HIT Consultant Insightful coverage of healthcare innovation
 

here

Results 5001 - 5025 of 5427Sort Results By: Published Date | Title | Company Name
Published By: RackSpace Hosting     Published Date: Apr 16, 2010
The business demands a solution which maximizes return while investing enough to mitigate perceived business risks, which requires technologies that align with the business's goals and objectives.
Tags : 
rackspace hosting, e-commerce strategy, risk mitigation
    
RackSpace Hosting
Published By: BlackBerry     Published Date: Apr 13, 2010
Equipping staff with the right tools can enhance productivity, motivation and staff retention. Highly secure mobile email and data applications help mobile workers stay in touch and up-to-date with a wide range of business issues. Extending that streamlined anytime, anywhere access to mobile voice applications is the next frontier in worker empowerment.
Tags : 
blackberry, fixed mobile convergence, fmc, pbxvoip, smartphones, it communication, microsoft exchange, mobile device management
    
BlackBerry
Published By: The Jellyvision Lab     Published Date: Apr 13, 2010
Do you feel overwhelmed when communicating benefits to employees? Any increase in headaches? Nausea? Sudden rise in blood pressure? Well, those symptoms often point to a general condition known as: Benefit Bewilderment. There are a number of possible causes for this condition. Let's see which apply to you and discuss possible treatments so you can work that HR mojo on your many other responsibilities.
Tags : 
jellyvision, benefit management, benefits, employee management, enrollment
    
The Jellyvision Lab
Published By: BlueHornet     Published Date: Apr 12, 2010
Over the next few years, more and more people are expected to check their email on their smartphones, rather than their PCs. In this free whitepaper, you'll learn how the most common mobile operating systems render your HTML emails, and more importantly, what you can do now to optimize your email creative to keep your messages looking great, no matter where they're opened.
Tags : 
bluehornet, email marketing, mobile rendering, smartphones, html email
    
BlueHornet
Published By: BlueHornet     Published Date: Apr 12, 2010
Every popular email client will display HTML content sent in email. However, not every email client has a "web standards" compliant HTML rendering engine. Therefore, the same email may render differently across different email clients. This whitepaper offers practical solutions to help designers, coders, and non-designers alike build a successful email that will render well across all email platforms.
Tags : 
bluehornet, html email rendering, email platforms, best practices, css, coding
    
BlueHornet
Published By: APC     Published Date: Apr 08, 2010
Many of the mysteries of equipment failure, downtime, software and data corruption, are the result of a problematic supply of power. There is also a common problem with describing power problems in a standard way. This white paper will describe the most common types of power disturbances, what can cause them, what they can do to your critical equipment, and how to safeguard your equipment, using the IEEE standards for describing power quality problems.
Tags : 
apc, power, cooling, it wiring, heat removal, green computing, ieee, equipment failure
    
APC
Published By: Genius Inc     Published Date: Apr 07, 2010
It's not only the responsibility of the marketing department to engage customers anymore, it's the entire organizations responsibility, and social media has made consumers even more accessible.
Tags : 
genius, sales, b2b marketing, sales results, lead generation, pipeline, lead scoring, nurturing
    
Genius Inc
Published By: MoreVisibility     Published Date: Apr 06, 2010
Planning a website redesign project of any size can be an overwhelming endeavor. How do you know where to begin and what should be included? MoreVisibility's Website Redesign Checklist will help you.
Tags : 
more visibility, website design, redesign, lead conversion, web development
    
MoreVisibility
Published By: IFS, Inc.     Published Date: Apr 01, 2010
In white papers, there is no shortage of advice about what best practices can lead to success. But equally important is a thorough understanding of what worst practices are to be avoided during an implementation.
Tags : 
ifs, enterprise applications, erp implementation, enterprise resources planning
    
IFS, Inc.
Published By: Microsoft Dynamics CRM     Published Date: Mar 30, 2010
This report reveals how Best-in-Class firms distinguish themselves from all others by routinely benchmarking and measuring their service performance; implementing effective measuring, monitoring and tracking systems; integrating service KPIs with company-wide CRM or ERP systems, wherever possible; and establishing a formal process for automatically collecting and disseminating data.
Tags : 
microsoft dynamic crm, service benchmarking, metrics, customer satisfaction, data management, mttr, kpi, metrics measuring program
    
Microsoft Dynamics CRM
Published By: Unica     Published Date: Mar 29, 2010
Marketers have been limited to bland options for sending communications to consumers on their mobile phones. With the introduction of Apple's iPhone and operating systems like Google's Android and Palm's Pre/Pixi, now offering similarly rich user experiences, you have the opportunity to reach your customers, anywhere, any time, on their mobile devices.
Tags : 
unica, email, emarketing, esp, email trends, social media, sms, spam
    
Unica
Published By: 4Retail     Published Date: Mar 24, 2010
This white paper aims to identify why there is a need for a new technology and how this solution can improve communication, enhance collaboration and reduce the lead time of the design to delivery cycle.
Tags : 
the third way, communication, document management, on-demand collaboration tool, project management, global sourcing, global sourcing management, on demand collaboration solution
    
