HIT Consultant Insightful coverage of healthcare innovation
 

here

Results 5226 - 5250 of 5420Sort Results By: Published Date | Title | Company Name
Published By: Godfrey     Published Date: Oct 02, 2008
Differentiation is a business decision made at the highest levels about the company’s positioning and values–how the company adds value to a customer relationship. There are many ways a company can make those decisions, and many different approaches to doing so. The most successful companies adopt a positioning that offers sustainable competitive advantage–a way of adding value that competitors cannot easily duplicate.
Tags : 
godfrey, b-to-b, business-to-business, branding, b-to-b branding, b-to-b differentiation, brand differentiation, branding differentiation
    
Godfrey
Published By: Godfrey     Published Date: Oct 02, 2008
It’s not unusual for business-to-business companies to cut communications budgets when faced with uncertain times like economic downturns, mergers/acquisitions, reorganization, significant competitive threats, technology changes and the like.And yet, it is precisely these situations in which communications that support the brand are most helpful. If there’s ever a time when you need the strength, continuity, and support of a healthy brand, it’s when there’s uncertainty.
Tags : 
b-to-b branding, business-to-business branding, b-to-b branding in web 2.0, b-to-b interactive media, brand guardians, brand ambassadors, media proliferation, brand fragmentation
    
Godfrey
Published By: CA WA 2     Published Date: Oct 01, 2008
Virtualization and clustering can bring many benefits to your business—better IT asset utilization, improved business continuity and improved operational efficiency. At the same time, virtualization can create a new level of complexity for IT. This white paper describes some of the technical challenges inherent in managing these complex environments and recommends strategies for successful deployment that will maximize the value of virtualization technology in your organization.
Tags : 
virtual, virtual machine, virtual storage, virtual server, virtualization, ca wa, ca wa 2
    
CA WA 2
Published By: MessageLabs     Published Date: Sep 25, 2008
In order to better understand where spyware is going, or more importantly, where it’s evolved from, we actually need to wind the clock back a lot further than may be first imagined; in fact, over fifteen years. If we look at the embryonic stages of the anti-virus industry, around sixteen years ago there were the first boot-sector viruses. It has taken this time for viruses as we’ve traditionally known them to evolve towards the more commercially viable, or intellectual-property-theft status that we now associate with contemporary viruses, a fact not realized by many. This whitepaper goes in-depth to discuss the history of spyware and its evolving future.
Tags : 
messagelabs, spyware, viruses, botnets, microsof, browser helper object, web threats, malware
    
MessageLabs
Published By: ZSL Inc.     Published Date: Sep 25, 2008
The hotspot in the current IT world is optimized Web Services. Now the enterprises have started their vision towards next generation Web Services. This white paper gives information for the business managers and engineers in developing and deploying Web Services using Rational Application Developer (RAD) and WebSphere Application Server (WAS), respectively. This paper explains the process to:* create a Web Service and Web Server client* build security to that web service* deploy the web service in WebSphere application server
Tags : 
zsl, soap, java, wsdl, uddi, web service security, risk exposure
    
ZSL Inc.
Published By: Breakout Solutions     Published Date: Sep 24, 2008
Breakout Solutions is pioneering the way in which organizations utilize Social Media to meet their online promotional objectives. Our proprietary video contest platform provides a turnkey solution for organizations that value interacting and communicating directly with their target market through social media. Web 2.0, has led to a more interactive and social landscape where content is no longer king, conversation is. Breakout Solutions can help your brand become a part of these conversations so that you have a better understanding of how others view your brand and utilize your products and services.
Tags : 
breakout solutions, promotional contest, branded promotion, videos, photos, audio, myspace, facebook
    
Breakout Solutions
Published By: Breakout Solutions     Published Date: Sep 24, 2008
Current trends are telling organizations exactly where their customers are congregating online but there seems to be a disconnect between users spending more time online in social networks and organizations spending more dollars and resources to reach them. Read this research today!
Tags : 
breakout solutions, blogs, videos, social networks, social media, web 2.0, social media optimization, social media marketing
    
