HIT Consultant Insightful coverage of healthcare innovation
 

act

Results 14501 - 14525 of 14761Sort Results By: Published Date | Title | Company Name
Published By: Project Success, Inc.     Published Date: Jun 23, 2008
For some projects, tracking actuals is unnecessary or is not worth the effort required. In other cases, however, tracking actual costs and resource usage is an essential aspect of the project control function. Why then is tracking actual costs and resource usage on a project ever worth the effort required to accomplish it?
Tags : 
project management, project success, psi
    
Project Success, Inc.
Published By: Emulex Corporation     Published Date: Nov 07, 2013
The status quo in network monitoring is no longer adequate for large organizations. Itís simply taking too long for enterprises with mission-critical networks to resolve and find the root causes of network incidents. To speed things up, enterprises must add dedicated incident response and root cause analysis capabilities that are 100% accurate and reliable to their network management arsenals. It takes so long to diagnose, fix, and eradicate network incidents that network uptime and performance are suffering. Because of this, organizations need to embrace incident response and root cause analysis capabilities to accelerate resolution times and avoid the network downtime and service degradation that can cost them thousands, if not millions, of dollars per minute. Download this Whitepaper for more information.
Tags : 
network monitoring, network visibility, technology, endace, best practices
    
Emulex Corporation
Published By: IBM     Published Date: Oct 13, 2016
Smart on-line transaction processing systems will be able to leverage transactions and big data analytics on-demand, on an event-driven basis and in real-time for competitive advantage. Download to learn how!
Tags : 
big data, operational decision making, transaction data
    
IBM
Published By: Trintech EMEA ABM Pilot     Published Date: Nov 03, 2017
The primary objective of any financial transformation project is to achieve process improvements by improving the quality, effectiveness and efficiency of financial information, ultimately enhancing shareholder value. Take the example of the close process. It would be incredibly simple to shorten the process by adding more people, however, is this an efficient way to reduce the number of days to close? On the right, the Hackett Group displays that best in class companies actually can be seen closing in fewer days, with greater automation and significant lower audit fees, emphasizing the idea that you really can do more with less.
Tags : 
account reconciliation, accounting automation, finance shared services, finance transformation program, finance transformation strategy, financial close, financial close process, reconciliation software, adjusting journal entries, recuing journal entries
    
Trintech EMEA ABM Pilot
Published By: Oath     Published Date: May 31, 2017
Understanding smartphone usersí behavior in the physical world is fueling the rise of location-based retargeting. Digital consumption on mobile devices surpassed desktop in 2015 and continues to grow. Using location as a signal of consumer activity and interest, advertisers can drive relevance and increase user engagement with their ads. Learn more in our infographic.
Tags : 
native advertising, native ads, search ads
    
Oath
Published By: Datex     Published Date: Oct 11, 2010
For companies offering time critical services, the ability to access information and packages quickly can result in time and labor savings and improve customer satisfaction.
Tags : 
software, courier, warehouse, logistics, wms
    
Datex
Published By: Asentria Corporation     Published Date: Sep 04, 2007
Simple voicemail has evolved into complex integrated messaging platforms and the generic black handset has been replaced by a plethora of devices. Service providers can become critical partners for companies looking to ensure availability of their voice network.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures, fault management, network management, remote site monitoring, remote site alarms, environmental monitoring, network alarm monitoring, network alarm management, remote telemetry units, alarm management system, network management systems, network monitoring, protocol mediation
    
Asentria Corporation
Published By: ReadyTalk     Published Date: Sep 19, 2014
In todayís marketplace, there are so many lead generation tactics available that it is imperative we employ the tools and practices that lead to the highest return in the shortest amount of time. Webinars should be a part of your lead generation strategy. They provide a higher return on your marketing investment.
Tags : 
webinars, qualified, leads, generation, strategy, marketing, investment, time, practices, tools
    
