HIT Consultant Insightful coverage of healthcare innovation
 

lag

Results 201 - 225 of 255Sort Results By: Published Date | Title | Company Name
Published By: Q1 Labs     Published Date: Feb 01, 2012
Is it time? Are you waving the white flag? Has your first gen SIEM failed to meet expectations despite your investment? If you are questioning whether your existing product or service can get the job done, you are not alone. Read this Securosis white paper to learn how easy it can be to replace your SIEM with a next generation solution.
Tags : 
siem, security event management, security information management, security incident management, it security, it network security, security intelligence, siem solution
    
Q1 Labs
Published By: Quantcast     Published Date: Feb 13, 2015
Twitter est un phénomène mondial qui a littéralement bouleversé les interactions en ligne entre les marques et les consommateurs. Récemment, Twitter a lancé une option publicitaire permettant aux marques de diffuser des Tweets et des comptes sponsorisés auprès des utilisateurs avec un ciblage d’audience spécifique. Cette offre, appelée «tailored audience», permet aux annonceurs d’utiliser leurs propres données afin d’affiner leur ciblage et de diffuser davantage de publicités personnalisées via la plateforme Twitter. Téléchargez notre guide pour en savoir plus!
Tags : 
twitter, tailored audience, quantcast
    
Quantcast
Published By: Workfront     Published Date: Sep 18, 2014
Have you become a slave to email—losing several hours per day trying to keep up? Are you plagued with drop-by, instant message and phone call requests interrupting your creative genius? Read this eBook and discover strategies for how to escape the 9 types of marketing work hell and the real cost of “living with” the situation. You’ll learn how to: • Reduce firedrill and interrupt requests • Stop “rework madness” with work templates • Eliminate needless meetings • Simplify and streamline work communication
Tags : 
eliminate needless meetings, streamline communication, interrupt requests, creative, marketing
    
Workfront
Published By: Business Software     Published Date: Apr 04, 2013
As today’s global marketplace becomes more sophisticated, the number and complexity of mission-critical financial transactions that companies conduct on a day-to-day basis continues to grow exponentially. Even small and mid-sized businesses are plagued by a rapidly increasing volume of financial processes that are highly intricate and multi-faceted. These activities, while important, are administrative in nature and often distract staff from more strategic planning initiatives that directly impact company prosperity and growth. Additionally, as legislative pressures continue to grow, and the rules imposed by Sarbanes Oxley, BASEL II, and other regulations become more stringent, businesses need to find better ways to ensure compliance by effectively logging, tracking, auditing, and reporting their financial data.
Tags : 
various types of business transactions, cost effectiveness, business-software.com, revealed
    
Business Software
Published By: IBM     Published Date: Aug 21, 2013
Have you ever found yourself in this untenable position? Your web team and email program owners are targeting the same customers, with different offers, or worse, competing offers. Siloed systems and teams limit marketers’ ability to make sound assessments about performance and spending. Marketers around the world spend over one trillion USD each year. Yet, most of them still manage their marketing programs with a hodgepodge of spreadsheets and disconnected applications. Unnecessary costs, delays and poor collaboration plague marketers. Under increasing pressure to connect with customers while doing more with less, marketers who strive to optimize marketing performance through a single integrated software platform can make the best use of people, programs and resources. Today, you need a return on every dollar spent and a platform that aligns technology, people and processes to help create effective, efficient marketing programs that support customers for life.
Tags : 
enterprise marketing management, marketing management, marketing roi, marketing connections, marketing performance, return on investment, marketing optimization
    
IBM
Published By: Hewlett-Packard Company     Published Date: May 15, 2014
HP's Gen8 servers are the flagship products bringing new technologies and capabilities to market. Delivering advances in performance, serviceability, and lifecycle automation, they address the demands of today's IT environments. Learn how these servers increase provisioning and uptime, and reduce the time and resources spent on server deployment and management
Tags : 
proliant gen8 servers, system architecture
    
Hewlett-Packard Company
Published By: Curalate     Published Date: Jul 17, 2014
In today's visual web, consumers are sharing brands’ images at record pace, taking content from brands' websites and saving it to visual social media like Pinterest, where relevancy trumps recency. This behavior significantly extends the life of products, creating engagement with images long after they've been sold out or removed from brands' (digital) shelves. In fact, nearly 50% of Pinterest's top pins send users to expired product pages, dead links and 404 pages. This is a major, major red flag...
Tags : 
instagram marketing, pinterest marketing, tumblr marketing, visual marketing, pinterest analytics, instagram analytics, pinterest for business, instagram for business
    
Curalate
Published By: TheMarketingScope     Published Date: Sep 29, 2015
In this eBook, we’re going to diagnose the most standard ailments of businesses who avoid content marketing like the plague. We’re going to tell you why, and how, you can put more than a bandaid solution in place.
Tags : 
content marketing, lead generation, market research, market strategy
    
