HIT Consultant Insightful coverage of healthcare innovation
 

ms office

Results 101 - 125 of 127Sort Results By: Published Date | Title | Company Name
Published By: LifeSize, a division of Logitech     Published Date: Jul 07, 2014
How we communicate in the business world is changing. Businesses increasingly have more remote workers. Whether working remote fulltime, part-time or just traveling for business, these workers rely heavily on their own mobile devices to stay connected to their teams, as well as to participate in meetings. Now more than ever, remote workers want (and expect) face-to-face interaction—and they want a seat at the meeting. There’s a strong demand for a video conferencing solution that can provide a simple and instant connected experience from the office to the home and on the go. Download now to learn more about cloud video conferencing.
Tags : 
lifesize, cloud, cloud video, remote, mobile, conferencing
    
LifeSize, a division of Logitech
Published By: Citrix     Published Date: Jul 25, 2014
Mobile devices and applications are quickly becoming as important and widespread in the enterprise as PCs and traditional business apps. Thanks to the consumerization of IT and bring-your-own-device (BYOD) programs, the workplace has expanded beyond the office and even the home to wherever the user happens to be. Traveling executives and Millennials alike expect to communicate, collaborate and access their important work applications and data from anywhere on whatever device they choose.
Tags : 
mobile, enterprise, application gap, pcs, byod, data
    
Citrix
Published By: MapR Technologies     Published Date: Jan 08, 2014
Forrester Research shares seven architectural qualities for evaluating Big Data production platforms. In this webinar guest speaker Mike Gualtieri, Principal Analyst at Forrester, along with experts from MapR and Cisco, will present the following: • The 7 architectural qualities for productionizing Hadoop successfully • Architectural best practices for Big Data applications • The benefits of planning for scale • How Cisco IT is using best practices for their Big Data applications Speakers • Mike Gualtieri, Principal Analyst at Forrester Research • Jack Norris, Chief Marketing Officer at MapR Technologies • Andrew Blaisdell, Product Marketing Manager at Cisco • Sudharshan Seerapu, IT Engineer at Cisco
Tags : 
big data, big data analytics, hadoop, apache hadoop, structured data, unstructured data, business analytics, metadata, analytics, mapreduce, data, data center, mapr
    
MapR Technologies
Published By: VMware AirWatch     Published Date: Mar 02, 2017
As a cloud-based business services suite, Microsoft® Office 365™ provides organizations with access to web, mobile and desktop versions of traditional Office software tools, cloud storage space for enterprise file sharing, and hosted services for communication and social. By making these services available across desktop, mobile, and web platforms, Microsoft is experiencing increased adoption from both consumers and businesses while expanding the possibilities for anytime-anywhere collaboration. Yet for all its promise, Office 365 poses a meaningful adoption and security challenges for the IT organization. This is where VMware Workspace™ ONE™ comes in — we’ve brought together the power of VMware AirWatch® and VMware Identity Manager™ to accelerate and secure Office 365 deployments.
Tags : 
    
VMware AirWatch
Published By: Seamless     Published Date: Jun 18, 2013
Michael Farino is the Hospitality Manager for the New York office of DLA Piper (DLA), one of the world’s largest business law firms.Michael and his team oversee the firm’s meal program and all caterin gand special events. With 500 employees in the office and dozens of client meetings and special events each month, this is no small task. DLA worked with Seamless to create a set of rules that would govern when and how employees could order food. Each and every one of DLA’s 500 NYC-based employees was given a username and password. Everyone was free to log-in and order their own meals. Everyone was also assigned to a specific budget group. These budget groups are based each person’s role at the Firm and can accommodate different spending limits and permission levels. As Michael notes, “right away, Seamless gave us the power to enforce our rules,but still be flexible so people get what they need. It’s a win-win.”
Tags : 
    
Seamless
Published By: Schneider Electric     Published Date: Feb 12, 2018
Small server rooms and branch offices are typically unorganized, unsecure, hot, unmonitored, and space constrained. These conditions can lead to system downtime or, at the very least, lead to “close calls” that get management’s attention. Practical experience with these problems reveals a short list of effective methods to improve the availability of IT operations within small server rooms and branch offices. This paper discusses making realistic improvements to power, cooling, racks, physical security, monitoring, and lighting. The focus of this paper is on small server rooms and branch offices with up to 10kW of IT load.
Tags : 
    
Schneider Electric
Published By: Bocada     Published Date: Aug 21, 2009
This strategic view is the proverbial "gold" that can be mined from your data protection systems; it is the asset that will enable IT management to prioritize activity to bring activities in line with business objectives and communicate policy compliance to corporate officers and data owners.
Tags : 
data consolidation, data protection, business management, business value, security policies, security policy, policy management, mission critical, mission critical data, bocata, bocada
    
Bocada
Published By: Quocirca     Published Date: Apr 08, 2009
The automation of traditional paper based processes with technology can lead to unnecessary complexity. This leads to increased costs and other challenges which can be avoided if solutions are simple and fit closely to the business task in hand.
Tags : 
quocirca, paper systems, it systems, it infrastructure, mobile technologies, functionality, capacity, cost control, cost cutting, ongoing costs, tco, total cost of ownership, anoto, automating business processes, paperless office, paper-based processes, network connection reliability, wi-fi, bluetooth, hardware choices
    
