HIT Consultant Insightful coverage of healthcare innovation
 

effective it

Results 1751 - 1775 of 1873Sort Results By: Published Date | Title | Company Name
Published By: HP and Intel® Xeon® processors     Published Date: May 08, 2012
This case study discusses Lifetime Products' strategy to connect globally distributed manufacturing, sales and product development into a cohesive, effective unit while controlling costs. Read on to find out more!
Tags : 
smb, networking, hp networking, lifetime products, strategy, global, manufacturing, product development
    
HP and Intel® Xeon® processors
Published By: SAP     Published Date: Jul 17, 2012
In spite of the growth of virtual business activities performed via the World Wide Web, every business transaction or operation is performed at a physical place. And as handheld GPS devices drive a growing awareness of the concept of "location," people are increasingly looking for operational efficiencies, revenue growth, or more effective management as a result of geographic data services and location-based intelligence. In this white paper, David Loshin, president of Knowledge Integrity, Inc., introduces geographic data services (such as geocoding and proximity matching) and discusses how they are employed in both operational and analytical business applications. The paper also reviews analytical techniques applied across many types of organizations and examines a number of industry-specific usage scenarios.
Tags : 
business, sap, white paper, technology, location, intelligence, business value, data services
    
SAP
Published By: uberVU via HootSuite     Published Date: Oct 10, 2012
Find out how to use our Facebook Timeline best practices to help your organization build an effective social media strategy, strengthen relationships with your brand's community and see your ROI on your Facebook campaign.
Tags : 
social media management, social media strategy, social media strategies, social strategy, social business, social enterprise, enterprise social networks, facebook strategies
    
uberVU via HootSuite
Published By: Blue Jeans Network     Published Date: Oct 17, 2013
Learn how to conduct effective and engaging meetings with easy, interoperable video conferencing that is enabled with the Cloud and is always accessible for all employees no matter the location.
Tags : 
video collaboration, pervasive video, video conferencing, mobility, cloud based video conferencing
    
Blue Jeans Network
Published By: Blue Jeans Network     Published Date: Oct 17, 2013
Learn how to conduct effective and engaging meetings with easy, interoperable video conferencing that is enabled with the Cloud and is always accessible for all employees no matter the location.
Tags : 
video collaboration, pervasive video, video conferencing, mobility, cloud based video conferencing
    
Blue Jeans Network
Published By: ServiceNow     Published Date: Apr 19, 2013
A robust configuration management database (CMDB) is the heart of a successful service knowledge management system. It is the faithful source of configuration details and relationships people rely on to manage services throughout their lifecycle. Like personal relationships, building and maintaining an effective CMDB is a commitment that requires care and attention to get the best value.
Tags : 
configuration management, database, database management
    
ServiceNow
Published By: ServiceNow     Published Date: Apr 19, 2013
Providing a good online shopping experience starts with understanding customer needs and expectations in order to deliver suitable goods and services. Employees expect a similar experience with a Service Catalog. An effective business service catalog captures employee needs and communicates negotiated service offerings and service level agreements. However, hitting service level targets requires more than just listing services. It’s essential to provide an automated self-service portal and open communication.
Tags : 
employee needs, service offerings, service level agreements, automation, self-service, communication
    
ServiceNow
Published By: CDW     Published Date: Sep 17, 2014
You are being buried by data. Multimedia including videos, audio and photos. Unstructured data in presentations, documents and social media feeds. Even the voicemails and databases that used to be the primary residents of your storage system are growing beyond your ability to manage them effectively. How can you keep it all under control without buying an endless stream of disk and storage devices? Experts from EMC and other leading storage manufacturers discuss the very latest trends in storage solutions and how an effective application of storage strategy can help tame the information beast and keep performance and availability issues at bay. Attendees will learn: - What are the hidden drivers in storage growth - How businesses of all sizes can benefit from a tiered storage strategy - Why virtualization is penetrating every level of IT - What role SSD and flash will play in every storage environment - What to do now to improve storage utilization and save costs
Tags : 
storage, tiering, performance, availability, media, feeds, system, netgear
    
