HIT Consultant Insightful coverage of healthcare innovation
 

cia

Results 6551 - 6575 of 6657Sort Results By: Published Date | Title | Company Name
Published By: athenahealth     Published Date: Apr 30, 2013
Struggling to keep its independence, Wilson Stream Family Practice needed to improve financial efficiency and data management. With athenahealth's medical billing and EHR services, the practice was able to organize clinical data, make patient visits more efficient, and improve overall quality of care.
Tags : 
ehr, electronic health record, analytics, data, best practices, clinical workflow, electronic health records, meaningful use, health analytics, business intelligence, privacy and security, quality and safety, enterprise resource planning, care coordination, enterprise content management
    
athenahealth
Published By: Sage SalesLogix     Published Date: Oct 24, 2008
Did you know that most Americans believe companies should have a presence in social media?* That means most of your customers and prospects expect you to be involved in social media, and will be more likely to do business with you if you are. *Cone 2008 Business in Social Media Study
Tags : 
crm, customer relationship management, socially empower, social crm, sage, sales tools, blog, twitter, facebook, new media, social media, customer centric, customer-centric, customer service, service, retention, loyalty, growing, growth, profitable
    
Sage SalesLogix
Published By: Jive Software     Published Date: Mar 11, 2013
There's a better way to manage deals -- For a sales organization, email and CRMs don't enable precise teamwork. Read this white paper to learn how social business tools bring critical deal management capabilities.
Tags : 
sales execution, sales effectiveness, social technology, sales tools, sales enablement, social business
    
Jive Software
Published By: Virgin Pulse     Published Date: Mar 13, 2014
A new survey of more than 1,000 full-time U.S. employees by Virgin Pulse reveals that, while employees love their companies, they're not always feeling appreciated. Begin to turn that sentiment around by supporting employees' Total Quality of Life - including physical, emotional, social, and financial health - and fostering the employee/manager relationship with open conversations highlighting employees' achievements and recognizing a job well done.
Tags : 
    
Virgin Pulse
Published By: VMware AirWatch     Published Date: Nov 13, 2015
Windows 10: L'ultima rivoluzionaria versione rilasciata da Microsoft offre un singolo sistema operativo per dispositivi mobili e PC `tradizionali. Piattaforma unica | Applicazioni unificate | Esperienza intuitiva | Sicurezza integrata Ridefinita per l'era Mobile First, Cloud First.
Tags : 
windows 10, vmware, cloud, cloud first, webinar, mobile first
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Dec 10, 2015
Windows 10: L'ultima rivoluzionaria versione rilasciata da Microsoft offre un singolo sistema operativo per dispositivi mobili e PC `tradizionali. Piattaforma unica | Applicazioni unificate | Esperienza intuitiva | Sicurezza integrata Ridefinita per l'era Mobile First, Cloud First.
Tags : 
windows 10, mobile, cloud first, webinar
    
VMware AirWatch
Published By: Lumension     Published Date: Jan 22, 2013
In this fast-paced webinar, I’ll look at everything that’s new as far as security in Windows 8, with a special focus on mobility.
Tags : 
endpoint management, security, compliance, patch management, file integrity monitoring, device control, windows 8, mobile, byod, windows rt
    
Lumension
Published By: VMware AirWatch     Published Date: Jul 19, 2017
VMware AirWatch® features a new – and more efficient – approach to Windows lifecycle management across any use case – whether deploying the OS to your remote workers, onboarding employees’ BYO machines, corporate deployments across your branch offices or managing a special line of business terminal. The unified endpoint management technologies fundamentally changes how organizations approach PC lifecycle management, allowing IT to deploy security patches and remediate vulnerabilities faster, install software more reliably and quickly and consolidate operational processes across devices on or off the domain.
Tags : 
    
VMware AirWatch
Published By: VMware     Published Date: Feb 24, 2017
In June 2016, VMware interviewed 575 VMware inner circle customers and partners with the goal of collecting Windows 10 insights and IT perspectives from global enterprise, commercial, and SMBs. This flipbook reveals the five key trends that were discovered for Windows 10 adoption and migration. Unified endpoint management (UEM) with Windows 10 and VMware takes these trends into account and gives customers the ability to unify desktop and mobile management under one model.
Tags : 
    