Breakout Solutions
Published By: JBoss     Published Date: Sep 23, 2008
This document is intended to provide insight into the considerations and processes required to move an enterprise application from a JavaEE-based application server, such as BEA WebLogic, Oracle Application Server, or IBM WebSphere, to the JBoss Enterprise Application Platform.
Tags : 
jboss, middleware, redhat, linux, red hat, server, server migration
    
JBoss
Published By: IBM     Published Date: Sep 18, 2008
Retailers regularly adapt to customer trends by investing in new systems technology. But they may not be aware that a system's initial purchase price is only 20 to 45% of the total cost of ownership of their system, and there's more to understand about the true cost of your purchase. Find out more on investing in the information system for your unique business.
Tags : 
ibm, ibm mmdg, infrastructure, networking, tco, total cost of ownership
    
IBM
Published By: IBM     Published Date: Sep 18, 2008
As total costs of small and mid-sized businesses increase, growing companies look ever closely at how their IT needs affect energy costs. The IBM case studies and survey results herein discuss opportunities to reduce IT energy costs, save money and devise IT investment strategies. Read them and learn how you can expand your business while helping the environment.
Tags : 
ibm, ibm mmdg, green, green computing, green data center, data center, datacenter, small business
    
IBM
Published By: IBM     Published Date: Sep 18, 2008
IBM conducted an in-depth assessment to identify vulnerabilities in New Hanover Health Network's information security practices, with emphasis on their auditing activity and capabilities. This white paper will explain how IBM helped them implement a series of best practices, thereby improving the confidentiality, integrity, and availability of their information systems.
Tags : 
ibm, ibm mmdg, hipaa, hippa, healthcare, health care, compliance, privacy
    
IBM
Published By: Quocirca     Published Date: Sep 18, 2008
Even when facing challenging economic times, businesses still need to communicate and rely on technology to connect with customers, partners, suppliers and their own employees. Cutting back on communications spending will have a negative effect in a long downturn.  It will leave any business that does so with fewer options when conditions improve and at a disadvantage compared to competitors that continue to invest.  However, there are 10 steps that can be taken to grow the value and use of communications, while controlling costs.
Tags : 
telecom, telecoms, quocirca
    
Quocirca
Published By: MessageLabs     Published Date: Sep 17, 2008
Social and business networking sites are changing the way people talk online. Sites like Facebook, MySpace and Bebo help friends stay in touch while LinkedIn and Plaxo mainly connect business users. They are very popular but present new challenges to IT managers. They seem to have come out of nowhere. For example, Facebook currently has 70m users, 40% of which are located in the US.  The rapid growth of such sites is part of the problem. Companies risk being caught off guard.  Learn how to protect your business from threats posed by online social networking in this 7 Step Guide for IT Managers.
Tags : 
web security, internet security, social networking, facebook, myspace, my space, social, messagelabs
    
MessageLabs
Published By: Tail-f Systems     Published Date: Sep 16, 2008
The key issues involved in developing on-device network management systems for carrier-grade enterprise and operator networks are the same for any other networked resource, only with more complexity and built-in restrictions due to the limited space and processing capabilities inherent to these types of devices.
Tags : 
network management, on-device network management systems, carrier-grade requirements, high availability, network scalability, tail-f, tailf
    
Tail-f Systems
Published By: CA Mainframe     Published Date: Sep 12, 2008
Automated application quality assurance and testing are fundamental to the delivery of the service levels and managed risks that are essential to delivering business outcomes you can depend on. In this context, CA’s mainframe Application Quality Management and Testing Tools send very strong messages: the tools are being actively developed and, where appropriate, integrated with equivalent tools on the distributed platforms, to help companies deliver holistic, automated, business services.
Tags : 
ca mainframe, mainframe, application quality, application testing, testing
    
CA Mainframe
Published By: CA Mainframe     Published Date: Sep 12, 2008
Data Professionals are now being asked to perform higher-level tasks and interact with businesses as “data stewards”.  In this survey, you will learn the challenges as outlined by over 850 data professionals. Get this CA-sponsored survey of the International DB2 Users Group (IDUG) conducted by Unisphere Research. The closer link between corporate performance and database performance is increasing pressure on data professionals to provide higher-level services to enterprise business customers.
Tags : 
database administrator, dba, database, data management, ca mainframe, mainframe
    
