HIT Consultant Insightful coverage of healthcare innovation
 

best practices

Results 2401 - 2425 of 2721Sort Results By: Published Date | Title | Company Name
Published By: Four Winds Interactive     Published Date: Jul 19, 2019
When it comes to implementing and managing an effective digital signage network, every organization has to start somewhere. Regardless of how many screens you have or what applications you’ve deployed, there’s always something new to learn. But you don’t have to learn every lesson on your own. We’ve compiled a list of tips and best practices from organizations of all sizes—companies with implementations ranging from 10 screens to 2,000 screens. Use this resource to learn from the people that have successfully implemented and scaled digital signage within their organizations.
Tags : 
    
Four Winds Interactive
Published By: Metalogix     Published Date: Aug 22, 2016
Read this eBook to learn the best practices for SharePoint Server 2016 migration
Tags : 
sharepoint, sharepoint server, migrating, best practices
    
Metalogix
Published By: VeriSign Incorp.     Published Date: Apr 15, 2009
"The Shortcut Guide to Business Security Measures Using SSL" examines current information security threats to business and describes techniques for developing a security management strategy that leverages established best practices.
Tags : 
extended validation, green bar, online security, optimize, sgc, server gated cryptography, verisign, trust marks, security, ssl technology, malware, it infrastructure, operating systems, hacking, phishing, dos, cybercrime, bot herders, cloud computing
    
VeriSign Incorp.
Published By: Castlight Health     Published Date: Aug 02, 2016
"You’re charged with much more than “benefits management.” You deliver programs that enable both your organization and your employees to successfully navigate the healthcare experience. Not easy, right? This short guide explores the six highly effective strategies we’ve identified to help benefits leaders lower costs, improve outcomes and increase benefit satisfaction. "
Tags : 
best practices, business optimization, business management, productivity, strategy, effective, organization
    
Castlight Health
Published By: Skillsoft     Published Date: Jun 23, 2016
The Skillsoft Learning and Talent Maturity Framework™ is designed to help organizations chart a path to actualize a self-developing organization reality. The framework is based on observations of more than 6,700 organizations with 45 million employees. By taking the complimentary diagnostic, organizations can gauge their current maturity level across nine indicators. At the end of the diagnostic, respondents will receive a report with their current maturity results, as well as prescriptions for advancing to the next stage. As more HR teams resolve to leverage the insights of forward-looking practices and initiate action toward progress, the field itself will become a more indispensable partner to the business. It’s an exhilarating opportunity that simply must be seized.
Tags : 
best practices, business optimization, business management, organization
    
Skillsoft
Published By: SumTotal, a Skillsoft Company     Published Date: Jun 24, 2016
The Skillsoft Learning and Talent Maturity Framework™ is designed to help organizations chart a path to actualize a self-developing organization reality. The framework is based on observations of more than 6,700 organizations with 45 million employees. By taking the complimentary diagnostic, organizations can gauge their current maturity level across nine indicators. At the end of the diagnostic, respondents will receive a report with their current maturity results, as well as prescriptions for advancing to the next stage. As more HR teams resolve to leverage the insights of forward-looking practices and initiate action toward progress, the field itself will become a more indispensable partner to the business. It’s an exhilarating opportunity that simply must be seized.
Tags : 
best practices, business optimization, business management, organization, talent management
    
SumTotal, a Skillsoft Company
Published By: LifeLock     Published Date: Aug 23, 2016
Every employee has a risk of having their identity stolen. Provide your employees with identity theft management by offering LifeLock.
Tags : 
best practices, identity theft, security, protection
    
LifeLock
Published By: BMC Software     Published Date: Aug 05, 2011
The survey findings paint an interesting picture - and an interesting disconnect. The very features that businesses are demanding before they will move to a SaaS solution (such as proven cost-effectiveness advantages over on-premise solutions) are benefits that many businesses are already enjoying from their SaaS solutions.
Tags : 
bmc software, smb it decision maker guide, best practices, software as a service, saas solution, crm, i.t. help desk
    