VMware
Published By: VMware AirWatch     Published Date: Jul 19, 2017
In June 2016, VMware interviewed 575 VMware inner circle customers and partners with the goal of collecting Windows 10 insights and IT perspectives from global enterprise, commercial, and SMBs. This flipbook reveals the five key trends that were discovered for Windows 10 adoption and migration. Unified endpoint management (UEM) with Windows 10 and VMware takes these trends into account and gives customers the ability to unify desktop and mobile management under one model.
Tags : 
    
VMware AirWatch
Published By: Microsoft Windows Phone     Published Date: Feb 08, 2010
How Windows Phones Combine Email, Messaging, Voice, and Presence in a Secure, Collaborative Environment. This paper explains why unified communications is essential and why Windows® Phones are ideally suited to serve as the "mobile connection" in a unified communication environment.
Tags : 
microsoft windows phones, unified communications, security, mobile worker, smartphone, business intelligence, corporate social network
    
Microsoft Windows Phone
Published By: Dell     Published Date: Oct 24, 2014
This IDC white paper considers the approaching end of extended support for Windows Server 2003 and explores the Windows migration options that are available to customers and the benefits associated with a modernization effort. It also evaluates the risks that customers face if they do not move off of Windows Server 2003 prior to the conclusion of extended support.
Tags : 
server migration, product support cycle, server compatibility, it support
    
Dell
Published By: Dell     Published Date: Feb 04, 2015
This IDC white paper considers the approaching end of extended support for Windows Server 2003 and explores the Windows migration options that are available to customers and the benefits associated with a modernization effort. It also evaluates the risks that customers face if they do not move off of Windows Server 2003 prior to the conclusion of extended support.
Tags : 
    
Dell
Published By: CEB     Published Date: Dec 03, 2015
The key challenge of B2B selling today: customer purchase processes are overwhelmed by an increasingly large and diverse number of customer stakeholders who can’t reach consensus on a common course of action. Learn how to overcome buyer dysfunction and guide customer to consensus.
Tags : 
marketing, sales, b2b, challenger, consensus, mobilizer, implementation, product marketing, blocker, commercial insight
    
CEB
Published By: BlackBerry     Published Date: Aug 10, 2009
In recent years, law firms have enjoyed remarkable financial returns due to a strong global economy, free flowing capital and a high level of demand for legal services. Law firm revenues and profits continued to be strong, even during the dotcom bust, the post 9/11 slowdown and the increasing cost of associate recruitment and retention. This success could be partly explained by the growth imperative in law firms: they must continue to grow, either by acquisition, or by recruiting laterals or associates, because law firm economics correlates size with profits. And many firms grew rapidly in the past several years.
Tags : 
blackberry, altman weil, law, legal, research in motion, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: WNS     Published Date: Jun 21, 2017
Making key decisions that improve business performance requires more than simple insights. It takes deep data discovery and a keen problem solving approach to think beyond the obvious. As a business leader, you ought to have access to information most relevant to you that helps you anticipate potential business headwinds and craft strategies which can turn challenges into opportunities finally leading to favorable business outcomes. WNS DecisionPoint , a one-of-its kind thought leadership platform tracks industry segments served by WNS and presents thought-provoking original perspectives based on rigorous data analysis and custom research studies. Coupling empirical data analysis with practical ideas around the application of analytics, disruptive technologies, next-gen customer experience, process transformation and business model innovation; we aim to arm you with decision support frameworks based on points of fact.
Tags : 
cost of goods solid, warehousing and logistics, advertising and promotion, rent, electricity and utilities, floor staff, depreciation, system costs
    
