HIT Consultant Insightful coverage of healthcare innovation
 

issues

Results 851 - 875 of 901Sort Results By: Published Date | Title | Company Name
Published By: Hyatt Legal Plans     Published Date: Jun 10, 2011
This whitepaper explores the effect employee personal legal matters have on workplace productivity. It also supports the idea that group legal plans help minimize these effects.
Tags : 
employee legal study, employee personal legal matters, group legal plans, legal plans for large businesses, group legal services
    
Hyatt Legal Plans
Published By: Real Asset Management Inc.     Published Date: Jun 24, 2011
This white paper will identify the Top 7 issues which businesses using spreadsheets to manage their fixed asset data are failing to address.
Tags : 
real asset management, ram, spreadsheets, fixed assets control, fixed asset management system, corporate governance, data integrity, depreciation, audit trail, security, parent/child assets, asset splits, batch disposals, forecasting, multi-book capabilities
    
Real Asset Management Inc.
Published By: Mimecast     Published Date: Jun 04, 2013
With recent high profile cases, such as the News of the World hacking scandal, hitting the news headlines, the issue of email retention has quickly moved up the IT Director’s agenda.
Tags : 
email archiving, ediscovery, compliance, legal, intrusion prevention, security
    
Mimecast
Published By: ServiceNow     Published Date: Apr 19, 2013
Unauthorized software, painful software license compliance audits, long fulfillment times, limited visibility, unaccountability... if these issues sound familiar, you are not alone. These are real challenges faced by many IT organizations - with serious consequences if not properly addressed. During our Software Asset Management webinar you will learn how having asset, configuration and other service management processes together in one system of record provides the control and visibility you need to overcome these challenges.
Tags : 
software, lincense, compliance, software asset management, service management
    
ServiceNow
Published By: CDW     Published Date: Sep 17, 2014
You are being buried by data. Multimedia including videos, audio and photos. Unstructured data in presentations, documents and social media feeds. Even the voicemails and databases that used to be the primary residents of your storage system are growing beyond your ability to manage them effectively. How can you keep it all under control without buying an endless stream of disk and storage devices? Experts from EMC and other leading storage manufacturers discuss the very latest trends in storage solutions and how an effective application of storage strategy can help tame the information beast and keep performance and availability issues at bay. Attendees will learn: - What are the hidden drivers in storage growth - How businesses of all sizes can benefit from a tiered storage strategy - Why virtualization is penetrating every level of IT - What role SSD and flash will play in every storage environment - What to do now to improve storage utilization and save costs
Tags : 
storage, tiering, performance, availability, media, feeds, system, netgear, emc, buying, data, social media, manage, voicemail, presentation, residents, issues, disk
    
CDW
Published By: Sage     Published Date: Jul 30, 2014
Managing employer compliance can be a tedious task, but it’s a highly visible, important way that the human resources department minimizes risk for the business and keeps the workforce running smoothly. Use this guide to stay informed about employment laws, reporting rules, and developing workforce compliance issues that may impact your organization. We’ll help you navigate ten crucial mandates, explaining the obligations and compliance considerations you need to be aware of in order to take on your responsibilities.
Tags : 
sage, compliance, workforce, fines, reporting, mandates
    
Sage
Published By: Sage     Published Date: Aug 19, 2014
The Patient Protection and Affordable Care Act (PPACA), signed into law by President Obama on March 23, 2010, and the amendments made by the Healthcare and Reconciliation Act of 2010 (together, known as the Affordable Care Act), have significant employment tax and information reporting implications. This survival guide will address the changes facing employers. You’ll find explanations of compliance issues, checklists of what your company should be doing, and a calendar of important effective dates.
Tags : 
sage, healthcare reform, ppaca, affordable care act, compliance, employment tax, practice management
    
Sage
Published By: NETIQ     Published Date: Sep 09, 2013
This flash point paper contains 4 simple rules to help you cut your organization’s privileged user access issues and facilitate resolution if and when a problem does arise.
Tags : 
netiq, privileged users, it security, hidden risk, super users, administrative access, security breach, corporate policies, mitigating risk, pum
    
