Hippa PatentWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Hippa Patent returned the following results.
RSS What is RSS?
Related Categories

 •   Storage Management
 •   Data Center Management
 •   Disk-based Backup & Storage/ RAID
 •   Storage Area Network (SAN)/ Network Attached Storage (NAS)
 •   Backup Systems and Services
 •   Data Security
 •   Network Security
 •   Storage Security
 •   Virtualization
 •   Enterprise Data Protection and Privacy

Related Searches
 •   Enterprise Hippa Patent
 •   Equipment Hippa
 •   Hippa Michigan
 •   Hippa Patent B2C
 •   Hippa Supply
 •   It Hippa Patent
 •   License Hippa Patent
 •   Office Hippa Patent
 •   Recovery Hippa Patent
 •   Schedule Hippa Patent
Advertisement

ALL RESULTS
1 - 25 of 47 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Virtualization Trends in the Healthcare Industry by Dell, Inc. and Intel®

October 23, 2013 - (Free Research)
This whitepaper covers the trends occurring with virtualization in the healthcare industry as organizations move to virtualize while meeting government regulations. 
(WHITE PAPER) READ ABSTRACT |

Fulfilling The Promise of Desktop Virtualization With GreenBytes' Patented Breakthrough Deduplication by GreenBytes

July 26, 2013 - (Free Research)
This whitepaper will help you learn about a patented zero latency inline deduplication solution that has been designed to break down the barriers of desktop virtualization. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

CW Europe – February Edition by ComputerWeekly.com

February 04, 2013 - (Free Research)
Many analysts are predicting that tablets will outsell laptops, this year, and become the most popular type of portable computer device. In this issue of CW Europe we take a look at tablet security, through a range of case studies, highlighting the benefits and downfalls of mobile computing. 
(EZINE) READ ABSTRACT |

Deliver Application-level Security at Data Center Performance Levels by Check Point Software Technologies Ltd.

September 2008 - (Free Research)
The shift from network-layer attacks to dynamically changing application-layer threats has dramatically increased security needs. This paper examines appliances that can quickly evolve to guarantee performance yet maintain a high level of security. 
(WHITE PAPER) READ ABSTRACT |

PODCAST: SOX, GLBA and HIPAA: Multiple Regulations, One Compliance Solution by Tripwire, Inc.

August 2009 - (Free Research)
What do SOX, GLBA, and HIPPA all have in common? These important regulations all require technical safeguards to protect or guarantee the veracity of critical information. In this Q&A podcast, gain an understanding of the above regulations and discover what capabilities and organization must have in place to address the requirements. 
(PODCAST) READ ABSTRACT |

How to Effectively Secure Electronic Health Records by HP and Intel

February 2012 - (Free Research)
In the ongoing effort to reach HIPPA Electronic Medical Record (EMR) compliance standards, one of the biggest concerns is security. Download this whitepaper to see how to develop a blanket of security for patients and your reputation through leveraging best practices for automated threat protection! 
(WHITE PAPER) READ ABSTRACT |

Role Based Access Control and Entitlement Management by FoxT

September 2009 - (Free Research)
The new Role-Based Access Control utilities enforce entitlements down to the data and device level. The ability to effectively provision and audit these fine-grained controls across diverse technology domains is still a challenge. Read this transcript for practical guidance on how to implement a unified policy management infrastructure for RBAC. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

ProStor InfiniVault SEC 17a-4(f) Compliance Assessment by ProStor Systems

December 2007 - (Free Research)
Download this white paper to learn how ProStor's InfiniVault data archiving system complies with an array of government requirements, which regulate the storage, retrieval and management of electronic records. 
(ARTICLE) READ ABSTRACT |

Dell Automated Deployment by Dell, Inc. and Microsoft Windows 7

August 2010 - (Free Research)
Dell Services has developed patent pending technology and processes that automates the PC provisioning process which can greatly reduce the overall cost associated with PC deployments. Read this data sheet to learn more! 
(DATA SHEET) READ ABSTRACT |

Inside the Dell Equallogic™ PS Series iSCSI Storage Arrays by Dell India

July 2008 - (Free Research)
Built on patented peer storage architecture, the Dell EqualLogic PS Series of Internet SCSI (iSCSI) storage arrays offer high performance, reliability, intelligent automation, and seamless virtualization of storage to enable simplified enterprise storage deployment and management, and comprehensive data protection. 
(BROCHURE) READ ABSTRACT |

The Force.com Multitenant Architecture: Understanding the Design of Salesforce.com's Internet Application Development Platform by Salesforce.com

March 2009 - (Free Research)
To meet the extreme demands of its large user population, Force.com's foundation is a metadatadriven software architecture that enables multitenant applications. This paper explains the patented technology that makes the Force.com platform fast, scalable, and secure for any type of application. 
(WHITE PAPER) READ ABSTRACT |

IBM ProtecTIER Deduplication Solutions by IBM

May 2011 - (Free Research)
IBM ProtecTIER Deduplication solutions, featuring revolutionary and patented HyperFactor data deduplication technology, provide enterprise-class performance, scalability, and proven enterprise-level data integrity to meet the disk-based data protection needs of the enterprise data center down to mid-market environments. 
(MICROSITE) READ ABSTRACT |

HP Dynamic Deduplication - achieving a 50:1 ratio by Hewlett-Packard Company

March 2009 - (Free Research)
In 2008, HP introduced two products to the HP StorageWorks D2D Backup System Family. Both feature Dynamic deduplication based on an HP-patented algorithm that packs up to 50 times more backup data into the same disk footprint. This paper explains how Dynamic deduplication works and also establishes how a 50:1 deduplication ratio may be achieved. 
(WHITE PAPER) READ ABSTRACT |

Woods Gain Advanced Web Filtering Technology with Bloxx by Bloxx, Inc.

