HIT Consultant Insightful coverage of healthcare innovation
 

technology management

Results 376 - 400 of 783Sort Results By: Published Date | Title | Company Name
Published By: Dell Storage     Published Date: Oct 17, 2011
With vStorage APIs, storage area network (SAN) resources can be utilized for greater virtual server performance and more efficient management of the entire virtualized data center. Read this white paper to find out more!
Tags : 
technology, vmware, dell, san, storage area, virtual server, desktop management
    
Dell Storage
Published By: Dell Storage     Published Date: Nov 08, 2011
With vStorage APIs, storage area network (SAN) resources can be utilized for greater virtual server performance and more efficient management of the entire virtualized data center. Read this white paper to find out more!
Tags : 
technology, vmware, dell, san, storage area, virtual server, desktop management
    
Dell Storage
Published By: Kaseya     Published Date: Mar 12, 2015
Banks want to use technology to work smarter, better and faster to maintain regulatory compliance, reduce risk and increase productivity. Automated IT systems management is helping them reach those goals in a seamless, efficient manner.
Tags : 
automated management systems, software management, it automation, financial institutions, regulatory compliance, security management, software patches, audit violations
    
Kaseya
Published By: IBM     Published Date: Aug 21, 2008
For a growing business, it’s increasingly difficult to integrate technological solutions and services to improve service management. So various frameworks have been created to help today’s IT professionals optimize their use of technology in managing IT processes. The third version of the Information Technology Infrastructure Library (ITIL) provides the latest set of process best practices for any service management improvement effort.
Tags : 
ibm, ibm mi, ibm grm, itil, service management, it management
    
IBM
Published By: Cherwell Software     Published Date: Sep 14, 2016
In this Playbook, we will explore a variety of organizations that have embarked on new ways of using IT Service Management technology to support and accelerate growth. Leaders from top worldwide organizations share how they have extended Cherwell Service Management to manage processes, build inviting customer experiences and accelerate success quickly and efficiently.
Tags : 
    
Cherwell Software
Published By: Xactly Corp     Published Date: Nov 16, 2016
Sales Compensation planning season is right around the corner, and there’s no better time than now to start preparing! Join compensation expert Robert Blohm, Xactly’s VP of Strategic Services, for an on-demand webinar which will share industry best practices regarding preparation efforts to help ensure you are ready. We’ll cover everything you need to do BEFORE you start designing. With the right preparation, your new plans will be grounded in reality and guided by the best thinking in your organization. Prepare to succeed.
Tags : 
comp planning, compensation planning, sales compensation planning, comp design, sales compensation, sales compensation software, incentive compensation software, sales commission
    
Xactly Corp
Published By: IBM     Published Date: Jul 13, 2012
Learn how respondents, including nearly 400 senior executives from some of the world's largest enterprises, are incorporating holistic business resilience planning into their businesses through top-level findings and case studies. Download the research report here.
Tags : 
ibm, technology, risk management, global technology, technology, risk study
    
IBM
Published By: Smartling     Published Date: Jul 17, 2014
Today's marketing technology stack offers a simplified, streamlined view of prospects and allows marketers to automate the customer conversion process. You may have a content management system ready to generate compelling content and email and social media marketing systems poised to send that content to prospects in a timely manner. The problem is that many of them don’t speak your language.
Tags : 
smartling, website translation, translate website, global marketing, marketing technology, fast translation, faster translation, translation speed
    
Smartling
Published By: Epicor     Published Date: Sep 07, 2018
As technology improves, lawn and garden retailers are relying more and more on their customer service to gain an advantage and differentiate themselves from the competition. Providing a pleasant customer experience can turn a first-time shopper into a lifelong buyer. In this guide, you’ll discover the important role mobile technology plays in delivering faster, service. Retailers everywhere are implementing mobile tools to empower their employees to support customers—from stock and pricing information to mobile checkout. Epicor Eagle N Series is a fully integrated retail management system that offers a whole host of mobile tools to help you service your customers, stay informed, and make decisions from anywhere. Read our guide and learn how the mobility of Epicor Eagle N Series can provide your retail business with a competitive advantage.
Tags : 
retail store software, retail sales software, retail saas, business retail software, epicor eagle, benefits of epicor eagle, benefits of retail pos, advantages of retail saas
    
