HIT Consultant Insightful coverage of healthcare innovation
 

outlines

Results 351 - 375 of 505Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Apr 09, 2015
This buyer’s guide can help you select the right identity and access management solution to successfully manage and control user access within, across and between organizations. The guide outlines the most common identity and access management challenges organizations face from the perspective of CSOs, IT operations staff, line-of-business managers and enterprise architects. It then provides a checklist for evaluating solutions and defines the capabilities required to address security complexity, compliance and cost.
Tags : 
access management solution, ibm, security risk, security compliance
    
IBM
Published By: IBM     Published Date: May 27, 2015
This white paper from a leading analyst, VDC Research, outlines some of the key opportunities and challenges facing companies that make the "things" that comprise the Internet of Things.
Tags : 
internet of things, product development, time to market, data analysis
    
IBM
Published By: IBM     Published Date: Jul 15, 2015
This ebook outlines four steps to develop a proactive approach to data security and privacy that will help you keep big data safe
Tags : 
big data security, data privacy, data protection, sensitive data, data risk management, vulnerability management, ibm solutions, data breaches, compliance
    
IBM
Published By: IBM     Published Date: Oct 02, 2015
Moving your company's security intelligence monitoring and management to the cloud can provide access to market leading capabilities and reduce capital expense. This paper outlines the advantages of the IBM security intelligence solution, delivered from the cloud, and monitored by service professionals.
Tags : 
cloud, security intelligence, ibm security, ibm security intelligence solution
    
IBM
Published By: IBM     Published Date: Oct 02, 2015
This ebook outlines four steps to develop a proactive approach to data security and privacy that will help you keep big data safe, and shows how IBM InfoSphere solutions can help protect data while giving your staff the right levels of access to do their jobs efficiently and accurately.
Tags : 
ibm, big data, data security, privacy strategies, ibm infosphere
    
IBM
Published By: IBM     Published Date: Jan 07, 2016
This paper outlines the advantages of the IBM security intelligence solution, delivered from the cloud, and monitored by service professionals.
Tags : 
ibm, security, intelligence, cloud
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
Moving your company's security intelligence monitoring and management to the cloud can provide access to market leading capabilities and reduce capital expense. This paper outlines the advantages of the IBM security intelligence solution, delivered from the cloud, and monitored by service professionals.
Tags : 
ibm, security intelligence services, ibm security intelligence solution, cloud
    
IBM
Published By: IBM     Published Date: Jul 17, 2018
With the deadline for GDPR compliance looming in May 2018, it’s a good time for security and privacy professionals to take stock of how their readiness efforts and approaches compare to the rest of the industry. This data-driven report outlines the current state of compliance, trends by industry and geography, and key Forrester recommendations for moving your efforts forward.
Tags : 
    
IBM
Published By: Group M_IBM Q418     Published Date: Sep 10, 2018
Digital transformation is not a buzzword. IT has moved from the back office to the front office in nearly every aspect of business operations, driven by what IDC calls the 3rd Platform of compute with mobile, social business, cloud, and big data analytics as the pillars. In this new environment, business leaders are facing the challenge of lifting their organization to new levels of competitive capability, that of digital transformation — leveraging digital technologies together with organizational, operational, and business model innovation to develop new growth strategies. One such challenge is helping the business efficiently reap value from big data and avoid being taken out by a competitor or disruptor that figures out new opportunities from big data analytics before the business does. From an IT perspective, there is a fairly straightforward sequence of applications that businesses can adopt over time that will help put direction into this journey. IDC outlines this sequence to e
Tags : 
    
Group M_IBM Q418
Published By: Group M_IBM Q418     Published Date: Sep 25, 2018
With the deadline for GDPR compliance looming in May 2018, it’s a good time for security and privacy professionals to take stock of how their readiness efforts and approaches compare to the rest of the industry. This data-driven report outlines the current state of compliance, trends by industry and geography, and key Forrester recommendations for moving your efforts forward.
Tags : 
    
Group M_IBM Q418
Published By: Cisco     Published Date: Jul 11, 2016
The Cisco Nexus® 9000 Series Switches product family makes the next generation of data center switching accessible to customers of any size. This white paper is intended for commercial customers new to Cisco Nexus 9000 Series Switches who are curious how the switches might be feasibly deployed in their data centers. This white paper highlights the benefits of Cisco Nexus 9000 Series Switches, outlines several designs suitable for small-to-midsize customer deployments, discusses integration with existing networks, and walks through a topology validated by Cisco for Cisco Nexus 9000 Series Switches, complete with configuration examples.
Tags : 
    
Cisco
Published By: Group M_IBM Q1'18     Published Date: Mar 16, 2018
This outlines the current state of compliance,trends by industry and geography, and key Forrester recommendations for moving efforts forward
Tags : 
gdpr, ibm, compliance, ibm security
    
Group M_IBM Q1'18
Published By: IBM     Published Date: Apr 13, 2018
This outlines the current state of compliance,trends by industry and geography, and key Forrester recommendations for moving efforts forward
Tags : 
gdpr, compliance, data protection, personal data
    
IBM
Published By: Bulldog Solutions     Published Date: Jul 20, 2009
A call-to-action architecture helps you engage more prospects in conversations that could lead to closed sales. This white paper outlines a strategy to create a call-to-action architecture that sets your sales team up for a success.
Tags : 
conversion mapping, sales pipeline, prospects, call-to-action architecture, lead generation, sales engagement, conversion points, planning, btob, hosted solutions, on-premise, bulldog solutions, lead gen, nurture, convert, sales leads, bds
    
