HIT Consultant Insightful coverage of healthcare innovation
 

rules

Results 126 - 150 of 264Sort Results By: Published Date | Title | Company Name
Published By: EdgeWave     Published Date: Oct 15, 2011
This newly updated handbook is an invaluable tool for IT and HR professionals who need to establish rules for e-communications at their organizations.
Tags : 
e-policy best practices, web filter for enterprise, web security, email security, messaging security, best practices, handbook, edgewave, human resources, p2p, social media, blogging, blog, instant message, instant messaging, peer-to-peer, peer-2-peer, policies, filtering, security
    
EdgeWave
Published By: IBM     Published Date: Dec 07, 2010
To support increasing demands, healthcare organizations need to improve their agility between processes and people through improved information sharing
Tags : 
ibm, advanced case management, healthcare, content management, social networking, collaboration, analytics, policies, rules
    
IBM
Published By: IBM     Published Date: Dec 07, 2010
Case Management and the Implications in these Energy and Utilities Industries.
Tags : 
ibm, advanced case management podcast, energy and utilities industries, content and process management, analytics, business rules, collaboration
    
IBM
Published By: IBM     Published Date: Dec 07, 2010
Case Management And the Implications in the Financial Services Industry.
Tags : 
ibm, advanced case management podcast, financial services industry, customer service, content and process management, analytics, business rules, collaboration
    
IBM
Published By: IBM     Published Date: Dec 07, 2010
Energy and utility companies need to manage incidents such as customer complaints or disputes to improve customer service while protecting the business should escalations occur. Advanced case management (ACM) provides enhanced service and risk management throughout the lifecycle of a case.
Tags : 
ibm, advanced case management podcast, acm, energy and utilities industries, customer service, risk management, business intelligence, content and process management, analytics, business rules, collaboration
    
IBM
Published By: Aveksa     Published Date: Nov 26, 2007
Although roles-based access control (RBAC) has been the subject of much interest in the past, experience with it has been mostly disappointing. The challenge of discovering established roles, defining new roles according to business need, connecting roles properly to the IT infrastructure, ensuring that they meet all compliance requirements, and managing roles through their natural lifecycles has, until now, proved to be too complicated and cumbersome to be practical.
Tags : 
access control, rules, compliance, governance, risk management, rbac, iam, identity management, access management, identity & access management, identity and access management, aveksa
    
Aveksa
Published By: Aveksa     Published Date: Dec 07, 2007
Every large enterprise has employees who need some level of access to its critical information resources, and many also provide a wide variety of types and levels of access to contractors, partners, vendors, and customers. Each of these points of access represents a source of potential business and compliance risk.
Tags : 
access control, access certification, compliant, certification, rules, compliance, governance, risk management, rbac, iam, identity management, access management, identity & access management, identity and access management, aveksa
    
Aveksa
Published By: Proofpoint     Published Date: Apr 22, 2010
This whitepaper addresses the key e-discovery challenges facing legal and IT departments today, form the impact of regulations such as the Federal Rules of Civil Procedure (FRCP) to the technology required to deal with them. Finally, this paper describes how businesses can develop a proactive strategy to deal with e-discovery requests in the event of litigation, saving time and money in the process.
Tags : 
proofpoint, email archiving, e-discovery, federal rules of civil procedure, frcp, electronic data, search and retrieval of messages
    
Proofpoint
Published By: IBM     Published Date: Aug 07, 2012
Databases and information management systems let you describe, categorize, store, modify and analyze data. What if you could do the same with decisions? Your systems could learn from previous choices and manipulate them to fit new parameters to intelligently mold future decisions made by executives, everyday business users and even your systems to optimize outcomes. Read this a specially selected excerpt from James Taylor's new book, "Decision Management Systems: A Practical Guide to Using Business Rules and Predictive Analytics" to discover the guiding principles for building decision management systems that can help your organization differentiate itself from the competition at virtually every decision point.
Tags : 
ibm, technology, decision management systems, business rules, predictive analytics, data, james taylor
    
IBM
Published By: IBM     Published Date: Nov 09, 2012
Many of the latest initiatives in the IT world are focused around aligning IT resources more closely with business users and solution needs. In this white paper, learn to make better business decisions with flexible, automated business rules.
Tags : 
operations decision management, it infrastructure, data management, automated business rules, automated business events
    
IBM
Published By: IBM     Published Date: Jan 17, 2013
Read this excerpt from James Taylor's new book, "Decision Management Systems: A Practical Guide to Using Business Rules and Predictive Analytics" to discover the guiding principles for building decision management systems.
Tags : 
decision, management, business, rules, principles, organization, james taylor's
    
IBM
Published By: Kenshoo     Published Date: Aug 06, 2012
TicketsNow, a leading online resale marketplace for sports, concert, and theater tickets, has created a strong paid search program to drive visitors and conversions to its site, TicketsNow.com. In 2010, TicketsNow began using Kenshoo Enterprise to manage its robust paid search campaigns. Using Kenshoo's algorithmic rules and model-based bid policies, TicketsNow has been able to effectively optimize millions of keywords and double overall contribution from its search engine marketing. To build on its success with the Kenshoo Universal Platform, TicketsNow sought to expand its efforts into social marketing with Facebook ads.
Tags : 
kenshoo, ticketsnow, cost-per-fan, kenshoo social, marketing, sales
    
Kenshoo
Published By: Sage     Published Date: Oct 14, 2014
Managing employer compliance can be a tedious task, but it’s a highly visible, important way that the human resources department minimizes risk for the business and keeps the workforce running smoothly. Use this guide to stay informed about employment laws, reporting rules, and developing workforce compliance issues that may impact your organization. We’ll help you navigate ten crucial mandates, explaining the obligations and compliance considerations you need to be aware of in order to take on your responsibilities.
Tags : 
sage, compliance, workforce, fines, reporting, mandates
    
