HIT Consultant Insightful coverage of healthcare innovation
 

rules

Results 226 - 250 of 264Sort Results By: Published Date | Title | Company Name
Published By: RuleStream     Published Date: Aug 21, 2009
This white paper from Managing Automation Research Services addresses how these ideas can be applied by engineer-to-order manufacturers.
Tags : 
product design, product development, made to order, make to order, made-to-order, make-to-order, engineer to order, engineer-to-order, engineering, mars, manufacturing, supply chain, rulestream
    
RuleStream
Published By: RuleStream     Published Date: Aug 21, 2009
Manufacturers of products with highly configurable and ever-changing customer requirements must confront specific challenges and operate far differently than traditional product development environments.
Tags : 
business process automation, business process management, bpm, bpa, scm, enterprise software, productivity, supply chain management, product development, make to order, made-to-order, made to order, rulestream
    
RuleStream
Published By: Sigaba     Published Date: Aug 21, 2009
This document details the mandated and proposed rules generally referred to as the "HIPAA requirements" and how they affect healthcare organizations and their business partners transmit medical information electronically.
Tags : 
compliance, policy based management, business management, hipaa compliance, health, hipaa, privacy, sigaba
    
Sigaba
Published By: IAG Consulting     Published Date: Jul 27, 2010
Requirements quality is tangible. This hard-hitting 10 minute video microcast presents the concrete rules that will allow you to quickly assess a requirements document and determine if it will likely lead to an effective implementation.
Tags : 
iag, project management, project management, maturity, consulting, model
    
IAG Consulting
Published By: NetIQ Corporation     Published Date: Nov 18, 2006
This white paper is a must read for those involved in the process of log management for legal use. You'll examine the admissibility of log data in court cases; maintaining the authenticity of log data; and how log data can be attacked and stand up to scrutiny. And, learn legal terms like Hearsay, Best Evident Rules, etc.
Tags : 
log file, data protection, log management, legal log, log data, log law, authenticated log, netiq, net iq
    
NetIQ Corporation
Published By: Xactis     Published Date: Feb 02, 2007
Learn the 'bottom-up' approach to start Business Rules Extracting, Migrating and Auto Re-architecting your current mission-critical legacy system and their data, into an SOA.  This is a "how-to" presentation addressing how to get started and eventually establish an internal L2S Center of Excellence.
Tags : 
soa, service oriented architecture, service-oriented architecture, business rules extracting, legacy system, erp, enterprise resource planning, mainframe, citrix, xactis
    
Xactis
Published By: Xactis     Published Date: Feb 05, 2007
Learn the ‘bottom-up’ approach to start Business Rules Extracting, Migrating and Auto Re-architecting your current mission-critical legacy system and their data, into an SOA.
Tags : 
soa, service oriented architecture, service-oriented architecture, business rules extracting, software development, c++, quality assurance, legacy system, xactis
    
Xactis
Published By: ElcomSoft     Published Date: Dec 06, 2007
These days we’re always hearing about the "information age," "information technology," and how "information rules the world." We have come to feel that information is everything. But what does that mean, and is information in itself so important? Not completely. We need information to make decisions – that's what is truly important. A proper decision lights the way to success in any situation. That's why having access to information is a competitive advantage in any business environment.
Tags : 
passwords, password, password protected, password management, access control, data protection, information management, elcomsoft
    
ElcomSoft
Published By: LogRhythm     Published Date: Sep 26, 2008
Is your organization adequately meeting the rules and regulations set forth in the Accountability Act of 1996 (HIPAA)? Learn how LogRhythm’s comprehensive log management and analysis solution can help your organization meet or exceed HIPAA regulatory requirements.
Tags : 
hipaa, hipaa compliance, health it, health regulations, compliance, comply, security, information technology, information security management, log management, log analysis, log collection, log analyzer, log tool, logrhythm, security event management, web logs, log collection, regulatory, regulations
    
