HIT Consultant Insightful coverage of healthcare innovation
 

here

Results 5026 - 5050 of 5433Sort Results By: Published Date | Title | Company Name
Published By: Context Optional     Published Date: Mar 09, 2010
If you're a brand marketer or digital agency looking to amplify your social marketing initiatives this year, this document will guide you through the growing world of Facebook apps. Today, there are more than 500,000 active applications on Facebook, but of these only 250 applications have more than one million monthly active users. You've downloaded this guide because you recognize that marketing today means creating a two-way dialogue with your customers.
Tags : 
context optional, social media, facebook, social networking, social applications, social marketing, email newsletters
    
Context Optional
Published By: ASG Software Solutions     Published Date: Feb 23, 2010
There are success stories of businesses that have implemented Business Service Management (BSM) with well-documented, bottom-line results. What do these organizations know that their discouraged counterparts don't?
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, archiving, sap, ilm, mobius, workload automation, wla, visibility, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce
    
ASG Software Solutions
Published By: Epicor     Published Date: Feb 22, 2010
Download this white paper now and learn high level definitions, opportunity identification, and future potentials for: Service Oriented Architecture (SOA), Enterprise Resource Planning (ERP) Anytime, Anywhere Availability, Mobile Devices, Web 2.0, and Report Cards or Balanced Scorecards as a Business Intelligence (BI) capability.
Tags : 
epicor, distribution environment, service oriented architecture, soa, enterprise resource planning, erp, business intelligence, mobile devices, web 2.0
    
Epicor
Published By: Saepio     Published Date: Feb 18, 2010
Marketing process optimization technologies are emerging everywhere. Yet none fully address a corporate marketer's needs and none fit the definition of a complete, integrated enterprise marketing management system. But that doesn't mean you shouldn't start implementing EMM today.
Tags : 
saepio, emm, roi, marketing process optimization, var, distribution, crm, mrm, distributed marketing, enterprise marketing management, campaign planning
    
Saepio
Published By: Websense     Published Date: Feb 16, 2010
This paper from Osterman Research highlights the cost savings of hybrid Web security with data loss prevention, and demonstrates how your organization can save time, money, and resources thereby lowering the cost of securing your enterprise. Register to access a complimentary copy of this Osterman Research white paper on the benefits of hybrid Web security and learn more.
Tags : 
tco, websense, web security, osterman, hybrid, security solutions
    
Websense
Published By: ESET     Published Date: Feb 11, 2010
Why all the hype? Is cyberwarfare really something enterprise information security professionals should be concerned about? It's hard to know what the next cyber crisis will be, but here are a few best practices that enterprise security teams should consider to avoid becoming victims.
Tags : 
eset, cyberwarfare, threat, enterprise information security, botnet, cyberattack, malware
    
ESET
Published By: Microsoft Windows Phone     Published Date: Feb 05, 2010
In this e-Guide, we recap Windows Mobile OS's evolution and look at the wide array of Windows Mobile-powered devices available to untethered today's workforces. We'll explore where and why Windows Mobile OS devices are used to support a wide range of mobile apps, from vertical business automation to knowledge worker access.
Tags : 
microsoft, windows mobile 6.5, mobile apps, smartphone, mobile worker, wince, business applications
    
Microsoft Windows Phone
Published By: Symantec.cloud     Published Date: Feb 03, 2010
Here are five common problems that occur when corporate employees use PST files and the advantages of email archiving.
Tags : 
messagelabs, symantec hosted services, pst file, personal storage table, email archiving, storage and backup, disaster recovery, compliance, legal discovery
    
Symantec.cloud
Published By: Hosting.com     Published Date: Feb 03, 2010
This briefing addresses the confusion about the security of cloud hosting implementations and then outline the practices and technologies available to keep clouds safe in the areas where they do have unique vulnerabilities.
Tags : 
hosting.com, cloud, computing, enterprise application, uptime
    
Hosting.com
Published By: ESET     Published Date: Jan 21, 2010
Unfortunately, people are frequently seduced by the word "free" and overestimate the supposed benefits such products offer. In order to illustrate this type of malicious methodology, the case of a rogue product is analyzed here.
Tags : 
eset, rogue anti-malware, security, antivirus, spyware
    
ESET
Published By: ESET     Published Date: Jan 21, 2010
The traffic lights are always at amber on the Internet, because there are always risks, so here are some tips for reducing your exposure to attacks from cybercriminals.
Tags : 
eset, security, cybercriminal, internet security, malware, back up and recovery, phishing
    
ESET
Published By: ESET     Published Date: Jan 21, 2010
Bots and botnets suck, so what better teaching aid to help people understand them than a vacuum cleaner? It can be extremely challenging to attempt to explain technical concepts to non-technical people. There are two goals for this presentation. Click on this white paper to read about it.
Tags : 
eset, internet security, bots, botnets, national cybersecurity alliance, roomba, remote access tool, denial of service attack, safe computing
    
ESET
Published By: Webtrends     Published Date: Jan 21, 2010
This is a must-see webinar if you want to understand the fundamentals of multivariate testing (MVT), segmentation, and content targeting. Join Bob Garcia, Director of Product Marketing Optimize and Frans Keylard, Director of Optimization as they use real-life examples to explain multivariate testing and teach you where and how to start optimizing.
Tags : 
webtrends, mobile strategy, app downloads, apps, performance indicators, mvt, segmentation, optimization
    