BMC Software
Published By: Tapinfluence     Published Date: Jun 07, 2016
In this eBook, based on a webinar by TapInfluence featuring PageFair and informed by data presented in PageFair and Adobe’s 2015 Ad Blocking Report, learn the eight facts you need to know about the state of ad blocking today so that you can make smart budget choices, reduce waste, and improve ROI tomorrow.
Tags : 
best practices, business optimization, business management
    
Tapinfluence
Published By: Cyphort     Published Date: Jun 28, 2016
We are pleased to present the findings of The State of Malware Detection & Prevention sponsored by Cyphort. The study reveals the difficulty in preventing and detecting malware and advanced threats. The IT function also seems to lack the information and intelligence necessary to update senior executives on cybersecurity risks. We surveyed 597 IT and IT security practitioners in the U.S. who have responsibility for directing cybersecurity activities and/or investments within their organization. All respondents have a network-based malware detection tool or are familiar with this type of tool.
Tags : 
technology, security, best practices, solutions, network management, detection, protection
    
Cyphort
Published By: AdRoll     Published Date: Jul 14, 2015
If you’re searching for information about attribution, you’ve come to the right place. Solving the attribution problem will be one of the most important things you do to boost ROI for your organization. In fact, 58% of marketers depend on attribution to allocate their marketing budget to the most effective channels. In a few short pages, this guide will deliver all the practical advice you need to run with the pros.
Tags : 
adroll, custom attribution model, roi, best practices, marketing solutions
    
AdRoll
Published By: TriNet     Published Date: Nov 26, 2012
In this report, leading entrepreneurs, recruiters, and investors share the best practices they use to win the talent wars.
Tags : 
startups, recruiting, best practices, hiring, hiring technology
    
TriNet
Published By: TriNet     Published Date: Jul 28, 2015
Download this report in which leading entrepreneurs, recruiters, and investors share the best practices they use to win the talent wars.
Tags : 
best practices, talent management, talent recruitment, cloud-based applications, infrastructure, open-source software, recruitment management
    
TriNet
Published By: SEEBURGER, Inc.     Published Date: Sep 12, 2011
Read the white paper to discover more about the true cost of "free" file sharing systems and file sharing best practices.
Tags : 
seeburger, file sharing, erp systems, file storage, security, file transwer, tco, mft, ftp, file transfer protocol
    
SEEBURGER, Inc.
Published By: LogRhythm     Published Date: Feb 07, 2017
Globally, sophisticated cyber-attacks are compromising organizations at an unprecedented rate and with devastating consequences. Modern attackers, including criminal organizations, ideological groups, nation states and other advanced threat actors are motivated by a wide range of objectives that include financial gain, industrial espionage, cyber-warfare, and terrorism.
Tags : 
security, technology, best practices, information technology, business analytics, business management
    
LogRhythm
Published By: Monotype     Published Date: Jan 10, 2017
Without overstating the situation, it's safe to say there has been a seismic shift in the way brands and customers interact, and with it, an equally profound change in how brands must communicate, market, and relate to their customers. In this eBook, you’ll learn about three areas of particular importance—continuity, customers, and compliance—where type can help deliver on the experience today's consumers expect.
Tags : 
digital design, monotype, design, creative, web fonts, internet marketing, branding, user experience, marketing best practices, marketing, emerging marketing, mobile ads, brand identity, brand health, consistency, continuity, customers, compliance, fonts, branding best practices
    
Monotype
Published By: IBM     Published Date: Jul 15, 2016
"The malware industry supplies all the components cybercriminals need to easily perpetrate malware-driven financial fraud and data theft. In today’s virtual world, the scope of organizations vulnerable to malware-driven cyber crime is quite broad. In addition to banks and credit unions that are subject to online banking fraud, financial fraud can be perpetrated on insurance companies, payment services, large e-commerce companies, airlines and many others. "
Tags : 
cybercrime, financial fraud, best practices, finance, banking fraud, e-commerce
    
