HIT Consultant Insightful coverage of healthcare innovation
 

outlines

Results 326 - 350 of 505Sort Results By: Published Date | Title | Company Name
Published By: Taleo     Published Date: Mar 30, 2012
This document outlines two ways that changes in business can impact succession planning and why integrating talent management processes can fill all your talent gaps.
Tags : 
employee wellness, corporate wellness, human capital management, wellness strategy, employee engagement, human resources, human resource management, talent management
    
Taleo
Published By: Qualys     Published Date: Nov 16, 2012
This report from Securosis outlines how yesterday's vulnerability scanners are evolving to meet this need, emerging as a much more strategic component of an organization's control set than in the past.
Tags : 
vulnerability management, it security, security attacks, security data, qualys cloud platform, zero-day threats, security threats, it threats, security risks
    
Qualys
Published By: Quantum - Quinstreet     Published Date: Aug 10, 2011
This paper outlines some of the important considerations for encrypting data on tape, and is intended to help IT administrators make the right decision for their environment and their company's data security needs.
Tags : 
quantum, quinstreet, data deduplication, deduplication, nas, network attached storage, remote replication, virtual tape library, data backup, reduce backup costs, deliver roi, retain data long term, back up virtual servers, secure your stored data, data deduplication and replication, symantec openstorage technology (ost), energy-effcient technology, media and entertainment, broadcast, postproduction
    
Quantum - Quinstreet
Published By: Taleo     Published Date: Feb 01, 2012
This paper outlines a 12 step methodology for building critical talent pipelines and provides insights into strategy and initiatives.
Tags : 
recruitment, recruitment software, talent management, talent management software, taleo
    
Taleo
Published By: Intel Corp.     Published Date: Aug 08, 2012
Virtualization reduces the number of physical servers IT needs to provision and maintain, but it also transforms the data protection paradigm. Now businesses can recover from failures in minutes, not hours, with unprecedented affordability. The key to achieving the best business uptime and cost savings is the effective design of storage management and data protection. This white paper outlines an end-to-end storage and data protection architecture optimized for VMware vSphere and Microsoft® Hyper-V environments.
Tags : 
complete, storage, data, protection, architecture, virtual, environments, virtualization, physical, servers, server, transforms, data, management
    
Intel Corp.
Published By: Intel Corp.     Published Date: Aug 08, 2012
The report outlines the benefits of using HP StoreOnce with NetBackup's integrated Network Data Management Protocol (NDMP) backup capabilities to enhance administrators' abilities to effectively manage NDMP-enabled NAS server backup and recovery.
Tags : 
using, storeonce, ndmp, backup, symantec, netbackup, report, outlines, benefits, network, network, data, management, protocol, nas, server
    
Intel Corp.
Published By: Bridgeline Digital     Published Date: May 17, 2013
Digital touchpoints support an increasingly large percentage of the overall customer experience. 2012 saw the emergence of several important digital customer experience trends that will gain momentum as firms look to unify the cross-touchpoint experiences they deliver in 2013. This report outlines key trends that will make up the landscape that customer experience professionals will be working in as they take strides to improve their digital customer experiences in 2013.
Tags : 
forrester, digital customer experience, customer experience management, customer experience trends, digital experiences
    
Bridgeline Digital
Published By: IBM     Published Date: Sep 03, 2013
This paper describes how workgroups and midsize companies can transform their spreadsheet-only process to create flexible and timely plans, budgets and forecasts. It outlines recommendations for implementing a complete performance management system, using IBM Cognos Express, an integrated reporting, analysis and planning solution purpose-built for workgroups and midsize companies.
Tags : 
transforming spreadsheets, planning, budgeting, forecasting, midsize companies, cognos express, management system, ibm
    
IBM
Published By: Coveo     Published Date: Nov 13, 2013
This eBook outlines cutting-edge strategies and technologies that transform knowledge management initiatives by turning data and information from anywhere into actionable knowledge.
Tags : 
big data, internal knowledgebase, knowledge management, unified search
    
Coveo
Published By: Imperva     Published Date: Nov 07, 2013
This white paper outlines the application threat landscape; explains why next generation firewalls are ill-equipped to stop web attacks; and provides six essential requirements for protecting web applications.
Tags : 
imperva, web applications, web application security, ddos, web attack, data protection, firewalls, next gen firewalls, validation, sql injection
    
Imperva
Published By: Litmos     Published Date: Apr 23, 2015
This guide outlines the foundational building blocks of a Rockstar Customer Training Department. This guide applies to everyone tasked with customer training, regardless of company size.
Tags : 
customer training, scaling, litmos, curriculum design, content creation, digital media creation, learning management system
    
Litmos
Published By: Polycom     Published Date: Jun 08, 2016
"Build your business case. There is a transformational shift around enterprise voice solutions as organizations move from the PBX to unified communications (UC) for their voice needs. In parallel, many organizations are moving their existing on-premises infrastructure into the cloud. This brief outlines the benefits and considerations such as: • Microsoft Office 365 and the cloud • Selecting phones for Skype for Business • Replacing the PBX and making the transition • And more Download this brief that helps you realize the benefits that UC and collaboration brings to the modern workplace."
Tags : 
business optimization, business strategy, network management, business applications, best practices, business process management, productivity
    