ReadyTalk
Published By: Sitecore     Published Date: Nov 05, 2015
For the additional benefit of complete insight into each unique visitor's experience with your website, link activity to an existing database or CRM, and get the full picture of your customers at your fingertips.
Tags : 
sitecore nfusion, website personalization, crm, customer loyalty, database
    
Sitecore
Published By: IBM     Published Date: Feb 23, 2012
Built on IBM's market-leading business rules management system and enhanced with capabilities for detecting time-based events, this offering drives more responsive actions to business opportunities or risk conditions, increasing the value of each customer, partner and internal interaction.
Tags : 
ibm, technology, information technology, it management, data management, data center
    
IBM
Published By: Epicor     Published Date: Nov 19, 2018
When determining which investments to make in their technology infrastructure, businesses sometimes choose to make no changes at all. While this decision avoids short-term costs and business disruption, it means the risk of reliance on obsolete technology. The cost of doing nothing is expensive in the long term. This eBook outlines exactly what is at stake for LBM businesses that wait to adopt modern technology. Download and learn how much your old system is costing your business. Youíll understand how an up-to-date solution like Epicor Bistrack helps build a path toward increased sales and profits.
Tags : 
    
Epicor
Published By: Epicor     Published Date: Aug 18, 2017
When determining which investments to make in their technology infrastructure, organizations will often choose to make no changes at all. While this decision avoids short-term costs and business disruption, it often simply delays the inevitableóeven making it worse. The cost of doing nothing is expensive in the long term. This reportófrom the independent researchers at Aberdeen Groupóoutlines the reasons organizations choose not to upgrade enterprise resource planning (ERP) software and cautions against this approach, supplying detailed research that illustrates the benefits of keeping your systems current. Check out the report, and see how upgrading your Epicor ERP can help grow your business.
Tags : 
erp software, enterprise resource planning software, manufacturing, epicor erp
    
Epicor
Published By: Epicor     Published Date: Sep 20, 2017
When determining which investments to make in their technology infrastructure, organizations will often choose to make no changes at all. While this decision avoids short-term costs and business disruption, it often simply delays the inevitableóeven making it worse. The cost of doing nothing is expensive in the long term. This reportófrom the independent researchers at Aberdeen Groupóoutlines the reasons distributors choose not to upgrade enterprise resource planning (ERP) software and cautions against this approach, supplying detailed research that illustrates the benefits of keeping your systems current. Download this report to learn how a new or improved ERP system can help get you the information you need to make informed decisions and act more efficiently, improving overall company performance.
Tags : 
erp software, enterprise resource planning software
    
Epicor
Published By: Compuware     Published Date: Aug 30, 2013
Highly complex, modern applications are being brought to market faster than ever before. With DevOps accelerating release cycles, itís harder than ever before to find and fix performance issues from reaching production. This paper discusses the selection requirements and benefits for a common APM platform to be used for proactive lifecycle-based performance management across development, test and production.
Tags : 
    
Compuware
Published By: Symantec     Published Date: Jun 12, 2008
An effective email management solution is essential for organizations in today's litigious environment. Learn more from Gartner research about the market and top vendors providing active archive solutions today. Download this research study to learn more.
Tags : 
symantec, email management, email archiving, archive, archiving
    
Symantec
Published By: Oracle     Published Date: Sep 24, 2015
The Business Impact Of Marketing Maturity In The Age Of The Customer
Tags : 
modern marketing, forrester report, becoming a modern marketer
    
Oracle
Published By: Oracle     Published Date: Feb 24, 2015
Oracle commissioned Forrester to interview 498 marketing decision-makers from across the US and Europe, finding that most companies are in the process of evolving marketing practices, but on average they are only about halfway to the goal of becoming customer obsessed or modern marketers. Read all the results. Get the report.
Tags : 
oracle, forrester, brand management, digital marketing, marketing automation, technology, decision making, information, data, insights, marketing maturity, revenue, growth, leadership
    
