HIT Consultant Insightful coverage of healthcare innovation
 

outlines

Results 26 - 50 of 506Sort Results By: Published Date | Title | Company Name
Published By: CA Technologies     Published Date: Oct 22, 2014
This paper outlines why legacy service desks and even newer platforms have not delivered on expectations, it describes the requirements for a service desk solution to be truly effective in today’s business environment and it details how CA Cloud Service Management delivers on these key requirements.
Tags : 
service desks, service management platforms, service desk solutions, failing service desks, saas
    
CA Technologies
Published By: CA Technologies     Published Date: Oct 22, 2014
This paper outlines why legacy service desks and even newer platforms have not delivered on expectations, it describes the requirements for a service desk solution to be truly effective in today’s business environment and it details how CA Cloud Service Management delivers on these key requirements.
Tags : 
service desks, service management platforms, service desk solutions, failing service desks, saas
    
CA Technologies
Published By: CA Technologies     Published Date: Oct 22, 2014
This paper outlines why legacy service desks and even newer platforms have not delivered on expectations, it describes the requirements for a service desk solution to be truly effective in today’s business environment and it details how CA Cloud Service Management delivers on these key requirements.
Tags : 
service desks, service management platforms, service desk solutions, failing service desks, saas
    
CA Technologies
Published By: CA Technologies     Published Date: Nov 12, 2014
This paper by CA outlines the challenges experienced on a daily basis in the IT department
Tags : 
complete it visualization, it operations visibility, application visibility, infrastructure management, uim
    
CA Technologies
Published By: CA Technologies     Published Date: Nov 12, 2014
This paper outlines the benefits of CA Unified Infrastructure Management and how it can have a positive impact on your business
Tags : 
complete it visualization, it operations visibility, application visibility, infrastructure management, uim
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 09, 2015
This paper outlines the defense-in-depth strategy that complements the traditional security solutions to provide protection against ATP's across all four phases of the attack.
Tags : 
advanced persistent threats, apts, defense-in-depth strategy, new security strategies, ca security
    
CA Technologies
Published By: Akamai Technologies     Published Date: Aug 17, 2017
Digital experiences on mobile connections suffer from performance issues, and impatient users compound the challenges that slower, intermittent mobile connections raise. Firms need to build a new discrete delivery tier to improve users’ perception of mobile performance and drive conversion and engagement. By dynamically adjusting to context, this new delivery tier can adaptively send the right assets, optimize the sequence, and modulate streaming rich media. this report outlines the delivery tier technology options that application development and delivery (AD&D) professionals must embrace. this is an update of a previously published report; Forrester reviews and updates it periodically for continued relevance and accuracy.
Tags : 
mobile performance, technology, digital experience, media
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: May 08, 2017
This paper, which has been jointly developed by Akamai and Wuaki.tv — an OTT service provider — covers the importance of satisfying viewer expectations for a broadcast-quality experience by quickly and reliably streaming video online. It explains why it is challenging to do so and outlines best practices for online video delivery. It also explores the option of splitting traffic across multiple content delivery networks (CDNs) versus tightly integrating video player technology with a single CDN in order to improve online video delivery in a strategic manner. Finally, the paper shows how Wuaki.tv chose the latter option and boosted customer retention, customer referrals, and revenues as a result.
Tags : 
content delivery, online video delivery, broadcast quality, viewer expectations, video streaming
    
Akamai Technologies
Published By: IBM APAC     Published Date: Jul 09, 2017
This document outlines how Best-in-Class firms use efficient content processes to achieve higher levels of customer centricity.
Tags : 
customer, ecm, enterprise content management, customer experience
    
IBM APAC
Published By: Amazon Web Services     Published Date: Apr 27, 2018
One of the value propositions of an Internet of Things (IoT) strategy is the ability to provide insight that was previously invisible to the business. But before a business can develop a strategy for IoT, it needs a platform that meets the foundational principles of an IoT solution. Amazon Web Services (AWS) believes in some basic freedoms that are driving organizational and economic benefits of the cloud into businesses. These freedoms are why more than a million customers already use the AWS platform to support virtually any cloud workload. These freedoms are also why AWS is proving itself as the primary catalyst to any Internet of Things strategy across commercial, consumer, and industrial solutions. This paper outlines core tenets that should be considered when developing an IoT strategy, the benefits of AWS in that strategy and how the AWS cloud platform can be the critical component supporting those core tenets.
Tags : 
    
Amazon Web Services
Published By: Cisco     Published Date: Oct 08, 2015
This paper outlines and explains the 5 steps to help defend your network from infection, hacking and hard to detect threats.
Tags : 
network defense, hacking, detecting threats
    
Cisco
Published By: Entrust Datacard     Published Date: Nov 29, 2016
This guide outlines the key elements of a certificate lifecycle management process and how to provide adequate tools and training to implement this process.
Tags : 
ssl, ssl certificate, lifecycle management process, ssl digital certificate
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jun 14, 2017
This guide — intended for IT and security professionals — outlines the key elements of a certificate lifecycle management process and how to provide adequate tools and training to implement this process.
Tags : 
    