Epicor
Published By: Epicor     Published Date: Oct 29, 2018
As technology improves, lawn and garden retailers are relying more and more on their customer service to gain an advantage and differentiate themselves from the competition. Providing a pleasant customer experience can turn a first-time shopper into a lifelong buyer. In this guide, you’ll discover the important role mobile technology plays in delivering faster, service. Retailers everywhere are implementing mobile tools to empower their employees to support customers—from stock and pricing information to mobile checkout. Epicor Eagle N Series is a fully integrated retail management system that offers a whole host of mobile tools to help you service your customers, stay informed, and make decisions from anywhere. Read our guide and learn how the mobility of Epicor Eagle N Series can provide your retail business with a competitive advantage.
Tags : 
retail store software, retail sales software, retail saas, business retail software, epicor eagle, retail pos, point of sale (pos) system, shopping cart software
    
Epicor
Published By: Epicor     Published Date: Aug 30, 2018
As technology improves, lawn and garden retailers are relying more and more on their customer service to gain an advantage and differentiate themselves from the competition. Providing a pleasant customer experience can turn a first-time shopper into a lifelong buyer. In this guide, you’ll discover the important role mobile technology plays in delivering faster, service. Retailers everywhere are implementing mobile tools to empower their employees to support customers—from stock and pricing information to mobile checkout. Epicor Eagle N Series is a fully integrated retail management system that offers a whole host of mobile tools to help you service your customers, stay informed, and make decisions from anywhere. Read our guide and learn how the mobility of Epicor Eagle N Series can provide your retail business with a competitive advantage.
Tags : 
retail store software, retail sales software, retail saas, business retail software, epicor eagle, benefits of epicor eagle, benefits of retail pos, advantages of retail saas
    
Epicor
Published By: Code42     Published Date: Apr 22, 2016
Rapid changes in technology and software, and the nearly universal shift to electronically stored information (ESI), has made eDiscovery more complex and expensive. In a movement to simplify and standardize their procedures—and dissolve some of the extra tensions surrounding litigation—many organizations are bringing phases of the eDiscovery process in house, in particular legal hold. Among other benefits, Code42 eDiscovery simplifies legal hold management. Litigation preparation can be a large task crossing over many departments, but will consistently feature two main players: Legal and IT. This document focuses on those two groups, and aims to enable one to see the eDiscovery world through the point of view of one group—or the other. Read more to find out the details.
Tags : 
code 42, legal process, ediscovery, litigation issues
    
Code42
Published By: Marketo, INC.     Published Date: Sep 25, 2008
In this free marketing Webcast, learn how two very different companies used lead management technology to significantly increase conversion rates—by as much as 500 percent!  Discover: key criteria for selecting a lead management solution... how to get up and running quickly, while avoiding needless costs... how to achieve the marketing results you want—and make it easy to access those numbers anytime.  Find out what lead management can do for your company. View this free Webcast now.
Tags : 
lead management, marketo, conversion
    
Marketo, INC.
Published By: Workforce Software     Published Date: Nov 23, 2015
In order to see the most benefit, organizations must lead with workforce management and they must do so with an eye toward three key issues: Ease-of-use and user adoption Specialization versus standardization Business alignment This paper will explore all three of these areas, and how organizations are leveraging the deep capabilities of modern workforce management technology as the first step of their HCM transformation.
Tags : 
workforce management technology, business alignment, workforce management software
    
Workforce Software
Published By: Q1 Labs     Published Date: Feb 02, 2012
WikiLeaks and Stuxnet have illustrated a few fundamental IT Security issues that have underscored the need for Total Security Intelligence to counter advanced threats and to detect anomalous behavior.
Tags : 
wikileaks, apt, advanced persisent threats, stuxnet, siem, security event management, it network security, security intelligence
    
