HIT Consultant Insightful coverage of healthcare innovation
 

act

Results 14026 - 14050 of 14578Sort Results By: Published Date | Title | Company Name
Published By: SolarWinds     Published Date: May 18, 2015
Monitor website availability and performance across Web pages and infrastructure elements. Learn how to proactively monitor five key areas of website performance issues caused by front-end components. With monitoring, you can proactively detect bottlenecks to find out whether the increase in server-side processing is due to the Web server or due to a front-end.
Tags : 
website availability and performance, infrastructure elements, five key areas, detect bottlenecks, server-side processing
    
SolarWinds
Published By: Symantec     Published Date: Sep 29, 2015
From building the business case for Website Security and explaining the science of SSL, to top tips and best security practices, this easy-to-read Dummies Guide will demystify the world of Website Security. Download now for yourself or share with a colleague. Learn to: • Make the business case for website security • Explain how SSL forms the foundation of great website security • Choose and implement the right SSL certificates for your website • Follow best practice for maintaining a healthy and trusted website
Tags : 
    
Symantec
Published By: Symantec Corporation     Published Date: Oct 03, 2013
We often think of malware as being designed to sit beneath the radar, collecting data in stealth mode, for the purposes of fraud or corporate espionage. Increasingly however, we’re witnessing attacks on corporations designed to cause substantial economic losses via wholesale destruction. For example, the Shamoon malware that recently hit Saudi Arabia-based Aramco (the world’s largest oil company) and RasGas (a Qatar-based gas company) corrupted files on tens of thousands of workstations, overwriting the Master Boot Records. These malware attacks, which may well have targeted website vulnerabilities, resulted in destruction on an industrial scale. At Aramco, IT professionals were forced to replace 30,000 PCs and laptops. RasGas meanwhile, had to shut down all email communications, and the company’s website was forced offline.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: Symantec Corporation     Published Date: Oct 03, 2013
Online where the reputation and success of your business is often measured by the trust that your customers have in the security of your website, it is important to understand how you can maintain and build on that trust. To that end, SSL/TLS has been the key to trust on the Internet for more than a decade and will continue to be so when it comes to providing the highest levels of protection against evolving cyber security threats. And while, yes, the technology is sophisticated and leading edge, the goal is simple: to make the Internet safer to transact business—for you, your customers and everyone else with whom you interact online. Please use this document as a reference to understand the threat landscape and understand how you can protect your company and your infrastructure.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: IBM     Published Date: Jun 15, 2009
Need your business to be flexible and agile? If you depend on the assets of partners & suppliers like us, you'll enjoy this video. It shows how the IBM WebSphere Application Server (WAS) Feature Pack for Web 2.0 uses the combined power of Web 2.0 and SOA to bring all our most important services to the forefront. Giving you immediate insight and interaction with customers partners, supplier, and retailers.
Tags : 
was, websphere application server, soa, web 2.0, ibm, server, soa, enterprise applications, server package, trial
    
IBM
Published By: IBM     Published Date: Dec 12, 2006
This paper gives the reader an overview of the functionality of IBM's WebSphere Customer Center, and explains why IBM is the strategic partner that more Fortune 500 companies select as their strategic platform for Customer Data Integration.
Tags : 
cdi, customer data integration, data management, data integration, customer service, customer interaction service, websphere, name matching, ibm
    
IBM
Published By: IBM     Published Date: Mar 28, 2008
Ensuring that data can be exchanged between disparate systems reliably and with speed and transactional integrity is a difficult trick to pull off. And it gets even trickier when things don’t work as anticipated. Yet this is exactly the challenge IBM has addressed for over a decade: first with IBM MQSeries® and now with IBM WebSphere® MQ.
Tags : 
    
IBM
Published By: Webtrends     Published Date: Jun 20, 2011
Marketers, managers and technologists all need real-time performance insights at their fingertips. Webtrends invites you to experience the award-winning Analytics 10, unified analytics uniquely made for digital marketing professionals in this webinar featuring Logitech and 3M.
Tags : 
webtrends, cmo, digital marketing, process, partnerships, go-to-market, customer experience, multi-channel marketing, optimization, data-driven marketing, web analytics, business intelligence, customer intelligence, crm, facebook, social media, mobile apps, lead generation, advertising, peer advice
    