Webtrends
Published By: Sun Microsystems     Published Date: Jan 11, 2010
In this free webcast, learn how business intelligence is changing-and how to best keep pace with it. The amount of available data is exploding; yet much of it is kept in separate silos, where it can't be combined to form meaningful insights. This webcast introduces the latest business intelligence technology that can help you discover your insight "needle" in a haystack of data.
Tags : 
sun, webcast, business intelligence, open source, data, data management, sun microsystems, databasing
    
Sun Microsystems
Published By: IBM     Published Date: Jan 05, 2010
Find out where you stand on the path to PCI compliance with our checklist of the"digital dozen" requirements.
Tags : 
ibm mmdg, credit card security, pci compliance, secure network, cardholder data
    
IBM
Published By: SAP     Published Date: Jan 04, 2010
There is growing evidence that more pervasive BI and analytics have a direct impact on competitiveness. Better decision making is more important when resources become restricted during a recession, so BI and analytics projects will still appeal to management. However, justifying large capital outlays for software will be challenging unless short-term benefits can be directly correlated with the investment.
Tags : 
sap, data mart, business intelligence, analytics, business objects, supply chain, compliance, safety, stewardship, process industries, performance, risk, compliance, standardization, teradata, objectstm, business objects, ubm, edw
    
SAP
Published By: IGLOO Software     Published Date: Dec 29, 2009
Extending social capabilities across your company can improve both individual and team productivity. With online communities, information is made transparent and corporate knowledge is bubbled up to where it can be used - no longer buried in email inboxes, hard drives or isolated in silos.
Tags : 
online communities, social capabilities, silo, web 2.0, igloo, branding, lifecycle
    
IGLOO Software
Published By: BlackBerry     Published Date: Dec 22, 2009
Over a decade ago, mobile telephony entered the enterprise through the back door: employees who could afford mobile phones occasionally used them for business; specific business units budgeted for employee mobiles and then procured them locally; policies surrounding the usage of mobile phones for work were - where they existed at all - haphazard; there was little means of policy enforcement; and in no case were these mobile phones integrated into a business's fixed telephony strategy, let alone its IT strategy. This stands in sharp contrast to other office technologies, such as PCs, faxes, and copiers.
Tags : 
blackberry, mobile applications, cio, pim, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: IBM ILOG.     Published Date: Dec 11, 2009
Businesses today need a Business Rule Management Systems (BRMS) solution that supports business changes and cycles far more effectively than traditional methods and takes direct advantage of business expertise. This IBM RedpaperT publication is intended for anyone who is interested in learning more about IBM WebSphere ILOG Rules for COBOL.
Tags : 
ibm redpaper, websphere ilog rules, cobol, code, cics channels and containers, business rule management systems, brms
    
IBM ILOG.
Published By: IBM ILOG.     Published Date: Dec 11, 2009
Learn how the WebSphere ILOG JRules Business Rules Management System (JRules BRMS) can automate decision making for data validation, eligibility and pricing in a real-world scenario. This demo shows how JRules BRMS allows organizations to gain a competitive advantage by adapting business systems to evolve with changing business policies and decisions. Click to view this demo!
Tags : 
ibm ilog, brm, business rule management system, jrules, websphere, author, deploy rules, business rules management
    
IBM ILOG.
Published By: IBM ILOG.     Published Date: Dec 11, 2009
Learn how WebSphere ILOG Business Rules Management System (BRMS) allows organizations to easily adapt business rules while ensuring compliance with policy requirements and analyzing the business impact of changes against key performance indicators. You will see how the BRMS is used in the back office to create eligibility rules that will be used to automatically screen auto insurance applicants.
Tags : 
ibm ilog, brm, business rules management system, brms, websphere, test, simulate rules
    
IBM ILOG.
Published By: Acquirgy     Published Date: Dec 09, 2009
For 6 months we evaluated leading PPC technology platforms including Marin, Kenshoo, Aquisio, SearchForce, Omniture, Clicable and others. Using a SWOT analysis, we compared their capabilities for small clients, as well as clients spending more than $1 million a month. We also explored their value for both lead generation and ecommerce clients.
Tags : 
ppc, acquirigy, ecommerce, lead generation, swot analysis, kenshoo, marin, aquisio, searchforce, omniture, clicable
    
Acquirgy
Published By: vWire     Published Date: Dec 02, 2009
vWire makes that process simple, and this white paper will go through the steps of upgrading the environment from ESXi 3.5.0 Update 4 to ESXi 4.0.
Tags : 
upgrade vmware vsphere 4.0, vwire 1.1, vsphere esxi, virtual hardware 3, tripwire, vwire
    
vWire
Published By: IBM     Published Date: Nov 24, 2009
This paper is aimed at IT architects and managers who need to understand how IBM CICS Transaction Server can be used in a modern service oriented architecture (SOA) enterprise solution.
Tags : 
ibm, leveraging middleware, system z software, soa enterprise, websphere, db2, cics transaction server, ims, websphere mq, renault, workload management, websphere, transaction server, service oriented architecture
    
IBM
Published By: Marathon Technologies     Published Date: Nov 18, 2009
High availability solutions are no longer an all or nothing discussion about expensive, proprietary solutions. Today there are wide range of affordable alternatives that provide the required level of availability at a cost justified by the risks of downtime.
Tags : 
marathon, downtime, everrun, server, failure, outage, windows, sql, availability
    
Marathon Technologies
Start   Previous    195 196 197 198 199 200 201 202 203 204 205 206 207 208 209    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.