, integration, erp
    
Znode
Published By: Oracle     Published Date: Sep 21, 2016
The job of keeping business data safe has spread across the organization to become an enterprise wide concern. The critical question now—the one that’s being asked, not only by IT but also by CFOs—is “Whether it’s on-premises or in the cloud, how do you keep sensitive data secure?” Your cloud provider should be able to provide the right answers.
Tags : 
    
Oracle
Published By: Riverbed     Published Date: Apr 14, 2017
Whether you’re new to the Amazon Web Services (AWS) Cloud or a long-time user, it is safe to assume what you’re hoping to benefit from - elasticity, reduced time-to-market, and cost effectiveness. Like the many networking folk before you however, you’ll soon discover that the complexity of legacy network management solutions can hold you and the cloud back from delivering what was expected. Rather than leverage router-based systems that can take days to be con?gured and deployed, you want utilize modern solutions that match or enhance the bene?ts ts that the cloud can deliver.
Tags : 
    
Riverbed
Published By: HP     Published Date: Feb 02, 2015
Diversified Agency Services serves a global network of marketing services and specialty communication companies. To provide its internal customers and their clients with safe, secure access to applications and services, DAS worked with HP on a multi-year project to consolidate its IT networks and implement HP SDN cloud-enabled networking. These steps have vastly simplified DAS IT operations, enabling it to deliver a faster, more agile, and more secure network. Read this case study to learn more.
Tags : 
    
HP
Published By: Cox Communications     Published Date: Nov 10, 2014
A company’s most valuable asset is arguably its data and it needs to be backed-up, stored, secured and managed so that its available to the organization when and where needed. Have you ever thought about how much data your organization generates every day? Are you concerned about how your business can safely store and reliably access their growing data?
Tags : 
cloud backup, cloud computing, asset management, asset storage, cox
    
Cox Communications
Published By: Intel Security     Published Date: Oct 21, 2015
Encryption solutions are a key component of data protection and are part of Intel Security protection suites.
Tags : 
mcafee, intel, data, security, protection
    
Intel Security
Published By: DrFirst     Published Date: Mar 13, 2015
Sebasticook Valley Health’s Emergency Department found that when it came to obtaining medication history, DrFirst’s MedHx(SM) solution provided vast improvements over the built-in feed from their integrated electronic medical records system. The hospital did a side by side comparison of MedHx(SM) and their existing feed, and determined that MedHx(SM) provided superior results, which reduced staff time spent on medication reconciliation, improved patient safety and enabled the hospital pharmacy, as well as doctors and nurses, to be more proactive in pulling medication history upon patient admission.
Tags : 
drfirst, hospital, solutions, medhx, emr, electronic, medical, records, reconciliation, safety, pharmacy, doctor, history, medication, ehr, providers, prescription, workflow, accuracy, electronic health records
    
DrFirst
Published By: DrFirst     Published Date: Mar 13, 2015
For hospitals, medication reconciliation is critical to quality patient care. Obtaining a complete and accurate list of the patient’s medications sets the cornerstone for good patient care during the hospital stay, informing doctors about treatments in progress, and arming them to prevent potentially harmful drug interactions.
Tags : 
drfirst, hospital, solutions, medhx, emr, electronic, medical records, reconciliation, safety, pharmacy, doctor, history, medication, ehr, providers, prescription, workflow, accuracy, efficiency, discharge
    
DrFirst
Published By: DrFirst     Published Date: Mar 13, 2015
Secure, efficient communication between doctors and staff is key to reliable patient care. For Groves Community Hospice, every situation involving patients requires rapid response; this poses a particular challenge, as more than 80 percent of the hospice staff work in the field. With so many doctors and staff off-site or on-call, and considering the inherent urgency of hospice care, Groves needed to streamline staff communications and enable a better way for physicians and staff to connect and discuss critical patient issues within a secure environment.
Tags : 
drfirst, hospital, solutions, medical records, communication, response, streamline, akario, backline, teams, groups, text, secure, patient experience, response, electronic health records, cloud computing, meaningful use, mobile / wireless, business intelligence
    
DrFirst
Published By: MobileIron     Published Date: Aug 20, 2018
The new generation of mobile devices, applications, and cloud services significantly improve agency efficiencies. Tasks that were once relegated to timeconsuming deskwork, are now performed in the field, and with improved accuracy. Because of this, more and more public safety agencies are adopting these new technologies. One purpose of the FBI’s CJIS Security Policy is to enable agencies to fully leverage mobile devices, but without sacrificing security. Mobile devices introduce a variety of new threat vectors and risks. Careful consideration of these risks is important to maintaining information security. Threats to mobile devices stem mainly from their size, portability, and available wireless interfaces. Examples of mobile device threats include: • Loss or theft of device • Unauthorized access to device • Mobile operating system vulnerabilities • Communication over untrusted networks • Malware or malicious Apps • Jailbreak or rooting activity • Data loss through user behaviors
Tags : 
criminal, justice, information, services, cjis, compliance
    
MobileIron
Published By: MuleSoft     Published Date: Jan 25, 2016
APIs are a strategic business necessity, but with the rising cost of API security breaches, it's important to develop a security strategy alongside an API strategy. This whitepaper will lay out the top security concerns around APIs, how the IT industry is addressing them, and how Anypoint Platform, MuleSoft's enterprise application integration platform, can keep your APIs safe and secure.
Tags : 
security, business metrics, best practices, business intelligence, enterprise applications
    
MuleSoft
Published By: MuleSoft     Published Date: Sep 08, 2016
Today's business environment is extraordinarily competitive. No company, no matter its size or what industry it is in is safe from disruption. It is easier than ever for new entrants to come into a market, turning entire industries upside down. Unless organizations can nimbly innovate at the speed of their competition, they will be left behind, and large organizations with calcified processes and structures will be hit the hardest.
Tags : 
mulesoft, microservices, digital transformation, business value, it support
    
MuleSoft
Published By: U.S. Cellular     Published Date: Aug 24, 2016
Don’t let a point of sale outage hurt sales and ruin the customer experience. Internet downtime can rack up thousands of dollars in lost revenue. A negative user experience can hurt your business and ultimately cause customers to move to a competitor. A business continuity solution can help provide additional bandwidth to handle peak activity and support temporary retail activity.
Tags : 
    
U.S. Cellular
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Keeping your data safe requires forward-thinking approaches to cybersecurity. Learn how you can augment your existing on-premise infrastructure with security measures in the cloud for a more robust web security posture. Download this guide to learn: Why the cloud is critical for web security How real-world DDoS attacks are testing the limits of on-site solutions Discover the questions some vendors don’t want you to ask
Tags : 
cloud, security, cyber, cloud, web, ddos
    
Akamai Technologies
Published By: IBM     Published Date: Oct 28, 2016
In this webinar, you will learn: - How to create a safe environment for honest feedback so it’s an invitation, not an imposition - Best practices for collecting feedback, from unstructured conversations to regular pulse surveys - What to do with the data you’ve collected, and how to use insights to create action plans that result in happier employees and better business performance
Tags : 
ibm, engagement social, employee engagement, kenexa
    
IBM
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.