HIT Consultant Insightful coverage of healthcare innovation
 

aco

Results 101 - 125 of 145Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: May 01, 2017
Today's enterprises support an assortment of end-user devices, including laptops and desktops (both PCs and Macs), tablets and hybrid devices, and, of course, smartphones. Not only do employees use a variety of form factors, but they run a variety of platforms on those devices, including: Apple iOS and Apple macOS Google Android Microsoft Windows To complicate the situation further, they run different versions of those platforms for example, Microsoft Windows XP SP3, Microsoft Windows 10 or anything in between. In addition, IT is being tasked more and more with managing and securing wearables, ruggedized devices and the Internet of Things (IoT). Read this whitepaper to learn more.
Tags : 
enterprise management, mobile management, organization optimization, security management, microsoft, data protection, bug prevention, information management
    
IBM
Published By: IBM     Published Date: May 01, 2017
MaaS360 delivers robust UEM capabilities across all major computing platforms, including iOS, macOS, Android and Windows devices. And where competing solutions offer incomplete support for legacy Microsoft platforms, MaaS360 supports Windows XP SP3, Microsoft Windows Vista, Microsoft Windows 7, Microsoft Windows 8, Windows 10 and Microsoft Windows 10 Mobile. These capabilities include: Identity and access management (IAM) that allows a shift from a device-based context to a more comprehensive, userbased context Application management, including an intuitive, universal application catalog for iOS, macOS, Android and Windows, advanced bundling and promotion features, bulk application purchase and distribution capabilities, and fine-grained data controls Download now to learn more!
Tags : 
microsoft, ibm, competing solutions, it support, device based, identity access management, universal application, promotion features
    
IBM
Published By: Utimaco     Published Date: Aug 18, 2008
Data protection programs at most organizations are concerned with protecting sensitive data from external malicious attacks, relying on technical controls that include perimeter security, network/wireless surveillance and monitoring, application and point security management, and user awareness and education. In this paper, the different leakage points are mapped with regulations and best practices.
Tags : 
leak, leakage, data protection, pci, cardholder, cardholder data, utimaco, database security
    
Utimaco
Published By: Utimaco     Published Date: Aug 18, 2008
Despite the advances in encryption techniques and vastly improved computer capabilities, however, many of the fallacies and outdated understanding about encryption persist. Sometimes these myths are even being perpetuated in popular technology publications where some authors and editorial staff fail to do their research thoroughly.
Tags : 
data protection, data security, database security, protecting data, utimaco
    
Utimaco
Published By: Utimaco     Published Date: Aug 18, 2008
Most of today’s standards and compliance regulations are concerned largely with the protection of private data at rest, during transactions, and while it traverses network connections. Some of these regulations make specific recommendations or require particular technologies for compliance. For all of them, however, encryption can be employed to satisfy the protection requirements.
Tags : 
leak, leakage, data protection, pci, cardholder, cardholder data, utimaco, database security, data encryption, encryption
    
Utimaco
Published By: Utimaco     Published Date: Aug 18, 2008
Better safe than sorry! When outsourcing, keeping an eye on data security right from the planning stage can save your company from nasty surprises. Readers should learn how to protect their confidential data when they exchange information with external partners.
Tags : 
leak, leakage, data protection, pci, cardholder, cardholder data, utimaco, database security, outsourcing, outsource, third party, 3rd party
    
Utimaco
Published By: Utimaco     Published Date: Aug 18, 2008
If company laptops, PDAs, or other mobile devices can't be found, it doesn't always mean that they've been stolen. Companies often lose track of these IT assets because there's no clear record of them. Encryption and inventory management can help to safeguard against the loss of confidential data.
Tags : 
leak, leakage, data protection, encryption, asset management, mobile, laptop security, mobile security, wireless security, utimaco
    
Utimaco
Published By: Phunware     Published Date: Jul 30, 2014
Retailers and Marketers have not yet begun to take total advantage of the newest technologies to leverage bid data and mobile. Download this whitepaper for the key best practices that will allow mobile marketers to utilize these technologies and capture a larger market share.
Tags : 
phunware, best practices ibeacon, big data ibeacon, push notifications
    
