HIT Consultant Insightful coverage of healthcare innovation
 

cia

Results 5926 - 5950 of 6320Sort Results By: Published Date | Title | Company Name
Published By: Jive     Published Date: Feb 13, 2014
Connecting Talent for Business Results. Enterprise Social Collaboration. What's HR got to do with it?
Tags : 
jive, social collaboration, aberdeen group, human resources
    
Jive
Published By: Jive     Published Date: Feb 13, 2014
The Customer Service Balancing Act
Tags : 
jive, customer service, customer satisfaction, social media, social business
    
Jive
Published By: Jive     Published Date: Feb 13, 2014
Becoming a social business: integrating social software throughout enterprise
Tags : 
jive, social business, social software, social, social media
    
Jive
Published By: Jive     Published Date: Feb 13, 2014
Changing the Face of Healthcare with Social Business Software
Tags : 
jive, social, social business software, social media, healthcare
    
Jive
Published By: Jive     Published Date: Apr 10, 2014
Aberdeen Group gathered data from more than 600 organizations to find out how social collaboration tools help meet business and talent goals.
Tags : 
reachmail, social collaboration, talent, employee development, business goals, talent goals
    
Jive
Published By: Arbor     Published Date: Sep 20, 2013
Financial services companies have been the target of a serious, sustained, and well-funded DDoS campaign for more than a year. What these attacks have continued to demonstrate is that DDoS will continue to be a popular and increasingly complex attack vector. DDoS is no longer simply a network issue, but is increasingly a feature or additional aspect of other advanced targeted attacks. The motivation of modern attackers can be singular, but the threat landscape continues to become more complex and mixes various threats to increase the likelihood of success. There have certainly been cases where the MSSP was successful at mitigating against an attack but the target Website still went down due to corruption of the underlying application and data. In order to defend networks today, enterprises need to deploy DDoS security in multiple layers, from the perimeter of their network to the provider cloud, and ensure that on-premise equipment can work in harmony with provider networks for effective and robust attack mitigation
Tags : 
distributed denial of service, ddos attack, financial services, financial services company, ddos defense, ddos protection, security, finance, ddos mitigation
    
Arbor
Published By: Arbor     Published Date: Sep 20, 2013
Today’s hosting provider can increase revenue by capitalizing on the growing demand of business customers for hosted online operations—provided, of course, that it can safeguard these critical operations against DDoS-related outages. Using the simple, step-by-step approach described in this paper, providers can model the financial impact of a DDoS attack on their operations and calculate the ROI of an effective DDoS defense solution.
Tags : 
distributed denial of services, defense solutions, security, financial management, ddos attacks, ddos protection, ddos defense system, ddos protection solutions, roi
    
Arbor
Published By: Work4™     Published Date: Feb 27, 2013
The essence of great recruiting is to fish where the fish are. As times change, the "recruiting waters" get overfished. This is what makes the profession so highly flexible. Over the course of a decade, the success of one technique creates the demand for the next.
Tags : 
facebook recruiting, facebook recruitment, social recruiting, employer branding, social media recruitment, recruiting on facebook, how to post a job on facebook, how to recruit on facebook, facebook job page, recruiting through social media, social media for recruiters, social recruiting strategies, facebook recruiting app, facebook recruiting application, facebook recruiting apps, facebook recruiting solution, facebook recruiting tool
    
Work4™
Published By: TIBCO     Published Date: Oct 28, 2013
In an IT landscape dominated by big data, mobility, social networking and cloud computing, integration will not only grow in importance, its very nature will change. This paper will discuss the 21st Century IT landscape as it relates to the new integration, and argue that the need for a comprehensive integration strategy has never been more urgent.
Tags : 
tibco, big data, integration, integration strategy
    
TIBCO
Published By: SilverSky     Published Date: May 22, 2014
Are you looking for a Microsoft Hosted Exchange Provider? Want to see how the providers in this space stack up? The Radicati Group provides vendor analysis and reveals the Trail Blazers, Specialists, Mature Players and Top Players in this report.
Tags : 
silversky, ibm, microsoft hosted exchange, microsoft hosted exchange providers, email service providers, cloud, cloud business email providers, cloud business email
    