4Retail
Published By: Webroot UK     Published Date: Mar 22, 2010
Move protection to where the threats are managing web-borne threats is becoming a major headache for today's resource-strapped organizations.
Tags : 
webroot, web security, cloud-based computing, malware, threat protection, data security
    
Webroot UK
Published By: Webroot UK     Published Date: Mar 22, 2010
By using a service based in the cloud, protection against threats is brought nearer to where those threats are located, making it easier and more effective to protect users against security threats such as malware.
Tags : 
webroot, cloud-based service, web security, malware, security threat
    
Webroot UK
Published By: BlackBerry     Published Date: Mar 19, 2010
Today, many companies are investing in wireless and mobile solutions. Where mobility was once viewed as a risky venture, its value is now understood. These solutions are expected to increase productivity and improve efficiency due to improved field-based access to knowledge within the mobile workforce. In the current competitive climate where companies must compete globally, wireless solutions are no longer about gaining an edge, but about keeping up with the competition.
Tags : 
blackberry, mobile applications, cio, pim, voip, smartphones, it communication, microsoft exchange
    
BlackBerry
Published By: MoreVisibility     Published Date: Mar 17, 2010
By now you'd be hard pressed to find a business that doesn't have some presence within social media channels - but there's a marked difference between having a Facebook Page and actively engaging in effective Social Media Marketing (SMM).
Tags : 
more visibility, smm, social media marketing, facebook, social networking, tweeting
    
MoreVisibility
Published By: Jigsaw     Published Date: Mar 15, 2010
One of the great myths in marketing & sales is that generating lots of 'leads' or 'awareness' for a product automatically translates into lots of new business. But quantity does not equal quality. The truth is this: if you don't have a clear denition of who your ideal customer is, why they buy, the language and stories that are meaningful to them, and where they live, you won't find them. Use this worksheet to help.
Tags : 
jigsaw, gen, demand generation, awareness, leads, support, sales, targetingb2b
    
Jigsaw
Published By: Bold Software     Published Date: Mar 15, 2010
If you've downloaded this guide then you already know how a live chat implementation can simultaneously help your business cut support costs and boost online conversions. If you've started investigating solutions then you also know there are a confusing number of choices available. The ten questions listed below can help you to find the right product for your business.
Tags : 
bold software, chat, live chat, e-service, internet retailers, traffic, customer service, benchmarks
    
Bold Software
Published By: NetApp     Published Date: Mar 09, 2010
This reference architecture showcases virtualizing Microsoft applications on VMware® vSphere 4™ and NetApp® unified storage and includes best practices for effective backup and recovery in a virtualized environment.
Tags : 
netapp, microsoft, vmware vsphere 4, virtual infrastructure, unified storage, fibre channel, backup, recovery
    
NetApp
Published By: Context Optional     Published Date: Mar 09, 2010
If you're a brand marketer or digital agency looking to amplify your social marketing initiatives this year, this document will guide you through the growing world of Facebook apps. Today, there are more than 500,000 active applications on Facebook, but of these only 250 applications have more than one million monthly active users. You've downloaded this guide because you recognize that marketing today means creating a two-way dialogue with your customers.
Tags : 
context optional, social media, facebook, social networking, social applications, social marketing, email newsletters
    
Context Optional
Published By: ASG Software Solutions     Published Date: Feb 23, 2010
There are success stories of businesses that have implemented Business Service Management (BSM) with well-documented, bottom-line results. What do these organizations know that their discouraged counterparts don't?
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, archiving, sap
    
ASG Software Solutions
Published By: Epicor     Published Date: Feb 22, 2010
Download this white paper now and learn high level definitions, opportunity identification, and future potentials for: Service Oriented Architecture (SOA), Enterprise Resource Planning (ERP) Anytime, Anywhere Availability, Mobile Devices, Web 2.0, and Report Cards or Balanced Scorecards as a Business Intelligence (BI) capability.
Tags : 
epicor, distribution environment, service oriented architecture, soa, enterprise resource planning, erp, business intelligence, mobile devices
    
Epicor
Published By: Saepio     Published Date: Feb 18, 2010
Marketing process optimization technologies are emerging everywhere. Yet none fully address a corporate marketer's needs and none fit the definition of a complete, integrated enterprise marketing management system. But that doesn't mean you shouldn't start implementing EMM today.
Tags : 
saepio, emm, roi, marketing process optimization, var, distribution, crm, mrm
    
Saepio
Published By: Websense     Published Date: Feb 16, 2010
This paper from Osterman Research highlights the cost savings of hybrid Web security with data loss prevention, and demonstrates how your organization can save time, money, and resources thereby lowering the cost of securing your enterprise. Register to access a complimentary copy of this Osterman Research white paper on the benefits of hybrid Web security and learn more.
Tags : 
tco, websense, web security, osterman, hybrid, security solutions
    
Websense
Published By: ESET     Published Date: Feb 11, 2010
Why all the hype? Is cyberwarfare really something enterprise information security professionals should be concerned about? It's hard to know what the next cyber crisis will be, but here are a few best practices that enterprise security teams should consider to avoid becoming victims.
Tags : 
eset, cyberwarfare, threat, enterprise information security, botnet, cyberattack, malware
    
ESET
Start   Previous    194 195 196 197 198 199 200 201 202 203 204 205 206 207 208    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.