ctr

Results 601 - 625 of 1034Sort Results By: Published Date | Title | Company Name
Published By: Code42     Published Date: Apr 22, 2016
Rapid changes in technology and software, and the nearly universal shift to electronically stored information (ESI), has made eDiscovery more complex and expensive. In a movement to simplify and standardize their procedures—and dissolve some of the extra tensions surrounding litigation—many organizations are bringing phases of the eDiscovery process in house, in particular legal hold. Among other benefits, Code42 eDiscovery simplifies legal hold management. Litigation preparation can be a large task crossing over many departments, but will consistently feature two main players: Legal and IT. This document focuses on those two groups, and aims to enable one to see the eDiscovery world through the point of view of one group—or the other. Read more to find out the details.
Tags : 
code 42, legal process, ediscovery, litigation issues
    
Code42
Published By: Citrix ShareFile     Published Date: Apr 11, 2017
Some financial professionals store or share terabytes of electronic information, including quarterly reports, billing statements or even sensitive personal data belonging to clients. Read this e-Book to better understand your security risks. You’ll learn: • The common challenges of data security • Steps to solve these challenges • And much more
Tags : 
data security, financial services, client data protection, security risk
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Apr 14, 2017
Some financial professionals store or share terabytes of electronic information, including quarterly reports, billing statements or even sensitive personal data belonging to clients. Read this e-Book to better understand your security risks. You’ll learn: • The common challenges of data security • Steps to solve these challenges • And much more
Tags : 
data security, data protection, network security, firewall security, it security, technology security
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Apr 14, 2017
Some financial professionals store or share terabytes of electronic information, including quarterly reports, billing statements or even sensitive personal data belonging to clients. Read this e-Book to better understand your security risks. You’ll learn: • The common challenges of data security • Steps to solve these challenges • And much more
Tags : 
data security, data protection, network security, firewall security, it security, technology security, anti virus
    
Citrix ShareFile
Published By: Canon Solutions America     Published Date: Feb 28, 2019
Security threats can be next to invisible, but this infographic shows exactly where your healthcare organization can be most at risk. It also gives you valuable tips for helping secure your patient data, financial documents, and medical records.
Tags : 
phi security, healthcare data privacy, data protection in healthcare, ehr solutions, ehr security, electronic health records management, hipaa breach, hipaa compliance checklist
    
Canon Solutions America
Published By: Canon Solutions America     Published Date: Feb 28, 2019
Fully updated for 2019, this guide covers the latest technologies and best practices for print, device, document, information, and cybersecurity. Learn how you can help maintain the confidentiality, integrity, and availability of health records throughout your organization.
Tags : 
phi security, healthcare data privacy, data protection in healthcare, ehr solutions, ehr security, electronic health records management, hipaa breach, hipaa compliance checklist
    
Canon Solutions America
Published By: Citrix     Published Date: Oct 26, 2017
Este libro electrónico identifica las consideraciones de WAF
Tags : 
    
Citrix
Published By: Citrix     Published Date: Oct 26, 2017
Descargue ""La guía definitiva para seleccionar el ADC adecuado para la era de la transformación digital"" para obtener más información. Rellene este formulario para recibir este libro electrónico.
Tags : 
    
Citrix
Published By: Citrix     Published Date: Oct 26, 2017
Descargue “La guía de escalado de ADC multidimensional para una transformación digital” para obtener información. Rellene este formulario para recibir este libro electrónico."
Tags : 
    
Citrix
Published By: Eaton     Published Date: Jul 12, 2019
Every three years, members of the National Fire Protection Association (NFPA) meet to review, modify and add new National Electrical Code (NEC), or NFPA 70, requirements to enhance electrical safety in the workplace and the home. This year’s code review is well underway: the second draft of NEC 2020 is complete and the annual NFPA Conference and Expo is scheduled for late June. What follows is a preview of what are, in my opinion, the most significant code changes on track to pass. In this blog, I’ll explore the reasoning for each change and the future steps the NEC may take beyond 2020 regarding: Ground fault circuit interrupter (GFCI) protection Service entrance equipment Reconditioned equipment Performance testing Load calculations Available fault current and temporary power This is a high-level overview. In the coming months, my Eaton colleagues and I will dig deeper into each topic as part of a continuing series on the 2020 code review cycle.
Tags : 
    
