HIT Consultant Insightful coverage of healthcare innovation
 

iti

Results 14201 - 14225 of 14910Sort Results By: Published Date | Title | Company Name
Published By: Network Automation     Published Date: Dec 02, 2008
Rapid development and deployment of automation to eliminate repetitive,labor intensive, and computer related tasks throughout the enterprise.
Tags : 
network automation, business process automation, automation deployment
    
Network Automation
Published By: OrderDynamics     Published Date: Dec 01, 2008
OrderDynamics provides a real world example of how its on-demand eCommerce platform automates fulfillment activities, keeping costs down, and Customer satisfaction up.
Tags : 
orderdynamics, esourcenutrition, ecommerce, warehouse automation
    
OrderDynamics
Published By: Microsoft Office     Published Date: Nov 24, 2008
This white paper highlights the key challenges facing the financial services industry, and discusses how the 2007 Microsoft® Office system can help financial institutions affect business performance with innovative and powerful enterprise capabilities that extend far beyond improving personal productivity.
Tags : 
microsoft office system, microsoft office groove® 2007, microsoft office open xml formats
    
Microsoft Office
Published By: Microsoft Office     Published Date: Nov 24, 2008
This white paper highlights key challenges facing the professional services industry and discusses how the 2007 Microsoft® Office system can help professional services firms enhance business performance by maximizing employee contributions. It also offers examples of firms realizing business impact from their early use of the 2007 Office system, which provides innovative and powerful enterprise-scale capabilities that extend far beyond improving personal productivity.
Tags : 
2007 microsoft office system, microsoft office project 2007, infopath foams services
    
Microsoft Office
Published By: Microsoft Office     Published Date: Nov 24, 2008
This white paper highlights the key challenges facing the manufacturing industry and discusses how the 2007 Microsoft® Office system can help maximize employee contributions and enhance business performance with innovative and powerful enterprise capabilities.
Tags : 
microsoft office sharepoint® server, microsoft office live meeting, microsoft office excel® 2007
    
Microsoft Office
Published By: SBE     Published Date: Nov 21, 2008
In today’s business environment, marketing practitioners must attempt to align their marketing efforts with management’s strategic vision. After all, a greater return on investment (ROI) translates into improved marketing effectiveness and increased revenue, profi t, and market share for the same amount of marketing spend.
Tags : 
archway, roi, archanalytics, marketing operations management, business intelligence
    
SBE
Published By: Customer Chemistry     Published Date: Nov 21, 2008
Many businesses believe they only have two choices when it comes to marketing -- establish an internal department or contract specific services with a full-service marketing agency. There is a third option worth exploring.  Strategic outsource marketing provides the commitment of an internal resource and the capabilities of a full-service agency without the operating costs of either.
Tags : 
clarity quest marketing, strategic outsource marketing, outsource marketing, outsourcing services
    
Customer Chemistry
Published By: YouSendIt     Published Date: Nov 21, 2008
In this datasheet, discover how it’s now possible to send large files in a way that’s safer and more affordable than FTP, courier services, and email attachments.  Learn how to beat the security challenges that come with global collaboration and data sharing; avoid crippling data transfer problems like partial file delivery or network delays; and know where your file is every step of the way, from sendoff to final destination. Download your copy now.
Tags : 
cost of ownership, total cost of ownership, tco, authentication, authorization, encryption, file transfer, content delivery, digital content delivery, attachment, email, ftp, security, confidentiality, data security, data integrity, tracking, auditing, visibility, report
    
YouSendIt
Published By: YouSendIt, Inc.     Published Date: Nov 21, 2008
In this datasheet, discover how it’s now possible to send large files in a way that’s safer and more affordable than FTP, courier services, and email attachments.  Learn how to beat the security challenges that come with global collaboration and data sharing; avoid crippling data transfer problems like partial file delivery or network delays; and know where your file is every step of the way, from sendoff to final destination. Download your copy now.
Tags : 
cost of ownership, total cost of ownership, tco, authentication, authorization, encryption, file transfer, content delivery, digital content delivery, attachment, email, ftp, security, confidentiality, data security, data integrity, tracking, auditing, visibility, report
    
YouSendIt, Inc.
Published By: GlobalSpec     Published Date: Nov 21, 2008
Gain practical tips for making marketing work in a difficult business environment, helping to prevent a downward spiral of falling behind, gain market share from competitors who cut back, and position your company for a surge when conditions improve.
Tags : 
globalspec, engineering, technical, industrial marketers, marketing investments
    
GlobalSpec
Published By: Archway     Published Date: Nov 21, 2008
The role of marketing is constantly changing. As budgets shrink and demands grow, marketing departments across the country are being carefully scrutinized for their effectiveness. Top executives are holding marketers more accountable, which means they must not only deliver results, but also find ways to measure the actual bottomline impact of their marketing initiatives.
Tags : 
archway, roi, marketing operations management, outsourcing, business assessments, market planning, product procurement
    