LogRhythm
Published By: Aprimo, Inc.     Published Date: Dec 23, 2008
Aprimo manages the financial aspects of your marketing process and captures information about each marketing project, which facilitates Sarbanes-Oxley compliance. It puts into place detailed procedures to manage access rights, to create and document business rules that apply to marketing projects and to ensure appropriate review and approval.
Tags : 
aprimo, marketing process, financial control, digital asset management, data management
    
Aprimo, Inc.
Published By: IBM ILOG.     Published Date: Dec 11, 2009
Learn how the WebSphere ILOG JRules Business Rules Management System (JRules BRMS) can automate decision making for data validation, eligibility and pricing in a real-world scenario. This demo shows how JRules BRMS allows organizations to gain a competitive advantage by adapting business systems to evolve with changing business policies and decisions. Click to view this demo!
Tags : 
ibm ilog, brm, business rule management system, jrules, websphere, author, deploy rules, business rules management
    
IBM ILOG.
Published By: IBM ILOG.     Published Date: Dec 11, 2009
Learn how WebSphere ILOG Business Rules Management System (BRMS) allows organizations to easily adapt business rules while ensuring compliance with policy requirements and analyzing the business impact of changes against key performance indicators. You will see how the BRMS is used in the back office to create eligibility rules that will be used to automatically screen auto insurance applicants.
Tags : 
ibm ilog, brm, business rules management system, brms, websphere, test, simulate rules
    
IBM ILOG.
Published By: Athena Security     Published Date: Nov 20, 2009
This paper presents some techniques to cleaning up the rule base along with an effective solution that addresses these automatically for you using Athena FirePAC for Firewall Rule Cleanup.
Tags : 
firewall rules, cisco firewall, netscreen firewall, check point firewall, firewall pci, firewall audit, firewall analysis, firewall rule cleanup, firewall unused rules, cisco pix, juniper netscreen, cisco asa, cisco fwsm.
    
Athena Security
Published By: Athena Security     Published Date: Nov 20, 2009
Making routine changes to the infrastructure should not be an additional source of stress, but with the additional roles of monitoring and troubleshooting often times it is. The reasons for this added stress are described in this paper along with an effective solution for addressing these problems using SolarWinds Orion Network Configuration Manager (NCM) and Athena FirePAC for firewall analysis.
Tags : 
solarwinds, solarwinds orion, solarwinds ncm, firewall management, firewall rules, cisco firewall, netscreen firewall, check point firewall, firewall pci, firewall audit, firewall analysis, firewall rule cleanup, firewall unused rules, cisco pix, juniper netscreen, cisco asa, cisco fwsm.
    
Athena Security
Published By: Bazaarvoice     Published Date: Nov 08, 2010
Today's UK shopper is an "empowered" consumer. This new breed of consumer is changing the rules of engagement for retailers simply by the power they possess in managing their own shopping experiences. Shoppers can easily access competing stores, brands, and products as part of their product research-whether it be online or on their mobiles.
Tags : 
bazaarvoice, engagement, empowerment, uk shopper, channel switch, ecommerce, mobile phones, mobile marketing, wireless
    
Bazaarvoice
Published By: SAS     Published Date: Aug 03, 2016
Banks and financial institutions have faced a spate of regulations centered on capital adequacy since the financial crisis started in 2008. The Basel Committee on Banking Supervision (BCBS) initiated a series of reforms to strengthen risk, capital and liquidity rules across banks. Among the important changes recommended are new rules for calculating Tier I and Tier II capital and the inclusion of additional risk measurement components for market risk, liquidity risk and counterparty risk. Despite these changes, a key drawback of the Basel framework is its focus on historical capital adequacy. While being useful, it does not help assess the impact of stress events on banks from an ex-ante basis. Hence regulatory agencies in several jurisdictions have mandated banks to define a forward-looking capital plan that incorporates stress scenarios.
Tags : 
best practices, business management, finance, banking, financial crisis
    