Sage
Published By: Sage     Published Date: Nov 23, 2015
Learn how to protect yourself and your organization from government scrutiny, noncompliance penalties, or expensive employee lawsuits. Sage created this guide to help you stay informed about employment laws, reporting rules, and developing workforce compliance issues that may impact your organization. We’ll help you navigate ten crucial mandates, explaining the obligations and compliance considerations you need to be aware of in order to take on your responsibilities.
Tags : 
compliance, noncompliance, employer compliance, hr manager, employment laws
    
Sage
Published By: McAfee     Published Date: Apr 14, 2014
Beyond the basics in a next generation firewall, to protect your investment you should demand other valuable features: intrusion prevention, contextual rules, advanced evasion analytics, secured access control, and high availability.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques
    
McAfee
Published By: Red Hat     Published Date: Nov 08, 2017
Accelerated digital transformation places new demands on business. To stay competitive, organizations must quickly adapt their business models and processes. Business process management (BPM), business rules management (BRM), and mobile applications are increasingly important to many business transactions—from customer-facing to business-to-employee (B2E) and business-to-business (B2B) interactions.
Tags : 
digital transformation, business process management, business rules management, mobile applications, application programming interfaces
    
Red Hat
Published By: Oracle     Published Date: Feb 10, 2016
Good supply chain management is essential to your operational efficiency, customer centricity, compliance, carbon footprint, and ultimately, your overall success. If handled correctly, your supply chain should improve customer service—along with the reputation of your brand—and boost your bottom line. But, as with many areas of business, the rules of the game are changing. What’s changing? Well, everything. New regulations, increased buyer expectations, shorter product lifecycles, fluctuations in demand, new market entrants, more ethical supplier management, poor visibility of globalized supply chains—all these things, and more, are testing the limits of the traditional supply chain model. The simple truth is that the way things used to be done, and the solutions that enabled it, are no longer up to the job. Today, organizations need levels of flexibility, integration, and visibility that are beyond what those systems were designed to deliver.
Tags : 
oracle, supply chain leaders, cloud migration, supply chain management, operational efficiency best practices
    
Oracle
Published By: Trend Micro SaaS     Published Date: Feb 09, 2009
Today's confidentiality and privacy requirements drive organizations of all sizes and industries to secure sensitive data in email. Often particular types of data need to be encrypted, such as credit card numbers, intellectual property, or client information. Organizations also need to protect confidential emails for particular groups, such as executive management, human resources or legal departments. Many organizations are turning to policy-based encryption to meet their encryption needs because it automatically encrypts data using content filtering rules that identify types of content or email for particular groups. Encryption is applied when the rules are triggered. With policy-based encryption, organizations avoid relying on individual users to secure important content.
Tags : 
saas, trend, trend micro, software as a service, trendlabs, email security, security, interscan messaging, service level agreement, sla, virus, spam, phishing, distributed denial of service, ddos, encryption, policy based, filtering
    
Trend Micro SaaS
Published By: IBM     Published Date: Apr 04, 2014
In the face of runaway innovation, there are leaders in every industry and region who are determined to push ahead and be the source of innovations that change our world. They've opened up their organizations to new ways of working, and they're leading from a position of trust.
Tags : 
ibm, c suite, global study, technology, customer engagement, digital experience, innovation, business technology
    
IBM
Published By: IBM ILOG.     Published Date: Jul 14, 2009
Has your organization run into difficulties adapting to evolving business conditions? Is there interest in being able to increase the efficiency of your operational processes? Are your business experts looking to more easily control the decisions within mission-critical systems? If you have answered 'yes' to any of the above, you may benefit from integrating a Business Rules Management System (BRMS) into your organization's overall enterprise architecture.  Learn more today!
Tags : 
ibm, organization, brms, business conditions, business rules management system, enterprise, improvement, profitabilty, decrease cost
    
IBM ILOG.
Published By: IBM ILOG.     Published Date: Jul 14, 2009
How-to vidoes explain the inner workings of JRules and BRMS, from writing rules to invoking decision services.  Become an instant expert!
Tags : 
ibm, jrules, brms, video, rules, decision making, services, systems, control, data, customer, customer service
    
IBM ILOG.
Published By: IBM ILOG.     Published Date: Jul 14, 2009
This white paper discusses one of the most effective ways to extend CRM functionality to competitively enhance your customers' experiences. By using business rules as a non-disruptive extension to your existing CRM system, you will facilitate highly personalized, flexible and consistent interactions in real time at the point of contact. Learn more today!
Tags : 
ibm, crm, functionality, customer, efficiency, system, flexible, atm, website, automated, organization, optimization, brms, knowledge, competitor
    
IBM ILOG.
Published By: IBM ILOG.     Published Date: Jul 14, 2009
This white paper explains how a business rule management system can make business process automation easier to understand, maintain and manage. Compare BRMS with other business automation schemes, like traditonal software coding or standard business rule engines. Learn how the Welsh Assembly Government and a United States commercial lender have implemented business rules to make a difference in their business processes.
Tags : 
ibm, bpm, business, business rule management, brms, hipaa, risk, operational cost, software coding, business rules engine, bre, business rule management system, brms, throughput
    
IBM ILOG.
Published By: IBM ILOG.     Published Date: Oct 26, 2009
This case study will showcase the challenges of clinical trial data management, but the highlighted techniques are applicable to any business needing smart, dynamic and adaptive Web-based user interfaces.
Tags : 
brms, business logic, business rules, claims management, data management, data validation, healthcare, productivity, web-based applications
    
IBM ILOG.
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.