TheMarketingScope
Published By: Thawte     Published Date: Oct 05, 2015
Wenn Sie Ihr Unternehmen und Ihre Kunden vor Angriffen schützen wollen, sollten Sie mit Wissen gewappnet sein. Das ist jedoch nicht einfach, denn die sich ständig ändernde Bedrohungslage und die kontinuierliche Weiterentwicklung der Abwehrmaßnahmen sind der perfekte Nährboden für Missverständnisse. In unserem Leitfaden können Sie nachlesen, was tatsächlich hinter den 10 hartnäckigsten Gerüchten über die Website-Sicherheit steckt.
Tags : 
website security myths, customer protection, ever-changing threats, website security
    
Thawte
Published By: Crownpeak     Published Date: Sep 29, 2016
The Gartner Magic Quadrant for Web Content Management (WCM) provides an in-depth analysis of leading vendors, designed to help guide companies that are in the process of evaluating a Web Content Management solution for their business. For the third year in a row, Gartner has recognized Crownpeak as a "Visionary" on its 2016 Magic Quadrant for Web Content Management. The report is an invaluable tool for gaining a better understanding of the industry's leading WCM solutions and their strengths. Crownpeak recently added Digital Quality Management to its platform, making us the only WCM with automated monitoring for flagging errors and inconsistencies. Enjoy a complimentary download on us!
Tags : 
crownpeak, gartner, magic quadrant, web content management, wcm, digital quality management, digital experience management
    
Crownpeak
Published By: Absolute Software     Published Date: Feb 04, 2010
Absolute Software has announced it has completed its acquisition of the LANrev systems management platform. Absolute plans to integrate LANrev's popular Mac and PC lifecycle configuration management technology with its flagship security and asset management suite, Computrace.
Tags : 
absolute, laptop, saas, lifecycle management, enterprise management, lock down, rapid recovery, stolen
    
Absolute Software
Published By: Schneider Electric     Published Date: Jun 07, 2019
Attracting Investors Webinar: With more than $18 billion in M&A activity in the first half of last year alone, the colocation industry is riding the bubble of rapid growth. Colocation data center providers are being evaluated by a wide range of investors, with varying experience and perspectives. Understanding the evaluation criteria is a critical competency for attracting the right type of investor and investment to your colocation business. Steve Wallage, Managing Director of Broad Group Consulting, has led more than 30 due diligence projects and will discuss specific areas of focus including assessment of financials, management, customers, business plan, competitive positioning and future strategy and exit. By attending this presentation colocation providers will: Hear how investors are assessing colocation providers Understand different types of investor strategy and positioning Explore actual case studies –success stories as well as examples where investors walked away Walk away with a greater understanding of how to not only attract investment, but the right type of investor to propel their business growth
Tags : 
investors, schneider electric, - colocation provider, attracting investors, colo data center
    
Schneider Electric
Published By: Diligent Technologies     Published Date: Apr 11, 2008
Data de-duplication has the power to revolutionize the data protection process by significantly reducing capacity requirements. Plagued by media hype and vendor FUD, this message can be easily lost. This paper serves as a primer on data de-duplication.
Tags : 
deduplication, diligent, diligent technologies, storage
    
Diligent Technologies
Published By: Arcot     Published Date: Jun 04, 2008
In the past, authentication solutions were either easy to use and inexpensive, but insecure (such as username/password) or very secure but expensive or difficult to implement (such as OTP tokens and smart cards). Arcot offers a third option: WebFort, a software-only, two-factor authentication solution. It delivers the right balance of cost, convenience, and strength.
Tags : 
arcotid, pki, multi-factor authentication, strong authentication, cryptographic camouflage, webfort x.509 certificate, public key infrastructure, authentication
    
Arcot
Published By: LaGarde     Published Date: Sep 10, 2008
Software as a service (SaaS) is an application delivery model where a software vendor develops a web-native software application and hosts and operates the application for use by its customers over the Internet. One of the biggest distinctions about this business model is that customers do not pay for owning the software itself but rather for using it.
Tags : 
saas, software as a service, lagarde, ecommerce, ebusiness, online shopping, shopping
    
LaGarde
Published By: LaGarde     Published Date: Sep 10, 2008
It's difficult to pick up a news report without reading about another data breach or case of identity theft. With so much personal and financial information stored and transmitted electronically, consumers are at greater risk than ever of becoming victims of fraud.
Tags : 
lagarde, pci, pci-dss, pci dss, compliance, credit card, payment card, data protection
    
LaGarde
Published By: LaGarde     Published Date: Sep 10, 2008
Businesses today are increasingly looking to the Web to streamline processes and maximize resources. Thus, an eCommerce solution that enables you to leverage existing processes and systems is the key to harnessing the power of the Web.
Tags : 
lagarde, ecommerce, e-commerce
    
