HIT Consultant Insightful coverage of healthcare innovation
 

components

Results 201 - 225 of 360Sort Results By: Published Date | Title | Company Name
Published By: IBM Software     Published Date: Feb 03, 2012
Read this white paper from IBM to learn about applying predictive analytics to claims management, including the typical ROI achieved, how embedded analytics improves decision making, and technology components of a predictive analytics solution.
Tags : 
ibm, security, predictive analytics, security policy, risk management, internet security, security solutions
    
IBM Software
Published By: IBM Cloud Business     Published Date: Jul 13, 2011
Are you getting the most you can out of your resource utilization? This technical note features two scenarios designed to illustrate the technical process of monitoring cloud services. Learn more about these time-saving,effective options for monitoring in the IBM Cloud.
Tags : 
cloud, components, hardware, ibm corp., monitor, resource, utilization, ibm
    
IBM Cloud Business
Published By: Navisite- A Time Warner Cable Company     Published Date: Aug 07, 2013
However, risk-averse enterprise IT professionals are understandably cautious about simply moving their entire IT portfolio of resources and services into a 100-percent cloud architecture. As with most technology-adoption curves, enterprises have not embraced an “all-or-nothing” paradigm, instead preferring a pragmatic, “evolution, not revolution” approach of cautious incrementalism. This helps them account for their existing investments, custom work, business requirements, and risk posture. Not everything will move to the cloud – at least not in the foreseeable future. That’s why so many IT professionals advocate a so-called “hybrid” approach. But what do we mean by “hybrid” and how do we optimally balance the various components of a hybrid cloud architecture?
Tags : 
hybrid cloud, pragmatic view, architectures, it professionals, it portfolio
    
Navisite- A Time Warner Cable Company
Published By: IBM     Published Date: Aug 07, 2012
As a claims management professional, you have to deal daily with formidable - and sometimes competing - challenges: provide superior customer experience; achieve operational excellence and cost containment; and effectively manage risk. Predictive analytics can help you improve each of these three outcomes, but more importantly, it helps strike the right balance among these three objectives for each new claim received. Read this white paper from IBM to learn about applying predictive analytics to claims management, including the typical ROI achieved, how embedded analytics improves decision making, and technology components of a predictive analytics solution.
Tags : 
improving, claims, management, outcomes, predictive, analytics, claims, management
    
IBM
Published By: SAP     Published Date: May 11, 2012
Explore the benefits of BI, the components of a successful BI strategy, and the steps all companies should take to determine their current level of BI need and effectiveness.
Tags : 
business intelligence, business intelligence solution, bi strategy, idc
    
SAP
Published By: ITinvolve     Published Date: Jun 06, 2012
As much as 80 percent of the time related to MTTR (mean time to repair) is spent on identifying the key components, relationships, and people involved to determine the cause of a problem and fix it.
Tags : 
mean time to repair, mttr, cloud computing, change management
    
ITinvolve
Published By: CDW     Published Date: Jan 14, 2015
Learn how to achieve a best-in-class wireless infrastructure and see how this will give your organization an opportunity to improve their Wi-Fi network performance and capacity to better serve us all.
Tags : 
wireless, infrastructure, network, performance, productivity, digital age, it components, wifi
    
CDW
Published By: CDW     Published Date: Aug 28, 2015
Comparing — and combining — IT components into an optimized solution yields many worthy advantages.
Tags : 
storage, servers, cloud computing, architecture, convergence, infrastructure
    
CDW
Published By: Crimson Hexagon     Published Date: Aug 26, 2014
In this paper, we introduce the essential components of online opinion monitoring. By incorporating them into your analysis, you can take full advantage of the opportunities that social media offers to you. Opinion monitoring will help you to develop informed advertising and marketing strategies that promote your brand’s market success.
Tags : 
crimson hexagon, social media, branding, measuring brand impact, brand impact, social media marketing, online opinion monitoring, opinion monitoring
    
Crimson Hexagon
Published By: NetApp     Published Date: Sep 19, 2013
Learn about FlexPod Select with Hadoop and how this enterprise class Hadoop has validated, pre-configured components that allow for faster deployment, higher reliability, and smoother integration with your existing applications and infrastructure.
Tags : 
flexpod select, hadoop, netapp, cisco, validated designs, cloudera, hortonworks, data
    
NetApp
Published By: Skillsoft     Published Date: Mar 05, 2014
This paper will assist you in answering key questions about how you can deliver the various components of a well-designed blended learning program.
Tags : 
learning, blended learning, development program
    
Skillsoft
Published By: Microsoft Azure     Published Date: Apr 11, 2018
Distributed systems enable different areas of a business to build specific applications to support their needs and drive insight and innovation. While great for the business, this new normal can result in development inefficiencies when the same systems are reimplemented multiple times. This free e-book provides repeatable, generic patterns, and reusable components to make developing reliable systems easier and more efficient—so you can free your time to focus on core development of your app. In this 160–page e-book, you’ll find: An introduction to distributed system concepts. Reusable patterns and practices for building distributed systems. Exploration of a platform for integrating applications, data sources, business partners, clients, mobile apps, social networks, and Internet of Things devices. Event-driven architectures for processing and reacting to events in real time. Additional resources for learning more about containers and container orchestration systems. “There are more
Tags : 
    