SilverSky
Published By: IBM     Published Date: Apr 04, 2013
What is a workload-optimized system? Simply put, it is one that matches architecture to the needs it is purchased for. Systems performance is no longer defined only by the fastest processor or other leading benchmarks, but rather by the ability to deploy new services faster, with higher quality, and within financial objectives. Commoditization has led some to think that financial objectives will lead to Intel-based systems for all uses. In this Advisory, we show that this is not the case, and by way of example, we demonstrate how Power Systems can be less expensive for ongoing operational costs and initial outlay.
Tags : 
business value, processor, new services faster, higher quality, financial objectives, intel-based, commoditization
    
IBM
Published By: ExtraHop     Published Date: Jul 25, 2013
ExtraHop enables healthcare IT organizations to harness the massive amounts of wire data flowing through their environments. See how ExtraHop can help to manage departmental and legacy applications while also supporting new initiatives such as meaningful use, compliance, VDI, EHR/EMR, and mobile applications.
Tags : 
operations, wire data, extrahop, applications, storage, compliance, vdi, mobile applciations
    
ExtraHop
Published By: RES Software     Published Date: Apr 08, 2013
RES Software, éditeur leader de solutions de poste de travail dynamique, annonce le déploiement de sa solution de gestion des environnements de travail au sein du Groupe Chèque Déjeuner. Le Groupe Chèque Déjeuner est une entreprise sociale créée en 1964, considéré comme le numéro 3 mondial sur le marché des titres spéciaux de paiement à vocation sociale et culturelle. Fort d’une présence à l’international dans 13 pays, regroupant plus de 2130 collaborateurs, en 2011, le Groupe Chèque Déjeuner a realise un volume d’affaires de 4,3 milliards d’euros et un chiffre d’affaires de 290,3 millions.
Tags : 
    
RES Software
Published By: Verint     Published Date: Apr 18, 2013
The vision for Celent’s Model Bank research was to try to answer an apparently simple question: “What would it look like for a bank to do everything right with today’s technology?” Of course, the question is not nearly as simple as it appears. The terms “everything” and “right” will mean very different things to different banks depending on their size, the complexity of their operations and product sets, and their technological starting points. While there is no such thing as a “Model Bank”—every bank does some things well, and others not as well when it comes to technology—it is possible to conceive of a “Model Bank” through real world examples of effective usage of technology.
Tags : 
banking, big data, technology, financial, effective use, analytics
    
Verint
Published By: HireRight     Published Date: May 01, 2013
There are a number of reasons why shrewd staffing agencies run background checks on potential employees before inviting them in to their business and, in turn, into their customers’ businesses. Background screening may be required by law for certain placements and industries, or, the customer may require screening. In all instances, failure to properly screen employees can have serious business and financial consequences. This industry brief outlines the risks that can arise from bad hires and how careful background screening can help mitigate those risks.
Tags : 
staffing, hireright, human resources, hr department, clients, potential employees
    
HireRight
Published By: HireRight     Published Date: May 01, 2013
Franchise owners have the benefit of brand recognition and a proven business model and plan. It is up to you, as a franchisee, to make your location successful and this success lies heavily on the staff you hire. Background screening may be required by law for certain franchise employees, depending upon the nature of the business. In all instances, failure to properly screen employees can have serious business and financial consequences. This industry brief outlines the risks that arise from bad hires and how careful background screening can help mitigate those risks.
Tags : 
hireright, human resources, hr department, investments, properly screen employees, franchise owners
    
HireRight
Published By: HireRight     Published Date: May 01, 2013
Do no harm and help heal are some of the top responsibilities for health care providers. The first step in meeting these requirements is to make sure your employees are worthy of your trust and that of your patients. Background screening is required by law for health care providers in many instances. In all instances, failure to properly screen health care employees can have serious business and financial consequences. This industry brief outlines the risks that arise from bad hires and how careful background screening can help mitigate those risks.
Tags : 
background screening, health care providers, responsibilities, hireright, risks of bad hires
    
