HIT Consultant Insightful coverage of healthcare innovation
 

cem

Results 276 - 300 of 599Sort Results By: Published Date | Title | Company Name
Published By: Return Path     Published Date: Jan 29, 2013
Internet Service Providers make filtering decisions about what email to block or mark as SPAM based on three main factors. Find out what they are in “Email Sender Reputation Report: Key Factors that Impact Email Effectiveness."
Tags : 
email filtering factors, sender reputation, email blocking
    
Return Path
Published By: Return Path     Published Date: Jan 29, 2013
The need for marketers to improve their optimization practices has led Return Path and the Relevancy Group to explore the state of email marketing measurement and analysis, as well as its role and impact on marketing performance.
Tags : 
email marketing optimization practices, audience segmentation, inbox placement, email program results, email marketing performance, competitive benchmarking tools, competitor email programs
    
Return Path
Published By: HP     Published Date: Jul 29, 2008
This white paper by IDC shows how an investment in training improves the likelihood of an IT project chances for success through enhancement of team skills. The white paper provides an analysis of a comprehensive survey with 144 senior IT managers examining the impact which training and skill level had on the success of 377 IT projects.
Tags : 
project success, project management, training, education, workforce, employee, mission critical
    
HP
Published By: Tealeaf     Published Date: Mar 31, 2011
Do you let the customer abandon and hope they have a better experience the next time they visit your site (assuming they return)?
Tags : 
tealeaf, cem solutions, real-time customer recovery, remarketing
    
Tealeaf
Published By: Entrust Datacard     Published Date: May 15, 2014
A proven, cost-effective strong authentication approach for law enforcement compliance in the United States
Tags : 
entrust, security, cjis, compliance, fbi, security policies
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jul 21, 2014
For law enforcement, courts and other public safety departments that access or exchange information with the Federal Bureau of Information (FBI) Criminal Justice Information Services (CJIS) division, a strict set of security controls must be followed.
Tags : 
cjis, compliance solutions, security control, law enforcement, courts, public safety departments, software authentication
    
Entrust Datacard
Published By: Dell     Published Date: Oct 20, 2008
Windows Vista includes deployment tools that help you manage your migration. Dell Services extends the reach of those tools with time-saving automated deployments based on best practices.
Tags : 
dell, automated deployment, deployment tools, dell deployment services, vista deployment enhancements
    
Dell
Published By: F5 Networks Inc     Published Date: Jul 08, 2009
iControl provides the means by which F5's BIG-IP platform can be automated, integrated, and flexible such that it can adapt in real-time to changing network and application infrastructure conditions inside and outside the data center. Whether you are building out a new infrastructure or adapting to new technology, using iControl can enable unprecedented levels of control over and visibility into the application delivery process.
Tags : 
enhancement, feature, big-ip, application delivery controller, adaptable, dynamic, device, system, version, management, solution
    
F5 Networks Inc
Published By: VMware     Published Date: Feb 26, 2009
This flash provides an overview of how CA ARCserve® Backup r12 provides several new disaster recovery enhancements, including an easy-to-use Disaster Recovery wizard. Together with the replication and application failover functionality in CA XOsoft™ Replication and CA XOsoft™ High Availability, and the integrity testing features in CA XOsoft™ Assured Recovery, these tools enable you to recover servers, applications, and data swiftly and effectively.
Tags : 
ca arcserve, ca xosoft, vmware, restoring database application, bootable cd, bootable tape, cdp, database sessions, simple recovery procedures, iis vm, non-disruptive testing, recovery enhancements
    
VMware
Published By: VMware     Published Date: Feb 26, 2009
This flash demonstrates how CA ARCserve Backup, CA XOsoft High Availability and CA XOsoft Replication help protect the virtualization data without impacting performance.
Tags : 
vmware, ca arcserve backup, ca xosoft high availability, virtualization data
    
VMware
Published By: PC Mall     Published Date: Mar 03, 2012
Two HP ProLiant four-processor servers have achieved outstanding performance results on the two-tier SAP® Sales and Distribution (SD) standard application benchmark with SAP enhancement package 4 for the SAP ERP application 6.0.
Tags : 
servers, server, hp servers, hp server, processors, amd
    
PC Mall
Published By: Adobe     Published Date: Sep 08, 2011
Regardless of the size of your organization or the depth of your CEM needs, Adobe can help you achieve your CEM goals with the industry's most comprehensive and versatile design tools and runtime support for realizing state-of-the-art CEM solutions. Download this white paper to learn more.
Tags : 
adobe, cem, customer experience management, best practices, customer interactions, enterprise applications, cloud compatibility, rias
    
Adobe
Published By: Adobe     Published Date: Sep 08, 2011
Review the new architecture based on OSGI, JCR and Sling which can run directly in a Java virtual machine.
Tags : 
adobe, cem, customer experience management, best practices, customer interactions, enterprise applications, cloud compatibility, rias, osgi, sling, java
    
