aco

Results 126 - 144 of 144Sort Results By: Published Date | Title | Company Name
By: AVACorp     Published Date: Mar 04, 2011
Tracking risks, assumptions, issues and dependencies in a practical way with proper project management towards better delivery
Tags : raid based project management approach
     AVACorp
By: DataCore Software     Published Date: Jun 20, 2011
This ESG Lab Validation documents the results of hands on testing of DataCore SANsymphony-V R8 Storage Virtualization Software.
Tags : storage virtualization, sansymphony-v, datacore software, virtual desktop, thin provisioning
     DataCore Software
By: Allscripts     Published Date: Mar 11, 2015
See how Allscripts Professional EHR™ is helping Choice Medical Group raise its standards of care to an Accountable Care Organization (ACO) level, with analytics, patient engagement and an open framework. Choice Medical Group is an Independent Physicians Association with 40 independent physicians spread across a 70-mile radius in the high desert. This organization must coordinate care with an additional 120 specialists and deliver quality care to an extremely rural population. Allscripts Professional EHR™ is helping the Association raise its standards of care to an Accountable Care Organization (ACO) level, with analytics, patient engagement and an open framework, ensuring that geographic distance does not limit quality care availability.
Tags : allscripts, ehr suite, value based care, aco, accountable care organization, choice medical group
     Allscripts
By: Polycom     Published Date: Nov 12, 2015
The hallmark of a great conference call is audio quality that sounds just like being in the same room with the other participants. Polycom HD Voice technology delivers more than twice the clarity of ordinary phone calls for life-like, vibrant conversations.
Tags : polycom, audio conferencing, video conferencing, conference call, acoustic clarity
     Polycom
By: MobileIron     Published Date: Mar 30, 2018
Securing macOS in the modern work era
Tags : 
     MobileIron
By: VMware AirWatch     Published Date: May 19, 2016
In the cacophony of business headlines, news of data security breaches come through like a high-tempo drum beat. In fact, the number of incidents keeps growing at a rate of 66 percent CAGR, with a cost per breach of $5.9 million. And some of the world’s most recognized brands are sustaining bruises to their reputations and harmful hits to their bottom lines as they scramble to repair the damages. Enterprise IT organizations are facing an elusive enemy perpetrators who range from sophisticated cyber criminals and government-sponsored spies to hackers and script kiddies, and who have motives as diverse as money, politics, or simply youthful mischief.
Tags : data security, enterprise, data protection, mobile security, anti spyware
     VMware AirWatch
By: Oracle     Published Date: Apr 16, 2018
Hoy en día enfrentamos muchos desafíos en las áreas de finanzas y en el proceso de gestión empresarial. Entre ellos están sistemas internos obsoletos, infraestructura y recursos de alto costo, dificultad para acompañar la legislación, entre otros. Conozca cómo Oracle Cloud permite y habilita a las empresas, de cualquier tamaño, a tener acceso a soluciones de gestión financiera ágiles, que actualmente, que hoy utilizan las mejores empresas globales.
Tags : como, revolucionar, tus, finanzas
     Oracle
By: Oracle     Published Date: Apr 16, 2018
Hoje em dia enfrentamos muitos desafios nas áreas de finanças e no processo de gestão empresarial. Entre eles estão sistemas internos obsoletos, infraestrutra e pessoas caras para manutenção, dificuldade em acompanhar a legislação, entre outros. Saiba como o Oracle Cloud permite e habilita que empresas de qualquer tamanho tenham acesso às finanças ágeis, atualmente, praticadas nas melhores empresas globais.
Tags : como, revolucionar, suas, financas
     Oracle
By: AWS     Published Date: Oct 07, 2019
Poor visibility into cloud deployments makes it difficult for organizations to enforce security and compliance across their cloud environment. Check Point CloudGuard Dome9 on Amazon Web Services (AWS) can help you gain deeper visibility of your traffic and configurations with automated assessments that strengthen your security posture and help you fulfill your part of the Shared Responsibility Model. Join the upcoming webinar with Check Point, Veracode, and AWS. Learn how Veracode improved their security posture using Check Point CloudGuard Dome9 on AWS.