Eaton
Published By: Eaton     Published Date: Jul 12, 2019
The production of counterfeit products is an increasing problem that affects the entire electrical industry. Counterfeit protective devices, like circuit breakers, including GFCI and AFCI for personal protection, pose one of the most significant risks to facility and employee safety. Because counterfeit products are more difficult to detect than ever, we as an industry must do more to guard against their risks and liabilities. By purchasing products from authorized resellers and using available tools to authenticate products, buyers can ensure a safer supply chain that mitigates the risk sub-standard and counterfeit electrical safety devices pose.
Tags : 
    
Eaton
Published By: Eaton     Published Date: Jul 12, 2019
Working on energized equipment is one of the more dangerous scenarios technicians face in the field. As a result, there’s been a concerted industry effort to improve the understanding of electrical shock and arc flash hazards. I believe one of the most important standards in this safety push is the restructured language within the 2018 edition of the National Fire Protection Agency’s (NFPA’s) 70E “Standard for Electrical Safety in the Workplace.” In the past, the standard addressed electrical hazards and risks holistically when considering energized electrical work. But today’s latest guidelines now identify hazards and risks independently and include recommendations for a thorough risk analysis that considers the hazard, the planned work task and potential human error. Together, the changes result in a clearer understanding of energized work and help reduce electrical incidents.
Tags : 
    
Eaton
Published By: Eaton     Published Date: Oct 04, 2019
Safety has always been Eaton’s highest priority and we work closely with the NEC (National Electric Code) to ensure new policies continue to protect our most valuable resources, people. Eaton, the NEC, NEMA, and other organizations have long maintained that molded case circuit breakers are not suitable for repair or refurbishment. While changes to the code for 2020 do not change that position, they do provide clarity on what it means to be refurbished and what is now required when a suitable product is refurbished, including clearly marking the item as refurbished and removing the original manufacturer’s listing mark. The new code distinguishes between general maintenance like replacing a breaker, and refurbishment, altering a piece of equipment to a once again operational state. Because a refurbished unit cannot be tested to the manufacturer’s test protocol, it cannot continue to carry the original listing mark. Read the article below and learn about "reconditioned", and what the NEC is doing to reinforce that UL489 molded case circuit breakers are not suitable for refurbishment or repair.
Tags : 
    
Eaton
Published By: Interactive Intelligence     Published Date: Dec 02, 2010
How a contact center deploys and manages eServices - non-voice interaction channels such as email, chat, SMS and social media - is the key to offering electronic services that attract modern tech-savvy customers. Learn about eServices best practices from Sheila McGee-Smith, founder of McGee-Smith Analytics, and Tim Passios, Director of Solutions Marketing at Interactive Intelligence, and how three diverse companies successfully utilize eServices to their advantage.
Tags : 
interactive intelligence, sms, media channel, short message service, wireless, mobile communications, gsm, social media
    
Interactive Intelligence
Published By: Nutanix     Published Date: Apr 24, 2017
Nube Empresarial para Dummies Descargue gratis el libro y aprenda cómo puede hacerlo ¿Qué es la Nube Empresarial? Cada vez más organizaciones líderes van más allá de la hiperconvergencia y se enfocan en una estrategia de nube empresarial para llevar agilidad, simplicidad y un modelo de consumo bajo demanda de nubes públicas a su propio datacenter. Este libro lo ayudará a entender lo qué es la nube empresarial y cómo diseñar una infraestructura en la nube para impulsar su organización hacia el futuro. Descarga gratis el libro
Tags : 
nube empresarial, nube empresarial para dummies, hiperconvergencia, que es la nube empresarial, infraesctructura en la nube, almacenamiento en la nube, virtualizacion en la nube, nutanix
    
Nutanix
Published By: Mainline Information Systems     Published Date: Oct 20, 2009
In this webcast, you will hear from an attorney specializing in Information Technology Law and a technology specialist who can help you sort through different solutions in the marketplace. You will learn how to adapt to the number of compliance regulations, data privacy laws, and court orders relating to electronic records.
Tags : 
it compliance, mainline information systems, information technology law, data privacy laws, government regulations, industry best practices
    
