HIT Consultant Insightful coverage of healthcare innovation
 

second

Results 326 - 348 of 348Sort Results By: Published Date | Title | Company Name
Published By: Esker     Published Date: Jun 29, 2017
Accounts receivable (AR) is no second-rate department. Not only is it usually the largest company asset, it deals directly with customers and cash flow — things businesses can’t do without. You'd think internal AR processes would be on the cutting edge of innovation, right? Yeahhh … not so much. While departments like sales, marketing and payroll have embraced the use of software solutions, AR has been slow to catch up, with many still relying on sticky notes, calendar reminders and spreadsheets to manage post-sale collections activities. Read this eBook to discover how automation can: • Be a complementary tool that eliminates tedious tasks • Be multi-dimensional, in that its usage can be extended into other areas of AR • Drive repeat sales and allow you to get paid faster Download the eBook now to discover more about Accounts Receivable Automation!
Tags : 
accounts receivable management, invoice management, collections management, ar best practices, invoice portal, invoice delivery
    
Esker
Published By: Intuit, Inc     Published Date: Jun 16, 2009
Nearly every business person regardless of their role – be it marketer, salesperson, consultant, engineer, or business owner – has acquired a second responsibility: project manager. In their desire to move quickly and keep costs low, many of these business people turn to the ubiquitous spreadsheet for help. Using a spreadsheet to track, update, and consolidate project information means spending valuable time on project administration – sending, receiving, and finding e-mails; cutting, pasting, consolidating, and reporting information; and reformatting, saving, and e-mailing spreadsheets.
Tags : 
intuit, quickbase, project management, available, familiar, inexpensive, immediate, spreadsheets
    
Intuit, Inc
Published By: Perimeter     Published Date: Jul 17, 2007
What is the difference between a risk, a threat, a vulnerability and an exploit? Which product or solution can be employed to address my institution’s information security and compliance needs? This paper provides some clarity on the first question, and in the process, it should help to offer an answer to the second question, one of aligning concerns with solutions with vulnerability management.
Tags : 
risk management, vulnerability assessment, ips, intrusion prevention, ids, intrusion detection, firewall, exploit
    
Perimeter
Published By: Polycom     Published Date: Jun 08, 2016
In the past, business meetings were treated like formal events. They were scheduled days or weeks in advance, often on a recurring basis (e.g. every second Tuesday), and had a defined start time and end time. Typically, these meetings had a named meeting host who managed the session and guided the team through a pre-published agenda.
Tags : 
best practices, business optimization, business management, application management, enterprise application, business intelligence, productivity
    
Polycom
Published By: Wasabi     Published Date: Oct 26, 2017
The recent Amazon S3 outage highlights the need for high-quality secondary storage and raises questions around dependence on a single-service provider. Wasabi offers a highly compelling alternative to Amazon S3 Cross Region Replication (CRR) allowing you to keep a live copy of your S3 data on Wasabi for a 1/5th the price of CRR. Fully compliant with S3, Wasabi also provides extreme data durability, integrity and security. In this tech brief we take you through Wasabi’s proposition of extreme savings with zero degradation in quality for secondary storage.
Tags : 
amazon s3, secondary storage, business-critical data, cloud storage, hot storage
    
Wasabi
Published By: Symantec.cloud     Published Date: Oct 11, 2012
Symantec has established some of the most comprehensive sources of Internet threat data in the world through the Symantec Global Intelligence Network, which is made up of more than 64.6 million attack sensors and records thousands per second.
Tags : 
symantec, internet security, malware, identity theft, data security
    
Symantec.cloud
Published By: Symantec     Published Date: Nov 30, 2015
Symantec has the most comprehensive source of Internet threat data in the world through the Symantec™ Global Intelligence Network, which is made up of more than 41.5 million attack sensors and records thousands of events per second.
Tags : 
    
Symantec
Published By: Symantec     Published Date: Nov 30, 2015
Symantec dispose du système de cyberveille le plus exhaustif de la planète. Son nom : Symantec™ Global Intelligence Network. Doté de plus de 41,5 millions de détecteurs d’attaques, cet observatoire enregistre des milliers d’événements à la seconde.
Tags : 
    
