HIT Consultant Insightful coverage of healthcare innovation
 

daily

Results 151 - 175 of 226Sort Results By: Published Date | Title | Company Name
Published By: SAP     Published Date: Apr 14, 2011
It's a near-daily occurrence: Companies of all sizes in all geographies are going out of business, which has a ripple effect both upstream and downstream. Learn in this AMR Research article, what you can do to monitor and minimize supplier risks.
Tags : 
suppliers, due diligence, continental vdo, honeywell aerospace, mitigation planning, visibility, opportunity management, supply chain risk management
    
SAP
Published By: SAP     Published Date: Apr 14, 2011
To realize a competitive advantage, small-business leaders must address five common obstacles: inefficient operations, inability to support rapid growth or new markets, disjointed business processes, lack of visibility into daily operations, and limited resources. Overcoming each of these challenges gives you the power to generate valuable insights into your business, operate more efficiently, and gain the flexibility to maximize your competitive advantage.
Tags : 
sap solutions, small businesses, midsize companies, competitive advantage, visibility, inefficient operations, disjointed business processes, roi
    
SAP
Published By: ReadyTalk     Published Date: Sep 19, 2014
In today's marketplace, there are so many lead generation tactics available that it is imperative we employ the tools and practices that lead to the highest return in the shortest amount of time. Software integration is important. Combining as many task and activities into one tool is crucial. And saving time is the biggest priority so we can complete the other hundred tasks we have to do on a daily basis.
Tags : 
webinars, qualified, leads, generation, strategy, marketing, investment, time, practices, tools, marketplace, saving, task, integration, return
    
ReadyTalk
Published By: SAS     Published Date: Mar 06, 2018
The 2016 ACFE Report to the Nations on Occupational Fraud and Abuse analyzed 2,410 occupational fraud cases that caused a total loss of more than $6.3 billion.8 Victim organizations that lacked anti-fraud controls suffered double the amount of median losses. SAS’ unique, hybrid approach to insider threat deterrence – which combines traditional detection methods and investigative methodologies with behavioral analysis – enables complete, continuous monitoring. As a result, government agencies and companies can take pre-emptive action before damaging incidents occur. Equally important, SAS solutions are powerful yet simple to use, reducing the need to hire a cadre of high-end data modelers and analytics specialists. Automation of data integration and analytics processing makes it easy to deploy into daily operations.
Tags : 
    
SAS
Published By: IBM     Published Date: Jan 06, 2015
The essential bridge between an organization and its customers is the workforce. The ability to engage, develop, recognize and support employees will be critical in the decisive battle for customer loyalty. It is employees who represent the organization's brand in the market, who interact with customers on a daily basis, who analyze changes in customer preferences and who develop and maintain the technologies that help connect the physical and digital worlds. And, therefore, a motivated and properly prepared workforce will be indispensable for success in the customer-activated world.
Tags : 
customer loyalty, employee support, workforce challenges, hr solutions
    
IBM
Published By: Qualys     Published Date: Jan 07, 2009
Choosing a solution for Vulnerability Management (VM) is a critical step toward protecting your organization's network and data. Without proven, automated technology for precise detection and remediation, no network can withstand the daily onslaught of new vulnerabilities that threaten security.
Tags : 
qualys, vm solution, vulnerability management, saas, database security, network patching, vulnerability patching, networking, security, https, web application security, web application scanning, web application testing, web app, web application threats, web application risks, network scanning, network scan, network auditing, scanning
    
Qualys
Published By: GoToAssist     Published Date: Oct 05, 2011
The challenges of today's service and support environment just might be keeping you awake at night. The expectations are great and the daily demands relentless. But there's hope. By moving away from the current break/fix technical support model and providing a value-added customer experience, organizations can gain a significant business advantage. This TSIA white paper identifies the 6 toughest issues impacting service and support organizations today, and it offers guidance on improving service levels and how to differentiate competitively based on quality of service.
Tags : 
citrix, executives, business, customer experience, technical support, technology
    
GoToAssist
Published By: Port25 Solutions     Published Date: Mar 23, 2012
Find out how PowerMTA from Port25 Solutions, Inc., helps MailChimp deliver over 25 Million emails daily.
Tags : 
smtp server, mta, email server, mail server, email infrastructure, enterprise software, email delivery, email reporting, bounce categorization, message transfer agent
    
Port25 Solutions
Published By: Esker     Published Date: Dec 08, 2014
Traditional accounts payable (AP) departments face the challenges associated with processing paper invoices on a daily basis— challenges that can take away your company’s competitive advantage. Luckily, there’s a better way to handle AP processing: automation. See how AP automation solutions can help you: • Process vendor invoices up to 65% faster • Reduce purchase-to-pay costs by 40-60% • Achieve processing accuracy up to 99% • Maintain 100% process visibility • Automatically archive invoices electronically Learn more about the benefits your company can achieve with AP automation– Read the eBook now!
Tags : 
automation, operations, accounts payable, manual inefficiencies, ap workflow, cost, erp system, data recognition, applications, invoicing
    
Esker
Published By: Cisco     Published Date: Sep 07, 2016
This white paper highlights the maturation of big data technologies and strategies, and how companies are transitioning from one-off pilot projects to powerful enterprise capabilities that can be leveraged on a daily basis.
Tags : 
    
Cisco
Published By: Oracle Social Cloud     Published Date: Jan 14, 2015
Did you know that 97% of business executives want social integrated across their enterprise? According to a recent Oracle global study, respondents nearly unanimously sang the praises of becoming a social business. Social gives you a window into the consumer like never before, revealing affinities that allow your business to understand and personalize engagements that build stronger customer relationships. Consumers don’t see social as a “marketing channel”. They just view it as part of their communications; it’s embedded in their daily mobile and digital experiences. Businesses should be thinking the same way. As Altimeter sees it, social business is the deep integration of social media and social methodologies into the organization to drive business impact
Tags : 
command center, social listening, influencers, digital, social marketing, social intelligence, cmo, oracle, research, social business; marketing cloud
    
Oracle Social Cloud
Published By: Polycom     Published Date: Mar 13, 2015
Dynamic work environments are made-up of people on the move and virtual teams across different time zones. This makes it challenging to access an expert or to secure information. You need a communication solution that anchors fast-moving teams and enables communication from any device, anywhere; and critical to your success, and ease of use and HD quality voice and video to help drive user adoption. And communication tools that integrate with applications you use daily that are managed through a single interface to streamline deployment and speed your return on investment (ROI).
Tags : 
mobile, unified communication, concept, brand, enterprise, voice, products, services, innovative technology, manufacture, functionality
    
Polycom
Published By: K2     Published Date: Jan 07, 2016
Microsoft SharePoint users rely on forms daily; it’s where the nitty-gritty work gets done. SharePoint forms that only work for current business needs can stagnate overall business growth. It’s important to plan today for a form that can carry your business processes into tomorrow. You have three options when looking for a SharePoint forms solution: should you buy, code or configure your own forms? Forms that can be delivered quickly, in an adaptable, affordable and future-ready way, are ideal.
Tags : 
microsoft sharepoint, best practices, security, sharepoint solutions, business processes
    
K2
Published By: Polycom     Published Date: Sep 15, 2015
Although formal meetings are not likely to go extinct in the near future, less formal, unscripted, impromptu “teaming sessions” will, and for many have already become, daily business.
Tags : 
team building, collaboration, conferencing, huddle, phone, polycom, skype, video, voice over ip, voice
    
Polycom
Published By: Lola Travel Company     Published Date: Jan 24, 2019
If you've ever felt overwhelmed trying to sort through all the corporate travel per diem guidelines out there, you are not alone. That's why we created this ebook, "Lola.com's ultimate guide to corporate travel per diems." You'll learn things like: -How to separate meal per diems from hotel per diems and other incidentals. -How to set smart guidelines for your employees that save your company money and give travelers a productive trip. -How to make sure you are spending money on the important things when it comes to daily travel expenses.
Tags : 
    
Lola Travel Company
Published By: Tripwire     Published Date: Dec 16, 2009
This Prescriptive Guide outlines the steps information security managers can take to break the compliance blame cycle and build an information security program that works. It also describes how they can achieve alignment among all stakeholders so that information security and compliance activities become integrated into daily business operations.
Tags : 
tripwire, information security, audit fatigue, compliance, security risk
    
Tripwire
Published By: IBM     Published Date: Aug 28, 2014
From recruitment to onboarding and processing, HR teams spend hundreds of hours every year manually typing and processing documents. But what if you could eliminate tedious, manual processes to save valuable time - and get critical data across the organization faster? Employee Lifecycle Management solutions from IBM can help you integrate employees faster and simplify your daily task list, so you can get back to what's important - take the assessment to see how much time you could save.
Tags : 
online tool, employee lifecycle, employee onboarding
    
IBM
Published By: IBM     Published Date: Dec 02, 2014
In a recent Aberdeen Group Analyst Insight report,1 Asset Management: The Changing Landscape of Predictive Maintenance, a survey of executives states that the number one risk to operations was failure of their critical physical assets —ensuring that they are available, reliable and performing as originally intended. Though, such a risk can become an opportunity. Top-performing companies rely on analytics related to maintenance, safety and replacement equipment to plan for capital expenditures, manage their assets on a daily basis and maximize asset performance.
Tags : 
asset productivity, operational performance, predictive maintenance, operational costs
    
IBM
Published By: IBM     Published Date: Apr 09, 2015
The information explosion, the proliferation of endpoint devices, growing user volumes and new computing models like cloud, social business and big data have created new vulnerabilities. Data security is a moving target—as data grows, more sophisticated threats emerge; the number of regulations increase; and changing economic times make it difficult to secure and protect data. Because data is a critical component of daily business operations, it is essential to ensure privacy and protect data no matter where it resides. Different types of information have different protection requirements; therefore, organizations must take a holistic and systematic approach to safeguarding information.
Tags : 
ibm, cloud, social business, big data, data security, data protection, privacy
    
IBM
Published By: IBM     Published Date: Apr 06, 2016
The information explosion, the proliferation of endpoint devices, growing user volumes and new computing models like cloud, social business and big data have created new vulnerabilities. Data security is a moving target—as data grows, more sophisticated threats emerge; the number of regulations increase; and changing economic times make it difficult to secure and protect data. Because data is a critical component of daily business operations, it is essential to ensure privacy and protect data no matter where it resides. Different types of information have different protection requirements; therefore, organizations must take a holistic and systematic approach to safeguarding information.
Tags : 
ibm, data security, risk management, big data
    
IBM
Published By: IBM     Published Date: Jul 07, 2016
Listen to videos with WIRED Editor Jim Daily and technology experts from The Linux Foundation, Canonical/Ubuntu, SUSE, The Met Office and IBM as they discuss how the latest hybrid cloud infrastructure technology and the best of Linux and open source can yield business innovation and growth.
Tags : 
ibm, linux, ibm linuxone, open source, open solutions
    
IBM
Published By: IBM     Published Date: Oct 18, 2016
Listen to videos with WIRED Editor Jim Daily and technology experts from The Linux Foundation, Canonical/Ubuntu, SUSE, The Met Office and IBM as they discuss how the latest hybrid cloud infrastructure technology and the best of Linux and open source can yield business innovation and growth.
Tags : 
ibm, linux, ibm linuxone, open source, open solutions
    
IBM
Published By: Microsoft Dynamics     Published Date: Jul 11, 2007
This white paper addresses business and technical decision-makers for ambitious companies in which product distribution and transportation play key roles in daily operations and profitability. It describes how the comprehensive, integrated management solution represented by Supply Chain Execution for Microsoft Dynamics AX can help build an integrated logistics solution.
Tags : 
scm, supply chain, radio frequency, rfid, inventory, transportation management, asset management, warehouse, distribution, labeling, microsoft, microsoft dynamics, productivity, manufacturing, operations
    
Microsoft Dynamics
Published By: McAfee, Inc.     Published Date: May 21, 2009
In this white paper written by Yankee Group and sponsored by McAfee, learn why daily vulnerability scanning is the kind of tough , no-nonsense measure that your consumers may be looking for before they can open up their wallets.
Tags : 
yankee, mcafee, trust marks, security, vulnerability management, e-commerce, reputation, privacy, truste, bbb, reputation, ssl, verisign, scanning
    
McAfee, Inc.
Published By: Cornerstone OnDemand     Published Date: Feb 07, 2017
Are your employees truly connected to—and engaged with—your business? In a perfect world, every employee is committed to your organization’s goals, is ready to go above and beyond in daily activities, and actively collaborates with other team members. Yet when it comes to employee engagement, there’s a big gap between perfect world scenarios—and the reality.
Tags : 
    
Cornerstone OnDemand
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.