HIT Consultant Insightful coverage of healthcare innovation
 

voi

Results 101 - 125 of 1647Sort Results By: Published Date | Title | Company Name
Published By: Centrix Software     Published Date: Mar 19, 2014
This paper highlights 5 things you may not know about Windows migrations, helping you to identify ways in which to avoid major obstacles.
Tags : 
windows migrations, desktop operating, systems, migration
    
Centrix Software
Published By: Cisco     Published Date: Mar 10, 2011
Read here to know the five ways businesses are taking advantage of new VoIP technology to save money.
Tags : 
cisco, business phone system, voip, voice over internet protocol, voice communication
    
Cisco
Published By: ComCorp     Published Date: Oct 08, 2009
Hiring a search engine optimization firm can be a difficult process. A skilled SEO firm will help you significantly increase the impact of your web presence, while a lesser firm will waste your money, and damage your online reputation. Yet, at least from the outside, the two can look relatively similar.
Tags : 
seo, search engine, sem, search marketing, search engine marketing, meta, meta tags, natural search, keywords, traffic generation, site traffic, web traffic, comcorp
    
ComCorp
Published By: OpenText GXS     Published Date: Apr 21, 2014
5 Ways to Benefit Your ROI using e-Signatures Download to learn more!
Tags : 
gxs, opentext, e-invoicing, invoicing, electronic invoicing, e-signatures, accounts payable, paper invoices
    
OpenText GXS
Published By: CA Technologies     Published Date: Mar 06, 2015
En 2007, Apple lance l’iPhone : le premier smartphone voit le jour. Avec son écran tactile et sa capacité à exécuter des applications légères, l’iPhone a révolutionné le marché du téléphone mobile.
Tags : 
    
CA Technologies
Published By: PGi     Published Date: May 15, 2019
Whether it’s a webinar or webcast, an online event is one of the smartest ways to connect with your audience. But not all online events are created equal. As with anything in life, your results will only be as good as the tools you’re using. We’ve collected five of the most common problems people face when producing an event so you can be prepared to fix them (or better yet, avoid them in the first place!).
Tags : 
    
PGi
Published By: Emarsys - APAC     Published Date: Jun 12, 2019
It’s time to look ahead. We have outlined 5 predictions that we believe marketers should be preparing for in the next 5 years. In this whitepaper, we’ll cover how: • Blockchain will become a greater core component of marketing. • Display advertising as we know it will finally die. • Cross-device identification will become a necessary part of omnichannel marketing. • Voice re-emerges as a distinct channel and internet interface. • All marketing will be done in real time.
Tags : 
    
Emarsys - APAC
Published By: CA Technologies EMEA     Published Date: Oct 18, 2017
OAuth permet à l’utilisateur de déléguer ses droits d’accès à une API, permettant ainsi à un service d’être intégré à un autre pour le compte de cet utilisateur. Ce sont les mêmes fournisseurs du Web social qui ont popularisé le schéma d’exposition d’une API afin de permettre à des développeurs tiers d’enrichir leurs plates-formes qui ont été les premiers à avoir appliqué ces mécanismes de délégation des autorisations. Créé en 2006, le protocole OAuth a permis de standardiser les mécanismes de ce type.
Tags : 
    
CA Technologies EMEA
Published By: HP Enterprise Services     Published Date: Mar 20, 2014
Learn the three basic elements for risk assessment and see how an understanding of these elements will allow you to better understand risk in your organization.
Tags : 
data breaches, protection, prevent data breaches, avoid costs, risk prevention, risk
    
HP Enterprise Services
Published By: Cisco     Published Date: Mar 10, 2011
Find out how deploying a company-wide voice over Internet protocol (VoIP) solution is one of the best ways to realize cost reduction across the organization.
Tags : 
cisco, business phone system, voip, voice over internet protocol, voice communication
    
Cisco
Published By: ActionCOACH     Published Date: Apr 17, 2013
How can you avoid failure while employing the proper tools to gain experience? you can do it by avoiding big mistakes and learning as you go. Download this eBook to learn some of the biggest mistakes that business owners make and how you can avoid them.
Tags : 
social media, actioncoach, social marketing campaign, social marketing best practices
    
ActionCOACH
Published By: StreamSets     Published Date: Sep 24, 2018
The advent of Apache Hadoop™ has led many organizations to replatform their existing architectures to reduce data management costs and find new ways to unlock the value of their data. One area that benefits from replatforming is the data warehouse. According to research firm Gartner, “starting in 2018, data warehouse managers will benefit from hybrid architectures that eliminate data silos by blending current best practices with ‘big data’ and other emerging technology types.” There’s undoubtedly a lot to ain by modernizing data warehouse architectures to leverage new technologies, however the replatforming process itself can be harder than it would at first appear. Hadoop projects are often taking longer than they need to create the promised benefits, and often times problems can be avoided if you know what to avoid from the onset.
Tags : 
replatforming, age, data, lake, apache, hadoop
    
StreamSets
Published By: Bazaarvoice     Published Date: Jan 29, 2013
Social doesn’t have to be a mystery: Here are six ways social can improve marketing efficiency and effectiveness for brands.
Tags : 
social strategies, brand health, consumer engagement, consumer insights, bazaarvoice
    
