HIT Consultant Insightful coverage of healthcare innovation
 

fix

Results 151 - 175 of 279Sort Results By: Published Date | Title | Company Name
Published By: 6th Sense Analytics     Published Date: Sep 18, 2007
Software development projects have a long and storied history of failure. In fact, 82% of projects today run late, while errors cost 80% of the average project budget to fix (The Standish Group). Certainly no other business process today is allowed to endure this sort of failure. But software development is often left to chance, despite the significant cost and importance of the process.
Tags : 
software development, development, programming, programmer, quality assurance, quality control, software testing, cost, costs, cost savings, spend management, spending, cost efficient, 6th sense
    
6th Sense Analytics
Published By: Stratus Technologies     Published Date: Nov 11, 2009
You probably know Stratus Technologies' fault-tolerant ftServer systems and services for delivering uptime of nearly 99.9999% for the world's most essential applications. What you might not know is how effectively - and how simply - our mission-critical Support Services let your enterprise protect this industry-leading availability. Our focus on preventing downtime and data loss brings you much more than basic break-fix support. If you're used to average server support, get ready to experience meaningful differences. One example: It's not uncommon for Stratus Support Services to identify problems before our customers do. Stellar satisfaction ratings of 96% or higher show the value our clients place in these services.
Tags : 
activeservice, stratus, fault tolerance, ftserver, application management, virtual technician
    
Stratus Technologies
Published By: IBM Software     Published Date: Aug 04, 2010
Implementing source code vulnerability testing in the software development life cycle. Finding and fixing security issues early is an application project can help reduce development costs while improving software quality. Source code security tools implemented and used across the software development life cycle are known to provide such results.
Tags : 
ibm ouncelab, software development life cycle, automated source code, security testing
    
IBM Software
Published By: ScriptLogic     Published Date: Mar 29, 2012
Quest ChangeBASE Professional enables organizations to easily address application compatibility challenges and quickly prepare applications for migration by automatically assessing and fixing potential compatibility issues.
Tags : 
    
ScriptLogic
Published By: ITinvolve     Published Date: Jun 06, 2012
As much as 80 percent of the time related to MTTR (mean time to repair) is spent on identifying the key components, relationships, and people involved to determine the cause of a problem and fix it.
Tags : 
mean time to repair, mttr, cloud computing, change management
    
ITinvolve
Published By: SAP     Published Date: Jul 17, 2012
SAP Supplier Management Software (SAP SRM) rapid-deployment solution delivers fast results to optimize operational procurement. Reduce costs with essential SAP software that is preconfigured to support your core procurement processes and implemented at a fixed price by SAP Consulting.
Tags : 
sap, srm, software, management, consulting, reduce costs, efficiency, reducing risk
    
SAP
Published By: CDW     Published Date: Feb 24, 2015
Software asset management (SAM) solutions promise to fix all that. They present a set of tools, practices and processes that take the uncertainty out of software licensing and enable organizations to fully optimize software inventories.
Tags : 
software license, software compliance, software asset management, sam, strategic license management, cloud-based services, virtualization
    
CDW
Published By: McAfee     Published Date: Apr 25, 2014
You spoke and we listened. Today’s advanced malware threats have you spending a lot of resources fighting an uphill battle. The answer is McAfee Advanced Threat Defense—so you can find, freeze, and fix threats.
Tags : 
advanced malware, maware threats, malware problems, malware attacks - rootkits, phishing, zero-access, trojans, apts, botnets, social engineering, sandboxing, layered defenses, block and contain malware
    
McAfee
Published By: Sage     Published Date: Mar 26, 2014
Spreadsheets have become one of the most prevalent software applications used by businesses. They are used for everything from simple calculations to impromptu databases. While inherently useful, spreadsheets are frequently used for tasks in which they are ill-suited. In fact, too many companies overlook the importance of accurate fixed asset tracking and rely on spreadsheets to track value, depreciation, and tax calculations. Unwittingly, this results in the direct loss of money and time.
Tags : 
sage, fixed assets, spreadsheets, tax payments, sarbanes-oxley, depreciation, tracking, planning, reporting
    
Sage
Published By: Sage     Published Date: Mar 26, 2014
Here’s a riddle: What have you used for a very long time, occasionally pulled your hair out over, contains lots of cells with mathematical formulas, and is very stressful to update whenever a tax law or GAAP principle changes?
Tags : 
sage, fixed assets, spreadsheets, tax payments, sarbanes-oxley, depreciation, tracking, planning, reporting
    
Sage
Published By: Sage     Published Date: Mar 26, 2014
Do you often find yourself daydreaming about a perfect fixed assets management solution?
Tags : 
sage, fixed assets, spreadsheets, tax payments, sarbanes-oxley, depreciation, tracking, planning, reporting
    
Sage
Published By: Cornerstone OnDemand     Published Date: Jul 16, 2015
Did you know that without a talent management strategy, a company with 2,000 employees is losing almost $2 million every year in preventable turnover alone? The new eBook, Why Your Nonexistent Talent Management Strategy is Costing You Money – And How to Fix It, shares the alarming hidden costs of managing employees “the way you've always done it.” If your organisation is still relying on manual processes to save money, this eBook will show you what you may be leaving on the table and steps you can take today to turn that around. You'll learn how a better talent management strategy can help your company achieve: • a 15% increase in earnings • more than 2x the median revenue per employee • 41% lower turnover rate among high performers
Tags : 
management strategy, talent management, performance, turnover, benefit
    