Microsoft Azure
Published By: Adobe     Published Date: Sep 28, 2016
Five years ago, the mobile revolution was in its adolescence. Now, it’s in the midst of a growth spurt, and it’s developing faster than ever. To keep up, you need to deliver customer-winning mobile experiences that drive loyalty for your brand. And the key for achieving this is mobile maturity. Our report outlines survey results from marketing and IT decision makers who share how they’re using mobile today. Read the report ‘Mobile is the strategy’ to learn: • The four components of the mobile maturity lifecycle • Why mobile apps are crucial to a successful mobile strategy • The role analytics plays in reaching mobile maturity
Tags : 
adobe, mobile, mobile strategy, marketing, mobile maturity, mobile apps, analytics
    
Adobe
Published By: Epson     Published Date: Jun 22, 2018
Imaging technology has dramatically aff ected the experience of K-12 teaching and classroom dynamics. From a time when the primary ways to relay information were verbal, via a blackboard or overhead projector, to the current array of computers, tablets, fl at screens and projectors – deciding what to select can be complicated. Today there is a lot of focus on fl at panels and projectors. However the big dilemma isn’t which technology to select, but how to support the right visual environments that help teachers teach and students learn. Whether the pedagogical style is sage on a stage, guide by the side, fl ipped classrooms, display-based or constructivist, getting everyone on the same page and keeping focus are key components in supporting student comprehension.
Tags : 
    
Epson
Published By: EMC Backup & Recovery Solutions     Published Date: Apr 29, 2010
This white paper describes components of the VMware vSphere and VMware View solutions and discusses options for protecting these environments using EMC Avamar with global source-based data deduplication.
Tags : 
emc, data domain, efficiency, vmware, server consolidation, servers, data integrity, backup
    
EMC Backup & Recovery Solutions
Published By: rPath     Published Date: Dec 10, 2010
This paper describes how rPath's centralized hub becomes the control infrastructure for managing IT system construction and change. This hub becomes the basis for managing and reusing standardized system components.
Tags : 
rpath, application delivery automation, integration, lifecycle management, enterprise appliances
    
rPath
Published By: HP and Intel® Xeon® processors     Published Date: Feb 12, 2013
In this paper, we highlight the features necessary to move beyond server virtualization by leveraging key integration capabilities between IT components, with a particular focus on the role that storage plays in the evolution of the data center.
Tags : 
datacenter, data center, architecture, virtualization, network, infrastructure
    
HP and Intel® Xeon® processors
Published By: IBM     Published Date: Aug 06, 2014
Financial institutions need to consider a broad array of key business case components, beyond fraud loss reduction and fraud-management operating costs, when examining the business ramifications of various fraud-prevention technology approaches.
Tags : 
ibm, banking, business, fraud-prevention, fraud, technology
    
IBM
Published By: Oracle     Published Date: Apr 22, 2014
This eBook explores the core components of a cloud-based ERP solution that delivers enterprise-class software without sacrificing functionality or changes to business processes and with no additional cost for infrastructure and complicated integrations.
Tags : 
cloud, erp, oracle, applications, infrastructure
    
Oracle
Published By: SAP     Published Date: Mar 24, 2011
The list of initiatives that are data-enabled-indeed, data-intensive-vary from company to company, from industry to industry. But the common denominator is an increasing awareness that these and other programs can't succeed without clean, meaningful, and available information. In this white paper, Baseline Consulting's Jill Dyché discusses how the data conversation is changing from philosophical questioning to hard-core tactics, from "What do we need?" to "Where do we start?" It covers the most common reasons for data governance failure, as well as the components of data governance that will inform the right strategy and give companies a means of determining where and how to begin their data governance journeys.
Tags : 
data governance, data governance failure, data governance initiative
    
SAP
Published By: SAP     Published Date: Mar 28, 2011
Using SAP Knowledge Acceleration software, version for the SAP Customer Relationship Management (SAP CRM) Sales solution, sales professionals gain the comprehensive skills and in-depth knowledge to leverage the sales components of SAP CRM.
Tags : 
sap knowledge acceleration, sap crm, sales solution
    
SAP
Published By: SAP     Published Date: Apr 07, 2011
Find out how to recognize the signs your company needs a business intelligence solution and what you should look for in a vendor. Learn more about BI components and approaches to implementing a solution to improve your company's efficiency and effectiveness.
Tags : 
sap, business intelligence, software solution, enterprise application
    
SAP
Published By: Sitecore     Published Date: Nov 05, 2015
We focus on baseline capabilities such as content and experience management, delivery, and optimization as well as on mobile support, cloud deployment, and integration with components such as marketing and commerce.
Tags : 
sitecore nfusion, web content management, wcm, cloud deployment, experience management, mobile support
    
Sitecore
Published By: IBM     Published Date: Apr 09, 2015
The malware industry supplies all the components cybercriminals need to easily perpetrate malware-driven financial fraud and data theft. In today’s virtual world, the scope of organizations vulnerable to malware-driven cybercrime is quite broad. In addition to banks and credit unions that are subject to online banking fraud, financial fraud can be perpetrated on insurance companies, payment services, large e-commerce companies, airlines and many others.
Tags : 
ibm, computer security, network security, malware protection, network security, security organization
    
IBM
Published By: IBM     Published Date: Jul 15, 2016
"The malware industry supplies all the components cybercriminals need to easily perpetrate malware-driven financial fraud and data theft. In today’s virtual world, the scope of organizations vulnerable to malware-driven cyber crime is quite broad. In addition to banks and credit unions that are subject to online banking fraud, financial fraud can be perpetrated on insurance companies, payment services, large e-commerce companies, airlines and many others. "
Tags : 
cybercrime, financial fraud, best practices, finance, banking fraud, e-commerce
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.