HIT Consultant Insightful coverage of healthcare innovation
 

here

Results 4976 - 5000 of 5308Sort Results By: Published Date | Title | Company Name
Published By: Blackberry     Published Date: Oct 03, 2012
Finally, there's a way for IT to give both aspects the attention they deserve. Find out what BlackBerry Balance® can do for your organization.
Tags : 
it control, information technology, user experience, mobile solutions, mobile security
    
Blackberry
Published By: Blackberry     Published Date: Oct 03, 2012
Though you can't stop the loss or theft of devices, there are powerful ways to ensure enterprise and data security in every scenario. This FAQ explains how the BlackBerry PlayBook tablets can be an integral part of an enterprise security strategy.
Tags : 
enterprise security, enterprise security strategy, mobile security, data security, blackberry, workplace mobility
    
Blackberry
Published By: uberVU via HootSuite     Published Date: Apr 23, 2013
If you want to influence the online conversation about your company, you need dedicated brand advocates who can participate in social media on your behalf. Advocates are invested in your success, aligned with your objectives and willing to defend your company. But where can you find them? Don’t look far. Your best potential social advocates are actually your own employees.
Tags : 
social media management, social media strategy, social media strategies, social strategy, social business, social enterprise, enterprise social networks
    
uberVU via HootSuite
Published By: sweetiQ     Published Date: Oct 29, 2012
Smartphones and the social, local, mobile ecosystem are the future of retail. Where once there was the yellow pages, today's mobile consumer has much more access to information. Read on to learn how to presence on the social local and mobile web.
Tags : 
local listing management, google+ local, google places, location-based marketing, local search, local search optimization, business listings, solomo
    
sweetiQ
Published By: Symantec     Published Date: Jul 29, 2013
Virtualization has been a game-changing technology for IT, providing efficiencies and capabilities that just aren't possible when constrained within a physical world. When searching for a backup and recovery solution for virtual environments, there are a few “must have” features to consider. Learn about the top four in this data sheet!
Tags : 
deduplication, virtual machines, symantec, enterprise, technology, server, virtualization, data protection
    
Symantec
Published By: CDW     Published Date: Sep 17, 2014
We now live in a flash centric world where all active data must be on flash. This doesn’t mean, however, that all data must be on flash. The best approach is to understand your application mix and workload requirements. Some key apps, like databases, are latency intolerant and should be pinned to flash. Others apps can benefit from fully-automated storage tiering. EMC’s market leading VMAX and VNX systems are flexible choices that can deliver all-flash and hybrid services. CDW and EMC has you covered!
Tags : 
data, market, flash, systems, key apps, centric, application, tiering
    
CDW
Published By: CDW     Published Date: Aug 07, 2015
How you benefit from VMware vSphere with Operations Management
Tags : 
    
CDW
Published By: Bridgeline Digital     Published Date: Jan 25, 2013
Marketers everywhere should be considering how to revamp their digital marketing strategy to cope with the mobile takeover. Download our latest eBook and explor the advantages of taking your web presence into the mobile era.
Tags : 
web design, marketing strategy, mobile marketing, web strategy
    
Bridgeline Digital
Published By: Sage     Published Date: Aug 19, 2014
Social media is making a huge impact on the way we use the Internet, communicate with friends and family, network with business colleagues, gather information, and make decisions. In business, social media can provide unique opportunities to promote products and services, find and recruit talented employees, and deliver an interactive customer experience. But there are also risks, such as the potential to damage the company’s reputation and brand, lose intellectual property, or invite lawsuits by employees, job applicants, or customers. From an HR perspective, it can be hard to tell if social media is your friend or your foe. This white paper discusses how HR can use social media and how it can go wrong.
Tags : 
sage, social media, human resources, recruit, risk, intellectual property
    
