HIT Consultant Insightful coverage of healthcare innovation
 

series

Results 401 - 425 of 483Sort Results By: Published Date | Title | Company Name
Published By: Semcasting     Published Date: Feb 19, 2014
This white paper will guide you through a series of third party studies that have been completed recently on the diminishing reach and effectiveness of audience targeting with cookies. The numbers are challenging and it appears it may be time for an alternative to the cookie.
Tags : 
digital targeting, ip targeting, online business marketing, online targeting, online ad targeting, internet marketing, online marketing, online marketing strategies, digital target, behavioral targeting online, targeted online advertising, ip address targeting, ip geo targeting, internet marketing business, ip zones, retail marketing, online retail marketing, retail trade area, retail marketing services, retail marketing ideas
    
Semcasting
Published By: LiveHive     Published Date: Feb 16, 2016
Creating a lean, mean selling machine is no easy task. That’s why we’ve asked inside sales expert, Sally Duby to break down four easy steps to getting your sales team in top selling shape. In this two part series, Sally will share: • The essential components of a lead process, including best practices on partnering with marketing • Creating a call cadence and contact model and how to stay on track using metrics • Steps to define buyer-based personas and ways get a prospect to respond quicker • Converting pipeline faster and best practices for closing deals
Tags : 
sales process, best practices, marketing, closing deals, livehive
    
LiveHive
Published By: NEC     Published Date: Aug 12, 2014
NEC has introduced the Express5800/A2000 Series Servers to accommodate enterprise application demands with peak server reliability, availability, and serviceability. The new server architecture and NEC engineering functionality align well with many of the most important IT priorities in 2014, including virtualization, big data and advanced data analytics. With the Express5800/A2000 Servers, NEC has the opportunity to educate application owners and work with system integrators to drive awareness and ultimately investment in its new server platform, which will help drive customer value. In this white paper, you will learn how these next-generation servers from NEC are ready to accommodate some of today’s demanding workloads.
Tags : 
servers, virtualization, customer value, analytics, application owners, system integrators, big data, reliability, enterprise, availability, serviceability, processor, architecture, express, stress
    
NEC
Published By: NEC     Published Date: Aug 26, 2014
In addition to high reliability and availability, enterprise mission critical applications, data centers operating 24x7, and data analysis platforms all demand powerful data processing capabilities and stability. The NEC PCIe SSD Appliance for Microsoft® SQL Server® is a best-practice reference architecture for such demanding workloads. It comprises an Express 5800 Scalable Enterprise Server Series with Intel® Xeon® processor E7 v2 family CPUs, high-performance HGST FlashMAX II PCIe server-mounted flash storage, and Microsoft® SQL Server® 2014. When compared with the previous reference architecture based on a server with the Intel® Xeon® processor E7 family CPUs, benchmark testing demonstrated a performance improvement of up to 173% in logical scan rate in a data warehouse environment. The testing also demonstrated consistently fast and stable performance in online transaction processing (OLTP) that could potentially be encountered.
Tags : 
sql, datacenter, servers, virtualization, customer value, analytics, application owners, system integrators, big data, reliability, enterprise, availability, serviceability, processor
    
NEC
Published By: Infacta     Published Date: Jan 22, 2007
In this series, we will provide an overview on email marketing, offer tips to help make your e-mail marketing campaigns more successful, review the tools necessary for effective email marketing and expose email marketing mistakes to avoid.
Tags : 
email marketing
    
Infacta
Published By: IBM     Published Date: Sep 18, 2008
IBM conducted an in-depth assessment to identify vulnerabilities in New Hanover Health Network's information security practices, with emphasis on their auditing activity and capabilities. This white paper will explain how IBM helped them implement a series of best practices, thereby improving the confidentiality, integrity, and availability of their information systems.
Tags : 
ibm, ibm mmdg, hipaa, hippa, healthcare, health care, compliance, privacy, patient, patient privacy
    
