HIT Consultant Insightful coverage of healthcare innovation
 

technology white paper

Results 276 - 300 of 320Sort Results By: Published Date | Title | Company Name
Published By: webMethods     Published Date: Aug 21, 2009
The goal of Business Process Productivity is to enable enterprises to become both highly agile and highly efficient, allowing them to more easily leverage their existing information technology (IT) assets to address market opportunities and pressures, and to create competitive differentiation through their business processes. This white paper describes how webMethods Fabric helps companies increase Business Process Productivity.
Tags : 
business process, bpm, bpa, productivity, competitive, business management, efficiency, web methods
    
webMethods
Published By: Dell Software     Published Date: Jul 18, 2012
Choosing a help desk solution
Tags : 
technology, help desk, management, tracking problems, ticket requests, white paper, customer service
    
Dell Software
Published By: DataViz     Published Date: Feb 06, 2007
Push email is in high demand for today's mobile workforce. If you have Documents To Go with InTact Technology, you can edit your files from anywhere without compromise.  Check out this white paper to find out how.
Tags : 
mobile computing, mobile workers, wireless application software, microsoft office, mobility, dataviz, document management, dataviz intact
    
DataViz
Published By: ZIGZAG Marketing, Inc.     Published Date: Feb 13, 2007
According to a 2005 survey from the CMO Council and KnowledgeStorm, prospects value white papers more than any other content produced by technology companies. And while most technology companies regularly publish white papers, they fail to get the maximum marketing value for their efforts.
Tags : 
whitepaper marketing, white paper marketing, lead generation, zigzag
    
ZIGZAG Marketing, Inc.
Published By: Provenir     Published Date: Mar 14, 2007
Mobile banking - banking on mobile devices including mobile phones, iPhones, Blackberries, and PDAs is taking off again, and financial institutions around the world are rushing to leverage the technology to gain new customers. This white paper describes the mobile banking "revolution", the state of the technology, the challenges, and the benefits.
Tags : 
wireless, wireless application software, wireless security, wireless phones, pda, smart phones, mobile computing, banking
    
Provenir
Published By: Microsoft Dynamics     Published Date: Nov 06, 2008
Microsoft® recently researched the experience of nearly 200 companies with more than 250 PCs that have deployed one or more of the applications in the Microsoft Dynamics line of business management solutions. Among these companies, whose attitudes to technology tended to be more forward looking than usual, a common issue was rapid growth. The pain points most often cited were manual processes that cause mistakes and inefficiencies, the need for more functionality, an inability to scale to support growth, integration problems, especially with the growing number of customer and partner systems, and a lack of operational insight. This white paper explores the experience of these companies in more detail to help you understand how you can use Microsoft Dynamics to support rapid growth and drive business success.
Tags : 
microsoft dynamics, crm, compliance
    
Microsoft Dynamics
Published By: Microsoft Dynamics     Published Date: Nov 06, 2008
Microsoft® recently researched the experience of nearly 200 companies with more than 250 PCs that have deployed one or more of the applications in the Microsoft Dynamics line of business management solutions. Among these companies, whose attitudes to technology tended to be more forward looking than usual, the most common issue was the need for modern systems. The pain points most often cited were manual processes that cause mistakes and inefficiencies, integration problems with other systems (both internal and external), lack of operational insight, and legacy software support and customization issues. This white paper explores the experience of these companies in more detail to help you understand how you can use Microsoft Dynamics to modernize your business processes and drive business success.
Tags : 
microsoft dynamics, crm, compliance
    
Microsoft Dynamics
Published By: Microsoft Dynamics     Published Date: Nov 06, 2008
Microsoft® recently researched the experience of nearly 200 companies with more than 250 PCs that have deployed one or more of the applications in the Microsoft Dynamics line of business management solutions. Among these companies, whose attitudes to technology tended to be more forward looking than usual, a common issue was growth via mergers and acquisitions (M&A). The pain points most often cited were non-integrated, overlapping systems, an inability to scale to support growth, the need for more functionality, and a lack of operational insight. This white paper explores the experience of these companies in more detail to help you understand how you can use Microsoft Dynamics to support your company’s growth via M&A and drive business success.
Tags : 
microsoft dynamics, crm, compliance, global functionality
    
