HIT Consultant Insightful coverage of healthcare innovation
 

managers

Results 576 - 600 of 699Sort Results By: Published Date | Title | Company Name
Published By: AirDefense     Published Date: Apr 24, 2007
This document outlines how hackers are exploiting vulnerabilities in 802.11 wireless LANs and describes the widely available hacking tools. As a collection of already published risks to wireless LANs, this white paper is written to inform IT security managers of what they are up against.
Tags : 
hackers, hacker, hacker detection, intrusion prevention, wireless security, wlan, wlans, 802.11, wireless lan, monitoring, airdefense
    
AirDefense
Published By: AirDefense     Published Date: Apr 24, 2007
This white paper is designed to guide network administrators and security managers to design, implement, and enforce wireless LAN security policies that enable every organization to fully reap the benefits of wireless LANs without experiencing undue management pains and security holes.
Tags : 
sox, sarbox, sarbanes oxley, sarbanes-oxley, compliance, hipaa, wlan, wlans, wireless security, wireless lan, wireless lans, vulnerability management, security policy, security policies, airdefense
    
AirDefense
Published By: Hewlett Packard Enterprise     Published Date: Mar 29, 2017
Join this dynamic LinkedIn group to be part of the cyber-security education conversation to gain an understanding for the best practices to improve security. Learn why HP says 64% of IT managers believe their printers are infected with malware, but only 45% of those IT professionals consider printers to be a medium or high risk vulnerability. The first responsibility of IT professionals is to make sure their companyís information is secure and today any device can become an access point threat. Printers and MFPs can be the Achillesí Heel of any cyber-security plan and are a goldmine for hackers looking to steal pertinent information. Join the conversation and learn whatís necessary to protect your company.
Tags : 
hewlett packard, printer security, information technology
    
Hewlett Packard Enterprise
Published By: Informatica     Published Date: Jul 07, 2011
Build your business case for MDM with an illustrated, step-by-step approach that shows executives and managers how MDM generates a single, reliable data set to empower customer- and partner- facing teams to improve sales, customer service and channel operations.
Tags : 
informatica, master data management, mdm, data set, competitive advantage, channel coverage, customer view, bad data, sales performance
    
Informatica
Published By: MCH     Published Date: Jan 29, 2007
Learn how local governments operate, who makes the purchasing decisions, what criteria influence buying decisions, and how timing can play a critical role in the success of your marketing campaigns.
Tags : 
government, local government, mch, mailings.com, database and list managers
    
MCH
Published By: MCH     Published Date: Jan 29, 2007
Not all B2B customers are businesses.  There is a parallel world of non-businesses among your customers that you may not be fully aware of.  Beyond B2B lies the Business-to-Institution (B2i) market, a sector that includes over 2 million institutions, spending $4.1 trillion annually. 
Tags : 
b2b, business to business, b-to-b, institutional marketing, institution, database and list managers, mch, mailings.com
    
MCH
Published By: Concep     Published Date: Mar 26, 2007
It's a long-debated question: is email marketing an art or a science? The answer may surprise you.  Download this paper now to learn more.
Tags : 
email marketing, enewsletters, enewsletter, newsletter design, deliverability, database and list managers, concep
    
Concep
Published By: Synchronicity Marketing     Published Date: Mar 26, 2007
Since most marketers know a lot more about their customers than their non-customers, there are many unanswered questions when it comes to prospecting with email. Download this white paper to learn the five most important steps to successful prospecting with permission email.
Tags : 
email marketing, database and list managers, landing pages, list rentals, database marketing, synchronicity marketing, permission email
    
Synchronicity Marketing
Published By: NovaRising     Published Date: Mar 26, 2007
There is no doubt that science is involved in email marketing, however, it is the art of that science which delivers true response.  Explore standout campaigns, the technologies they employ, and their creative techniques in this presentation.
Tags : 
email marketing, newsletter design, deliverability, database and list managers, enewsletter, e-newsletter, enewsletters, e-mail marketing, novarising
    
NovaRising
Published By: Alacritech     Published Date: Aug 21, 2009
IP storage using Internet SCSI (iSCSI) provides opportunity for many organizations looking to extend existing Fibre Channel SANs to stranded servers, or looking to deploy Ethernet-based SANs. It can reduce costs by allowing IT managers to take advantage of existing, familiar Ethernet networks. Often the biggest complaint white new technology like iSCSI is its ability to provide more than simple functionality and connectivity.
Tags : 
internet scsi, ip storage, ip networks, fiber channel, fibre channel, san, storage area networks, iscsi, alacritech
    
Alacritech
Published By: Alacritech     Published Date: Aug 21, 2009
Customers are increasingly constrained by large transfers of data backup, long backup times to storage devices, and less efficient use of server resources as a result. System and database availability is heavily impacted during backup periods, and with the rapid growth of storage and the need to archive customer data, IT managers are actively seeking solutions for their backup problems.
Tags : 
data backup, backup and recovery, storage, database availability, backup, recovery, servers, backup server, backup servers, data transfer, alacritech
    
Alacritech
Published By: Applix     Published Date: Mar 13, 2007
Financial and business managers today are seeking a higher level of analytical ability to manage business performance than ever before. But these kinds of analyses often lie beyond the reach of most of today's ERP systems.
Tags : 
enterprise resource planning, erp, business analytics, analytical applications, sap, business management, applix
    
