HIT Consultant Insightful coverage of healthcare innovation
 

sufficient

Results 51 - 75 of 92Sort Results By: Published Date | Title | Company Name
Published By: CEB     Published Date: Jul 01, 2014
Employee engagement is necessary but not sufficient in achieving your company’s key business priorities. Learn how to ensure workers are engaged and aligned with your organization's strategy, and agile enough to create and sustain advantage in an ever-changing marketplace.
Tags : 
new work environment, agility, engagement, alignment, organization, strategy, marketplace
    
CEB
Published By: APSALAR     Published Date: Jun 08, 2015
Because a DMP is a complex piece of technology, it can feel daunting for a marketer to thoughtfully evaluate alternatives. That’s why we’ve created this paper – to help simplify and streamline the process by suggesting a short list of questions that get to the heart of what matters strategically in a DMP so that you can make your decision with a focused yet sufficient set of information.
Tags : 
    
APSALAR
Published By: AWS     Published Date: May 31, 2018
Effective security for cloud-hosted web applications requires full visibility into the environment in which the apps live and the potential exposure to vulnerabilities — and to do so consistently, while proactively monitoring for attacks without causing delays in application development and delivery. Cloud adoption means that a focus on perimeter security is not sufficient and may even be obstructive, because it can impact application performance and availability. By completing this form, I agree that I'd like to receive information from Amazon Web Services, Inc. and its affiliates related to AWS services, events and special offers, and my AWS needs by email and post. You may unsubscribe at any time by following the instructions in the communications received. Your information will be handled in accordance with the AWS Privacy Policy. https://aws.amazon.com/privacy/
Tags : 
    
AWS
Published By: Anaplan     Published Date: Mar 29, 2018
As businesses grow more optimistic about opportunities for growth, the pressure is on for sales organizations to meet ever higher revenue targets. In a global survey on sales performance optimization by CSO Insights, 94 percent of respondents said their 2014 revenue targets were higher than last year’s. It’s no wonder that “capture new accounts,” cited by 60 percent of respondents, topped the list of objectives for 2014 in the study. At the same time, many sales reps are struggling to meet even their current quotas. And in an Aberdeen Group survey, nearly half identified insufficient revenue growth as the top pressure motivating them to pursue sales management initiatives ranging from building out the capabilities of sales teams to improving management practices and investing in technology tools.
Tags : 
sales, performance, revenue, optimization, objectives, accounts
    
Anaplan
Published By: MuleSoft     Published Date: Jan 16, 2018
The world of retail is changing dramatically. Retailers used to have anonymous, transactional relationships with their customers; but now both retailers and customers want a deeper relationship. The retailers that win today are the ones that use technology to build those personal customer experiences and transform their digital retail experience. However, it isn’t always easy to implement new solutions with existing systems. Read this eBook to discover: Why existing approaches are not sufficient for the pace of digital transformation that retail demands How to drive technology change in your organization, creating a greater capability to innovate and transforming the digital retail experience for your customers How to adopt an API-led approach to integration that packages underlying connectivity and orchestration services as easily discoverable and reusable building blocks
Tags : 
    
MuleSoft
Published By: MuleSoft     Published Date: Nov 27, 2018
The world of retail is changing dramatically. Retailers used to have anonymous, transactional relationships with their customers; but now both retailers and customers want a deeper relationship. The retailers that win today are the ones that use technology to build those personal customer experiences and transform their digital retail experience. However, it isn’t always easy to implement new solutions with existing systems. Read this eBook to discover: Why existing approaches are not sufficient for the pace of digital transformation that retail demands How to drive technology change in your organization, creating a greater capability to innovate and transforming the digital retail experience for your customers How to adopt an API-led approach to integration that packages underlying connectivity and orchestration services as easily discoverable and reusable building blocks
Tags : 
    
MuleSoft
Published By: EMC Corporation     Published Date: Dec 08, 2014
Traditional methods for provisioning and maintaining storage resources are no longer sufficient to achieving business goals due to the fact that technology layers mask the relationship of application workloads to the physical storage devices that support them. The broad adoption of disruptive technologies - including cloud, virtualization, mobility, software-defined data centers, and big data - have introduced new and more challenging requirements for enterprise IT. Find our more in this whitepaper.
Tags : 
cloud, big data, software-defined data, virtualization, storage, mobility
    