IBM
Published By: iDirect     Published Date: Jan 29, 2007
This article is the third and final part of a series designed to help you find a search engine optimization company that is worthy of your trust. In this installment, you will learn questions to ask search engine optimization companies in order to assess the business assurances that they have made.
Tags : 
search engine optimization, search marketing, seo, seo firm, seo firms
    
iDirect
Published By: iDirect     Published Date: Jan 29, 2007
In this article, the second of a three-part series, readers will learn key questions that can be asked to determine the competence of any search engine optimization company that they are considering. This article can serve as a valuable resource for those researching search engine optimization companies.
Tags : 
search marketing, search engine optimization, seo, seo firm, seo firms
    
iDirect
Published By: LookSoftware     Published Date: Aug 21, 2009
SOA is a set of architectural and design principles that are probably new to most iSeries people. SOA considers an enterprise as consisting of many processes and services. SOA comes with the expected set of acronyms and jargon, such as "loose coupling" and "granularity" and is typically implemented with Web Services.
Tags : 
service oriented architecture, web service management, soa, application integration, look software, looksoftware, as/400
    
LookSoftware
Published By: Preventsys     Published Date: Aug 21, 2009
This paper is a synopsis of the presentations given at the Preventsys "CISO Breakfast Series," a succession of seminars given across North America in January and February 2005. The speakers for each breakfast consisted of security professionals and executives who provided their views on how to more effectively align information security with business initiatives.
Tags : 
network security, intrusion prevention, security management, business management, information management, data security, preventsys
    
Preventsys
Published By: 2dev     Published Date: Jan 29, 2007
The goal of this series of articles is to help DBA's having a basic understanding of Oracle's Application Server.
Tags : 
software development, oracle, database, database security, oracle application server, database administrator, dba, database development, 2dev
    
2dev
Published By: CCSS     Published Date: Jul 05, 2007
Capability breeds dependence. The more you can do, the more is asked of you. The more time you save, the more time you spend seeking out ways to save more time or money. If less really is more, how do you do more with less? Effective system monitoring could help you break free of the system shackles and use your System i (iSeries) network to save time and money.
Tags : 
ibm, system monitoring, monitoring, network monitoring, productivity, performance management, system performance, memory pool performance, memory pool, lpar, system configuration, performance monitoring, ccss
    
CCSS
Published By: Interactive Intelligence     Published Date: Feb 21, 2013
This two part paper is a review of a remote agent case study. This first part looks at the issues faced and the benefits received from the people side of the project: How the agents and management of a remote solution can positively affect customers.
Tags : 
case study review, customer service metrics, interactive intelligence, remote solutions
    
Interactive Intelligence
Published By: Interactive Intelligence     Published Date: Feb 21, 2013
Home working is among the top three strategic priorities for many Fortune 500 companies. The home working business model continues to accelerate in customer contacts, mid and back office functions as well as across the enterprise.
Tags : 
next generation, home agent series, fortune 500, interactive intelligence, business case for home working, back office functions
    
Interactive Intelligence
Published By: Interactive Intelligence     Published Date: Feb 21, 2013
The economic pressures of the last three years have forced businesses to focus on cost reduction, often ahead of everything else. At the onset, the belt-tightening in the customer contact organization was viewed as temporary. Read on for more.
Tags : 
home agent series, leveraging technologies, remote agents, interactive intelligence
    
Interactive Intelligence
Published By: Interactive Intelligence     Published Date: Feb 28, 2013
Driving to one percent - In this series, we view this phenomenon from a business perspective and how seemingly minor additions, deletions, or shifts can reap substantive results.
Tags : 
driving to one percent, call analysis, answering machine detection, interactive intelligence, fdcpa compliance
    
Interactive Intelligence
Published By: Interactive Intelligence     Published Date: Feb 28, 2013
In this white paper series, on TCPA, from ARM.com, Latitude Software, and Interactive Intelligence, we asked collection industry attorneys David Kaminski and Anita Tolani to weight in on different aspects of technology for TCPA compliance.
Tags : 
tcpa compliance, telephone consumer protection act, compliance, interactive intelligence
    