Webtrends
Published By: The Vitality Group     Published Date: Jan 28, 2014
This technical brief streamlines and simplifies the key issues in the new regulatory landscape and provides information to help inform important business decisions regarding Wellness programs. "The Legal Environment of Wellness" offers in depth information abuot wellness program requirements under the ACA, and reviews how corporate wellness programs are impacted by the rulings of the Affordable Care Act (ACA) and HIPAA. In addition to the ACA, it covers information companies need to be aware of regarding how other legislation may impact their health promotion efforts. Choosing a new wellness program or bringing current programs into compliance will require a thorough understanding of new and existing laws and sometimes complex decisions and structural redesign.
Tags : 
employee wellness, employee wellness program, employee health, employee benefits, corporate health program, corporate wellness program, corporate wellness incentive program, employee health and wellness program, employee health incentive pgoram, employee wellness incentive program, workpace wellness program, workplace health program, workplace health promotion, health and wellness program, workpace health program, workplace health promotion, health and wellness program, corporate health program cost, affordable care act compliance, afordable care act provisions
    
The Vitality Group
Published By: Venafi     Published Date: Nov 12, 2015
This infographic reveals the challenges that enterprises face with securing keys and certificates and an action plan to reduce risk.
Tags : 
security, internet security, privacy, digital security certificates, security keys
    
Venafi
Published By: McAfee     Published Date: Feb 25, 2015
This report summarizes key steps organizations can take to harden their infrastructure, improve their responsiveness, and actively disrupt targeted attacks by paying attention IoAs
Tags : 
siem, real-time siem, attacks, real-time security, mcafee, attack prevention, targeted attacks, siem solution, siem security, security, security intelligence solution
    
McAfee
Published By: NetApp     Published Date: Feb 19, 2015
In today’s 24/7, always-on world, people expect institutions of higher education to lead with technology. Constant connectivity, mobility, and access to rich media anytime, anywhere not only define the educational experience, but also help to attract and retain the best students, faculty, and staff. Western Oregon University (WOU), relies on NetApp to help support its mission of providing effective, technology-powered learning opportunities.
Tags : 
    
NetApp
Published By: Cloudian     Published Date: Jul 17, 2019
Read this case study to learn why WGBH’s research led them to object storage — specifically, HyperStore from Cloudian.
Tags : 
cloudian, storage, cloud storage, nas, san, workflow, data protection, hybrid cloud
    
Cloudian
Published By: Mimecast     Published Date: Jun 02, 2016
Email impersonation attacks—also known as CEO fraud or whaling attacks—are a growing concern for organizations of any size. These scams have led to more than $2.3 billion in losses over the last three years.* Think you’re safe on your own? Snap out of it! Download the new Mimecast E-book Whaling: Anatomy of an Attack to learn the facts about these damaging and costly threats—and how you can stop them. *US Federal Bureau of Investigation, 4/2016
Tags : 
mimecast, whaling, phishing, email attacks, email security, internet security
    
Mimecast
Published By: AppDynamics     Published Date: Sep 20, 2017
Azure has been through many rounds of changes that have significantly affected the ways in which .NET and other developers interact with the platform. The shift in strategy has been rocky at times. In 2011, technology reviewers described Microsoft Azure as a confusing platform with a difficult to use web-based interface and incomprehensible documentation. Since then, the teams working on the platform have gradually improved it, resulting in a much more user-friendly platform that offers a well-organized array of services.
Tags : 
mobile developers, microsoft azure, xamarin, it operations, developer market, container
    
AppDynamics
Published By: Wildfire Interactive     Published Date: Jun 14, 2012
Launching a social advertising campaign may be easy. However, creating a great social advertising campaign that actually pays off can be a real challenge. Plus, the rules for success change from Facebook to Twitter to LinkedIn.
Tags : 
facebook, twitter, social media, advertising, marketing, emerging marketing, ads, social advertising campaigns
    
Wildfire Interactive
Published By: Godfrey     Published Date: Oct 24, 2008
 Recently, however, the explosive growth of online media has changed the PR game, creating a deeper, richer two-way communication between a marketer and its target audiences. Now, marketers can use social media strategies and tactics to engage their audiences directly. Those tactics include press release optimization, online media monitoring and reporting, social media press releases, RSS feeds, blogs, podcasts, webcasts and a host of other emerging technologies.
Tags : 
godfrey, b-to-b search, search, search engine optimization, seo, search engine marketing, sem, keywords, organic search, paid search, click-throughs, click-through rate, backlinks, link equity, link farms
    