Cornerstone OnDemand
Published By: Cornerstone OnDemand     Published Date: Oct 21, 2015
Did you know that without a talent management strategy, a company with 2,000 employees is losing almost $2 million every year in preventable turnover alone? The new eBook, Why Your Nonexistent Talent Management Strategy is Costing You Money – And How to Fix It, shares the alarming hidden costs of managing employees “the way you've always done it.” If your organisation is still relying on manual processes to save money, this eBook will show you what you may be leaving on the table and steps you can take today to turn that around. You'll learn how a better talent management strategy can help your company achieve: • a 15% increase in earnings • more than 2x the median revenue per employee • 41% lower turnover rate among high performers
Tags : 
reachmail, talent management, talent management strategy, employee management, effective employee management
    
Cornerstone OnDemand
Published By: Dell EMC     Published Date: Feb 08, 2016
This IDC Buyer Case Study summarizes how a $1.4 billion manufacturer of faucets and other fixtures has integrated flash storage technology into its datacenter environment to improve performance, handle rapid business growth, and improve internal productivity.
Tags : 
emc, xtremio, data center, flash storage, growth, productivity, performance
    
Dell EMC
Published By: Cyphort     Published Date: Jun 28, 2016
Thanks to its convenience, online shopping has become a major trend over the last few years and lets face it, it’s here to stay. With the rise of online shopping, marketing experts capitalized on this new avenue to advertise their products. Now your friends nudge you on Facebook to buy a product they love and Google suggests a friendly place across the street where you can get your car fixed. It’s become hard to browse even a few pages without running into an ad and because of this increases, malware experts also saw a new avenue of attack - Malvertising.
Tags : 
downloads, best practices, network management, solutions, technology, advertising
    
Cyphort
Published By: Cambium Networks     Published Date: Oct 03, 2016
Cambium Networks’ fixed wireless broadband solutions provide an attractive ROI for electric utilities when replacing leased-lines for: Redundant backbone IP network rings Smart meter and distribution automation aggregation transport Transport for substation and distribution SCADA data Remote office connectivity Mobile WiFi connectivity in substations and operation centers Download this white paper to learn more.
Tags : 
wireless broadband, roi, mobile wi-fi connectivity, smart meter
    
Cambium Networks
Published By: ThousandEyes     Published Date: Nov 17, 2016
ThousandEyes monitors BGP routes from both corporate and service provider networks so you can see inbound routes to your prefixes and outbound routes to key services and endpoints. Act quickly on issues including local misconfigurations, peering changes, and route hijackings. Watch this video short now!
Tags : 
    
ThousandEyes
Published By: ThousandEyes     Published Date: Mar 14, 2017
Internet Outage Detection provides insights from global traffic and routing data into outages that cause path termination in ISPs and unreachable BGP prefixes.
Tags : 
    
ThousandEyes
Published By: ThousandEyes     Published Date: Mar 14, 2017
ThousandEyes monitors BGP routes from both corporate and service provider networks so you can see inbound routes to your prefixes and outbound routes to key services and endpoints. Act quickly on issues including local misconfigurations, peering changes, and route hijackings.
Tags : 
    
ThousandEyes
Published By: Qualys     Published Date: Nov 05, 2013
Automated Vulnerability Management (VM) solutions help you discover devices running in your network, determine whether they are vulnerable to attack, find fixes to the underlying problems, and protect yourself while those fixes are being implemented. This checklist of best practices will save you time and help you understand what to look for when selecting a VM, whether you have a dozen systems or a million.
Tags : 
vulnerability management solution, best practices, architecture, scanning, automation, continuity, reporting, cyber security
    
Qualys
Published By: Qualys     Published Date: Nov 05, 2013
Automated Web Application Scanning (WAS) solutions help you discover web apps running in your network, determine whether they are vulnerable to attack, understand how to fix them, and protect your business. This checklist of best practices will save you time and help you understand what to look for when selecting a WAS solution, whether you have a handful of apps or thousands.
Tags : 
vulnerability management solution, best practices, architecture, scanning, automation, continuity, reporting, cyber security
    
Qualys
Published By: Cornerstone OnDemand     Published Date: May 15, 2015
Read this white paper to learn why having a talent management strategy is important and cost effective.
Tags : 
talent management strategy, employee engagement, training, career development, management
    
Cornerstone OnDemand
Published By: Qualys     Published Date: Nov 11, 2009
New network vulnerabilities appear constantly and the ability for IT security professionals to handle new flaws, fix misconfigurations and protect against threats requires constant attention. However, with shrinking budgets and growing responsibilities, time and resources are at constrained. Therefore, sifting through pages of raw vulnerability information yields few results and makes it impossible to accurately measure your security posture.
Tags : 
qualys, network secure, it security, vulnerability, it budget, risk management, vulnerability management, misconfigurations, guard
    
Qualys
Published By: Qualys     Published Date: Nov 11, 2009
New network vulnerabilities appear constantly and the ability for IT security professionals to handle new flaws, fix misconfigurations and protect against threats requires constant attention.
Tags : 
qualys, network secure, it security, vulnerability, it budget, risk management, vulnerabilities
    
Qualys
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.