NETIQ
Published By: Dell Software     Published Date: Apr 17, 2013
The paper showcases how IT can proactively address problems before they result in service degradation. Foglight provides the visibility organizations need into the why of customer behavior. Line-of-business owners can identify sources of customer frustration and work with IT to eliminate issues.
Tags : 
beyond web analytics, dell, quest software, reduce customer frustration, visible organizations
    
Dell Software
Published By: Thawte     Published Date: Dec 29, 2015
The goal of this white paper is to help enterprises make pragmatic decisions about where and when to use cloud solutions by outlining specific issues that enterprises should raise with hosting providers before selecting a vendor, and by highlighting the ways in which SSL from a trusted Certificate Authority (CA) can help enterprises conduct business in the cloud with confidence.
Tags : 
    
Thawte
Published By: IBM     Published Date: Jan 09, 2014
Today, large organizations are being buffeted by a host of changes, many of them unexpected or unfamiliar. Business information is virtually exploding in size, kind and locale, taxing the abilities of even the most progressive enterprises to keep up. Mobile technologies and business analytics that were once exclusively used by employees with specialized needs and skills are now common across the entire workforce. As a result of all this, IT is bending under the strain of developing and delivering necessary new services while at the same time maintaining core service quality. This report will consider these issues, as well as IBM’s position in and efforts around developing next generation enterprise systems solutions, including its System z mainframes, POWER7+ processor-based Power Systems servers and System Storage offerings focused on those areas and use cases.
Tags : 
enterprise systems, system performance, power7+, power systems servers, system storage, it infrastructure, analytics solutions, business analytics, business processes, charles king, pund-it, inc., ibm
    
IBM
Published By: Cisco     Published Date: Jun 21, 2016
In today’s global economy, innovation matters. For teams to innovate rapidly and with great frequency, they must be able to clearly communicate and closely collaborate. Miscommunication, misunderstanding and misinterpretation only leads to costly errors, bottlenecked business processes and market misfires. Most of these issues are avoidable.
Tags : 
    
Cisco
Published By: Riverbed     Published Date: Apr 14, 2017
Many organizations transitioning from on-premises Microsoft applications to Office 365 will experience performance problems due to geographic factors and use of the Internet for connectivity. IT can minimize performance issues and deliver an acceptable experience to end users by paying careful attention to network design.
Tags : 
    
Riverbed
Published By: Marketo     Published Date: Jun 08, 2017
Are you running into limitations with your current marketing automation solution? Perhaps your solution is missing core functionality for cross-channel marketing or reporting. Maybe you’ve found that even basic workflows are inflexible and cumbersome for your team to create or replicate. It’s also possible that you’re facing reliability or support issues that hinder your success. The fact is, if you don’t have key functionality, system reliability, or support resources, you simply won’t achieve the best results. Worse, you may be slowing down your entire business. If you don’t make the move to a robust, scalable platform, you’re in real danger of falling behind your industry peers and top competitors.
Tags : 
    
Marketo
Published By: HP     Published Date: May 05, 2014
Performance testing solves application issues potentially impacting revenue, productivity, and brand recognition: Discover how Telus has reduced the number of performance issues introduced by IT releases and saved well over $10M in business impact costs (revenue loss/workaround expenses/impact on brand name) since 2011 using HP Performance Center. TELUS is a leading national telecommunications company in Canada, with $10.9 billion of annual revenue and 13.1 million customer connections.
Tags : 
    
HP
Published By: Polycom     Published Date: Nov 09, 2015
When it comes to conference calling, the lack of clarity, background noise, and volume issues that you experience on a standard phone, are all solved by a dedicated conference phone—you can hear the difference. This can have a real impact if you’re teleconferencing on a regular basis and you want to remain alert, attentive and productive.
Tags : 
polycom, conference call, background noise, clarity, teleconferencing
    