Bulldog Solutions
Published By: Bulldog Solutions     Published Date: Jul 20, 2009
With competition growing for your prospects’ attention, it’s never been more important to create powerful messaging that builds a bridge between an issue that’s on their minds and your company’s solution or service. This white paper outlines three steps for creating relevant messages and effective calls to action.
Tags : 
calls to action, bds, bulldog solutions, messaging, planning, promotion planning, lead gen, topics, messages, effective calls to action, audience, audit, gap, compliance, black box
    
Bulldog Solutions
Published By: Microsoft Dynamics     Published Date: Jul 11, 2007
This white paper outlines ways that technology can help manufacturers meet these challenges, increase operational efficiency, and step ahead of competitors with more proactive planning, greater shared visibility, and more agile and more profitable responses to change.
Tags : 
manufacturing, manufacturer, scm, supply chain, supply chain management, lean methods, lean manufacturing, lean, industrial, competitive, plant, competitive analysis, productivity, microsoft, microsoft dynamics
    
Microsoft Dynamics
Published By: Safari Books Online     Published Date: Jun 08, 2009
This white paper outlines some of the most salient challenges and demonstrates how technology managers can enable their development teams to streamline application development and troubleshooting, while keeping them current on emerging technology, new product versions, and changing market trends-allowing them to move right past the gotchas.
Tags : 
safari books, technology, development, streamline, product, branding, market trends, design, needs, developer, challenges, target, critical data, ruby
    
Safari Books Online
Published By: GoToWebinar     Published Date: Jul 08, 2011
A successful marketing Webinar series can educate your prospects on your company's uniqueness, create a competitive advantage, dramatically increase lead flow, and drive sales. This new eGuide outlines best practices for creating and delivering a successful Webinar series that gives your organization a solid competitive edge.
Tags : 
citrix gotowebinar, live webinar, marketing webinar series development, eguide, competitve edge, key planning, content and distribution
    
GoToWebinar
Published By: GoToMeeting     Published Date: Apr 05, 2011
This Forrester white paper explores the evolution of project management and outlines steps for defining, hiring and developing your next-generation project managers.
Tags : 
project manager, software development, lean, pmbok, soft skills, pmp, forrester
    
GoToMeeting
Published By: GoToMeeting     Published Date: Oct 06, 2011
You only have seconds to make a good impression on prospects. Can you grab their attention and prove your competence in fewer than 90 words? This one-pager by Jill Konrath, sales strategist and author, outlines seven essential guidelines that will increase your email prospecting success.
Tags : 
marketing, citrix, prospect, email marketing
    
GoToMeeting
Published By: SAS     Published Date: Aug 28, 2018
With the widespread adoption of predictive analytics, organizations have a number of solutions at their fingertips. From machine learning capabilities to open platform architectures, the resources available to innovate with growing amounts of data are vast. In this TDWI Navigator Report for Predictive Analytics, researcher Fern Halper outlines market opportunities, challenges, forces, status and landscape to help organizations adopt technology for managing and using their data. As highlighted in this report, TDWI shares some key differentiators for SAS, including the breadth and depth of functionality when it comes to advanced analytics that supports multiple personas including executives, IT, data scientists and developers.
Tags : 
    
SAS
Published By: SAS     Published Date: Dec 20, 2018
Think of the self-service things you use in a day. Gas pumps. ATMs. Online apps for shopping. They’re convenient and easy to use. People choose what they want, when they want – without involving others in their minute-to-minute decisions. What if your organization could treat data discovery and analytics the same way? SAS has combined two of its visual solutions to do just that. SAS Visual Analytics and SAS Visual Statistics share the same web-based interface to provide self-service data exploration and easy-to-use interactive predictive analytics in a collaborative environment. This white paper takes a look at this convergence and outlines how these products can be used together so that everyone, even nontechnical users, can investigate data on their own, create analytical models and uncover new insights that drive competitive differentiation. Your analytics journey just got a lot easier.
Tags : 
    
SAS
Published By: Coverity     Published Date: Mar 13, 2012
This white paper outlines a practical approach to implementing secure practices into the software development lifecycle. And it is only by bringing security into all phases of development that you can begin to protect your operations.
Tags : 
development, lifecycle, software, development, security, secure, practices, phases, protection, malfunction, breach, recall, revenue, attack
    
Coverity
Published By: IBM     Published Date: Apr 10, 2013
This white paper outlines some of the major factors affecting inventory and supply chain management, and covers practices and capabilities that distinguish the most successful approaches to this complex process. You'll learn the factors to consider as you evaluate the maturity of your organization's supply chain and inventory management processes as well as recommendations for incremental improvements that can enable you to cost-effectively upgrade your inventory management system, one step at a time.
Tags : 
predictive, inventory, management, inventory, supply, complex, cost-effective, inventory, supply
    
IBM
Published By: Coverity     Published Date: Apr 20, 2012
This white paper outlines a practical approach to implementing secure practices into the software development lifecycle.
Tags : 
development, lifecycle, software, development, security, secure, practices, phases, protection, malfunction, breach, recall, revenue, attack
    
Coverity
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.