Polycom
Published By: Intel Security     Published Date: Apr 06, 2016
This solution brief outlines how security operations must evolve to a continuous operation focused on assessing readiness, acquiring and integrating threat intelligence, and increasing the speed of threat response capability
Tags : 
advanced malware, targeted malware, layered malware defense, targeted attacks, critical infrastructure threats, forensic analysis, static detection, dynamic detection, forensic analysis, application control, vulnerability scanning, real-time kernel protection, change management monitoring, database activity monitoring, siem, network ips, global intelligence, advanced threat defense
    
Intel Security
Published By: Oracle     Published Date: Feb 14, 2013
This executive brief outlines how the use of consistent, enterprise-wide talent management programs can help organizations develop effective leadership and return significant business value.
Tags : 
leadership development, seven steps to success, business value, coporate leadership talent, hiring strategies
    
Oracle
Published By: Citrix Online     Published Date: Jul 01, 2010
This new white paper explores the strategic role first-contact resolution plays in support environments, provides best practices for optimising performance and outlines steps for achieving consistent FCR.
Tags : 
citrix online tech, best practices, first-contact resolution, performance driver, fcr, support centre, tco, problem management, measurement, roi
    
Citrix Online
Published By: Tripwire     Published Date: Jul 08, 2008
This paper outlines the nature of infrastructure integrity, change auditing, and compliance solutions. It describes how an investment in configuration assessment and change auditing solutions can stabilize IT operations, lowering the operational costs associated with the IT infrastructure; be a force multiplier; and provide a solid foundation that increases the effectiveness of the investment in information security.
Tags : 
tripwire, information security, infrastructure, change management, change, change auditing
    
Tripwire
Published By: Tripwire     Published Date: Dec 16, 2009
This Prescriptive Guide outlines the steps information security managers can take to break the compliance blame cycle and build an information security program that works. It also describes how they can achieve alignment among all stakeholders so that information security and compliance activities become integrated into daily business operations.
Tags : 
tripwire, information security, audit fatigue, compliance, security risk
    
Tripwire
Published By: TRUSTe     Published Date: Jul 09, 2010
This paper outlines the key areas where businesses need to focus on as they assess their integrity practices. It also provides a steppingstone to developing a comprehensive framework that will underlie an effective business integrity strategy.
Tags : 
truste, coppa, privacy, protection, ecommerce, enterprise services, trust, hipaa
    
TRUSTe
Published By: TRUSTe     Published Date: Dec 08, 2010
This paper outlines for businesses the mobile landscape and introduces best design and privacy practices for mobile websites and apps, location-aware technologies, and mobile advertising.
Tags : 
truste, mobile platform strategy, design, privacy and security, mobile advertising, website, apps
    
TRUSTe
Published By: Gleanster Research     Published Date: Oct 20, 2013
This research study from Gleanster "From Batch-and-Blast to Lead Nurturing: How Top Performers overcame legacy practices to embrace the new dynamics of B2B marketing." outlines how Top Performing organizations made the move to lead nurturing.
Tags : 
    
Gleanster Research
Published By: Gleanster Research     Published Date: Oct 20, 2013
This research study from Gleanster "From Batch-and-Blast to Lead Nurturing: How Top Performers overcame legacy practices to embrace the new dynamics of B2B marketing." outlines how Top Performing organizations made the switch to marketing automation.
Tags : 
    
Gleanster Research
Published By: IBM     Published Date: Oct 06, 2014
This Aberdeen ebook outlines the business value and best practices of integrating the contact center with omni-channel programs in order to deliver a seamless customer experience across multiple touch-points.
Tags : 
omni-channel strategy, contact center integration, customer experience
    
IBM
Published By: IBM     Published Date: Jul 22, 2016
This research report examines the key issues, and provides recommendations for leveraging data and analytics to help procurement drive greater enterprise value. Based on in-depth interviews with two dozen leading Chief Procurement Officers (CPOs), the report outlines pragmatic steps that every procurement organization can take to leverage analytics and improve engagement with suppliers and key business stakeholders across the enterprise.
Tags : 
ibm, commerce, procurement, analytics, procurement analytics, data, big data, procurement organization
    
IBM
Published By: IBM     Published Date: Jan 05, 2017
This research report examines the key issues, and provides recommendations for leveraging data and analytics to help procurement drive greater enterprise value. Based on in-depth interviews with two dozen leading Chief Procurement Officers (CPOs), the report outlines pragmatic steps that every procurement organization can take to leverage analytics and improve engagement with suppliers and key business stakeholders across the enterprise.
Tags : 
ibm, procurement, commerce, procurement analytics
    
IBM
Published By: IBM     Published Date: Apr 09, 2015
This ebook outlines four steps to develop a proactive approach to data security and privacy that will help you keep big data safe, and shows how IBM InfoSphere solutions can help protect data while giving your staff the right levels of access to do their jobs efficiently and accurately.
Tags : 
data security, ibm, ibm infosphere, privacy strategy, big data security
    
IBM
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.