Symantec
Published By: Symantec     Published Date: Nov 30, 2015
Symantec vanta la più completa fonte di dati relativi alle minacce Internet, un sapere collettivo raccolto dalla Symantec™ Global Intelligence Network, una rete costituita da oltre 41,5 milioni di sensori di attacco in grado di registrare migliaia di eventi ogni secondo.
Tags : 
    
Symantec
Published By: Carbonite     Published Date: Jan 04, 2018
These days, a lot of organizations are looking to the cloud to help them protect their data. They wish to take advantage of the appealing economics and operational agility that are two of the biggest attributes of a cloud-based IT infrastructure. Leveraging the cloud can be a smart choice for any organization interested in gaining more control over costs (i.e., almost all organizations). According to ESG research, reducing costs was the second most commonly reported business driver affecting IT spending in 2016.
Tags : 
    
Carbonite
Published By: Visible Technologies     Published Date: Jul 24, 2009
The impact of the social conversations has dramatically increased. More than 133 million blogs have been indexed since 2002. Twitter has doubled in size this year alone to roughly 30 million users, who create 1,500 new "Tweets" every second. Facebook's 35-year-old-plus demographic grew to 12 million users in the first quarter of 2009. But that's only part of the story. The results from search engines are even more important. 2,300 searches are performed every second of every day.
Tags : 
social networking, digital age, reputation, social networking, visible technologies, facebook, twitter, youtube
    
Visible Technologies
Published By: Venafi     Published Date: Oct 26, 2015
This is the second part of the Ponemon Institute’s 2015 Cost of Failed Trust Report, which reveals the damaging impacts on global business from unprotected cryptographic keys and digital certificates. This new report reveals that most companies lose customers, suffer costly outages, fail audits, and experience breaches due to unprotected and poorly managed keys and certificates.
Tags : 
security controls, security, security applications, ssl/tls certificates, secure connection, security network
    
Venafi
Published By: Cohesity     Published Date: Nov 20, 2018
Today, hybrid cloud is increasingly the norm, and enterprises are challenged with ways to have visibility, manage and make use of all this data – both on-premises and in the cloud. While much attention has been given to primary data affecting mission-critical workloads, data for secondary workloads – backup, test/dev, disaster recovery, and archiving to name a few – have become siloed the same way application data has, leading to multiple point solutions to manage an increasing amount of data. This white paper looks at the evolution of these challenges and offers practical advice on ways to store, manage and move secondary data in hybrid cloud architectures while extracting the hidden value it can provide. Download to learn more.
Tags : 
    
Cohesity
Published By: Oracle + Dyn     Published Date: Jun 27, 2017
"Most organizations have invested in improving the performance and resiliency of their on-premise Global Load Balancing (GLB) capabilities, but very few organizations are able to achieve the level of performance and high availability that a cloud-based anycast DNS network can offer. Enterprises across the globe have begun complementing their existing GLB with a DNS service that operates in an always-on manner and can effectively manage and balance internet traffic through intelligent steering capabilities. Download whitepaper and learn the keys to: • Maintaining availability - through global and regional load balancing • Improving digital experience in a hybrid cloud environment • Increasing performance and reliability through a secondary DNS solution Learn more! "
Tags : 
    
Oracle + Dyn
Published By: Skillbridge Training     Published Date: Sep 20, 2013
What was once considered futuristic science fiction, Cyber warfare is now today’s reality. Whether in the form of unmanned drones controlled by an operator thousands of miles away from a target, or viruses that travel that same distance in a nanosecond, like it or not, the cyber domain is the next war front.
Tags : 
    
Skillbridge Training
Published By: Conductor     Published Date: Apr 09, 2013
SEO is increasingly maturing in the organization and with increased resources, budget and technology adoption occurring in the last year, expectations are that it will grow even further in 2013. Search’s influence in the organization has grown to such an extent that search is now found second most commonly in its own separate department, something unheard of only a few short years ago. Check out this whitepaper to learn how leveraging SEO technology can grow your organization’s online market share in 2013.
Tags : 
seo, seo technology, budget, roi, search engine optimization, digital marketing, online marketing
    
Conductor
Published By: RES Software     Published Date: Apr 05, 2013
While the inevitable move to Windows 7 has been on the horizon for IT departments for several years, it’s clear that migration projects continue to plague many IT professionals. RES Software commissioned its second Windows 7 migration survey in June 2012 to assess the progress of these implementations in relation to a previous benchmarking survey issued in 2010. The most recent survey captures data from more than 330 IT professionals in North America and Europe across multiple industries and job functions. The results have been analysed and are highlighted within this research brief.
Tags : 
windows 7 migrations, it professionals, survey, capture data, job functions, it professionals in north america, research brief, res software
    