IBM
Published By: HP - Enterprise     Published Date: Nov 19, 2008
Matt Rose, Senior Software Security Consultant at Fortify Software, shares his findings from a year analyzing millions of lines of code. He unveils his top ten most common vulnerabilities and provides detailed examples of each. These technical examples come from his experience working with fortune 500 companies, government agencies, and major ISVs.
Tags : 
security, application security, java, vulnerabilities, developer, source code, analysis, fortify software, fortify, security best practices, common vulnerabilities, code
    
HP - Enterprise
Published By: Symantec     Published Date: Oct 01, 2015
Security software and settings on your web server are up-to-date. Your Internet browser and client are up-to-date. Your client computers are free of malware. You keep an eye on the expiry date of your organization’s TLS/SSL certificates and replace them in a timely manner.
Tags : 
tls/ssl, application best practices, security software, malware, software settings
    
Symantec
Published By: MaritzCX     Published Date: Nov 29, 2016
Discover how a successful customer experience measurement program works
Tags : 
maritzcx, cx strategies, customer experience, voice of customer, voc
    
MaritzCX
Published By: Viavi Solutions     Published Date: Mar 21, 2016
IT today is more complex than ever. Public cloud, networks, storage systems, servers, and applications all combine to deliver today’s IT services. But how do you manage such a diverse and complex infrastructure? Can legacy tools help after this seismic shift? This document answers these questions and provides 20 tools you need to deliver services in this new hybrid IT world.
Tags : 
viavi solutions, hybrid it, public cloud, storage systems, it services, legacy tools, best practices
    
Viavi Solutions
Published By: Dialpad     Published Date: Apr 19, 2016
Today, everything about the way we work has changed. Your employees, customers, and extended ecosystem have greater expectations than ever before, and the voice and unified communication solution you select is one of the most important decisions you can make toward a collaborative, connected, and productive workforce. This list gives you some of the most important questions to include in an RFP this year, as well as key insights about how these will play out for your business.
Tags : 
communication, reporting, network management, business intelligence, business management, best practices, productivity
    
Dialpad
Published By: MuleSoft     Published Date: Jan 16, 2018
For the last several years, microservices has been an important trend in IT architecture, and many architects and IT executives experience pressure to jump on microservices as the new hot thing. But there is a feeling that microservices must only be implemented in a certain way, or it is being done incorrectly. This simply isn't so. This whitepaper discusses how microservices presents itself as a series of patterns, and outlines how organizations should select the microservices pattern that makes sense for their own business, goals, and culture. Read this whitepaper to discover: The top six microservices patterns and the advantages and disadvantages of each Foundational best practices to make sure your microservice implementation is successful How Anypoint Platform can help you implement a microservices architecture in a workable way
Tags : 
    
MuleSoft
Published By: Spredfast, Inc.     Published Date: Aug 30, 2011
In the Social Media Pocket Guide, discover best practices for developing full-scale programs. The guide outlines the business case, content strategy, real-world examples and measurement methods for the 6 best ways to use social media.
Tags : 
spredfast, social media management, social media strategy, social media planning, twitter, facebook, linkedin, youtube, flickr, social business, engagement, awareness, monitoring, spredfast, brand awareness, customer care, lead generation, social media objectives
    
Spredfast, Inc.
Published By: Movable Ink     Published Date: Apr 01, 2016
Email marketing has entered a new era of innovation, allowing the travel and hospitality industry to reach and engage consumers like never before. But consumer expectations are also high. Today, a successful email campaign takes contextual messaging and offers that speak to each customer on a personal level. In this playbook, you’ll find examples of contextual email marketing campaigns for the travel and hospitality industry that have proven to engage customers, drive ROI and build a loyal fan base. We’ve also packed it with email tips and best practices designed specifically for today’s travel and hospitality marketers.
Tags : 
email marketing, travel marketing, hospitality marketing, contextual marketing, contextual email, email personalisation, customer experience
    
Movable Ink
Start   Previous    90 91 92 93 94 95 96 97 98 99 100 101 102 103 104    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.