EMC Corporation
Published By: Secure Computing     Published Date: Jan 25, 2008
In an environment where business and government databases store ever-increasing amounts of sensitive and confidential data; and where a growing number of employees need to access that data remotely, password security alone is insufficient to ensure user authentication. Two-factor authentication requires two measures for users to verify their identities and access data.
Tags : 
cell phone, cell phones, wireless security, mobile security, mobile workers, authentication, 2-factor authentication, iam
    
Secure Computing
Published By: ACTEK, Inc.     Published Date: Aug 30, 2007
Download this very brief guide now and reflect on the 9 Indicators. If you answer "no" to two or more of the questions listed within, there is undoubtedly sufficient ROI to strongly consider replacing your current incentive compensation system.
Tags : 
incentive compensation, incentive, sales, salesforce, salesforce management, sales manager, sales management, bonus
    
ACTEK, Inc.
Published By: Axeda Corporation     Published Date: Sep 06, 2007
Enabling IT equipment vendors to perform remote service on your data centers helps maximize uptime and lower TCO—but at what risk? Dial-up modems and VPNs introduce security vulnerabilities and lack sufficient auditing capabilities—making it virtually impossible to track external access and maintain data center security. Download this white paper to learn how you can manage security risks, lower service-related costs, achieve regulatory and internal compliance, and more.
Tags : 
remote, remote access, remote network, network management, network security, data center, datacenter, data center management
    
Axeda Corporation
Published By: Stratus Technologies     Published Date: Sep 19, 2007
For mission-critical IT, service outages and data loss pose serious consequences.  This white paper examines how availability management, disaster recovery and business continuity support one another and offers insight to find success at all of them.
Tags : 
business continuity, disaster recovery, high availability, stratus, stratus technologies
    
Stratus Technologies
Published By: SAS     Published Date: Jun 05, 2017
From cars to factories to cities, many governments are already collecting information from citizens and connected devices that send and receive data over the internet of things (IoT). While analysts expect the IoT to soar to tens of billions of devices by 2020, no one knows how many or what new types of intelligent devices will emerge. But we do know that traditional approaches to data management and analytics may not be sufficient for sustaining value in this new, connected world
Tags : 
    
SAS
Published By: AWS     Published Date: May 25, 2018
Effective security for cloud-hosted web applications requires full visibility into the environment in which the apps live and the potential exposure to vulnerabilities — and to do so consistently, while proactively monitoring for attacks without causing delays in application development and delivery. Cloud adoption means that a focus on perimeter security is not sufficient and may even be obstructive, because it can impact application performance and availability. Similarly, relying on your cloud service provider’s security services is insufficient; any provider will tell you that securing the cloud environment is a shared responsibility between cloud service provider and customer, and the responsibility for specifically securing web applications is the sole responsibility of the customer. And although the industry as a whole has become better at protecting lower-level network and server resources, as attackers look for targets, they are moving up the application stack.
Tags : 
    
AWS
Published By: VM Ware     Published Date: Nov 04, 2009
Hopefully your business will never have to experience a major disaster. But having an effective disaster recovery plan with sufficient documentation, adequate testing, and well trained staff will increase your chances of survival when faced with a minor or major catastrophe.
Tags : 
disaster recovery, infrastructure, data
    
VM Ware
Published By: Cisco Systems     Published Date: Dec 23, 2013
Does your WAN provide sufficient performance and reliability for your remote-site users? In this guide, discover how to design a full-service network with secure, encrypted communications using Cisco Dynamic Multipoint VPN technology. Download Design Guide
Tags : 
vpn, wan, cisco, cisco validated designs, cvds, remote-site user performance, full-service network, encrypted communications
    
Cisco Systems
Published By: SAS     Published Date: Mar 06, 2018
Despite heavy, long-term investments in data management, data problems at many organizations continue to grow. One reason is that data has traditionally been perceived as just one aspect of a technology project; it has not been treated as a corporate asset. Consequently, the belief was that traditional application and database planning efforts were sufficient to address ongoing data issues.
Tags : 
    
SAS
Published By: APC     Published Date: Feb 19, 2008
Cooling for IT wiring closets is rarely planned and typically only implemented after failures or overheating occur. Historically, no clear standard exists for specifying sufficient cooling to achieve predictable behavior within wiring closets. An appropriate specification for cooling IT wiring closets should assure compatibility with anticipated loads, provide unambiguous instruction for design and installation of cooling equipment, prevent oversizing, maximize electrical efficiency, and be flexible enough to work in various shapes and types of closets. This paper describes the science and practical application of an improved method for the specification of cooling for wiring closets.
Tags : 
apc, power, cooling, it wiring, heat removal, green computing
    