Quocirca
Published By: SpringCM     Published Date: Dec 06, 2006
SpringCM forms the basis for GE Medical’s secure document management platform that connects main office staff with field-based technicians and outside contractors.
Tags : 
document management, case study, content management, cms, content management system, document security, collaboration, springcm, spring cm
    
SpringCM
Published By: Borer Data Systems Ltd.     Published Date: Nov 07, 2007
Purchase price alone is not an accurate measure as to the true costs of a system. When evaluating the products offered by different vendors, the purchaser should take into consideration: purchase cost of equipment and software; cost of installing the infrastructure including data cable and mains power outlet and power cables; cost of installation; cost of maintenance; and more.
Tags : 
energy, power, energy conservation, cost, cost of operation, tco, total cost of ownership, power management, networking, network management, green, green business, environment, environmental, borer, access control, carbon footprint, borer, borer data systems, green office
    
Borer Data Systems Ltd.
Published By: Borer Data Systems Ltd.     Published Date: Nov 07, 2007
Swiping a card to gain access to a company building is now a perfectly accepted feature of everyday corporate life. Over the years, we have all grown familiar with the routine and the advantages it brings to access control. But where cards were once used exclusively to open doors, controlling who went where and when in a building, now they can be used for a wide variety of extra functions.
Tags : 
security, security management, access control, identity management, iam, authentication, tracking, workforce, workforce management, employee management, borer, access control, ip world, borer, borer data systems, office security, building security, card technology
    
Borer Data Systems Ltd.
Published By: ZSL Inc.     Published Date: Jul 20, 2009
One of the vital needs of business is to connect processes, people and information both within across the organizational boundaries. Microsoft Dynamics CRM 4.0, a Customer Relationship Management application, provides solution to the sales managers in accessing the lead/prospect data and promoting their business successfully.
Tags : 
ms office, crm, customer relationship management, lead data, prospect, zsl, office, outlook, excel, dynamics, microsoft, customer data
    
ZSL Inc.
Published By: IBM ILOG.     Published Date: Dec 11, 2009
Learn how WebSphere ILOG Business Rules Management System (BRMS) allows organizations to easily adapt business rules while ensuring compliance with policy requirements and analyzing the business impact of changes against key performance indicators. You will see how the BRMS is used in the back office to create eligibility rules that will be used to automatically screen auto insurance applicants.
Tags : 
ibm ilog, brm, business rules management system, brms, websphere, test, simulate rules
    
IBM ILOG.
Published By: BMC ESM     Published Date: Jul 17, 2009
Join us as we talk with Atwell Williams, Solutions Architect for the Office of the CTO at BMC Software. Get insights into where to start when building and managing a CMDB and find out how to define what "done" looks like. Learn whether a bottom-up or a top-down approach will work best for you, hear important tips for training your team, and get some great practical advice from one of BMC's experts.
Tags : 
bmc, software, cto, solutions architect, cmdb, project, team, organization, implementation, successful team, project management, stage 4, configuration management database
    
BMC ESM
Published By: BMC ESM     Published Date: Jul 22, 2009
Join us as we talk with Atwell Williams, Solutions Architect for the Office of the CTO at BMC Software. Get insights into where to start when building and managing a CMDB and find out how to define what "done" looks like. Learn whether a bottom-up or a top-down approach will work best for you, hear important tips for training your team, and get some great practical advice from one of BMC's experts.
Tags : 
bmc, software, cto, solutions architect, cmdb, project, team, organization, implementation, successful team, project management, stage 4, configuration management database
    
BMC ESM
Published By: Intermec     Published Date: Sep 07, 2011
Using electronic-citation systems to increase number of citations issues and reduce time needed to process them.
Tags : 
intermec, electronic citation, productivity, officer safety, e-citation applications, mil standards
    
Intermec
Published By: Exel     Published Date: Sep 11, 2009
In challenging economic times, companies look for new ways to control costs and improve efficiency. To address these issues, manufacturers are taking a hard, strategic look at Maintenance, Repair and Operations (MRO) supply. Commonly known as "indirect materials," MRO supply includes a vast array of items that support internal operations, ranging from safety gloves and office supplies to spare parts for mission-critical industrial equipment and tooling.
Tags : 
mro, exel, supply, repair, operations, maitenance, mission critical, supply chain
    
Exel
Published By: Okta     Published Date: Feb 24, 2015
This report summarizes the most important factors for deciding between Office 365 and on-premises systems to support e-mail, Web-based document sharing, unified and coexistence possibilities for the most important Office 365 services, and summarizes the licensing and purchasing options for large businesses. communications, and other collaboration functions. It summarizes the major business and technical factors for evaluating Office 365, outlines the technical capabilities, migration options, and coexistence possibilities for the most important Office 365 services, and summarizes the licensing and purchasing options for large businesses.
Tags : 
office 365, on-premises systems, web-based sharing, licensing and purchasing options, technical capabilities, migration options, coexistence
    
