HIT Consultant Insightful coverage of healthcare innovation
 

goe

Results 101 - 125 of 212Sort Results By: Published Date | Title | Company Name
Published By: Return Path     Published Date: Jan 29, 2013
Internet Service Providers make filtering decisions about what email to block or mark as SPAM based on three main factors. Find out what they are in “Email Sender Reputation Report: Key Factors that Impact Email Effectiveness."
Tags : 
email filtering factors, sender reputation, email blocking
    
Return Path
Published By: Epicor     Published Date: Aug 03, 2012
As the saying goes, what you can't measure, you can't manage. You may understand the importance of Key Performance Indicators (KPIs), but how do you measure them?
Tags : 
gross margin, epicor, sales per employee, inventory turns, service level, days sales outstanding, average collection period, days payables outstanding, average payables period, cash conversion cycle, inventory control, warehouse fulfillment, purchasing, sales
    
Epicor
Published By: LogMeIn     Published Date: Oct 10, 2014
This Harvard Business Review delves into a companies scarcest resource, time, and how this goes largely unmanaged.
Tags : 
time management, resource management, time management software
    
LogMeIn
Published By: Adobe     Published Date: Jun 26, 2019
Take the guesswork out of TV media buying with Adobe Programmatic TV. With our automated approach, you can ensure less waste by better defining your audience and by speaking to them wherever they’ll best receive your content. Instead of spending hours trying to find the best reach and value, our data does the work for you. Fill out the form to read the article Advanced TV goes prime time.
Tags : 
    
Adobe
Published By: SAP     Published Date: Mar 17, 2016
- Supply Chains are already complex as they are – why on earth would we want to extend them? Because it’s an end-consumer driven economy. We expect to purchase products and services through multiple channels and of course we want to have these products delivered the same day. Of course the product is individualized based on my specific requirements, and yes, it goes without saying, that the products need to be compliant to regulations and standards.
Tags : 
sap, ted talk, supply chain, digital
    
SAP
Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: Clari     Published Date: Mar 24, 2017
Part art, part science, sales forecasting can be daunting for new and experienced sales leaders alike. Your sales forecast is required for successful company planning, and when it goes wrong, the dominoes begin to fall: your executives, investors, and even the public may question your credibility. Download now to find out!
Tags : 
sales forecasting, sales execution, clari, sales, sales operations, pipeline inspection, opportunity management, opportunity
    
Clari
Published By: Ephesoft     Published Date: Apr 04, 2018
If you have worked in an Accounts Payable department, you know that the premise of most AP functions is number-driven and data-driven. Invoices come in, they are processed and money goes out. While it may sound easy, the process requires special attention to details, numbers, data entry, approvals and other business processes. Organizations that use innovative, smart document capture solutions now have a simple way to streamline invoicing, improve accuracy and increase productivity.
Tags : 
    
Ephesoft
Published By: Infosys     Published Date: Jun 12, 2018
Customers today are far more concerned about the contents and origin of a product than ever before. in such a scenario, granting them easy access to product information, via digital initiatives such as SmartLabel™, goes a long way in strengthening customer trust in a brand. But it also means expending several man-hours of effort processing unstructured data, with the possibility of human error. Intelligent automation can help save effort and time, with virtually error-free results. A consumer products conglomerate wanted a smart solution to implement SmartLabel™ compliance. See how Infosys helped and the five key takeaways from the project.
Tags : 
automation, brand, information, digital, customer
    
Infosys
Published By: BloomReach     Published Date: Dec 22, 2014
It’s long past time to stop talking about the rise of the machines. They have risen. They are here. And they are insinuating themselves into our lives at a rapidly accelerating pace. Barely a day goes by without some new twist on a theme that was once framed as “man vs. machine,” shorthand for the tension between the reliance on intuition and instinct versus a blind acceptance of computer-created decisions.
Tags : 
    
BloomReach
Published By: Dell Software     Published Date: Jul 24, 2012
With Quest Workspacetm Asset Manager, you can easily find data on hardware and software inventory and compare it to records on what's been purchased as well as what's actually in use. Centrally track and manage the IT contracts and licenses then generate usage reports automatically that you easily correlate to actual purchase costs and legal responsibilities. For managing software licenses, Quest Workspacetm Asset Manager goes beyond simply scanning and identifying software. It traces software usage through metering and quickly identifies if it's being underutilized, sitting idle or if the appropriate number of licenses have been purchased. From one solution, you can implement IT asset management best practices that eliminate overspending and ensure license compliance.
Tags : 
software data recognition, software management, software metering, multiple platform coverage, windows, mac os, software inventory, vmware, citrix, technology integration, data integration, data management, data center
    
Dell Software
Published By: Marketo     Published Date: Jun 08, 2017
As a marketer, you know how critical it is to understand how your marketing efforts contribute to the bottom line. There’s a lot that goes on behind-the-scenes to generate sales pipeline and ultimately revenue. And by becoming a data-driven marketer that’s in tune with the right metrics, you can demonstrate marketing’s contribution to both. Metrics illustrate the impact that you and your team are driving in the organization, which is critical to ensure you have the budget and resources you need to deliver optimum business outcomes. Without metrics, it’s nearly impossible to measure the success of your activities and identify elements to optimize in future campaigns. And without them, there’s no way to determine your return on investment (ROI).
Tags : 
marketing, data driven, metrics, revenue model, tracking campaign, channel success, b2b, return on investment
    