Adobe
Published By: Adobe     Published Date: Sep 08, 2011
Discover how to build mobile apps and learn more about minimizing development time and the re-use of components across device platforms.
Tags : 
adobe, cem, customer experience management, best practices, customer interactions, enterprise applications, cloud compatibility, rias, osgi, sling, java, ios, android
    
Adobe
Published By: YouSendIt     Published Date: Jul 18, 2011
This whitepaper highlights how organizations can solve their attachment management problems while imposing little or no change on the way that users work and increasing IT's visibility into the process for compliance purposes -- inexpensively and at reduced corporate risk.
Tags : 
email attachments, online file sharing, ftp replacement, send large files, secure file transfer, managed file transfer, file transfer, online file storage, large email attachment, upload, upload files, send it on, yousendit, file sharing, yousendit file sharing
    
YouSendIt
Published By: Citrix Systems     Published Date: Nov 10, 2014
Virtualization has made compute infrastructure and storage infrastructure an order of magnitude more flexible, yielding huge gains in IT efficiency. However, the network has not achieved the same efficiency gains. Unlike the advancements in compute and storage virtualization, networking has not kept pace, and has become a barrier to achieving the promise of enterprise cloud computing. As enterprise IT continues its transition to the Cloud Era, the data center network is once again taking center stage.
Tags : 
application, deployment, research, enterprise, data center, controller, network, security, cloud, virtualization, platform, performance, scalability
    
Citrix Systems
Published By: SuccessFactors, Inc.     Published Date: Aug 30, 2011
A successful pay-for-performance culture can literally transform any business. Learn the key steps necessary to unlock your employees' potential, keep your "superstars" happy and ultimately drive a healthier bottom line.
Tags : 
successfactors, pay-for-performance culture, alignment, visibility, cascading goals, immediate reinforcement, coaching, smbs, cost savings, retention, increased motivation, performance management, compensation
    
SuccessFactors, Inc.
Published By: OpenText     Published Date: Mar 20, 2012
The report highlights industry best practices for establishing and nurturing CEM programs that delight customers while improving overall business results.
Tags : 
marketing, customer experience, customer satisfaction, analytics, customer service, aberdeen
    
OpenText
Published By: IBM - Tririga     Published Date: Dec 21, 2011
The Financial Accounting Standards Board (FASB) and the International Accounting Standards Board (IASB) are jointly working on a replacement for the current lease accounting standards. The paper discusses how to create an action plan to prepare for this replacement.
Tags : 
ibm, new lease, accounting, finance, fasb, iasb, business finance
    
IBM - Tririga
Published By: Skillsoft     Published Date: Oct 03, 2014
With the recent increase in enforcement of the Foreign Corrupt Practices Act (FCPA) and the tightening of anti-corruption legislation in Europe and other regions, knowledge of bribery rules and regulations has never been more critical. In the US alone, the total fines for FCPA violations levied by the Department of Justice (DOJ) and Securities and Exchange Commission (SEC) in 2013 exceeded $720 million1. Fortunately, effective training and internal communication have been identified as strategies to mitigate your compliance risk. Here are five things you need to know about anti-bribery enforcement trends.
Tags : 
skillsoft, foreign corrupt practices act, fcpa, department of justice, doj, securities and exchange, anti-bribery, enforcement trends, anti-corruption
    
Skillsoft
Published By: Adobe     Published Date: Sep 19, 2013
Earning top rankings in both strategy and market presence, Adobe AudienceManager was named a leader in data management platforms in the Forrester Wave™: Data Management Platforms report for Q3 2013.
Tags : 
adobe, media optimizer, data management, platforms, technology, audience delivery, marketing
    
Adobe
Published By: ForeScout     Published Date: Aug 14, 2012
Business wants more fluid access to data while IT organizations must maintain security. As the variety of access and multitude of threats to network resources and sensitive information have grown, so has the need for more flexible and automated ways to effectuate security policies, controls and enforcement. Rarely is this need more keenly felt than at the network endpoint, where people, technology, information assets and requirements for security and compliance meet most directly.
Tags : 
pragmatic, path, achieving nac results, essential implementation, process, control, consideration, data, access, it organization, security, protection, network, access, control, nac, interoperability, 802.1x standards, control, options
    
ForeScout
Published By: CDW     Published Date: Jul 11, 2013
In the context of these current vulnerability announcements, there is definite cause for concern: vulnerable systems are widespread, they can be exploited remotely, and the exploitation itself seems relatively simple. This means that we likely have only a short window of time before attacks become widespread.
Tags : 
cdw, cdw blog, ipmi, business intelligence
    
CDW
Published By: Aruba Networks     Published Date: Jul 03, 2013
The increased performance and higher capacity of 802.11ac have tremendous appeal for organizations rapidly approaching the limits of their current Wi-Fi network, or for organizations that are striving to adopt next-generation applications or interactive network experiences. To help identify these opportunities, this brief represents the top use cases for adopting 802.11ac technology today.
Tags : 
802.11n, 802.11ac, ieee, enhancements, reliability, 5-ghz, capacity
    
Aruba Networks
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.