September 2008 - (Free Research)
The Bloxx Web filtering appliance with Tru-View Technology combines the best of traditional methods with its patented language analysis and intelligent identification techniques, providing three levels of protection. 
(WHITE PAPER) READ ABSTRACT |

Xiotech Emprise 5000 and Citrix XenServer 5.5.0 by Xiotech Corporation

June 2010 - (Free Research)
Xiotech's Emprise 5000 system is a revolutionary concept in data storage. It is built on patented Intelligent Storage Element (ISE) technology and provides a perfectly balanced building block of performance, reliability, and scalability that delivers the lowest total cost of ownership of any SAN or SAN-like storage system on the market. 
(WHITE PAPER) READ ABSTRACT |

ExaGrid: Cost-Effective Disk-Based Backup by ExaGrid Systems, Inc.

April 2011 - (Free Research)
The ExaGrid system is a plug-and-play disk backup appliance that works with existing backup applications. ExaGrid’s patented zone-level deduplication technology minimizes the amount of data to be stored by storing only the unique bytes across backups instead of storing the redundant data. Read on to learn more today! 
(DATA SHEET) READ ABSTRACT |

Technical Overview: Flash-Optimized Hybrid Storage from the Ground Up by Nimble Storage

February 2014 - (Free Research)
In this product brief, you'll learn how Nimble Storage customers run more workloads with less storage infrastructure, protect more data, and streamline data management so they can focus on higher-value projects. 
(WHITE PAPER) READ ABSTRACT |

Next-Generation Firewall by SonicWALL

February 2011 - (Free Research)
It can be a real challenge for IT administrators to efficiently deliver critical corporate solutions while also contending with employee use of wasteful and often dangerous applications. Critical applications need bandwidth prioritization while social media and gaming applications need to be bandwidth throttled or even completely blocked. 
(WHITE PAPER) READ ABSTRACT |

VKernel Capacity Analyzer by VKernel

January 2009 - (Free Research)
In a virtual server infrastructure where all resources are shared, optimal performance can only be achieved with an adequate amount of properly allocated resource capacity. Not allocating enough resources can cause critical bottlenecks - leading to performance problems and costly downtime events. 
(TRIAL SOFTWARE) READ ABSTRACT |

Removing Internet Anonymity Barriers with IP Intelligence by Digital Element

January 2008 - (Free Research)
NetAcuity IP Intelligence technology provides an excellent way to non-invasively gather new intelligence about the online universe, and Digital Element delivers the de facto standard in IP Intelligence. 
(WHITE PAPER) READ ABSTRACT |

Solid State Storage - A New Standard for Enterprise-Class Reliability by Fusion-IO

February 2009 - (Free Research)
With throughput and seek times faster than disk arrays, data centers are including NAND flash as part of their server infrastructure. Fusion-io offers solid state storage solutions with NAND flash that provides integrity for data exceeding today's solid state storage solutions and surpasses enterprise-class rotating magnetic storage devices. 
(WHITE PAPER) READ ABSTRACT |

The Alcatel-Lucent OmniAccess 8550 WebServices Gateway: AUTOMATED WORKFLOW FOR IMPROVED PAT IENT CARE by Alcatel-Lucent

April 2008 - (Free Research)
The Alcatel-Lucent OmniAccess 8550 Web Services Gateway is a network appliance that secures automated business processes to meet corporate governance obligations. 
(WEBCAST) READ ABSTRACT |

Pervasive Data Profiler v4 by Pervasive Integration

January 2008 - (Free Research)
Pervasive Data Profiler™ ensures data quality. Proactively audit all types of data; automate testing against changing business data quality needs and compliance regulations. Get hyper-fast, multithreaded processing of large data sets or sample data 
(WHITE PAPER) READ ABSTRACT |

Data Deduplication Background: A Technical White Paper by Quantum Corporation

February 2011 - (Free Research)
The term “data deduplication”, as it is used and implemented by Quantum Corporation in this white paper, refers to a specific approach to data reduction built on a methodology that systematically substitutes reference pointers for redundant variable-length blocks (or data segments) in a specific dataset. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

Faster, More Reliable and Cost-Effective Disk-Based Backup and Recovery with IBM ProtecTIER Deduplication Solutions by IBM

May 2011 - (Free Research)
When evaluating deduplication solutions, there are five important design factors to consider. Understanding these factors can help ensure that the deduplication solution you select today will meet your needs well into the future. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 47 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts