HIT Consultant Insightful coverage of healthcare innovation
 

effective it

Results 1576 - 1600 of 1801Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Aug 21, 2008
Reliability Centered Maintenance (RCM) is an advanced maintenance strategy for increasing asset availability by minimizing downtime caused by failures, reducing an asset’s total cost of ownership and increasing overall equipment effectiveness (OEE).This white paper describes the Reliability Centered Maintenance (RCM) process, breaking it down into seven steps including supporting information on how IBM Maximo® Asset Management supports each step of the process.
Tags : 
rcm, reliability centered maintenance, asset-intensive, maximo asset management, it management, infrastructure, network management, ibm mi, ibm, ibm grm
    
IBM
Published By: IBM     Published Date: Aug 21, 2008
One of the biggest hurdles that enterprises face is a lack of trust in IT’s ability to deliver business value. While a Service Oriented Architecture (SOA) can sort things out by making systems more flexible and agile, this is only part of the answer. What’s missing is an effective model for engaging consistently with business teams throughout the whole lifecycle of IT investments.
Tags : 
ibm, ibm mi, ibm grm, service management, service oriented architecture, soa
    
IBM
Published By: IBM     Published Date: Aug 21, 2008
IT is becoming increasingly important in virtually every aspect of business. For enterprises to compete effectively in the marketplace, IT service management must broaden its focus and take a more holistic attitude toward IT service provision. The goal is to resolve the disconnect between IT and business within organizations in order to achieve necessary levels of resilience, control, availability and quality of service.
Tags : 
ibm, ibm mi, ibm grm, service management, it management, itil, itsm
    
IBM
Published By: IBM     Published Date: Sep 18, 2008
It’s a changing climate for network security and demands for improved documentation of regulatory compliance continue to increase. The time has come for a comprehensive, cost-effective, scalable security event and log management solution. Read this white paper for more information about the IBM solution that answers this challenge.
Tags : 
ibm, ibm, mmdg, security management, security data management, data management
    
IBM
Published By: IBM     Published Date: Dec 03, 2008
A cost-effective way to take advantage of storage consolidation, the IBM System Storage DS3400 Express, features Fibre Channel direct-attach or SAN solution for easy transition. It’s also simple to deploy and manage, and it’s expandable as you grow.
Tags : 
ibm, ds3400 express data sheet, system storage, fibre channel, san solution, data consolidation
    
IBM
Published By: IBM     Published Date: Jan 13, 2009
In business, no two challenges are the same. To be effective now and in the future, organizations must be able to adapt with speed and agility. Read this white paper to learn how enterprise mashups can help you use existing IT assets and projects to solve situational problems and take advantage of business opportunities.
Tags : 
ibm, enterprise mashups, it assets, situational applications, information mashing, governance, supply chain management
    
IBM
Published By: IBM     Published Date: Jan 13, 2009
Many dashboards have limitations that can make it difficult for businesses to provide value beyond the executive level. But with IBM portals, you can create a foundation to build more effective active dashboards. This executive brief shows how next-generation dashboards can provide a competitive advantage by helping improve flexibility and decision-making.
Tags : 
ibm, portal technologies, dashboards, ibm portals, dashboard trends, composite applications
    
IBM
Published By: IBM     Published Date: Aug 10, 2009
Practically every CIO office is focused on quickly exploiting opportunities to drive value for the business. Decisions about seamlessly integrated and personalized portal infrastructures with high operational efficiencies are top of mind. Through agile and unique online experiences, portals bring together applications, information sources and people – in the contexts of role and associated business processes – on the Web and across the value chain. Additionally, they increase talent effectiveness and productivity while lowering costs, and they drive value chain agility and customer advocacy.
Tags : 
ibm, portal, mashup, value chain, business partners, middleware, web-based applications, application integration, websphere portal express, soa, linux, wsrp, rest, tco, ajax, system p5
    
IBM
Published By: ISYS     Published Date: Aug 21, 2009
The benefits to an effective search function on your website can be substantial. This white paper leads you through the process of designing and selecting your website search engine, in four easy steps.
Tags : 
search engine, search, desktop search, enterprise software, davies, isys, isys search, web site search, search engines, site search
    
ISYS
Published By: OutlookSoft     Published Date: Aug 21, 2009
An effective corporate performance management (CPM) solution leverages a unified application for all key business processes, a centralized database ensuring the highest level of data accuracy and consistency, and provides critical decision-making information in real-time. Read this insightful white paper to learn more.
Tags : 
performance management, business management, business process management, bpm, data quality, business decision, business metrics, outlook soft, outlooksoft
    
OutlookSoft
Published By: Preventsys     Published Date: Aug 21, 2009
This paper is a synopsis of the presentations given at the Preventsys "CISO Breakfast Series," a succession of seminars given across North America in January and February 2005. The speakers for each breakfast consisted of security professionals and executives who provided their views on how to more effectively align information security with business initiatives.
Tags : 
network security, intrusion prevention, security management, business management, information management, data security, preventsys
    
Preventsys
Published By: Preventsys     Published Date: Aug 21, 2009
Security professionals are constantly being asked to justify every security project. Security risks can often be difficult to measure and even more difficult to understand by people outside the department. The key to demonstrating improvement is to translate security information into business terms.
Tags : 
security, metrics, business metrics, security management, information management, aligning, alignment, business integration, preventsys
    
Preventsys
Published By: PTC     Published Date: Nov 27, 2007
Defining an effective Internet and domain name strategy is vital to any business — especially small- or medium-sized businesses which have limited development and promotional budgets. From defining this strategy, to understanding the keys to Web promotion, here is vital information that every entrepreneur should know.
Tags : 
web development, web site, web marketing, buy domains, buydomains, web site design, site promotion, seo, domain name, hosting, web site design, website design
    
PTC
Published By: Secure Computing     Published Date: Feb 22, 2007
This paper outlines these new threats and discusses the limited effectiveness of reactive legacy Web security solutions against those threats.  The paper then outlines the new reputation based, proactive security paradigm that is necessary for securing Web 2.0 applications.
Tags : 
web 2.0, web 20, web security, application security, web app security, internet security, network security, hacker detection, intrusion prevention, secure computing, securecomputing
    
Secure Computing
Published By: Sybase     Published Date: Aug 21, 2009
This paper provides guidance on how companies should rethink their existing management and security strategy to effectively secure mobile solutions in the workforce, over a wide array of devices, connections and applications. It details why mobile security must be included as a mission critical component of any enterprise strategy and implemented on a pro-active basis before any major security breach has the opportunity to negatively affect the enterprise.
Tags : 
security management, mobile device, mobile security, wireless security, secure laptop, secure pda, secure blackberry, network security, compliance, sybase
    
Sybase
Published By: Third Brigade     Published Date: Nov 27, 2006
This white paper identifies critical vulnerabilities that most organizations overlook when they secure their web applications. It also introduces host intrusion defense with deep packet inspection as a new, effective  approach for shielding these vulnerabilities.
Tags : 
web application security, application security, web security, web service security, security management, internet security, ips, intrusion prevention, intrusion detection, hacker detection, third brigade
    
Third Brigade
Published By: Tridion     Published Date: Aug 21, 2009
This White Paper explains why the Tridion Web Content Management solution with its unique Tridion Blueprint Management functions is the most effective and cost efficient solution on the market for controlling your global website operation.
Tags : 
web content, content management, web site management, cost control, web management, webmaster, content management system, cms, tridion
    
Tridion
Published By: Villanova     Published Date: Aug 21, 2009
Based on the Japanese words Seiri, Seiton, Seiso, Seiketsu and Shitsuke, the 5S philosophy focuses on effective workplace organization and standardized work procedures. 5S simplifies your work environment, reduces waste and non-value activity while improving quality efficiency and safety. Once fully implemented, the 5S process can increase morale, create positive impressions on customers, and increase efficiency and organization.
Tags : 
lean methods, productivity, efficiency, workforce management, customer service, six sigma, 6 sigma, project management, business management, business process management, bpm, people management, villanova
    
Villanova
Published By: EMC     Published Date: Nov 06, 2006
By utilizing the speed and reliability of the EMC CLARiiON® AX150 networked storage system and the convenience of EMC Retrospect® 7.5 for Windows backup and recovery software, SMBs can implement fast, effective, reliable data protection that is easy to set up and manage without placing undue strain on IT resources.
Tags : 
data protection, raid, disaster plan, disk-based, tape-based, data backups, disk backup, tape backup, emc, emc clariion, emc insignia, emc retrospect, backup and recovery, data backup, data recovery
    
EMC
Published By: Symantec     Published Date: Nov 02, 2006
Remote control software has proven to be a cost-effective way of providing remote support. This paper examines how these products provide a cost-effective help desk tool and defines necessary security requirements.
Tags : 
remote control, help desk, remote access, remote network management, remote support, network security, symantec
    
Symantec
Published By: Symantec     Published Date: Jun 12, 2008
An effective email management solution is essential for organizations in today's litigious environment. Learn more from Gartner research about the market and top vendors providing active archive solutions today. Download this research study to learn more.
Tags : 
symantec, email management, email archiving, archive, archiving
    
Symantec
Published By: Quocirca     Published Date: Mar 06, 2007
Arguably IP is the most successful open standard ever, but as network communications converge under a single standard used for an increasing number of applications, we need to understand how effectively these critical assets are being managed. Read more in this white paper now.
Tags : 
networking, ip networks, ip telephony, voip, convergence, voice over ip, network management, telecommunications, ip convergence, communications convergence, quocirca
    
Quocirca
Published By: Quocirca     Published Date: Jul 03, 2008
Small and medium sized organizations have similar issues to large companies when it comes to the processing and storage of information and data, yet often have little capability to attract, retain and maintain the skills for managing their data assets compared to large organizations.  Blade systems offer an effective way to address the specific challenges faced by smaller organizations in managing their IT assets, and allows then to gain greater value from them.
Tags : 
storage, blade, blade systems, small business, smb, smbs, mid-sized business, quocirca
    
Quocirca
Published By: Quocirca     Published Date: Jul 03, 2008
Businesses of all sizes adopt technology to make them more productive, cost effective or flexible and help them compete. Over the years the adoption of tools such as mobile phones, wireless laptops, the internet and email have all been driven by such expectations. Small and mid-sized businesses (SMBs) are often at the forefront as these technologies can give them a lead on their larger competitors. What starts as a useful extra tool or 'competitive edge' soon becomes the accepted norm and a search for improved quality and utility then ensues.
Tags : 
convergence, mobile, wireless, communications, unified communications, quocirca
    
Quocirca
Published By: Quocirca     Published Date: Apr 08, 2009
Monitoring, measuring and reporting on the financial health of an organisation is a basic need that requires effective tools and processes to optimise the end result. Underpinning this is the requirement for planning capabilities, utilising scenario and what if analysis with simulations and other forward looking capabilities. The new primary research presented in this report shows that most organisations still have much to do.
Tags : 
quocirca, oracle, monitoring, measuring, reporting, financial health, compliance, epm, soft-touch, governance, business intelligence, epm index, financial services authority, merger and acquisition, m&a, key performance indicators, kpis
    
Quocirca
Start   Previous    57 58 59 60 61 62 63 64 65 66 67 68 69 70 71    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.