Polycom
Published By: Riverbed     Published Date: Feb 26, 2015
The financial industry is tough. Things change fast, and the field is always becoming more competitive and global. Likewise, clients are more demanding than ever, and customers now expect nothing less than 24/7 accessibility and reliability. To succeed in this environment, financial services firms and their clients rely heavily on IT to get the job done. Unfortunately, many firms struggle to keep up with those demands and are held back by issues with technology – especially regarding mission-critical applications.
Tags : 
apps, technology, finance
    
Riverbed
Published By: Riverbed     Published Date: Jul 10, 2017
Performance issues today are compounded by increasingly complex infrastructures that IT teams must contend with when delivering applications. As a result, detecting and fixing performance problems is hard. Sluggish end-user transactions may present themselves as being slow due to the code.
Tags : 
application performance, performance issues, complex infrastructure, transactions
    
Riverbed
Published By: CA Technologies     Published Date: Jun 04, 2015
Industry leaders share insights on DevOps and big data, ITIL, testing and more. Once again, we have spent time talking to leading community figures such as Dave Farley (“Continuous Delivery” author) to discuss the major issues impacting DevOps today. This latest issue features comments from 10 experts and covers many hot topics such as: - Enterprise DevOps transformation - DevOps and big data - DevOps and ITIL - Shadow IT vs DevOps - 6 Habits of Effective DevOps Practitioners - DevOps and Testing
Tags : 
    
CA Technologies
Published By: Workforce Software     Published Date: Nov 23, 2015
In order to see the most benefit, organizations must lead with workforce management and they must do so with an eye toward three key issues: Ease-of-use and user adoption Specialization versus standardization Business alignment This paper will explore all three of these areas, and how organizations are leveraging the deep capabilities of modern workforce management technology as the first step of their HCM transformation.
Tags : 
workforce management technology, business alignment, workforce management software
    
Workforce Software
Published By: Venafi     Published Date: Mar 04, 2015
This technical case study addressing key and certificate security issues is designed for security conscious enterprises to understand real-life attack scenarios that threaten their businesses in today’s world. This white paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches. This paper should be read by more technical IT security staff who are interested in detailed attack methods and remediation tactics. The executive summary is intented for IT Security leaders (CISOs and their direct reports) and addresses the proof-of-concept attack impacts on the business. The attack scenario described in this technical white paper is based on a reproduction of a real-world attack in a Raxis test environment that simulated an enterprise security infrastructure.
Tags : 
venafi, ssh keys, vpn credentials, digital certificates
    
Venafi
Published By: XO Communications     Published Date: Apr 14, 2015
Enterprise communications is at a critical juncture. Employees require the very best mobility and collaboration tools while IT struggles with tight budgets and lean staffing. Read this paper to learn about these looming challenges and how hosted PBX with Unified Communications can help you address these issues, paving the way for better enterprise communications.
Tags : 
    
XO Communications
Published By: FICO     Published Date: Nov 03, 2015
Examines the issues surrounding the effectiveness of related programs and practices across the financial sector.
Tags : 
    
FICO
Published By: FICO     Published Date: Sep 02, 2016
Download this white paper to learn more about these three keys to successful deposit pricing management: Reacting quickly in a dynamic rate environment Being prepared for new regulatory issues Achieving a pricing process
Tags : 
    
FICO
Published By: ArborNetworks     Published Date: Feb 12, 2016
Ask any cybersecurity professional and she’ll tell you that her job is getting increasingly difficult. Why? Most will point to a combination of the dangerous threat landscape, IT complexity, and their overwhelming workload. These issues are driving a major transition in enterprise security. Large organizations must move beyond a threat prevention mentality to become proactive cyber-¬-attack “hunters” that constantly monitor their networks for signs of trouble. This shift to proactive hunting will require new technologies that collect, process, and analyze massive amounts of security data, offer intelligent security analytics for real-¬-time incident detection, integrate threat intelligence to align suspicious internal activities with external threats, and provide analysts with the right data analytics features to query and manipulate data for historical investigations.
Tags : 
arbor networks, enterprise, cyber attack, network, data
    
ArborNetworks
Start   Previous    23 24 25 26 27 28 29 30 31 32 33 34 35 36 37    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.