Phunware
Published By: Phunware     Published Date: Jul 30, 2014
Download this case study to learn more about how WWE was able to increase fan engagement, loyalty and revenue.
Tags : 
phunware
    
Phunware
Published By: Phunware     Published Date: Aug 11, 2014
Many hospitals are losing revenue and receiving poor reviews due to process inefficiencies that can often result in missed or delayed appointments and patient dissatisfaction. Additionally, with the influx of newly insured health care patients resulting from the Affordable Care Act’s new regulations, it is more of a challenge than ever before to guide patients through the hospital system in an efficient manner. In this white paper, we’ll examine how hospitals can use mobile technology to enhance the patient and visitor experience and drive new revenue through increased efficiency.
Tags : 
phunware, hospital mobile strategy, hospital beacon strategy, hospital mobile technology, hospital wayfinding technology, hospital push notifications, hospital digital navigation
    
Phunware
Published By: Phunware     Published Date: Aug 27, 2014
Learn the 5 questions you should be asking a potential location-based marketing partner and see the importance of choosing the right marketing and analytics partner for your organization.
Tags : 
location based services, wi-fi beacons, geofencing, ble, bluetooth low energy technology, close proximity marketing, wayfinding, branded mobile apps
    
Phunware
Published By: Phunware     Published Date: Oct 14, 2014
Learn the 7 benefits of using location to improve your organization’s customer experience and see how this will help retain loyal customers.
Tags : 
mobile location marketing, location aware technology, showrooming, geo-fence, mobile push notifications, mobile beacons
    
Phunware
Published By: Phunware     Published Date: Oct 14, 2014
Learn how you can reach a wider audience by using location-based technology and see how location-aware technology can benefit your organization.
Tags : 
mobile location marketing, location aware technology, geo-fence, mobile push notifications, mobile beacons, mobile solutions for hospitals, mobile solutions for real estate, mobile solutions for museums, mobile solutions for airports, mobile solutions for stadiums, mobile solutions for sports
    
Phunware
Published By: BlackBerry Cylance     Published Date: Jun 24, 2019
In 2018, BlackBerry Cylance observed many trends in the threat landscape, such as a decline in overall ransomware attacks, an increase in malicious coinminers, and a marked evolution of popular threats like Emotet. Additionally, overall malware attacks rose by 10% as attackers continued to hone their tools, skills, and tactics to threaten Windows, macOS, and Internet of Things (IoT) platforms. Read the BlackBerry Cylance 2019 Threat Report to understand these trends in greater depth, and to learn our recommendations to improve your security strategies.
Tags : 
    
BlackBerry Cylance
Published By: Tippit ERP     Published Date: May 18, 2009
Download this side-by-side comparison guide that breaks down the industry's top 11 ERP players (including Epicor, Infor, Microsoft, and NetSuite) so you can quickly and easily compare the features and costs of each. Learn more today!
Tags : 
erp, midmarket, inside erp, epicor, infor, microsoft, netsuite, lawson, microsoft, netsuite, crm, enterprise, dynamics, premise, sox, macola, oracle, sap, sage, qad
    
Tippit ERP
Published By: Quantcast     Published Date: Feb 18, 2015
Wie hat die Evolution des digitalen Marketings und der Aufstieg von Programmatic Display die heutige Landschaft der Onlinewerbung geprägt? Diese Präsentation beleuchtet, welche Veränderungen die Onlinewerbung in den letzten 20 Jahren beeinflusst haben – vom ersten statischen Web-Banner bis zu dynamischen, personalisierten Werbemitteln, die über Real-Time-Bidding-Algorithmen ausgeliefert werden. Paco Panconcelli, Managing Director bei Quantcast Deutschland, zeigte die Möglichkeiten von Programmatic Display für Werbungtreibende und Mediaagenturen auf, damit sie das Beste aus der neuen, digitalen Welt herausholen.
Tags : 
quantcast, programmatic display, real-time-bidding, digitalen marketings
    