Tags : 
     AWS
By: Jamf     Published Date: Nov 05, 2018
The whispers of “imaging is dead” accompanied macOS High Sierra as Apple introduced Apple File System (APFS) to the Mac. Now, whispers have turned to shouts as macOS Mojave takes yet another step further in rendering imaging a thing of the past. This white paper examines all things imaging and looks at the reasoning behind the transition, what new provisioning workflows are available to you, and the benefits of adhering to a more modern deployment method.
Tags : 
     Jamf
By: Veracode     Published Date: Oct 26, 2016
As software applications are increasingly distributed through cloud and mobile platforms, the risk of vulnerabilities affecting enterprises rises. This whitepaper provides advice for secure development and delivery of applications throughout the software development lifecycle.
Tags : veracode, security, application security, software applications, software development lifecycle, enterprise applications
     Veracode
By: Veracode     Published Date: Oct 26, 2016
Can DevOps be one of the most disruptive trends ever to hit application security, or even software development? DevOps enables developers to integrate security testing, validation and monitoring into both application development and deployment. Download this free whitepaper now to review the components of the current DevOps framework and how to put security into the processes of DevOps.
Tags : veracode, security, devops, application security, enterprise applications
     Veracode
By: Veracode     Published Date: Oct 26, 2016
When a high-profile, or simply branded, vulnerability is disclosed, security teams are expected to abandon their planned activities and react. But, these responses can be time-consuming and costly. Even if the vulnerability is achieving mainstream awareness, enterprises need to balance responses against risk. Download this handy report for guidance on preparing for a high-profile vulnerability disclosure so risk-management or security teams can respond with the appropriate level of urgency.
Tags : veracode, security, vulnerability, high-profile vulnerability disclosure, vulnerability disclosure, enterprise applications
     Veracode
By: Veracode     Published Date: Oct 26, 2016
20% of enterprises have suffered a security incident related to a business application or IT service consumed from external partners. With breaches like these making headlines, and enterprises’ growing reliance on third-party software, security of the cyber supply chain will garner increased attention. Download this joint Veracode/Enterprise Strategy Group (ESG) report to explore enterprises’ challenges in securing their cyber supply chain and get best practices for ensuring that every application – regardless of its origin – is secure.
Tags : veracode, security, supply chain security, web applications, application security, enterprise applications
     Veracode
By: Veracode     Published Date: Oct 26, 2016
Web application attacks are now the most frequent pattern in confirmed breaches, and organizations know that application security is key to protecting their data. But many organizations lack the resources to develop a comprehensive AppSec program, and need to look to external services. Download this guide for a straightforward, four-step method for acquiring the services you need to support a comprehensive AppSec program.
Tags : veracode, application security, sans, security, enterprise applications
     Veracode
By: Progress     Published Date: Mar 26, 2018
Patients are morphing into healthcare consumers, while healthcare providers and suppliers are simultaneously facing tighter payments. The Triple Aim is the operating beacon to deal with this challenging operating environment. How will healthcare organizations manage? By bringing data together from inside and outside the traditional healthcare system, and quickly delivering solutions into people’s hands via a new generation of enterprise health clouds.
Tags : 
     Progress
By: Progress     Published Date: Mar 26, 2018
Patients are morphing into healthcare consumers, while healthcare providers and suppliers are simultaneously facing tighter payments. The Triple Aim is the operating beacon to deal with this challenging operating environment. How will healthcare organizations manage? By bringing data together from inside and outside the traditional healthcare system, and quickly delivering solutions into people’s hands via a new generation of enterprise health clouds.
Tags : 
     Progress
By: Veracode     Published Date: Jun 26, 2019
Applications become vulnerable to an encapsulation attack when they fail to differentiate data or functionality within components. Without clearly defined boundaries between control spheres, bad code can creep across components and attackers can gain unauthorized access to data and functions.
Tags : 
     Veracode
By: Veracode     Published Date: Jun 27, 2019
The demand on software development teams is greater than ever.
Tags : 
     Veracode
Start   Previous    1 2 3 4 5 6     Next   End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com