Okta
Published By: Asure Software     Published Date: Mar 06, 2014
Since 2005, organizations have created more workspace changes – eliminating vast (and dull) cubicle farms in favor of community spaces arranged to accomplish several goals including: • Maximize existing workspace • Foster more collaboration and teamwork • Accommodate mobile/remote employees who no longer need a dedicated space in an office building Hot desking and desk hoteling are workspace strategies that are here to stay. This executive briefing will help any real estate or facility manager understand how to leverage these concepts, adapt to trends and get a return that the finance team will appreciate.
Tags : 
    
Asure Software
Published By: Polycom     Published Date: Jun 08, 2016
"What are the benefits of moving your phone services to Office 365? How does the Skype for Business phone experience online differ from a traditional on-prem PBX phone experience? What are the important features to consider when selecting phones for your Office 365 cloud deployment? Join Polycom voice experts Randy Wintle and Peter Huboi as they cover these topics and more in one of our most accessed on-demand webinars."
Tags : 
cloud management, cloud services, cloud management, best practices
    
Polycom
Published By: Unitrends     Published Date: Jan 05, 2017
Exchange Online, SharePoint Online, and OneDrive for Business are the applications your business relies on every day. But without a smart backup plan, finding and restoring lost Office 365 data can take hours, days, or even longer. The facts are that data loss can occur in cloud-based applications, including Microsoft Office 365 and deleted items will be permanently removed after 14 days. Read our eBook to learn how to broaden your backup and recovery plan to include purpose built protection for Microsoft Office 365.
Tags : 
unitrends, microsoft office 365, backup, recovery, data loss
    
Unitrends
Published By: VMware AirWatch     Published Date: Dec 13, 2016
As enterprises embrace adoption of Microsoft Office 365 to drive productivity by using the latest mobile applications and alleviate the complexity and costs associated with on-premise Exchange environments, achieving a balance between security and user experience is often difficult. In this 60-minute webinar, discover how VMware AirWatch® Enterprise Mobility Management (EMM) easily integrates with both Office 365 and VMware Identity Manager to optimize user experience and ensure data is secure across all devices and platforms. An AirWatch expert will give an in-depth demonstration of the advantages of deploying Office 365 with AirWatch by VMware, as well as conduct a Q&A session.
Tags : 
    
VMware AirWatch
Published By: Druva     Published Date: Aug 04, 2016
The rise of the mobile workforce, combined with an increasing risk of litigation, has created a crisis for businesses. When faced with a request for eDiscovery—the production of electronically-stored information (ESI) in the course of a lawsuit or investigation—legal and IT teams must identify and place costly, time-consuming holds on responsive files. These holds apply across devices and repositories, both inside and outside the organization, including SaaS-based cloud applications such as Office 365, Google for Work, and Box. And lest these teams become complacent, saying “It won’t happen here,” it should be noted that in 2014, 34 percent of companies faced at least one lawsuit with more than $20 million at issue.
Tags : 
    
Druva
Published By: Druva     Published Date: Aug 04, 2016
The rise of the mobile workforce, combined with an increasing risk of litigation, has created a crisis for businesses. When faced with a request for eDiscovery—the production of electronically-stored information (ESI) in the course of a lawsuit or investigation—legal and IT teams must identify and place costly, time-consuming holds on responsive files. These holds apply across devices and repositories, both inside and outside the organization, including SaaS-based cloud applications such as Office 365, Google for Work, and Box. And lest these teams become complacent, saying “It won’t happen here,” it should be noted that in 2014, 34 percent of companies faced at least one lawsuit with more than $20 million at issue.
Tags : 
best practices, storage, mobile workforce, technology, data, office 365, mobile device
    
Druva
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Forrester Consulting was commissioned to conduct a Total Economic Impact™ (TEI) study to examine the potential return on investment (ROI) enterprises may realize by deploying Cylance's advanced threat protection solution, CylancePROTECT®, and its deployment and configuration services, ThreatZero™. The study aims to provide readers with a framework to evaluate the potential financial impact of CylancePROTECT and ThreatZero on their organizations, which will improve customer success with advanced cybersecurity and antivirus protection solutions. To better understand the benefits, costs, and risks associated with an investment in Cylance, Forrester interviewed the Chief Information Security Officer for a Large State County Government, who has used the solutions for over a year. Cylance provides a new-generation, predictive, cybersecurity, and malware prevention solution that leverages artificial intelligence to prevent malware from executing on endpoints in real time. This is usually implemented with ThreatZero, which is a continuous professional service program rendered by Cylance for users of CylancePROTECT. ThreatZero guides through the planning, implementation, integration, and ongoing optimization of the solution. This often includes end user education, training, and support to totally eliminate endpoint threats and incidents. With CylancePROTECT and ThreatZero, the organization was able to reduce security breaches to almost zero, catching malware before it ever gained access to public records. Relative to their previous endpoint protection, this significantly reduced costs from remediation/reimaging and incidence response. Additionally, IT and security employees’ productivity were boosted. Read more in the full TEI report.
Tags : 
economic, cylance, roi, enterprises
    
BlackBerry Cylance
Start   Previous    1 2 3 4 5 6    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.