Sage
Published By: Kaseya     Published Date: Mar 12, 2015
Providers who add BDR to their offerings can enjoy substantial profit margins and incremental monthly recurring revenue. BDR, therefore, is ideal for solution providers, especially as a first step to a managed services practice.
Tags : 
backup, data loss, risks, recovery services, humor error, program deletions, hardware failures, system crashes
    
Kaseya
Published By: McAfee     Published Date: Apr 10, 2013
This report details Forrester's findings about how well each vendor fulfills the 47-criteria evaluation and where each vendor stands in relation to each other to help security and risk professionals select the right partner for their email content security solution.
Tags : 
email content security, email encryption, forrester wave, on premises, saas, email security management, mcafee email gateway
    
McAfee
Published By: Jive     Published Date: Jun 28, 2013
Let's get real. Social business isn't just about connecting employees and customers to "collaborate better" wherever they are, from whatever device.
Tags : 
jive, jive software, social intranet, ebook, mckinsey global institute
    
Jive
Published By: Jive     Published Date: Apr 10, 2014
Aberdeen Group gathered data from more than 600 organizations to find out how social collaboration tools help meet business and talent goals.
Tags : 
reachmail, social collaboration, talent, employee development, business goals, talent goals
    
Jive
Published By: Arbor     Published Date: Sep 20, 2013
Financial services companies have been the target of a serious, sustained, and well-funded DDoS campaign for more than a year. What these attacks have continued to demonstrate is that DDoS will continue to be a popular and increasingly complex attack vector. DDoS is no longer simply a network issue, but is increasingly a feature or additional aspect of other advanced targeted attacks. The motivation of modern attackers can be singular, but the threat landscape continues to become more complex and mixes various threats to increase the likelihood of success. There have certainly been cases where the MSSP was successful at mitigating against an attack but the target Website still went down due to corruption of the underlying application and data. In order to defend networks today, enterprises need to deploy DDoS security in multiple layers, from the perimeter of their network to the provider cloud, and ensure that on-premise equipment can work in harmony with provider networks for effective and robust attack mitigation
Tags : 
distributed denial of service, ddos attack, financial services, financial services company, ddos defense, ddos protection, security, finance
    
Arbor
Published By: Sponsored by HP and Intel® Xeon® processors     Published Date: Feb 19, 2013
The data captured in this Technology Adoption Profile from Forrester shows that the time is now for firms to reduce capital and operating expense through improved tools and processes where excess exists.
Tags : 
future proofing, data center, storage, forrester research, hp intel, hp 3par
    
Sponsored by HP and Intel® Xeon® processors
Published By: Seamless     Published Date: Sep 05, 2013
Are you in charge of ordering food for the office? Do colleagues ask for last-minute catering and complain about eating the same thing all the time? Do you have to track budget codes and billing information? If you think there has to be a better way, you’re right. Join us for this 30-minute educational webinar and learn how online food ordering services can help eliminate all of these hassles while saving you time and money. From individual meals and group orders, to catered meetings and company parties, if you order food into the office, you don’t want to miss this webinar.
Tags : 
save money, save time, online food ordering, food, ordering food online, seamless
    
Seamless
Published By: Seamless     Published Date: Sep 13, 2013
Are you in charge of ordering food for the office? Do colleagues ask for last-minute catering and complain about eating the same thing all the time? Do you have to track budget codes and billing information? If you think there has to be a better way, you’re right. Join us for this 30-minute educational webinar and learn how online food ordering services can help eliminate all of these hassles while saving you time and money. From individual meals and group orders, to catered meetings and company parties, if you order food into the office, you don’t want to miss this webinar.
Tags : 
save money, save time, online food ordering, food, ordering food online, seamless
    
Seamless
Published By: Seamless     Published Date: Sep 13, 2013
Are you in charge of ordering food for the office? Do colleagues ask for last-minute catering and complain about eating the same thing all the time? Do you have to track budget codes and billing information? If you think there has to be a better way, you’re right. Join us for this 30-minute educational webinar and learn how online food ordering services can help eliminate all of these hassles while saving you time and money. From individual meals and group orders, to catered meetings and company parties, if you order food into the office, you don’t want to miss this webinar.
Tags : 
    