CA Mainframe
Published By: LaGarde     Published Date: Sep 10, 2008
Software as a service (SaaS) is an application delivery model where a software vendor develops a web-native software application and hosts and operates the application for use by its customers over the Internet. One of the biggest distinctions about this business model is that customers do not pay for owning the software itself but rather for using it.
Tags : 
saas, software as a service, lagarde, ecommerce, ebusiness, online shopping, shopping
    
LaGarde
Published By: Faronics     Published Date: Sep 10, 2008
IT Managers are tasked with making the desktop environment more secure and locked down to a uniform corporate standard, yet flexible enough to handle the myriad of exceptions that arise across the enterprise. Centralized Configuration Management (CCM) tools are great, especially in environments with branch offices. But CCM tools can’t do the big job of making your environment inherently more secure or more flexible.
Tags : 
security, configuration management, faronics, cmdb, desktop security, it management, ccm
    
Faronics
Published By: thawte     Published Date: Aug 27, 2008
This guide will introduce you to our Starter PKI Program, explaining how it works as well as the benefits it offers. We’ll also point you to a dummy company on our Web site where you can “test drive” the Program.
Tags : 
thawte, pki
    
thawte
Published By: IBM     Published Date: Aug 21, 2008
The goal of having one enterprise resource planning (ERP) solution for all business processes remains popular. However, there are still many misconceptions associated with using enterprise resource planning solutions in asset-intensive industries. This white paper discusses and demystifies the myths for decision makers in asset-intensive industries. You’ll also see how IBM Maximo Asset Management can enhance the quality of asset data, contribute to the safety of the workforce, and help facilitate best practices that significantly impact the long-term success of your business.
Tags : 
erp, asset management, best practices, bpm, business process, ibm mi, ibm, ibm grm
    
IBM
Published By: IBM     Published Date: Aug 21, 2008
There are many ways to uncover Web application vulnerabilities. This white paper examines a few of these vulnerability detection methods – comparing and contrasting manual penetration testing with automated scanning tools. What you’ll discover is that neither of these methods are an exhaustive method for identifying Web application vulnerabilities.
Tags : 
ibm, ibm mi, ibm grm, web security, internet security, application security
    
IBM
Published By: NewField IT     Published Date: Aug 19, 2008
The printer salesman began his pitch: "Once upon a time there was a poor, dull document that was of interest to no-one. Its vital information was ignored by one and all, and it stayed unloved and unlovely at the bottom of a drawer in the kingdom of Officeland." NewField IT is an independent consultancy practice with primary data covering 28 countries and over 70,000 devices. In this paper, they take an impartial look at the use of colour in an office, its advantages and the cost to a business.
Tags : 
    
NewField IT
Published By: NewField IT     Published Date: Aug 19, 2008
For the human body to work at its full potential, it needs to be in good shape. Carrying excess fat, as we all know, leads to poor physical and mental performance, and the same could be said to be true of our workplaces. A healthy – and happy – office is one that is lean and fit, where the job in hand can be carried out with energy and efficiency, and where each part of the overall system functions effectively.
Tags : 
    
NewField IT
Published By: NewField IT     Published Date: Aug 19, 2008
There has been an increased interest in companies adopting Managed Print Services to improve efficiency and reduce costs. Industry analysts have produced substantial amounts of material on the benefits and reasons why one should go down this road... but have they been listening to vendors too much?
Tags : 
    
NewField IT
Published By: Utimaco     Published Date: Aug 18, 2008
Data protection programs at most organizations are concerned with protecting sensitive data from external malicious attacks, relying on technical controls that include perimeter security, network/wireless surveillance and monitoring, application and point security management, and user awareness and education. In this paper, the different leakage points are mapped with regulations and best practices.
Tags : 
leak, leakage, data protection, pci, cardholder, cardholder data, utimaco, database security
    
Utimaco
Start   Previous    203 204 205 206 207 208 209 210 211 212 213 214 215 216 217    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.