Entrust Datacard
Published By: Jonckers     Published Date: Apr 11, 2011
This case study examines Adobe's globalization efforts in transforming traditional practices to global content value chains and outlines how Adobe's been able to do it successfully.
Tags : 
jonckers, multilingual product content, value chain, machine translation, localization, adobe systems, global content value chain, gcvc
    
Jonckers
Published By: EMC     Published Date: Apr 15, 2011
This handout outlines how EMC integrates with VMware more than any other vendor, how EMC VNX is built with virtual environments in mind and how EMC does the most to enable customers to properly implement and maximize the benefits for VMware virtualization.
Tags : 
vmware, emc vnx, virtualization, integration, vsphere, vstorage api, vnx series
    
EMC
Published By: MicroStrategy     Published Date: Sep 09, 2014
Improve revenue, loyalty, and productivity while controlling costs. It’s a given: Most shoppers are now armed with a mobile device when they enter a retail store. They are highly informed and expect retail employees they interact with to be at least, if not more knowledgeable about a store’s products, promotions, and services. This white paper outlines the 5 key benefits of a winning mobile app strategy, including new ways retailers can effectively leverage mobile technology as a competitive advantage. With the average shopper looking at their phone more than 150 times a day, learn how leading retailers leverage mobile technology to: Enhance customer experience Drive sales Boost customer loyalty Achieve operational efficiencies Download this white paper to find out how retailers with a powerful, effective mobile app program in place can win the battle for shoppers’ eyes and ears — and wallets.
Tags : 
mobile apps, customer experience, customer loyalty, operational efficiencies, mobile technology, sales lift, customer loyalty, best practices
    
MicroStrategy
Published By: BMC Software     Published Date: Jun 25, 2013
Large gaps and loss of productivity challenge the value, agility and cost of IT across the globe. “Exploring Business and IT Friction: Myths and Realities,” outlines key issues that cause friction between business users and IT, such as: • Gaps in customer satisfaction and the perceived value of services • Inadequate IT support, which decreases productivity and revenue • Lack of communication and ownership in how business users and IT work together to identify service levels and technology needs See what 900 business and IT professionals had to say and get recommendations for change.
Tags : 
bmc, productivity, it support, customer satisfaction, technology
    
BMC Software
Published By: Oracle     Published Date: Aug 08, 2013
The era of social networking clearly has arrived, creating significant implications for enterprises. Today, there are compelling rewards for embracing social networks—and potentially severe penalties for putting it off any longer. This white paper outlines four key ground rules for engaging with social networks in order to maximize their potential for improving customer service.
Tags : 
social, customer experience, oralce, social networking, customer service
    
Oracle
Published By: Oracle     Published Date: Aug 09, 2013
Oracle delivers the industry’s most complete, flexible, and global technology foundation to help companies simplify how they manage people. This Strategy Brief outlines Oracle’s HCM solutions.
Tags : 
oracle, strategy brief, hcm
    
Oracle
Published By: Oracle     Published Date: Aug 09, 2013
WEX Inc., a business payment and processing organization has grown from a US based company to a global player. Kelley Shimancky, VP of Organizational Development at WEX outlines the path to successful global HR with Fusion HCM.
Tags : 
wex inc, fusion, oracle
    
Oracle
Published By: Oracle     Published Date: Aug 15, 2013
The era of social networking clearly has arrived, creating significant implications for enterprises. Today, there are compelling rewards for embracing social networks—and potentially severe penalties for putting it off any longer. This white paper outlines four key ground rules for engaging with social networks in order to maximize their potential for improving customer service.
Tags : 
social, customer experience, oralce, social networking, customer service
    
Oracle
Published By: Oracle     Published Date: Aug 15, 2013
Oracle delivers the industry’s most complete, flexible, and global technology foundation to help companies simplify how they manage people. This Strategy Brief outlines Oracle’s HCM solutions.
Tags : 
oracle hcm
    
Oracle
Published By: Oracle     Published Date: Aug 15, 2013
WEX Inc., a business payment and processing organization has grown from a US based company to a global player. Kelley Shimancky, VP of Organizational Development at WEX outlines the path to successful global HR with Fusion HCM.
Tags : 
wex inc, fusion, oracle
    
Oracle
Published By: Secureworks     Published Date: Nov 11, 2016
This paper outlines the discrete layers and levels of a world-class security organisation and programme, and how organisations can take advantage of services from SecureWorks to support their progress toward worldclass status.
Tags : 
managed security services, security, secureworks, threat and vulnerability management, security, security architecture, cyber security
    
Secureworks
Published By: Absolute Software     Published Date: May 31, 2016
The US healthcare industry has historically lagged behind others in the maturity of security capabilities, only recently catching up on data security and privacy in response to HIPAA. But there is a wide range of other mounting risks unique to healthcare that S&R pros in healthcare can’t ignore — greater regulatory pressure, increasing targeted attacks, the frightening uncertainty of IoT security, and global economic pressures. This report outlines the most important security capabilities for security leaders in this sector to implement in the face of these challenges.
Tags : 
healthcare, security capabilities, data security, best practices, security
    
Absolute Software
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.