HireRight
Published By: HireRight     Published Date: May 01, 2013
A person’s home is their castle, and no one would willingly welcome in a dangerous criminal. If you offer in-home services, your customers trust you to send someone that is not a threat to their family or personal property. If you fail to do so, there can be serious business , financial and even legal consequences. This industry brief outlines the risks that arise from bad hires and how careful background screening can help mitigate those risks.
Tags : 
field employees, screening, hireright, human resources, in home services screening
    
HireRight
Published By: HP and Intel ®     Published Date: May 03, 2013
HP Cloud Solution for Microsoft is designed to provide a scalable, high-performance integrated infrastructure optimized for virtual environments built on Microsoft Hyper-V. Designed and built according to the Microsoft Private Cloud Fast Track reference architecture, HP Virtual System for Microsoft comes standard with Microsoft Windows Server 2012 (which includes Hyper-V) and is designed to deliver top performance for a wide range of virtualized applications, including Microsoft Exchange, SQL Server, and SharePoint. This paper will focus on ESG’s analysis of the costs and benefits—and ultimate economic value—associated with deploying and managing HP Cloud Solution for Microsoft, versus a comparable conventional data center infrastructure comprised of discreet, non-integrated compute, storage, network, and management components.
Tags : 
cloud, virtualization, data center, infrastructure, storage, network, management
    
HP and Intel ®
Published By: HP and Intel ®     Published Date: May 06, 2013
In today’s hyperconnected world—with its multiple mobile devices, ubiquitous Internet access and pervasive social media platforms—people expect immediate access to information and services. These expectations are increasingly felt in corporate IT departments, where business units demand instant applications and fast services. Virtualization and cloud computing can help corporate IT meet these demands by bringing more flexibility and agility to the environment. But the ultimate solution is to transform the way IT is delivered. Indeed, many enterprises have already started on the journey toward the IT as a service (ITaaS) model.
Tags : 
    
HP and Intel ®
Published By: HP and Intel ®     Published Date: May 06, 2013
This IDC white paper describes the challenges associated with managing the growing complexity of IT infrastructures, with a focus on support services for the enterprise. It highlights the important role of support services in maximizing system performance and minimizing downtime. The paper also examines the HP Insight Online, HP Insight Remote Support, and HP Proactive Care service offerings, specifically for HP ProLiant Gen8 servers featuring Intel Xeon technologies — including an analysis of the return on investment (ROI) from these programs for existing HP customers.
Tags : 
it infrastructure, roi, enterprise, performance management, downtime, remote support, support
    
HP and Intel ®
Published By: Viavi Solutions     Published Date: Apr 07, 2017
Growing in number and becoming increasingly more malicious, security threats and attacks pose a severe threat to the survival of a business. Security operations teams need to leverage every available tool to respond more quickly and effectively to these incidents. While network packet capture and forensic analysis has traditionally been used by network operations, such a tool can also help security teams augment existing defenses and get on top of these threats. Given the hostile IT security environment, close collaboration between these groups is crucial to overall IT organizational success. This white paper explains the importance of packet capture and forensic analysis to security operations, examines the dynamics of this growing collaboration between security and network teams, and explores a leading platform in this market from Viavi Solutions.
Tags : 
    
Viavi Solutions
Published By: Dell SecureWorks     Published Date: May 28, 2013
Advanced Persistent Threats (APT) are a serious concern in today’s threat landscape. They represent a threat to an organization’s intellectual property, financial assets and reputation. In some cases, these threats target critical infrastructure and government suppliers, thereby threatening the victim country’s national mission.
Tags : 
    
Dell SecureWorks
Published By: Introhive     Published Date: Jun 04, 2013
Our research shows that if one thing hasn’t changed in sales, it’s the importance of relationships. Through our study and various insights throughout this eBook you will be better understand how to navigate your sales efforts in the modern age.
Tags : 
introhive, sales, relationship capital, social crm
    
Introhive
Published By: Salesforce.com     Published Date: Jun 17, 2013
Transforming Your Business with Salesforce Pull ahead of your competition by learning best practices for incorporating social and mobile technologies.
Tags : 
social, mobile, technology, sales and marketing operations, crm, customer relationship management
    
Salesforce.com
Start   Previous    231 232 233 234 235 236 237 238 239 240 241 242 243 244 245    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.