RES Software
Published By: Cisco     Published Date: Jan 21, 2015
As the Internet of Everything (IoE) drives exponential change — and opportunity — customers and retailers face a complex maze of shopping journeys. Mobility and apps now represent a disruption similar in scope to what we saw with e-commerce in the late 1990s and early 2000s. In the second quarter of 2014, total discretionary retail spending rose 3 percent; e-commerce rose 10 percent; and mobile commerce rose 47 percent.
Tags : 
digital, shopping, journey, retail, mobility, apps, e-commerce
    
Cisco
Published By: Workday APAC     Published Date: Jul 18, 2019
"Workday has been named the top-ranked ERP system for hospitals and healthcare organizations in the “2019 Best in KLAS: Software and Services” report by KLAS Research. In addition, we’ve been selected as a Category Leader in Talent Management. We’re honored to be recognized for the second year in a row as the leader enabling healthcare providers to improve efficiencies, reduce costs, and deliver quality care. And we wouldn’t be here without our customers. Learn more about how how their feedback contributed to our top rankings."
Tags : 
    
Workday APAC
Published By: Success Factors     Published Date: Oct 07, 2014
Preparing for the 2020 workforce is critical to business strategy, growth, and performance. To understand the challenges and opportunities, Oxford Economics and SAP surveyed over 2,700 executives and more than 2,700 employees in 27 countries during the second quarter of 2014. We found that many companies lack the structure, strategy, culture, solutions and resources to manage employees effectively. To succeed, they must address the role and relevance of people strategy; changing demographics and evolving definitions of work; leadership ability and cultivation; employee wants and needs; and talent development.
Tags : 
successfactors, workforce, sap, strategy, culture, structure, leadership, cultivation
    
Success Factors
Published By: Dell EMEA     Published Date: Aug 20, 2019
When it comes to longevity, nobody can hold a candle to Dell. Not only do our machines have the capability, manageability and security features that are trusted by IT, but they are designed for long lifecycles, thereby reducing waste and recycling costs. Small wonder they’ve been around for so long. That’s the past, but what about the futuristic features? Latitude 7400 2-in-1 uses Dell’s new ExpressSign-in to detect users’ presence, wake the system in about one second, and scan for facial recognition to log them in with Windows Hello. Users can just sit down at their desk and start working – without control-alt-delete or even reaching for the power button. In fact, it is the world’s first PC to use a proximity sensor enabled by Intel® Context Sensing Technology. When users step away for a break, Latitude will recognize they’ve left and lock itself to preserve battery life and maintain security.
Tags : 
    
Dell EMEA
Published By: Cisco     Published Date: Nov 18, 2015
Historically, the speed of a wired connection at the access edge has always been faster than that of a wireless connection. This means workers had to choose between the performance of wired connectivity and the convenience of a wireless connection. Consequently, workers often had to modify the way they worked— first, finding a wired port to use for high-bandwidth applications, such as video or streaming media, and then shifting to wireless connections when the need to be mobile was more important than having the performance of wired. Today, though, the industry sits on the precipice of the biggest innovation in the history of wireless LAN: the release of 802.11ac Wave 2. Wave 1 of 802.11ac brought network speeds that were 1.3 Gbps (Gigabits per second), which is on par with wired networking speeds. However, 802.11ac Wave 2 shatters the gigabit barrier with speeds of up to 6.8 Gbps.
Tags : 
wifi, lan, infrastructure, poe, network
    
Cisco
Published By: Emulex Corporation     Published Date: Nov 07, 2013
Having 100% accurate network visibility is a looming requirement for avoiding substantial financial losses. Why? And how can you get it? You can’t manage and protect what you can’t see. But while many hundreds of network monitoring tools exist, organizations today know surprisingly little about the traffic on their mission-critical, high-speed networks. It takes them so long to fix network problems that the business suffers while the seconds, minutes, and hours of downtime accumulate. Download this Whitepaper for more information.
Tags : 
network monitoring, network visibility, technology, endace, best practices
    
Emulex Corporation
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.