WNS
Published By: IBM     Published Date: Apr 09, 2015
This American Banker webcast, sponsored by IBM, provides new insight into cybercrime and fraud prevention. Financial institutions have invested heavily in fraud prevention technologies and programs. However, sophisticated organized crime syndicates continue to successfully attack financial institutions and their customers. These criminals adapt quickly by using advanced technology and with ever changing attack vectors to exploit information security and fraud protection gaps across payment types, banking channels, and organizational boundaries. Traditional fraud prevention technologies are simply not capable of detecting and preventing account takeover and advanced malware attacks. A new approach to counter fraud is needed.
Tags : 
finance, cyber crime, banking, security, network security, fraud prevention
    
IBM
Published By: IBM     Published Date: Apr 23, 2015
This American Banker webcast, sponsored by IBM, provides new insight into cybercrime and fraud prevention.
Tags : 
ibm, cybercrime, fraud, prevention, technology, financial institutions
    
IBM
Published By: IBM     Published Date: Aug 06, 2014
The holistic, integrated fraud-prevention platform from Trusteer, an IBM company, effectively protects financial institutions against the full range of attack vectors responsible for the majority of online and cross-channel fraud, including account takeover.
Tags : 
    
IBM
Published By: IBM     Published Date: Aug 08, 2014
The holistic, integrated fraud-prevention platform from Trusteer, an IBM company, effectively protects financial institutions against the full range of attack vectors responsible for the majority of online and cross-channel fraud, including account takeover.
Tags : 
fraud detection, finance, account takeover, cybercrime, fraud prevention
    
IBM
Published By: IBM     Published Date: Nov 04, 2014
Cybercriminals are stepping up their attacks on financial institutions by gaining control of customer devices with highly advanced man-in-the-browser (MitB) malware and spear phishing attacks. They then conduct real-time credential theft and take over accounts. The main reason for cybercriminals’ continued success is that highly evasive advanced financial malware allows for a wide variety of attacks that are very difficult to detect with traditional fraud prevention technologies.
Tags : 
cybercrime, fraud-prevention, cyber threat, security
    
IBM
Published By: IBM     Published Date: Dec 01, 2014
Cybercriminals are stepping up their attacks on financial institutions by gaining control of customer devices with highly advanced man-in-the-browser (MitB) malware and spear phishing attacks. They then conduct real-time credential theft and take over accounts. The main reason for cybercriminals’ continued success is that highly evasive advanced financial malware allows for a wide variety of attacks that are very difficult to detect with traditional fraud prevention technologies.
Tags : 
cybercrime, fraud prevention, mitb, malware
    
IBM
Published By: Success Factors     Published Date: Feb 16, 2012
Attracting the best talent is a never-ending challenge. Learn five strategies for getting ahead, even in the worst business environments. Get your report now, compliments of SuccessFactors.
Tags : 
employee performance, high performance culture, high performing workforce, smart goals, performance reviews, goal setting, performance management, business strategy, business execution, strategy execution, business strategy software, business results, talent management, learning management, recruiting management, workforce planning, workforce analytics, succession planning, compensation, core competencies
    
Success Factors
Published By: PEAK Technologies, Inc.     Published Date: Apr 19, 2007
Download this paper now and read why many businesses now recognize that comprehensive management of their wireless device infrastructure is a crucial component of a total IT enterprise management solution.
Tags : 
wireless, infrastructure, wireless infrastructure, wireless device, wireless networking, wlan, mobile computing, it management, tco, total cost of ownership, peak, peak technologies
    
PEAK Technologies, Inc.
Published By: Echelon     Published Date: Feb 19, 2015
Parking lot, area, and pathway lighting that burns all night represents a significant source of energy waste and contributes to needless sky glow and light pollution. Learn how that can be avoided with this whitepaper.
Tags : 
outdoor lighting, commercial lighting, wireless outdoor lighting, rf outdoor lighting, lighting controls, outdoor lighting controls, outdoor lighting solutions, lumewave, echelon, public safety, energy savings, light pollution, energy savings, pole spacing, sensor coverage, safety, public safety
    
Echelon
Start   Previous    253 254 255 256 257 258 259 260 261 262 263 264 265 266 267    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.