CDW
Published By: CDW     Published Date: Feb 27, 2015
The real test of any SAM system goes beyond creating a one-time Effective Licensing Position (ELP) for a given software publisher. To be truly valuable, the SAM solution has to have the ability to manage change. Being able to work from a dependable list of software that has been approved by, and which also serves the business, means that finite IT & SAM resources are not wasted through the support of legacy software that might be deemed redundant, and should keep a company on track technically by not becoming dependent on aging software. This 10 –Minute Guide from SAM experts at Snow Software will show how to establish and maintain a Software Catalog for the purpose of ensuring that your software estate remains relevant and fit for its business purpose.
Tags : 
software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security
    
CDW
Published By: Semcasting     Published Date: Aug 29, 2013
This white paper will guide you through a series of third party studies that have been completed recently on the diminishing reach and effectiveness of audience targeting with cookies. The numbers are challenging and it appears it may be time for an alternative to the cookie.
Tags : 
digital targeting, ip targeting, online business marketing, online targeting, online ad targeting, internet marketing, digital target, online marketing strategies
    
Semcasting
Published By: Genesys     Published Date: Jun 11, 2013
Your new all-in-one contact center should include all of the tools needed to support efficient and effective customer service. Great contact center solutions allow you to do more with less; less IT time to deploy and monitor; less agent time to answer and resolve customer requests; and less administrator frustration as they try to adjust resources to meet operational demand.
Tags : 
contact centers, customer service, solution, technical, technology, drive business, voice, strategy
    
Genesys
Published By: Arbor     Published Date: Sep 20, 2013
Financial services companies have been the target of a serious, sustained, and well-funded DDoS campaign for more than a year. What these attacks have continued to demonstrate is that DDoS will continue to be a popular and increasingly complex attack vector. DDoS is no longer simply a network issue, but is increasingly a feature or additional aspect of other advanced targeted attacks. The motivation of modern attackers can be singular, but the threat landscape continues to become more complex and mixes various threats to increase the likelihood of success. There have certainly been cases where the MSSP was successful at mitigating against an attack but the target Website still went down due to corruption of the underlying application and data. In order to defend networks today, enterprises need to deploy DDoS security in multiple layers, from the perimeter of their network to the provider cloud, and ensure that on-premise equipment can work in harmony with provider networks for effective and robust attack mitigation
Tags : 
distributed denial of service, ddos attack, financial services, financial services company, ddos defense, ddos protection, security, finance
    
Arbor
Published By: Sponsored by HP and Intel® Xeon® processors     Published Date: Feb 19, 2013
Learn how healthcare providers are reducing their need for storage capacity through thin provisioning and reducing administration time by up to 90% by using autonomic management to simplify, automate and expedite storage management and maintenance.
Tags : 
strategy cost effective, storage for healthcare, hp intel, it systems, storage maintenance
    
Sponsored by HP and Intel® Xeon® processors
Published By: Sponsored by HP and Intel® Xeon® processors     Published Date: Feb 19, 2013
Learn how government and educational institutions are reducing their need for upfront storage capacity and making more efficient use of resources by eliminating stranded storage capacity using autonomic management and more.
Tags : 
strategy guide, public institutions, hp intel
    
Sponsored by HP and Intel® Xeon® processors
Published By: NETIQ     Published Date: Sep 09, 2013
This Forrester Technology Adoption Profile (TAP) shows how growth in mission-critical applications is driving disaster recovery initiatives, enhanced disaster recovery capabilities shorten recovery objectives and the future of disaster recovery rests with advanced continuity tools. To learn more, download your copy of this informative Forrester TAP today.
Tags : 
netiq, disaster recovery, replication, recovery, forrester, technology adoption profile, mission critical, white paper
    
NETIQ
Published By: SafeNet     Published Date: Jun 04, 2013
This paper uncovers the key strategies that banks can employ in order to effectively and efficiently combat today's threats, and ensure identity and transaction security in eBanking.
Tags : 
ebanking, identity protection, transaction protection, authentication
    
SafeNet
Published By: Viavi Solutions     Published Date: Apr 07, 2017
Growing in number and becoming increasingly more malicious, security threats and attacks pose a severe threat to the survival of a business. Security operations teams need to leverage every available tool to respond more quickly and effectively to these incidents. While network packet capture and forensic analysis has traditionally been used by network operations, such a tool can also help security teams augment existing defenses and get on top of these threats. Given the hostile IT security environment, close collaboration between these groups is crucial to overall IT organizational success. This white paper explains the importance of packet capture and forensic analysis to security operations, examines the dynamics of this growing collaboration between security and network teams, and explores a leading platform in this market from Viavi Solutions.
Tags : 
    