Archway
Published By: HP - Enterprise     Published Date: Nov 19, 2008
Fortify Software conducted a candid interview with Avi Rubin, Professor at Johns Hopkins University and specialist in the field of eVoting security risks. He discusses the concerns around software security as well as the voting solutions surrounding software independence.
Tags : 
application security, security risks, voting, fortify, fortify software, avi rubin
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Nov 19, 2008
For a CISO, open source introduces a new source of risk and unique security challenge: how do you influence developers over whom you have no direct management control? Jennifer Bayuk, former CISO of Bear Stearns, provides insight on best practices for evaluating, deploying and managing open source code.
Tags : 
business risk, security, application security, audit, risk, vulnerabilities, fortify, fortify software, hackers, cyber threats, application security standards, threats, assessment, remediation, jennifer bayuk, bear stearns, ciso, application security best practices
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Nov 19, 2008
While investments to secure the enterprise continue to rise, breaches into company systems and data are skyrocketing. These cyber crimes are consistently debilitating organizations operations, reputations and ultimately, viability. Today’s CEOs are demanding aggressive strategies to protect their business. CIOs and CSOs are working together to employ proven Business Software Assurance approaches across the enterprise to stay ahead of constant threats.
Tags : 
business risk, security, application security, audit, risk, vulnerabilities, fortify, fortify software, hackers, cyber threats, application security standards, threats, assessment, remediation, ciso, cyber crime, breaches, information technology, c-level
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Nov 19, 2008
This webinar explores 12 of the most common security traps in Java by examining the causes of security failures in modern Java–based applications. Approaching security with an “outside in” style, we look at vulnerabilities from a developer’s perspective, focusing on the source code.
Tags : 
security, application security, java, vulnerabilities, developer, source code, analysis, fortify software, fortify
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Nov 19, 2008
Matt Rose, Senior Software Security Consultant at Fortify Software, shares his findings from a year analyzing millions of lines of code. He unveils his top ten most common vulnerabilities and provides detailed examples of each. These technical examples come from his experience working with fortune 500 companies, government agencies, and major ISVs.
Tags : 
security, application security, java, vulnerabilities, developer, source code, analysis, fortify software, fortify, security best practices, common vulnerabilities, code
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Nov 19, 2008
Adrian Asher, Chief Security Officer at Betfair, an online UK betting exchange explains how he manages a “culture of security” and protects the Betfair brand in this 20-minute candid interview.
Tags : 
betfair, security, application security, audit, risk, vulnerabilities, fortify, fortify software, hackers, brand
    
HP - Enterprise
Published By: HP - Enterprise     Published Date: Nov 19, 2008
With an extensive background in police, military, government, and industry security, Howard Schmidt explains how to respond to the changing landscape of cyber threats and how business leaders are helping set the standards for application security. He then profiles industry role models who are setting the standard for application security.
Tags : 
howard schmidt, security, application security, audit, risk, vulnerabilities, fortify, fortify software, hackers, cyber threats, application security standards, threats, assessment, remediation
    
HP - Enterprise
Published By: Melissa Data     Published Date: Nov 18, 2008
Learn what a Web Service is and how it works, the advantages of using a Data Quality Web Service, the technology assessment for implementation, and several case studies (Saab and other real world case studies) to demonstrate real life successes.
Tags : 
melissa data, data quality, contact data verification, address verification, validate address, address verification software, address verify, address validation software, data quality tools, data quality management, data quality objects, data quality api, address quality, data cleanse, data hygiene, data quality, data quality analysis, data quality api, data quality assurance, data quality control
    
Melissa Data
Published By: Melissa Data     Published Date: Nov 18, 2008
Tom Brennan and John Nydam explain the Melissa Data and Stalworth partnership, discuss the business problems caused by bad data, and describe how DQ*Plus provides a complete data quality solution for enterprise applications and commercial databases.
Tags : 
melissa data, data quality, contact data verification, address verification, validate address, address verification software, address verify, address validation software, data quality tools, data quality management, data quality objects, data quality api, address quality, data cleanse, data hygiene, data quality, data quality analysis, data quality api, data quality assurance, data quality control
    
Melissa Data
Published By: BrightCove     Published Date: Nov 18, 2008
With the explosive growth of online video, traditional SEO has taken on a new dimension: video search and discovery. De-mystify the world of video search with a practical framework for video SEO and increase the value of your video content.
Tags : 
brightcove, video seo, contextual publishing, inbound links, video feeds & sitemaps, metadata, site architecture, emerging techniques, search engine optimization
    
BrightCove
Start   Previous    562 563 564 565 566 567 568 569 570 571 572 573 574 575 576    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.