Seamless
Published By: Work4™     Published Date: Feb 27, 2013
The essence of great recruiting is to fish where the fish are. As times change, the "recruiting waters" get overfished. This is what makes the profession so highly flexible. Over the course of a decade, the success of one technique creates the demand for the next.
Tags : 
facebook recruiting, facebook recruitment, social recruiting, employer branding, social media recruitment, recruiting on facebook, how to post a job on facebook, how to recruit on facebook
    
Work4™
Published By: Verint     Published Date: Apr 18, 2013
The vision for Celent’s Model Bank research was to try to answer an apparently simple question: “What would it look like for a bank to do everything right with today’s technology?” Of course, the question is not nearly as simple as it appears. The terms “everything” and “right” will mean very different things to different banks depending on their size, the complexity of their operations and product sets, and their technological starting points. While there is no such thing as a “Model Bank”—every bank does some things well, and others not as well when it comes to technology—it is possible to conceive of a “Model Bank” through real world examples of effective usage of technology.
Tags : 
banking, big data, technology, financial, effective use, analytics
    
Verint
Published By: HireRight     Published Date: May 01, 2013
There are a number of reasons why shrewd staffing agencies run background checks on potential employees before inviting them in to their business and, in turn, into their customers’ businesses. Background screening may be required by law for certain placements and industries, or, the customer may require screening. In all instances, failure to properly screen employees can have serious business and financial consequences. This industry brief outlines the risks that can arise from bad hires and how careful background screening can help mitigate those risks.
Tags : 
staffing, hireright, human resources, hr department, clients, potential employees
    
HireRight
Published By: HireRight     Published Date: May 01, 2013
A person’s home is their castle, and no one would willingly welcome in a dangerous criminal. If you offer in-home services, your customers trust you to send someone that is not a threat to their family or personal property. If you fail to do so, there can be serious business , financial and even legal consequences. This industry brief outlines the risks that arise from bad hires and how careful background screening can help mitigate those risks.
Tags : 
field employees, screening, hireright, human resources, in home services screening
    
HireRight
Published By: Logicalis     Published Date: Sep 22, 2014
Video solutions eliminate geographic boundaries and allow you to sit across a conference table from fellow participants, regardless of where they are in the world. By using unified video collaboration solutions for a virtually unlimited number of applications, you can boost productivity and communication throughout your organization, even across the largest of enterprises—allowing you to become more agile and responsive to changing needs. Download this white paper to learn how.
Tags : 
logicalis, cisco, cisco systems, video communication, video solutions, enterprise video technologies, enterprise applications, employee collaboration
    
Logicalis
Published By: HP and Intel ®     Published Date: May 06, 2013
In today’s hyperconnected world—with its multiple mobile devices, ubiquitous Internet access and pervasive social media platforms—people expect immediate access to information and services. These expectations are increasingly felt in corporate IT departments, where business units demand instant applications and fast services. Virtualization and cloud computing can help corporate IT meet these demands by bringing more flexibility and agility to the environment. But the ultimate solution is to transform the way IT is delivered. Indeed, many enterprises have already started on the journey toward the IT as a service (ITaaS) model.
Tags : 
    
HP and Intel ®
Published By: Cisco     Published Date: May 14, 2013
Not long ago, if you asked an IT executive about transformation, there was a good chance you’d get a technology-centric response. You’d hear about consolidation and virtualization, power and cooling, security and availability. Today, the responses are different. This edition of Unleashing IT is all about transformation. Not technology change, but business change through the use of technology.
Tags : 
innovation, change management, cost reduction, cloud, virtualization
    
Cisco
Start   Previous    193 194 195 196 197 198 199 200 201 202 203 204 205 206 207    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.