Q1 Labs
Published By: Dell Storage     Published Date: Apr 17, 2012
Discover the top five distinctions of this solution from other hardware, and learn how it can help you reduce costs.
Tags : 
technology, dell, storage center, storage, san, vmware, desktop management, infrastructure
    
Dell Storage
Published By: IBM Software     Published Date: Feb 03, 2012
In this technical white paper from IBM, learn how predictive analytics can be used to detect internal and external threats to your organization.
Tags : 
ibm, threat detection, technology, security, security policy, risk management, vulnerability management
    
IBM Software
Published By: IBM     Published Date: Aug 07, 2012
In this technical white paper from IBM, learn how predictive analytics can be used to detect internal and external threat detection.
Tags : 
ibm, threat detection, technology, data management, security, it security
    
IBM
Published By: Oracle     Published Date: Nov 14, 2013
Sales people spend more time out of the office than in. When they are out of the office, they need information at their fingertips. And in today’s more mobile, more collaborative, and more data-rich business world, the needs of corporate sales forces are radically changing.
Tags : 
sales, mobility, technology, sales process, relationship management, collaboration, business analytics
    
Oracle
Published By: Oracle     Published Date: Nov 27, 2013
Sales people spend more time out of the office than in. When they are out of the office, they need information at their fingertips. And in today’s more mobile, more collaborative, and more data-rich business world, the needs of corporate sales forces are radically changing.
Tags : 
sales, mobility, technology, sales process, relationship management, collaboration, business analytics
    
Oracle
Published By: Tenable     Published Date: Feb 05, 2018
"This IDC Technology Spotlight examines the evolution of vulnerability management. By leveraging the cloud and new technologies that deliver greater visibility, organizations can gain an accurate picture of their assets and overall risk posture. This is a critical step toward addressing the current landscape where attackers are using a wide variety of vectors such as mobile, social, and cloud-based attacks to infiltrate organizations and steal data. By reading this report you will get an overview of: - Benefits of cloud-based security and vulnerability management - Challenges of adopting cloud-based vulnerability management - IDC assessment of Tenable.io cloud vulnerability management"
Tags : 
vulnerability management, analyst report, idc
    
Tenable
Published By: Dell     Published Date: Nov 12, 2018
IT professionals need tools that make the never-ending log of tasks they face daily, more manageable. While tools like Intel® Active Management Technology (AMT), which is part of the set of Intel vPro™ technologies, can improve management capabilities, learning the software can take time. Download this report today to learn how Dell Client Command Suite can lessen the administrative burden and help your admins maximize their daily productivity.
Tags : 
    
Dell
Published By: LogRhythm     Published Date: Sep 26, 2008
Find out more about how LogRhythm can help organizations fulfill The Federal Information Security Management Act (FISMA) requirements in documentation and implementation of controls for IT systems that support operations and assets.
Tags : 
fisma, nist compliance, comply, security, information technology, information security management, log management, log analysis
    
LogRhythm
Published By: LogRhythm     Published Date: Sep 26, 2008
Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;} The Gramm-Leach-Biley Act (GLBA) was enacted to ensure protection over customer’s records and information. LogRhythm can help financial institutions implement and perform procedures to indentify risks, eliminate or reduce these risks, and to monitor and maintain the implemented processes and procedures to ensure that the identified risks are effectively managed. Please read this whitepaper for more details…
Tags : 
glba, glba compliance, gramm-leach-biley act, compliance, financial technology, finance, comply, security
    
LogRhythm
Published By: LogRhythm     Published Date: Sep 26, 2008
Is your organization adequately meeting the rules and regulations set forth in the Accountability Act of 1996 (HIPAA)? Learn how LogRhythm’s comprehensive log management and analysis solution can help your organization meet or exceed HIPAA regulatory requirements.
Tags : 
hipaa, hipaa compliance, health it, health regulations, compliance, comply, security, information technology
    
LogRhythm
Start   Previous    9 10 11 12 13 14 15 16 17 18 19 20 21 22 23    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.