Bazaarvoice
Published By: Bazaarvoice     Published Date: Mar 12, 2013
Social doesn’t have to be a mystery: Here are six ways social can improve marketing efficiency and effectiveness for brands.
Tags : 
social strategies, brand marketing, social media, social media marketing
    
Bazaarvoice
Published By: Clarabridge     Published Date: Dec 03, 2013
This paper explores the impact of social media on the marketplace and customer behaviors, and provides a six-step “road map” that guides organizations through the process of implementing a social media program.
Tags : 
clarabridge, digital communications, digital revolution, product information, using social media, customer behaviors, social media program, interacting with customers, product and service problems, respond quickly, customer satisfaction, customer loyalty, market share, marketplace, voice of the customer, voc, customer insights
    
Clarabridge
Published By: Alert Logic     Published Date: May 23, 2019
A Payment Card Industry Data Security Standard (PCI DSS) audit can be passed by complying with the bare minimum requirements, but that falls short of the purpose of it: to secure and protect cardholder data. Meeting compliance is about passing an audit at a specific point in time and also maintaining it after the audit. The real challenge is sustaining continuous compliance to avoid costly breaches at the hands of motivated and skilled adversaries. Indeed, as detailed in Verizon's "2017 Payment Security Report," nearly half (45%) of the companies examined between 2015 and 2016 were not fully PCI DSS compliant.
Tags : 
    
Alert Logic
Published By: AppZen     Published Date: Jul 15, 2019
Accounts payable departments at large enterprises pay thousands of invoices each month. With such a large volume of invoices, companies leave themselves at risk for over-payment and potential invoice fraud. As your business grows and your vendor list gets larger, how do you stay on top of the validity of each invoice?
Tags : 
    
AppZen
Published By: AppZen     Published Date: Oct 21, 2019
Accounts payable departments at large enterprises pay thousands of invoices each month. With such a large volume of invoices, companies leave themselves at risk for overpayment and potential invoice fraud. As your business grows and your vendor list gets larger, how do you stay on top of the validity of each invoice?
Tags : 
    
AppZen
Published By: Bazaarvoice     Published Date: Aug 01, 2014
How do shopping holidays like Cyber Monday and Boxing Day affect review usage? What does review traffic reveal about back-to-school shopping? Download The Conversation Index to see how customer conversations impact the global shopping seasons.
Tags : 
bazaarvoice, holiday sales, growth, cyber monday, boxing day, review usage, traffic
    
Bazaarvoice
Published By: Staples     Published Date: Jan 22, 2018
As a shipping manager, there are a lot of wrong turns you can take. Use this handy cheat sheet to make sure you avoid those mistakes and get your shipments out on time, every time.
Tags : 
    
Staples
Published By: Glowpoint     Published Date: Oct 07, 2015
Who is doing videoconferencing right? Get inspiration from around the world from companies who are applying videoconferencing technologies in the most clever and interesting ways.
Tags : 
video conferencing, voip
    
Glowpoint
Published By: YouSendIt     Published Date: Sep 17, 2008
Sending presentations, audio, video, or graphics files can jeopardize your network’s security. Now learn why you should never use FTP or conventional email to send oversize files; how managed file transfer makes networks safer; and how to avoid email compliance hassles. Don’t let large files become a security issue—download this white paper now.
Tags : 
promo code: wp1, file transfer, attachment, email, ftp, security, powerpoint attachment, mp3 attachment, jpeg attachment, photoshop attachment, multimedia attachment, audio attachment, video attachment, large attachment, file size, digital content, digital content delivery, authorization, access, access control
    
YouSendIt
Published By: YouSendIt, Inc.     Published Date: Sep 17, 2008
Sending presentations, audio, video, or graphics files can jeopardize your network’s security. Now learn why you should never use FTP or conventional email to send oversize files; how managed file transfer can make your network safer; and 7 key criteria to look for. Plus, find out how to avoid email compliance hassles using tracking and traceability. Transferring large files could be a potential security issue. Download this white paper now and learn how to prevent it.
Tags : 
promo code: wp1, file transfer, attachment, email, ftp, security, powerpoint attachment, mp3 attachment, jpeg attachment, photoshop attachment, multimedia attachment, audio attachment, video attachment, large attachment, file size, digital content, digital content delivery, authorization, access, access control
    
YouSendIt, Inc.
Published By: Dynatrace     Published Date: May 20, 2016
In this eBook, we will: -Tell you how to get started with performance metric monitoring -Share real-life examples of application failures and how to avoid them by using 7 key metrics to find problems early on -Show you how stuff really works in "the life of a metric" and how to integrate performance metrics into automation tools throughout your application delivery chain Get the right processes and metrics in place to support continuous delivery and build a better digital experience, faster.
Tags : 
dynatrace, software delivery, digital, performance metrics, mobile consumer, digital experience
    
Dynatrace
Published By: HP & Intel     Published Date: Oct 04, 2011
Read this Cloud Security Planning Guide to make sure your cloud computing initiatives avoid these dangerous - and costly - pitfalls.
Tags : 
    
HP & Intel
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.