Godfrey
Published By: Lenovo     Published Date: Jun 09, 2015
Tier-1 Original Equipment Manufacturers (OEMs) like HP, Dell and Lenovo are facing new competition from Original Design Manufacturers (ODMs), and other companies providing “white-box” equipment based on open-source specifications. As this paper will discuss, there are more factors than initial price
Tags : 
lenovo, cloud provider, hardware, msp, odm
    
Lenovo
Published By: Harvard Business School     Published Date: Feb 12, 2015
To thrive, companies need to innovate. And to innovate, companies need collaboration. Discover how bringing together diverse expertise, experience, and points of view can help you maximize contributions from every member of your team—and drive new levels of success.
Tags : 
high potentials leadership, high potential leaders, high-impact or fast-track individuals, top performers, harvard business school, executive education program, collective genius, linda hill, effective leaders
    
Harvard Business School
Published By: Harvard Business School     Published Date: Feb 19, 2015
To thrive, companies need to innovate. And to innovate, companies need collaboration. Discover how bringing together diverse expertise, experience, and points of view can help you maximize contributions from every member of your team—and drive new levels of success.
Tags : 
high potentials leadership, high potential leaders, high-impact or fast-track individuals, top performers, harvard business school, executive education program, collective genius, linda hill, effective leaders
    
Harvard Business School
Published By: Microsoft     Published Date: Jun 19, 2017
Gartner reports that 75% to 80% of organizations are using some form of agile project management process. Although agile project management has been around for many years, the way we adapt it has changed significantly, especially as project portfolio management (PPM) practices have evolved. In today’s businesses, technology plays a crucial role in our success, but technology can also make things more uncertain. This uncertainty has given us the motive to be more flexible and requires a “think on your feet” mentality. For this reason, we've seen a big spike in Agile PPM over the last few years. So how do we continue to deliver stability and efficiency, the result of traditional style PPM, while also giving in to necessary risks that lead to innovation and competitive edge? It’s simple: accept the value in each method, avoid the inevitable pains that may develop with segregation, and opt for a unified agile and traditional PPM model.
Tags : 
    
Microsoft
Published By: Corvisa LLC     Published Date: Feb 13, 2015
This whitepaper presents new study findings on current consumer hot buttons, identifies what’s still broken when it comes to customer service, and highlights the industries and businesses that know how to get it right.
Tags : 
customer interaction, contact center, customer service, customer satisfaction
    
Corvisa LLC
Published By: AppDynamics     Published Date: Sep 20, 2017
Every industry is going through digital transformation. Whether retail, manufacturing, media, finance, or software - in order to survive organizations are changing the way they operate in order to meet the demands of today’s connected customers. Whether it’s Uber redefining urban transportation for consumers, Slack enabling teams to collaborate in totally new ways, or Docker rivaling legacy virtualization providers, innovation is being powered by technology, and it’s happening faster than ever before.
Tags : 
development operations, digital transformation, application, automation, safeguards
    
AppDynamics
Published By: CloudHealth by VMware     Published Date: Feb 13, 2019
Google Cloud Platform is being widely adopted for its security and performance networking capabilities, machine learning, Kubernetes support, and data analytics. Google has been developing innovative price models to attract new users and provide cost benefits for customers. Read this eBook for answers to questions such as: -What are Committed Use Discounts? -Why do you need Committed Use Discounts? -What are Sustained Use Discounts? -What is the difference between Committed and Sustained Use Discounts? Download GCP Discounts and Why You Should Care to learn how you can take advantage of discounts in Google Cloud Platform to save you money on your monthly cloud bill.
Tags : 
cloud management, google cloud platform, multicloud management
    
CloudHealth by VMware
Published By: Oracle     Published Date: Mar 28, 2017
Loyalty programs provide a framework to nurture guest relationships, offering recognition, perks and options to redeem rewards. Most importantly, they create guest profiles and transaction histories that yield the insights needed to foster what is demanded today: individualized guest interactions.
Tags : 
hotel, loyalty program, perks, redeem, oracle
    
Oracle
Start   Previous    555 556 557 558 559 560 561 562 563 564 565 566 567 568 569    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.