Microsoft Dynamics
Published By: Integration New Media     Published Date: Apr 01, 2008
This new white paper by Integration New Media provides marketing agencies and multimedia developers with a strong foundation of information about Rich Internet Applications (RIAs). From basic definitions through to technology explanations, this white paper is a must-read for those looking to embrace new technologies to satisfy their clients’ growing needs.
Tags : 
multimedia, ria, rich internet applications, web development, inm, integration new media
    
Integration New Media
Published By: Integration New Media, Inc.     Published Date: Sep 18, 2008
This new white paper by Integration New Media provides marketing agencies and multimedia developers with a strong foundation of information about Rich Internet Applications (RIAs). From basic definitions through to technology explanations, this white paper is a must-read for those looking to embrace new technologies to satisfy their clients’ growing needs.
Tags : 
multimedia, ria, rich internet applications, web development, inm, integration new media
    
Integration New Media, Inc.
Published By: CDI     Published Date: Feb 10, 2009
White paper or Webinar?  Free trial or sweepstakes?  Learn how to choose the right offer for your next demand generation campaign – a choice that will have more impact on campaign success than any decision you'll make on copy or design.
Tags : 
connectdirect, cdi, lead generation, high-technology marketers, white papers, webinars, potential leads
    
CDI
Published By: CA Technologies     Published Date: Jul 06, 2011
The concept of cloud computing implies that the cloud computing platform is "mist" - ethereal and simple. In reality, it requires a complex infrastructure and sophisticated processes to make the illusion a reality
Tags : 
cloud-computing. ca, cloud, private-cloud, cloud computing, white paper, whitepaper, whitepapers, white papers
    
CA Technologies
Published By: CA Technologies     Published Date: Jul 06, 2011
Written by Malcolm Fry, this whitepaper is based on the service life cycle approach to service management and it provides a great foundation to organisations who want to reduce risk and gain maximum benefit from cloud computing.
Tags : 
ca. service management, it service management, cloud-computing, cloud, servicedesk, itsm, private-cloud, cloud computing
    
CA Technologies
Published By: Endace     Published Date: Aug 20, 2012
How long did it take to get a permanent fix for your last network problem? Too long? Even worse, did you fall short of actually getting one? If so, it's not surprising. But because of network visibility problems, chances are good that your organization is leaking real money in network and business downtime. With this white paper you will learn valuable information on how to have this problem fixed sooner and maintain better performance from your Network.
Tags : 
endace, technology, white paper, network, noc, network visibility problems, unified communications, virtual desktop infrastructure
    
Endace
Published By: Endace     Published Date: Aug 20, 2012
Organizations don't know what's going on inside their networks, and that's costing them real money. Deploying an intelligent recording fabric with guaranteed 100% packet capture, accuracy, and storage is fundamental to solving the problem. But how do you embrace the new paradigm? To get started, create a list of the system criteria that are mandatory to delivering reliable and complete visibility information to your engineers, so you can be sure their decision-making is on target.
Tags : 
endace, technology, white paper, network, intelligent recording fabric, infrastructure, business risk, intelligent network
    
Endace
Published By: Endace     Published Date: Aug 20, 2012
An intelligent, searchable recording fabric with 100% accuracy sounds pretty useful. But can you calculate a solid ROI to justify it? Use this white paper to figure out how to manage and measure the value and payback of your network and how to increase its benefits.
Tags : 
endace, technology, white paper, network, value, payback, network visibility, infrastructure
    
Endace
Published By: Endace     Published Date: Aug 20, 2012
The status quo in network monitoring is no longer adequate for large organizations. It's simply taking too long for enterprises with mission-critical networks to resolve and find the root causes of network incidents. To speed things up, enterprises must add dedicated incident response and root cause analysis capabilities that are 100% accurate and reliable to their network management arsenals.
Tags : 
endace, technology, white paper, network, network monitoring, network management, networks, reliability
    
Endace
Published By: Infoblox     Published Date: Jun 11, 2012
Companies require products that offload routine functions from the technology staff so that they can focus on more-important tasks. Download this whitepaper to learn what automation can do for you.
Tags : 
infoblox, time, value, network, network automation, automation, tasks, productivity
    