Interactive Intelligence
Published By: Technolytics     Published Date: Oct 05, 2007
Recently, a series of cyber attacks on the Defense Department and Defense contractors in the United States as well as the Ministry of Defense and Parliament in the U.K. have created significant cause-for-concern by computer security experts. It is imperative you read this brief and learn how we're all vulnerable and what is being done to prevent these Cyber Attacks.
Tags : 
spy ops, spy-ops, cyber attack, hacker, hackers, government, internet security, national security, network security, intrusion, intrusion detection, intrusion prevention, trojan, risk management, cyberwarfare, cyber warfare, technolytics
    
Technolytics
Published By: VMware Dell     Published Date: Jun 17, 2008
Faced with an aging set of servers within its IT infrastructure, United Bank and Trust decided to embrace virtualization as way to move forward. United deployed the VMware Infrastructure 3 solution together with an EqualLogic PS Series virtualized iSCSI SAN, which established an enterprise storage platform to achieve the high availability, data protection and performance required for United’s new generation, virtualized IT environment.
Tags : 
server, server virtualization, virtual machine, virtual server, vmware, equallogic, dell equallogic, virtualization, vmware, virtual infrastructure, x86
    
VMware Dell
Published By: VMware Dell     Published Date: Sep 29, 2008
Virtualized IT infrastructures can simplify management and facilitate business continuity while helping minimize power consumption and procurement costs. Virtualization also helps organizations automate disaster recovery plans. Dell EqualLogic PS Series arrays and VMware® Site Recovery Manager (SRM) software provide integrated, cost-effective, automated site recovery and testing for enterprise data centers.
Tags : 
vmware, dell, iscsi, equallogic, site recovery manager, navicure, disaster recovery
    
VMware Dell
Published By: VMware Dell     Published Date: Sep 29, 2008
This technical report will discuss the installation and configuration of Site Recovery Manager with the Dell EqualLogic PS Series storage arrays. It will cover setup, testing, failover, failback and troubleshooting. This document is designed to be used in conjunction with the Administrator Guide for Site Recovery Manager and assumes a prior knowledge of VMware Virtual Infrastructure.
Tags : 
vmware, dell, equallogic, site recovery, disaster recovery, iscsi, windows server, microsoft, data protection
    
VMware Dell
Published By: RedEye On Demand     Published Date: Jun 23, 2008
Rapid manufacturing's benefits extend far beyond the upfront savings on tooling. Discover how it will improve your operations, sales and profits and why it is heralded as the next industrial revolution. In the first of a series, you will discover the benefits of the freedom to redesign your products at any stage in the life cycle.
Tags : 
plm, product design, product lifecycle management, design, redeye
    
RedEye On Demand
Published By: ConcertTech     Published Date: Jun 03, 2009
As the third in our series, this paper continues the effort of providing information that enables you to evaluate a deployment company and its Technology Rollout System intelligently so that you can realize the most cost-effective and time-efficient project deployment.
Tags : 
rollout, global technology, deployment, concert technology, project facilitator, project manager, internal resources, job functions, delivery team, program, delivery team, web-based software, applications, warehouse, unified resource, dedicated resource, hybrid
    
ConcertTech
Published By: Network Automation     Published Date: Dec 10, 2008
IST uses Fourth Shift software by SoftBrands to manage its operations in Big Flats, New York (headquarters) and Buffalo, New York, as well as the United Kingdom, Canada and France. For Fourth Shift to function correctly for IST, a series of process must be run each night on several servers. These processes include batch runs, data extracts, and system backup.
Tags : 
network automation, process automation, automate, automatic interaction
    
Network Automation
Published By: Neolane, Inc.     Published Date: Sep 23, 2010
In the first instalment of this series, "Fight Marketing Fatigue Now," we discussed the challenge of improving relevancy and the varying degrees of personalization that exist within marketing organizations today. We made the case for a new approach, interactive one-to-one personalization. In this paper, we discuss how to achieve the related benefits including improved customer engagement, increased ROMI and measurable business value.
Tags : 
neolane, segmentation, romi, emarketing, branding, personalization, sms
    
Neolane, Inc.
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.