APC
Published By: CarbonBlack     Published Date: Mar 16, 2016
It is now widely recognized that antivirus software is insufficient to protect organizations, large or small, from advanced threats and targeted attacks. In response, organizations are increasingly looking to adopt proactive approaches to security, such as application control, to ensure the fidelity and security of intellectual property.
Tags : 
application control, advanced threats, security, proactivity approaches, security
    
CarbonBlack
Published By: Dextra Technologies     Published Date: Aug 30, 2013
It’s no longer sufficient talk about the importance of mobility for IT-enabled operations. Instead, think about the concept of pervasive mobility, where the current generation of traditional devices like notebooks are augmented, and perhaps eventually replaced, by a new armada of consumer-class devices at the edge of the network. In fact, the bulk of information now being created and stored on corporate networks comes from notebooks, tablets and smartphones.
Tags : 
best practices, pervasive mobility, information technology, mobile, network, gadgets, consumer class devices, smartphones
    
Dextra Technologies
Published By: Dell Software     Published Date: May 28, 2013
Tools and techniques used to protect physical data are no longer sufficient for virtual data assets. How do you know which technology is right for your organization? Let an expert do the work for you: The Buyers’ Guide to Virtual + Physical Data Protection.
Tags : 
dell quest, appassure, data protection, virtual data, physical data protection
    
Dell Software
Published By: IBM     Published Date: Apr 09, 2015
Managing user identities and user-access privileges is a cornerstone of effective security for organizations. It is vitally important to verify that only the right people can access protected resources and that their activities are sufficiently monitored. However, in order to effectively compete and meet customer expectations, organizations are increasing the number of users—including customers, employees, citizens, partners and suppliers—who are allowed to access information across the web, the cloud and federated environments. This trend makes identity and access management even more challenging and exposes organizations to many potential risks.
Tags : 
user identities, ibm, user access privileges, customer satisfaction, information access, cloud, security risks
    
IBM
Published By: Group M_IBM Q119     Published Date: Feb 22, 2019
Society simply must change the way it serves its most vulnerable members. Service delivery models are outdated and constrained by budgets, organizational structures and legislation. Citizens aren’t getting what they need to become more self-sufficient and recover from hard times or significant events such as disasters. Government isn’t keeping up with the demand generated by the complex times we live in and agencies are stressed to the breaking point by current service expectations. Something different must be done to generate better outcomes. This action requires better engagement between government and citizens which can lead to more self-reliant individuals and lower demands and costs on government. In California, one county is tackling this challenge head on and has found a better way to serve their citizens.
Tags : 
    
Group M_IBM Q119
Published By: IAG Consulting     Published Date: Aug 24, 2010
Requirements quality is tangible. It is possible to look at the specific characteristics of requirements documentation and determine if it is sufficiently clear, accurate and complete to lead to a successful project. Since flawed requirements trigger about 70% of all project failures,1 this paper will present some hard and fast rules for looking at requirements documents, in any format, and being able to determine if they are reasonably well constructed. It will outline the key points to look for in a requirements document, and why this can save a company hundreds of thousands of dollars. Finally, it will offer five straightforward questions to address when evaluating requirements quality. The paper is not intended to be a full audit of requirements, but rather act as a guide and checklist for evaluation.
Tags : 
iag, project management, project management, maturity, consulting, business requirements
    
IAG Consulting
Published By: LeapFrog Interactive     Published Date: Jan 23, 2009
Demographics alone are no longer sufficient to provide a brand with the kind of information it needs to understand what truly motivates consumer behavior.  To delve deeper into the minds of its target audience, brands need to utilize psychographics. Learn more today!
Tags : 
leapfrog, industry research, psychographics, psychographic research, consumer behavior
    
LeapFrog Interactive
Published By: Eaton Corp.     Published Date: Jun 01, 2009
Virtualization can deliver dramatic benefits for data centers, but it can also stress the underlying support infrastructure.  Power and cooling systems—which may have been quite sufficient for pre-virtualization needs—could easily become inadequate when data center performance patterns are radically altered.  This paper describes some of power challenges related to virtualization—and the readily available technologies to address them.
Tags : 
virtualization, data center, infrastructure management, power, cooling, monitoring.
    
Eaton Corp.
Start   Previous    1 2 3 4    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.