LaGarde
Published By: Aprimo, Inc.     Published Date: Dec 23, 2008
BearingPoint wanted a “one-stop-shop” for its growing marketing organization that was easy to setup and didn’t require a lot of resources. A tool was needed to help with the wide-range of marketing activities that satisfied the needs of the entire marketing team. This system needed to easily handle financial and legal requests, capture campaign and event data, support creative development and reduce manual processes that contributed to the lagging of concrete knowledge of their marketing budgets and spending at any given point in time.
Tags : 
aprimo, marketing operations, financial visibility, marketing resource management
    
Aprimo, Inc.
Published By: BMC Control M     Published Date: Jul 16, 2009
Die Stapelverarbeitung ist in den meisten Unternehmen ein zentraler, geschäftskritischer Prozess. Sie dient als Grundlage  für eine Vielzahl von Anwendungen – E-Commerce, Buchhaltung, Lagerverwaltung, ERP, Kundenservice und viele andere mehr. Jeder Ausfall eines solchen geschäftskritischen Batchprozesses kann drastische Auswirkungen auf den Geschäftsbetrieb haben. Betriebsausfälle, entgangene Gewinne oder sogar Vertragsstrafen können die Folge sein.
Tags : 
itil, change, management, hardware, dmdb, bmc, ema, process
    
BMC Control M
Published By: BMC Control M     Published Date: Jul 22, 2009
Die Stapelverarbeitung ist in den meisten Unternehmen ein zentraler, geschäftskritischer Prozess. Sie dient als Grundlage  für eine Vielzahl von Anwendungen – E-Commerce, Buchhaltung, Lagerverwaltung, ERP, Kundenservice und viele andere mehr. Jeder Ausfall eines solchen geschäftskritischen Batchprozesses kann drastische Auswirkungen auf den Geschäftsbetrieb haben. Betriebsausfälle, entgangene Gewinne oder sogar Vertragsstrafen können die Folge sein.
Tags : 
itil, change, management, hardware, dmdb, bmc, ema, process
    
BMC Control M
Published By: SAS     Published Date: Aug 04, 2016
A persistent skills gap plagues employers in all major industries, spurring SAS to provide additional resources that support the next generation of analytical talent. But we know the skills gap can mean different things to different people. This e-book features interviews with those who employ, possess, and educate analytics talent. Keep reading to learn how employers, educators and students are working to fill the analytics skills gap.
Tags : 
best practices, competitive advantage, business practices, ebook
    
SAS
Published By: Dell     Published Date: Jul 30, 2012
With the release of the new Windows Server 2008 R2 many IT professionals are plagued with questions about the new operating system and whether the upfront costs can really save organizations money in the end.
Tags : 
microsoft, hyper-v, server, windows, vpn, wan, bandwidth
    
Dell
Published By: NAVEX Global     Published Date: Mar 21, 2018
The U.S. Foreign Corrupt Practices Act (FCPA), the U.K. Bribery Act (UKBA), Sapin II and many other Anti-Bribery and Corruption (ABC) laws and regulations around the world make it clear that bribery and corruption is prohibited, illegal and the source of fines, penalties, reputational damage, and in some cases criminal liability. This is particularly true when the bribes are offered to foreign government officials, especially by third parties. Before examining some of the common red flags and the appropriate courses of action to take, reviewing the various guidelines and frameworks available for organisations to build adequate procedures to protect themselves against third party risks is advisable. These frameworks have assisted organisations in establishing a strong legal defence in the event that a bribe does occur. These measures are having ramifications across the globe and they inform many of the components of the best ABC programmes in place today.
Tags : 
    
NAVEX Global
Published By: VMware SD-WAN by VeloCloud     Published Date: May 21, 2019
Digital transformation has moved out of the early-adopter phase and into mainstream adoption. According to the ZK Research 2018 IT Priorities Study, 88% of businesses now have digital initiatives underway, up from 84% in 2017. The urgency of IT and business leaders is well warranted, as companies that master being digital will leapfrog the competition and be able to sustain a market-leading position. Those that lag in their digital initiatives will fall farther behind and will struggle to survive. The key to digital success is having an agile IT foundation that enables businesses to adapt to market transitions faster than the competition. However, there is no single technology called “digital transformation.” Rather, it is powered by the following four key enabling technologies:
Tags : 
    
VMware SD-WAN by VeloCloud
Published By: CA Technologies     Published Date: Jun 03, 2015
"DevOps – seeks to unify the traditionally separate worlds of application development and the operational functions that follow. Once unified, the process then loops back again to enable seamless iterations faster than ever before. The theory of constraints teaches process planning and path of least resistance, yet IT lags most industries when integrating the entire process. This is where DevOps both finds its greatest challenge to adoption and, arguably, the greatest need for its revolutionary way of doing things. This InformationWeek special report outlines the current state of DevOps adoption and its impact on the Financial Services industry."
Tags : 
    
CA Technologies
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.