<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>Netvouz / lillymark / tag / it</title>
<link>http://netvouz.com/lillymark/tag/it?feed=rss&amp;pg=4</link>
<description>lillymark&#39;s bookmarks tagged &quot;it&quot; on Netvouz</description>
<item><title>Asset Management in the Changing Technology Environment</title>
<link>http://www.slideshare.net/eGestalt/asset-management-in-the-changing-technology-environment</link>
<description>The techno-centric business environment enables enterprises to facilitate their workforce, vendors, customers and partners with easy access to their corporate networks, digital data and various web based applications.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Wed, 17 Sep 2014 11:14:45 GMT</pubDate>
</item><item><title>Asset Management Services – Management &amp; Tracking of Assets</title>
<link>http://www.hclisd.com/Asset-Management.aspx</link>
<description>HCL Asset management services comprise of all the activities associated with ongoing management &amp; tracking of assets. Our Vulnerability Asset Management Services covers the physical, technological, contractual &amp; financial aspects of IT Assets.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Tue, 19 Jun 2012 11:08:48 GMT</pubDate>
</item><item><title>Barnes &amp; Noble Stores Become Target to Hackers</title>
<link>http://www.egestalt.com/blog/2012/11/19/barnes-noble-stores-become-target-to-hackers/</link>
<description>No company is guarded from security threats. This seems to be the norm with hackers finding new targets every day, the latest being Barnes &amp; Noble. It has come to light that hackers have stolen credit card information of customers who shopped at 63 Barnes &amp; Noble stores across the country even as early as last month.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Fri, 07 Dec 2012 11:49:12 GMT</pubDate>
</item><item><title>Barriers to Telehealth Adoption Slowly Coming Down</title>
<link>http://www.computer.org/portal/web/The-Doctor-Is-In/content?g=8206605&amp;type=blogpost&amp;urlTitle=barriers-to-telehealth-adoption-slowly-coming-down</link>
<description>We’ve seen that word bandied about frequently. In brief, telehealth comprises not only physician-patient interactions but information and educational services that foster awareness of treatments, medical conditions, good health practices and diagnoses.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Thu, 04 Sep 2014 11:04:28 GMT</pubDate>
</item><item><title>Benefits of Automating IT Service Management Operations</title>
<link>http://www.youtube.com/watch?v=SvEmKq91BDQ</link>
<description>IT Service Management (ITSM) is practiced by all organizations having Human and IT Resources such as hardware -servers, desktops / laptops, scanners / printers, switches / routers and software -operating systems, application software, security / anti-virus software.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Fri, 03 Jan 2014 11:38:37 GMT</pubDate>
</item><item><title>Benefits of Automating IT Service Management Operations</title>
<link>http://www.youtube.com/watch?v=SvEmKq91BDQ</link>
<description>IT Service Management (ITSM) is practiced by all organizations having Human and IT Resources such as hardware -servers, desktops / laptops, scanners / printers, switches / routers and software -operating systems, application software, security / anti-virus software.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Tue, 28 Jan 2014 07:06:29 GMT</pubDate>
</item><item><title>Benefits of Automating IT Service Management Operations</title>
<link>http://www.youtube.com/watch?v=SvEmKq91BDQ</link>
<description>IT Service Management (ITSM) is practiced by all organizations having Human and IT Resources such as hardware -servers, desktops / laptops, scanners / printers, switches / routers and software -operating systems, application software, security / anti-virus software.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Thu, 27 Feb 2014 06:40:13 GMT</pubDate>
</item><item><title>Best Practices In Developing An IT Disaster Recovery Plan</title>
<link>http://www.netmagicsolutions.com/webinar/best-practices-in-developing-an-it-disaster-recovery-plan</link>
<description>This webinar introduces the key concepts and components that go into architecting and implementing an IT DR Plan and the best practices therein. Covering the entire flow from Disaster to Recovery.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Mon, 26 Aug 2013 04:57:56 GMT</pubDate>
</item><item><title>Big Data &amp; the Cloud: The Research Agenda</title>
<link>https://www.youtube.com/watch?v=U0xTjzY0g_w</link>
<description>Join keynote speakers, panelists, and conference organizers from the 2013 IEEE Congress on Services Computing as they discuss the key research areas and unresolved issues that confront developers, researchers, and IT professionals working in cloud-based systems.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Mon, 18 Aug 2014 06:24:17 GMT</pubDate>
</item><item><title>Biggest Breach of 2013 Reported in Texas</title>
<link>http://www.egestalt.com/blog/2013/07/26/biggest-breach-of-2013-reported-in-texas/</link>
<description>Protected health information of nearly 277,000 patients at Texas Health Harris Methodist Fort Worth has been compromised after several hospital microfilms, which were supposed to be destroyed, were found in three different public locations.</description>
<category domain="http://netvouz.com/lillymark?category=5038404302206526589"></category>
<author>lillymark</author>
<pubDate>Fri, 23 Aug 2013 04:45:40 GMT</pubDate>
</item></channel></rss>