Mainline Information Systems
Published By: IBM     Published Date: Dec 30, 2008
You've heard it a million times: Do more with less. It may be good business, but as budgets shrink and IT demands grow, you may start to wonder if the people who are saying "do more with less" think that it's a magical incantation. Run the servers without electricity! You've already taken basic cost-cutting steps and saved the easy money. You know that you need to dig deeper. But where should you start? This e-book, provided by IBM, will introduce you to the five big IT budget killers - and some of the best ways to knock them out.
Tags : 
ibm, it budgeting, economical budget, it demands
    
IBM
Published By: IBM     Published Date: May 04, 2009
Intel faces a familiar challenge: do more with less. With compute capacity growing exponentially and chip size expectation shrinking, the new 5500 series delivers on both fronts. This white paper delivers test results that show increased performance and speed along with greater efficiency.
Tags : 
ibm, express seller, virtualization intel, xeon, processor, 5500, bladecenter, system x
    
IBM
Published By: IBM     Published Date: May 04, 2009
Even with increased start-up costs, higher-end processors can offer a lower TCO thanks to better performance. This white paper shows detailed comparisons between higher- and lower-end servers with surprising results—including a 42% lower TCO and 87% faster performance for the higher-end processor.
Tags : 
ibm, express seller, virtualization intel, xeon, processor, 5500, bladecenter, system x
    
IBM
Published By: IBM     Published Date: Oct 21, 2009
The Austin Diagnostic Clinic recovers critical data in less than an hour with IBM Tivoli Storage Manager FastBack software. ADC reduced backup window for electronic medical records from two hours to five minutes; were able to restore many services in under an hour; reduced time and cost of server consolidation initiative and achieved up to 75% reduction in testing times.
Tags : 
tivoli, ibm, austin diagnostic clinic, data recovery, storage, data protection, data recovery, it environment
    
IBM
Published By: Inovis     Published Date: Aug 06, 2007
This white paper provides an overview of the growing opportunities for EDI managers and coordinators. It highlights how their role can change from being responsible for implementation of technologies for operational activities to being infrastructure leaders. It shows how they can deliver increased efficiencies and velocity for value chain automation, which increases visibility, control and agility for a business.
Tags : 
edi, electronic data interchange, electronic data, inovis, supply chain, manufacturing, productivity, infrastructure
    
Inovis
Published By: Inovis     Published Date: Aug 06, 2007
The challenges presented by multiple Value-Added Networks (VANs) and managing diverse trading partners create barriers to the efficiencies promised by EDI. Multiple providers mean multiple points of failure with no one entity to hold accountable. Also, as trading communities grow, end-to-end supply chain visibility becomes an essential operational requirement.
Tags : 
van, vans, value added, value-added, value added, edi, electronic data interchange, scm
    
Inovis
Published By: Inovis     Published Date: Aug 06, 2007
No enterprise is an island. Goods and services flow in from suppliers. When you include suppliers of wares for raw material extractors, along with recyclers that turn consumer and commercial waste into new raw materials and finished goods, it is a supply chain with no beginning and no end.
Tags : 
supply chain management, scm, supply chain, supplier, vendor management, vendor selection, communication, collaboration
    
Inovis
Published By: Stratus Technologies     Published Date: Apr 17, 2009
The long migration to electronic health records (EHRs) in the U.S. is set to speed up with the funding authorized by the American Reinvestment and Recovery Act of 2009.  But what are the specific risks when clinicians can’t access electronic health records? How far-reaching are the consequences when EHR data is lost, or its integrity is compromised?  This paper looks at the mission-critical role of EHR systems, and introduces availability solutions that build in uptime protection to ensure the continuity of operation that both caregivers and patients can depend on.
Tags : 
stratus, electronic health records, ehrs, american reinvestment and recovery act, health, records, availability solutions, mission-critical
    
Stratus Technologies
Published By: Proofpoint     Published Date: Apr 22, 2010
This report summarizes the findings of Proofpoint's sixth-annual email security and data loss prevention study, including surprising statistics about how large companies manage the risks associated with outbound email, blog postings, media sharing sites, social networking sites, mobile Internet-connected devices and other electronic communications streams.
Tags : 
proofpoint, outbound email, data loss prevention, email security, social networking, electronic messaging, mobile email
    
Proofpoint
Start   Previous    18 19 20 21 22 23 24 25 26 27 28 29 30 31 32    Next    End
Search Resource Library