Marketo
Published By: Mocana     Published Date: Jun 18, 2010
Mocana's NanoVOIP is a comprehensive security solution for application developers and device designers looking to build secure VOIP products. Its simple API means no previous crypto expertise is required, and its tiny memory footprint goes where other implementations simply can't. Download the NanoVOIP whitepaper and receive a free trial.
Tags : 
mocana, nano voip, security, application developer, device designer, encrypted voice, video, data solution
    
Mocana
Published By: NETIQ     Published Date: Jun 20, 2014
On the one hand, you have the increased productivity that goes along with BYOD. On the other hand, you have all the security risks and users’ concerns about giving IT visibility or control of a personal device. Learn how to solve this puzzle.
Tags : 
netiq, byod, mobile access, autonomy, privacy
    
NETIQ
Published By: Symantec     Published Date: Feb 04, 2015
Seventy percent of Americans are seriously concerned about identity theft. More than two thirds of online shoppers don’t complete their purchase because of price. In the world of e-commerce, you need a targeted marketing strategy to ensure you’re offering customers the reassurance and guarantees they need to browse and buy confidently. Symantec’s Norton Shopping Guarantee gives you just that. Online stores are seeing a dramatic return on investment when they use it. For merchants and customers alike, it’s satisfaction guaranteed.
Tags : 
e-commerce, identity theft, targeted marketing strategy, reassurance and guarantee, return on investment
    
Symantec
Published By: Symantec     Published Date: Jun 24, 2015
This white paper illustrates how there’s a better way to inspire consumer confidence and satisfaction, all while increasing conversions, order value, and repeat buyers on your site.
Tags : 
customer satisfaction, reassurance, customer confidence, online shopping, return on investment
    
Symantec
Published By: EVault     Published Date: Mar 21, 2014
Er zijn heel veel manieren om uw data te back-uppen – dan is het goed om te weten dat 12 Best Practices ze allemaal beslaan. Als u dit compacte whitepaper leest, kunt u in een paar minuten: •Bepalen of uw back-up en recovery systeem voldoet •Specifieke stappen bepalen om verbeteringen aan te brengen •Efficiëntie, betrouwbaarheid en kosten-effectiviteit verhogen Vul uw gegevens in en download
Tags : 
evault, cloud computing, cloud connected diaster, disaster recovery, natural disaster, better for business
    
EVault
Published By: Tyco Integrated Security     Published Date: Dec 08, 2014
The cloud is no longer just for deploying software – it’s now transforming the way companies physically secure their business. Learn how you can future-proof your business and secure your company with the flexibility of the cloud and the latest security know-how.
Tags : 
video security, cloud, business protection
    
Tyco Integrated Security
Published By: Code42     Published Date: Apr 22, 2016
Data loss, theft or breach is inevitable, but backup assures recovery, continuity and rapid response. Endpoint data backup is at the core of an enterprise data security strategy. Modern endpoint backup goes well beyond backup and restore, delivering risk reduction across the enterprise and addressing perennial IT and business problems. Discover more by reading this whitepaper.
Tags : 
endpoint backups, data visability, code 42, data loss, data recovery
    
Code42
Published By: Oracle     Published Date: Aug 22, 2016
This white paper goes into detail about the growth of the supply chain cloud.
Tags : 
    
Oracle
Published By: Trillium Software     Published Date: May 25, 2011
To achieve business goals and objectives, you must first optimize the information supporting all of your business processes. Implementing an Information Quality Management practice and applying best practices will help maximize the value of your information.
Tags : 
trillium software, information quality management, iqm, business process silos, tactical data, strategic information, productivity, mdm, michele goetz, information maturity
    
Trillium Software
Published By: Trillium Software     Published Date: May 25, 2011
To achieve business goals and objectives, you must first optimize the information supporting all of your business processes. Implementing an Information Quality Management practice and applying best practices will help maximize the value of your information.
Tags : 
trillium software, information quality management, iqm, business process silos, tactical data, strategic information, productivity, mdm, michele goetz, information maturity
    
Trillium Software
Published By: IBM     Published Date: Feb 25, 2008
In preparation for disasters, it’s critical to have a backup site that can be used if your primary location goes down. Does your business have the right procedures and equipment to recover after a disaster? Get answers. Download this article about a new enterprise data center and learn more about protecting your IT infrastructure.
Tags : 
disaster recovery, business continuity, preparedness, natural disaster, redundancy, hurricane, backup, recovery, data management, ibm, ibm opt it, opt it, hurricane fay
    
IBM
Published By: Stratus Technologies     Published Date: Dec 03, 2008
As server virtualization goes mainstream, the workloads of virtual machines are taking on mission-critical proportions.
Tags : 
server virtualization, stratus technologies, virtual machines, server reliability
    
Stratus Technologies
Published By: Hyland Software     Published Date: Dec 17, 2013
Unlike a basic document management system, ECM goes beyond storing and retrieving content to provide functionality that supports business initiatives. Multiple document types are captured, integrated, processed and measured to streamline workflows.
Tags : 
emc, enterprise content management, emc solution, automated processing, workflow, integration, emc strategy, onbase, hyland software
    
Hyland Software
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.