Applix
Published By: Bocada     Published Date: Aug 21, 2009
This white paper focuses on Sarbanes-Oxley Act (SOX) regulations relevant to data protection, and describes both best practices and automated tools used by today's leading storage managers and backup/recovery teams to meet the mandates of SOX.
Tags : 
sarbanes oxley act, sarbanes oxley, sarbox, sox, sox compliance, compliance, financial, finance, auditing, security audit, audit, sox audit, data protection, storage management, bocada, bocata
    
Bocada
Published By: HP     Published Date: Jul 08, 2009
This white paper looks at what it takes to deliver a broad set of network storage solutions that address the ongoing needs of IT managers while accommodating their current business requirements. Learn more today!
Tags : 
smbs, small and medium-sized businesses, idc, das, directattached, storage, storage, availability, networked storage, economy, it budget, nas, network attached storage, virtualization, consolidation, fibre channel, value-added resellers, var, serial ata, sata
    
HP
Published By: IBM     Published Date: Mar 17, 2009
CPDA’s Product Lifecycle Management (PLM) research programs target the critical decisions in Product Lifecycle Management challenging Design, Engineering, Manufacturing, and Information Technology managers and executives. CPDA’s PLM collaborative research programs provide indepth analysis of strategies, products, issues, processes, technologies, trends, case studies, and surveys for assessing technology, business goals and objectives, and implementation road maps.
Tags : 
ibm, telelogic, addressing future automotive needs, model-driven systems, product value management, plm, computer-aided design, cad, design/simulation council, product value management, software level modeling, model-driven systems, automotive trends, sysml, csrs, mechatronics
    
IBM
Published By: Internet Security Systems     Published Date: Aug 21, 2009
Mobile and remote workers of all types need high-quality connections to the Internet and to their corporate networks. They need connections from branch offices, homes, airports, hotels and other locations around the world. This truly becomes a security challenge as network managers scramble to meet these needs.
Tags : 
mobile workforce, remote access, network security, wireless security, off-site, remote workers, internet security, internet security systems
    
Internet Security Systems
Published By: Metafuse     Published Date: Sep 26, 2007
In speaking with project managers, directors of operations, vice presidents of professional services, chief financial offers, and other project team members every day, we hear familiar stories repeatedly and there are some trends, or commonalities. This document outlines five of the most common project management challenges.
Tags : 
project management, document management, project planning, project, enterprise resource planning, erp, planning, metafuse, project insight
    
Metafuse
Published By: PerformanceIT     Published Date: Aug 21, 2009
With the current demands on today's CIO and IT Managers, implementing a top notch, easy-to-use proactive network, application and server support structure that meets budgetary confines can seem like a daunting task. Until now...
Tags : 
infrastructure, network management, server management, application performance management, server support, performance management, performanceit, performance it
    
PerformanceIT
Published By: PerformanceIT     Published Date: Aug 21, 2009
The phrase "Best Practices" has become so overused, it has become practically meaningless for IT managers. Improvement is necessary, but where do you start, what tools are appropriate, where do I find actionable information, and how do I do this with minimal cost? If these questions apply to you, this paper provides a plan of attack.
Tags : 
it management, best practice, network management, systems management, improvement, streamline, streamlining, efficiency, efficiencies, productivity, performance management, performance it, performanceit
    
PerformanceIT
Published By: Solidcore     Published Date: Aug 21, 2009
This white paper outlines the issues faced by IT managers in meeting their compliance requirements and explains how Solidcore can be a core component of a sustainable and cost-effective SOX compliance program.
Tags : 
sox, sox compliance, sarbox, sarbanes oxley, archiving, finance, cost control, solid core, solidcore
    
Solidcore
Published By: Tridion     Published Date: Aug 21, 2009
This White Paper explains how Tridion's Web Content Management solution and the technological choices made by Tridion can help organizations achieve their business goals. It is intended for Systems Architects and IT Managers who need to assess the impact of incorporating Tridion into their existing environments.
Tags : 
alignment, business management, business goals, goal-oriented, content management, cms, tridion
    
Tridion
Published By: Villanova     Published Date: Aug 21, 2009
Professionals who master Six Sigma disciplines can become recognized leaders, guiding key projects that result in breakthrough improvements, improving bottom-line results.  This white paper discusses how Project Managers can deliver projects as much as 90% faster, and reduce costs by 25%.
Tags : 
project management, project management tips, 6 sigma, lean methods, lean, pmp, cost control, productivity, business management, villanova
    
Villanova
Published By: x1     Published Date: Aug 21, 2009
This paper describes a new user-centric approach to managing structured and unstructured organizational documents and data. Focusing on end-user features offers significant benefits to corporations, their employees, and their IT managers.
Tags : 
document management, data management, user-centric, desktop search, search and retreival
    
x1
Published By: Quocirca     Published Date: Sep 18, 2008
Businesses of all sizes have to manage an increasing diversity of remote users and devices. The task ranges from simply keeping systems running to ensuring security, compliance and the achievement of environmental goals. Under this sort of pressure, IT managers and managed service providers, to which the task is often outsourced, must have flexible access to powerful tools and an ability to share the data those tools rely on.
Tags : 
quocirca, remote, it management
    
Quocirca
Published By: Neterion     Published Date: Dec 05, 2006
The relentless growth of data and network-intensive applications such as digital imaging, multimedia content, and broadcast/video continues to drive volumes of enterprise data and network traffic. As growth continues, IT managers are challenged with implementing solutions without interrupting critical business processes.
Tags : 
network infrastructure, traffic management, bandwidth management, bandwidth, network management, neterion
    
Neterion
Start   Previous    14 15 16 17 18 19 20 21 22 23 24 25 26 27 28    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.