HIT Consultant Insightful coverage of healthcare innovation
 

aci

Results 201 - 225 of 2375Sort Results By: Published Date | Title | Company Name
Published By: Business.com     Published Date: Jun 03, 2009
At a time when most businesses are facing lengthening sales cycles, reduced budgets and staff cut-backs, its imperative to keep leads flowing into the business and at a lower cost. In this study of over 27,000 B2B web sites, Business.com found 93% of B2B companies are in danger of having their best intentions come back to haunt them. Learn more today!
Tags : 
black box, b2b, search marketing, b2c, toolkit, key relevance, jumpfly, sales cycle, ignite, sales, product, service, pdf, rational, enquiro, search solutions, target audience, seo, search engine, keyword
    
Business.com
Published By: Butler Technologies     Published Date: Jul 03, 2018
MPO connectors increase your data capacity with a highly efficient use of space. But users have faced challenges such as extra complexities and time required for testing and troubleshooting multi-fiber networks. VIAVI helps overcome these challenges with the industry's most complete portfolio of test solutions for MPO connectivity.
Tags : 
    
Butler Technologies
Published By: Butler Technologies     Published Date: Jul 03, 2018
MPO connectors increase your data capacity with a highly efficient use of space. But users have faced challenges such as extra complexities and time required for testing and troubleshooting multi-fiber networks. VIAVI helps overcome these challenges with the industry's most complete portfolio of test solutions for MPO connectivity.
Tags : 
    
Butler Technologies
Published By: C2C Systems, Inc.     Published Date: Mar 15, 2007
Compliance, capacity management and e-policy enforcement. Which factors are driving email archiving at your organization? And how do you pick a solution that solves your specific problems without breaking the bank? There are many internal and external forces driving the need to archive.
Tags : 
email archiving, email security, storage, security policies, policy based management, compliance, exchange server, c2c
    
C2C Systems, Inc.
Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : 
ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience, social media, mobile, applications, customer experience management, customer engagement
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : 
ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience, social media, mobile, applications, customer experience management, customer engagement
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : 
ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience, social media, mobile, applications, customer experience management, customer engagement
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter, network provisioning, network security, access control, authentication, internet security, web service security, mobile device management
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : 
ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience, social media, mobile, applications, customer experience management, customer engagement, application performance management, customer interaction service, customer satisfaction, secure content management
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter, network provisioning, network security, access control, authentication, internet security, web service security, mobile device management
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Customers are embracing new technologies and they want to interact through a variety of applications, at any time and from any device. Many consumer facing organizations are racing to enable new interaction channels to innovate, grow their business and improve customer loyalty. As they expand online services and add mobile and social media interaction there is an increasing need to both secure and coordinate these activities. The key challenge is to deliver innovative new applications and services quickly and to provide an excellent customer experience across multiple channels.
Tags : 
ca technologies, crm, customer relationship management, delivery, security, multi-channel, customer environment, customer experience, social media, mobile, applications, customer experience management, customer engagement, application performance management, customer interaction service, customer satisfaction, secure content management
    
CA Technologies
Published By: CA Technologies     Published Date: Nov 12, 2014
This paper aims to help IT departments understand how capacity is allocated and consumed throughout the data center.
Tags : 
optimizing it capacity, the demands on the it department, performance optimization
    
CA Technologies
Published By: CA Technologies     Published Date: Nov 12, 2014
A Technology Adoption Profile based on a custom survey of 102 North American and European enterprise IT decision-makers with knowledge of their company’s performance and capacity management capabilities.
Tags : 
application performance, capacity management capabilities, optimizing it capacity, the demands on the it department, performance optimization
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 19, 2014
IT organizations are increasingly being called upon to cost-effectively deliver reliable support for the entire catalog of business services, or risk outsourcing to a managed service provider.
Tags : 
ca technologies, capacity management, business automation, business intelligence, business scoring
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 19, 2014
There are few concerns more critical to the success of an enterprise than the performance of its applications. Business applications are the engines that keep the business moving, representing both the touch points for customers as well as the means of interaction among employees. If the performance of critical applications is restricted in any way, the business can suffer irreparable damages.
Tags : 
ca technologies, application performance management, capacity management, business applications, business integration
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 19, 2014
This paper offers a practical look at capacity management, outlining the six key steps IT organizations can take to realize capacity management that delivers maximum value.
Tags : 
ca technologies, application perfermance management, business integration, business applications
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 19, 2014
As demands on the data center increase, IT and facilities departments need to be able to increase and sustain high availability, maximize efficiency and minimize costs. Data Center Infrastructure Management (DCIM) provides an integrated platform for monitoring and measuring consumption, capacity and performance of both IT and facilities resources in the data center.
Tags : 
ca technologies, dcim, data center, data center operations, infrastructure
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 19, 2014
The data center is getting bigger and more complex and so too is the asset inventory. Every new asset has an impact on the day–to–day operations of the data center – from power consumption and problem resolution to capacity planning and change management.
Tags : 
ca technologies, dcim, asset management, power, power and cooling, data center energy
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 19, 2014
To help organizations plan their DCIM roadmap, this paper explores five essential DCIM use cases and outcomes. From better asset utilization and faster provisioning to maintaining availability, greater efficiency and smarter capacity planning, we look at how DCIM can close the operational and optimization gap for both IT and facilities.
Tags : 
ca technologies, it operations, dcim, data center management, data center capacity, performance management
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 20, 2015
In the application economy, speed, innovation and quality have become table stakes. If you can’t meet your customers’ expectations, they will surely find a competitor who can. Whether your organization is in one of the sectors facing the most intense digital competition—insurance, banking, telecommunications or retail—or in a more traditional industry, how rapidly and successfully you embrace a software-driven digital transformation strategy will likely have a profound effect on your organization’s long term viability. Within this transformation sphere, the development of “omnichannel” or “digitally-connected multi-channel” capabilities is a key priority. CA Technologies can help you deliver a consistent, integrated and quality customer experience, regardless of how your customers choose to interact with you.
Tags : 
enterprise mobility management, mobile devices, software, competitive advantage, strategic requirement
    
CA Technologies
Published By: CA Technologies     Published Date: Feb 13, 2015
You’re facing increasing global competition. And changing business models, such as lower-cost cloud options, enable more competitors to join the fray faster than ever. Your response? Consistently select the right projects and bring in-demand products and services to market quickly. But the evidence often tells a different story.
Tags : 
strategic planning, cloud options, global competition, in-demand products, in-demand products
    
CA Technologies
Published By: CA Technologies     Published Date: Mar 06, 2015
En 2007, Apple lance l’iPhone : le premier smartphone voit le jour. Avec son écran tactile et sa capacité à exécuter des applications légères, l’iPhone a révolutionné le marché du téléphone mobile.
Tags : 
    
CA Technologies
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.