SAS
Published By: Tavant Technologies     Published Date: Sep 21, 2010
Integrated and closed-loop warranty management strategy to significantly reduce the total warranty spend and reserves, improve product quality, and increase end-customer satisfaction
Tags : 
warranty white paper, warranty solution, warranty management, warranty integration, cross-functional warranty, warranty cost reduction, warranty intelligence, warranty analysis, warranty challenges, warranty business rules, warranty automation, warranty benchmarking, warranty best in class, warranty improvement
    
Tavant Technologies
Published By: Intacct Corporation     Published Date: Jul 13, 2011
A good financial and accounting system should propel your business forward. It should give you the specific insights you need to spot the storms ahead, help you maximize resources with streamlined processes, and be nimble enough to help you navigate the changing currents of today's business environment. Download this white paper to make sure you have the facts straight about what to look for-and what to look out for.
Tags : 
intacct, geni whitehouse, accounting system, investment, gaap, ifrs accounting standards, navigation system, books, currencies, log
    
Intacct Corporation
Published By: Ameriteck Web Services     Published Date: Feb 18, 2011
You want a firm that can understand your business rules and your customer demands and implement it the right way. You want a firm that has an experience and proven track records into the e-Business industry. AWS has it all!
Tags : 
website design, ecommerce websites, ecommerce solution, free quote for website design, website design quote, custom website design, business website design, retail ecommerce solution, small business website design
    
Ameriteck Web Services
Published By: dvsAnalytics     Published Date: Apr 20, 2011
Due to increasingly strict federal, state, and industry regulations aimed at protecting health & financial information, an understanding of the required rules and standards and how they relate to call recording is critical
Tags : 
hipaa, pci dss, nacha, audit logs, call recording, data encryption, user access controls, ephi, phi
    
dvsAnalytics
Published By: Mobile PRM     Published Date: May 18, 2011
This eBook offers the exclusive and critical rules for using the power of mobile to transform your patient relationships.
Tags : 
mobile health, mhealth, ehealth platform, pharmaceutical marketing, patient-centric, mobile health technology
    
Mobile PRM
Published By: Urban Airship     Published Date: Jun 20, 2012
Push is a permission-based, staggeringly powerful mobile customer communication channel. Learn the "7 Rules of Good Push", in this useful primer, from Urban Airship, the world's largest provider of push messaging. A must-read for marketers everywhere!
Tags : 
push, push communications, push messaging, push notifications, mobile communications, smartphone alerts, smartphone push, push messages, permission-based mobile communications, mobile customer loyalty, push applications, mobile apps, mobile messaging, good push, mobile customer communications, personalized mobile alerts, social push, mobile marketing
    
Urban Airship
Published By: Urban Airship     Published Date: Mar 15, 2013
Push is a powerful, permission-based, mobile customer communication channel. Leveraging push effectively inherently demands particular rules of engagement. Learn the “7 Rules of Good Push” in this useful primer from Urban Airship.
Tags : 
customer engagement, push messaing, mobile marketing, mobile, smartphone, good push
    
Urban Airship
Published By: Sage     Published Date: Jul 30, 2014
Managing employer compliance can be a tedious task, but it’s a highly visible, important way that the human resources department minimizes risk for the business and keeps the workforce running smoothly. Use this guide to stay informed about employment laws, reporting rules, and developing workforce compliance issues that may impact your organization. We’ll help you navigate ten crucial mandates, explaining the obligations and compliance considerations you need to be aware of in order to take on your responsibilities.
Tags : 
sage, compliance, workforce, fines, reporting, mandates
    
Sage
Published By: NETIQ     Published Date: Sep 09, 2013
This flash point paper contains 4 simple rules to help you cut your organization’s privileged user access issues and facilitate resolution if and when a problem does arise.
Tags : 
netiq, privileged users, it security, hidden risk, super users, administrative access, security breach, corporate policies, mitigating risk, pum
    
NETIQ
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.