Oracle
Published By: Dell Mobility     Published Date: Oct 12, 2011
Download this report to find out how technology professionals rate factors like security, integration with existing infrastructure, ease of use, etc.
Tags : 
dell, mobility, solutions, servers, storage, datacenter, client refresh, wireless, mobility, workstation productivity, mobile phones, smartphones, smart phones, touch screen phones, pda phones
    
Dell Mobility
Published By: Trend Micro SaaS     Published Date: Feb 20, 2009
Hosted, or "in-the-cloud", messaging security capabilities are becoming increasingly popular with organizations of all sizes. Some have already adopted hosted services, while others are becoming more receptive to the notion of using third party services to manage their security infrastructure than they were just a year ago. Particularly driven by the current economic recession, decision makers are realizing that hosted email security can provide a cost-effective solution while actually improving security.
Tags : 
saas, trend, trend micro, software as a service, on-premise, cloud, trendlabs, email security, security, interscan messaging, service level agreement, sla, virus, spam, phishing, distributed denial of service, ddos, filtering, worry free, security
    
Trend Micro SaaS
Published By: Constant Contact     Published Date: Jun 18, 2015
Email marketing is a proven and cost-effective way to drive revenue and stay top-of-mind with prospects and customers. But many small business owners struggle to find the time to get started with email marketing or see real results. In this paper, find out how an email marketing consultant can solve this problem, see how one small business quadrupled its return on investment by working with an email marketing consultant, and how to find a local and vetted email marketing consultant within 72 hours.
Tags : 
constant contact, email marketing, email marketing strategy, marketing email
    
Constant Contact
Published By: Tapinfluence     Published Date: Jun 07, 2016
The rise of digital in the marketing mix has brought a whirlwind of change to the agency space, from work being brought in house to competition from consultancies and service providers. What an agency looks like in just five years is going to be tremendously different from the traditional model we know today.
Tags : 
marketing, content marketing, best practices, business optimization, best practices
    
Tapinfluence
Published By: Mass Relevance     Published Date: May 08, 2014
Learn about how your audience interacts with social media and why it is becoming one of the best ways to help brand your organization and engage with your customers.
Tags : 
spredfast, mass relevance, social media, integrating marketing
    
Mass Relevance
Published By: ClickSoftware     Published Date: Aug 13, 2014
This paper evaluates how the shrinking lunch break impacts the business.
Tags : 
managing a mobile workforce, lunch breaks, length of lunch breaks, effects of missing lunch, mobile workforce management
    
ClickSoftware
Published By: BambooHR - HR Software     Published Date: Jan 25, 2011
Administrative demands leave HR practitioners with time for little more than keeping up with growing workloads. A voice at the strategy table requires efficient HR information systems to and create real value in the HR function.
Tags : 
bamboohr, spreadsheets, excel, administrative demands, workloads, human resources, talent management, hr software, hrms, hris, employee database
    
BambooHR - HR Software
Published By: Webroot Inc     Published Date: Jan 15, 2015
The problem with the vast majority of network and endpoint security solutions is that they operate on the premise of static whitelists and blacklists. These lists do not account for the changing nature of URLs, IPs, files and applications, nor for the volume of unknown threats permeating the web, meaning they cannot be used to provide adequate protection. Compounding this problem is that commercial network security technology, such as NGFWs and unified threat management systems, can easily flood the organizationís network security teams with too many alerts and false positives, making it impossible to understand and respond to new threats. As a result, not only do these threats evade the security technology and land with the victimís infrastructure, but they also have plenty of time to steal sensitive data and inflict damage to the victimís business. The final characteristic of the latest attacks is how quickly they compromise and exfiltrate data from the organization, compared to the
Tags : 
firewall, network security, urls, ips, adequate protection
    
Webroot Inc
Start   Previous    574 575 576 577 578 579 580 581 582 583 584 585 586 587 588    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.