Infoblox
Published By: IBM     Published Date: Jul 13, 2012
This white paper examines the changing nature of the workplace and the demands it places on IT managers for faster delivery of high-quality, flexible services while providing a quick return on IT investment.
Tags : 
ibm, technology, security, white paper, management, it managers, productivity, workplace
    
IBM
Published By: SAP     Published Date: Jul 16, 2012
Contrary to popular belief, an IP-based video surveillance system of 40 cameras offers a lower total cost of ownership (TCO) than an analog-based surveillance system, according to a new study from Axis Communications.
Tags : 
technology, white paper, analog, surveillance, tco, total cost of ownership, infrastructure
    
SAP
Published By: NETIQ     Published Date: Sep 09, 2013
This Forrester Technology Adoption Profile (TAP) shows how growth in mission-critical applications is driving disaster recovery initiatives, enhanced disaster recovery capabilities shorten recovery objectives and the future of disaster recovery rests with advanced continuity tools. To learn more, download your copy of this informative Forrester TAP today.
Tags : 
netiq, disaster recovery, replication, recovery, forrester, technology adoption profile, mission critical, white paper
    
NETIQ
Published By: Symantec Corporation     Published Date: Jun 18, 2014
Cloud computing is rapidly transforming the IT landscape, and the conversation around adopting cloud technology has progressed from if to when. Enterprises are showing strong interest in outsourced (public) cloud offerings that can help them reduce costs and increase business agility. These cloud services offer enormous economic benefits but they also pose significant potential risks for enterprises that must safeguard corporate information assets while complying with a myriad of industry and government regulations. Read this white paper to find out what Symantec is doing help to bridge the gap to cloud computing!
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals
    
Symantec Corporation
Published By: GE Healthcare     Published Date: Feb 23, 2015
Given the wide range of technology options available, it's important for healthcare IT executives to pick the right image management technology and approach for a long-term sustainable solution delivering the desired performance and ROI. This whitepaper explores solutions for multi-layered neutrality, a standards-based framework for unifying medical images and clinical documents across the enterprise and community.
Tags : 
ge healthcare, clinical data, healthcare technology, image management technology, medical imaging, data management, information technology
    
GE Healthcare
Published By: Adobe     Published Date: Mar 03, 2017
With a world of information and accessibility in their pockets, customers can engage with a brand whenever and wherever they want. This flexibility has made mobile technology an essential part of the way both customers and businesses interact. And to deliver experiences that feel personal and intimate, your plan needs to account for a critical building block to any relationship: trust. Read Circles of Trust: Use Mobile to Engage Better, to understand how you can leverage trust to deliver a better customer experience. Read the white paper to learn: The four major circles of trust as a fresh approach to successful customer experience The seven steps to effective optimization The 3 Cs of mobile marketing The steps for developing a mobile optimization plan across your organization
Tags : 
mobile engagement, branding, mobile marketing, mobile optimization
    
Adobe
Published By: Cyveillance     Published Date: Jun 20, 2014
Phishing is defined by the Financial Services Technology Consortium (FSTC) as a broadly launched social engineering attack in which an electronic identity is misrepresented in an attempt to trick individuals into revealing personal credentials that can be used fraudulently against them. In short, its online fraud to the highest degree. Although its been around for years, phishing is still one of the most common and effective online scams. The schemes are varied, typically involving some combination of spoofed email (spam), malicious software (malware), and fake websites to harvest personal information from unwitting consumers. The explosive rise of mobile devices, mobile applications, and social media networks has given phishers new vectors to exploit, along with access to volumes of personal data that can be used in more targeted attacks or spear phishing. The fact that phishing attacks are still so common highlights their efficacy and reinforces the need to implement comprehensive phishing and response plans to protect organizations. An effective phishing protection plan should focus on four primary areas: Prevention, Detection, Response, and Recovery. High-level recommendations for each of the four areas are outlined in this whitepaper.
Tags : 
cyveillance, phishing, security, cyberattacks, cybercriminals, threats
    
Cyveillance
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.