Viavi Solutions
Published By: IBM     Published Date: Sep 10, 2013
This guide discusses the benefits of each capability and provides checklists to help you evaluate whether or not a particular vendor's solution addresses each of these areas effectively. You will also find a list of attributes and capabilities yous should look for in selecting a provider that can support the full breadth of your endpoint management requirements.
Tags : 
endpoint management, endpoint, security, ibm, it management, capabilities, vendor solutions, endpoint solutions
    
IBM
Published By: IBM     Published Date: Sep 30, 2013
IBM conducted more than 1,700 in-depth, face-to-face interviews with CEOs, general managers and senior public sector leaders from around the globe. Our newest CEO Study, the largest of its type ever undertaken, is the latest in the IBM C-suite Study Series. It explores how CEOs are responding to the complexity of increasingly interconnected organizations, markets, societies and governments – what we call the connected economy. Three themes emerged. Today's CEOs must: - Empower employees through values - Engage customers as individuals - Amplify innovation with partnerships Register now to access the insights that can help you lead more effectively through impactful connections with your employees, customers and partners.
Tags : 
global chief executive officer, leadership, technology, connectedness, customer insights, connections, ceos, business strategy
    
IBM
Published By: Oracle     Published Date: Nov 01, 2013
The next generation of talent management practices and solutions will largely be driven by economic evolution, demographic changes, and technology advancements. These factors are dramatically influencing the way people work, the way companies are organized, and the way talent is managed. Current business and talent management processes and technology must evolve to effectively deliver business value over the next few years. This paper explores how current business and talent management processes and technology must evolve in order to effectively deliver business value in the next 5 to 10 years. The research presented in this paper is supported by interviews with thought leaders in talent management, including practitioners, academics, and technologists from around the globe.
Tags : 
zenithoptimedia, oracle, future of talent management, economic factors, the knowledge economy, globalization, structural unemployment, generational geographies
    
Oracle
Published By: Oracle     Published Date: Nov 01, 2013
The ability to manage talent effectively can dictate the success of the entire organization. Organizations must invest in solutions that help attract, retain and develop talent while aligning to the overall goals and success of the business. This infographic provides insight why the future of human capital management depends on cloud-based talent management technology.
Tags : 
zenithoptimedia, oracle, future of hcm, cloud-based talent, talent management, oracle talent cloud, cloud integration, oracle integration architecture
    
Oracle
Published By: Symantec     Published Date: Oct 07, 2014
With the rapid rise in data breaches, advanced threats and mobility, data loss prevention (DLP) has quickly evolved from a security issue to a business imperative. This research paper examines the findings from a new study on DLP by Symantec. The goal of the study is to understand how DLP programs impact the effectiveness of security executives, while also protecting corporate data.
Tags : 
data loss prevention, data breaches, threats and mobility, security executives, corporate data
    
Symantec
Published By: IBM     Published Date: Feb 05, 2014
An effective cyber security strategy calls for the latest intelligence on the kinds of attacks that are occurring, who is committing them, and how often they are happening. A new IBM report offers expert insight into a range of security statistics, based on monitoring tens of billions of security events that occurred at 3,700 organizations around the world.
Tags : 
    
IBM
Published By: IBM     Published Date: Aug 06, 2014
The holistic, integrated fraud-prevention platform from Trusteer, an IBM company, effectively protects financial institutions against the full range of attack vectors responsible for the majority of online and cross-channel fraud, including account takeover.
Tags : 
    
IBM
Published By: Cisco     Published Date: Feb 23, 2016
Industrial enterprises around the world are retooling their factories with advanced technologies to boost manufacturing flexibility and speed, achieving new levels of overall equipment effectiveness (OEE), supply chain responsiveness, and customer satisfaction in the process. This renaissance reflects very real pressures industry players face today. For years, traditional factories have been operating at a disadvantage, impeded by production environments that are “disconnected”—at the very least strictly gated—to corporate business systems, to supply chains, and to customers and partners.
Tags : 
technology, manufacturing, management infrastructure
    
Cisco
Start   Previous    61 62 63 64 65 66 67 68 69 70 71 72 73 74 75    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.