Quantcast
Published By: VMware     Published Date: Feb 24, 2017
Apple began aligning management profiles in Mac and iOS software years ago so that Macs could be managed alongside iOS devices with mobile device management (MDM). Each macOS update has delivered additional MDM controls, enabling IT to manage more endpoints together. Unified endpoint management brings together traditional client management with a modern enterprise mobility management framework to simplify the management process for IT. This whitepaper summarizes the key challenges of Mac management and outlines considerations and product features to help ensure a successful deployment.
Tags : 
    
VMware
Published By: Symantec     Published Date: Nov 30, 2015
Independientemente de que se trate de una persona o una empresa, usted se debe encargar de la seguridad online de la misma manera en que se encarga de la seguridad física en su hogar o su empresa. No solo le hará sentir más seguro, sino que además protege a las personas que visitan su hogar, el lugar de trabajo oel sitio web. Es importante comprender los riesgos potenciales y asegurarse deestar totalmente protegido contra ellos. En el vertiginoso mundo de la tecnología, no siempre es sencillo mantenerse al día con los avances más recientes. Por este motivo, es aconsejable asociarse con una empresa de seguridad en Internet de buena reputación.
Tags : 
    
Symantec
Published By: Symantec     Published Date: Nov 30, 2015
A confiança naqueles com quem fazíamos transações e a confiança de que as informações de compra que fornecíamos estariam seguras. Afinal, como sempre acontece, onde houver dinheiro haverá criminosos ansiosos por tirar proveito das crescentes oportunidades.
Tags : 
    
Symantec
Published By: IBM     Published Date: Sep 18, 2008
When bound to regulation and compliance, process manufacturers find opportunities to grow through enterprise resource planning (ERP). However, 50% of process manufacturers execute non-integrated ERP strategies. This Aberdeen Group research study reveals best practices to help you adapt or select an ERP vendor that improves your business performance.
Tags : 
erp, enterprise resource planning, cindy jutras, process, process industry, chemical, food and beverage, food, beverage, pharmaceutical, pharma, best-in-class, material requirements planning, mrp, global competition, manufacturing process, microsoft dynamics, acsis, fullscope, traceability
    
IBM
Published By: Aconex     Published Date: Jun 18, 2008
In the construction industry, as in business generally, risk management involves identifying risks, assessing them and then developing strategies to manage them. Organizations that manage risk well enjoy financial savings, greater productivity and service quality, improved success rates of new projects and better decision making. It is clear that, in today's complex business environment, risk factors are wide reaching, and are intrinsically linked to achieving organizational objectives.
Tags : 
risk management, collaboration, web collaboration, web-based collaboration, aconex
    
Aconex
Published By: Aconex     Published Date: Jun 18, 2008
Over the past three years there has been a sharp rise in the number of mega projects in boom markets such as the Middle East, and Asia. This has presented the opportunity for US firms to play a leading role in some of the most ambitious construction developments ever undertaken.
Tags : 
construction, collaboration, project management, aconex
    
Aconex
Published By: Aconex     Published Date: Jun 24, 2008
It's a common scenario in the mining and oil & gas industries: the project has been approved to proceed and the pressure is on to get multiple parties – partners, consultants, contractors and suppliers – working together efficiently to meet an aggressive schedule. This challenge is often exacerbated by globalization and by the vast volume of data that flows between the project team.
Tags : 
information management, construction, oil, mining, gas, commodities, energy, aconex, collaboration, project management
    
Aconex
Published By: YouSendIt     Published Date: Jul 18, 2011
This case study illustrates how replacing FTP servers, CD's and courier services with YouSendit has resulted in a more secure, easier and efficient creative workflow process both internally and with their external vendors and parnters.
Tags : 
wacom, online file sharing, ftp replacement, send large files, secure file transfer, managed file transfer, file transfer, online file storage, large email attachment, upload, upload files, send it on, yousendit, file sharing, yousendit file sharing
    
YouSendIt
Published By: AVACorp     Published Date: Mar 04, 2011
Tracking risks, assumptions, issues and dependencies in a practical way with proper project management towards better delivery
Tags : 
raid based project management approach
    
AVACorp
Start   Previous    1 2 3 4 5 6    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.