HIT Consultant Insightful coverage of healthcare innovation
 

cis

Results 3601 - 3625 of 4222Sort Results By: Published Date | Title | Company Name
Published By: RingCentral     Published Date: Mar 21, 2014
This guide provides you with essential information and tools so you can understand your phone system options, and make the decision that meets the needs—and ambitions—of your business.
Tags : 
ringcentral, phone system, business phone, mobile phone, business transition, phone provider, cloud based phone, changing attitudes
    
RingCentral
Published By: Riskified     Published Date: Aug 06, 2019
Legacy fraud detection systems often approve or decline orders based solely on a handful of order details. Modern solutions are far more sophisticated, instantly considering hundreds of data points for each order, resulting in more accurate decisions. Savvy merchants expect much more from their fraud management solutions than simply a risk score.
Tags : 
    
Riskified
Published By: Riskified     Published Date: Aug 06, 2019
As the global eCommerce market grows and fraudster methodology evolves, new fraud management approaches and tools are being introduced at a fast pace. Trying to stay on top of developments in the eCommerce fraud prevention landscape can be overwhelming and time consuming. Riskified is proud to present the eCommerce Fraud Solution Buyer’s Kit, a comprehensive series of resources designed to guide executives, decision makers, and procurement professionals through the process of assessing current fraud management performance and understanding which available approaches and solutions can best meet their needs.
Tags : 
    
Riskified
Published By: Riskified     Published Date: Aug 06, 2019
The impact of chargeback rates is abundantly clear and easily measurable, but the financial impact of false declines - rejecting perfectly good customers over fear of fraud - is largely underestimated by eCommerce merchants. In reality, these mistakes, which are all too common but difficult to track, end up costing merchants significantly more than chargebacks, and are more damaging to the business’ bottom line. This guide is designed to help businesses approve more good eCommerce orders, and to put in place better tracking for ongoing improvement in order decision accuracy
Tags : 
    
Riskified
Published By: Riverbed     Published Date: Oct 17, 2012
There are many decisions to be made in the process of building a SharePoint environment. The challenge is thinking through all requirements to ensure that everyone uses SharePoint. This whitepaper focuses on WAN optimization and why it is important.
Tags : 
wan optimization, sharepoint, sharepoint environment, deployment
    
Riverbed
Published By: Riverbed     Published Date: Nov 08, 2012
Application delivery solutions sit at the nexus connecting users to business services and data, therefore, selecting between solution options is not a decision made lightly. Read on to learn about the business value and efficiency of Stingray.
Tags : 
riverbed, stingray, it infrastructure, optimization, data optimization, performance optimization
    
Riverbed
Published By: Riverbed     Published Date: Jul 17, 2013
Your business is complex. Big data promises to manage this to make better decisions. But the technology services that run your business are also complex. Many are too complex to manage easily, causing delays and downtime. Forrester predicts this will worsen. To combat this onslaught, you need machines to analyze conditions to invoke automated actions. To perform adaptive automation, you need IT analytics, a disruption to your monitoring and management strategy. This report helps leaders prepare for IT analytics that turn big data efforts inward to manage the technology services that run your business. Register to get the full report.
Tags : 
analytics, big data, forrester
    
Riverbed
Published By: Riverbed     Published Date: Jul 17, 2013
Effective IT planning and decision making are dependent upon having a complete asset inventory and an accurate understanding about dependencies available before, during and after IT change activities. Application discovery and dependency mapping (ADDM) solutions automate the process of discovering and mapping transactions and applications to the underlying infrastructure and application interdependencies. Learn how Riverbed Cascade’s built-in application discovery and dependency mapping capabilities can help you shorten project times and mitigate risk.
Tags : 
effective it, addm, application discovery, riverbed cascade
    
Riverbed
Published By: Riverbed     Published Date: Apr 14, 2017
"Infrastructure and operations leaders often struggle to understand the role of cloud computing and to develop strategies that exploit its potential. I&O leaders should complete the prerequisites before making the technology decisions required for successful, service-centered cloud computing strategies. Read the Gartner report to learn more about key recommendations: Identify the cloud-computing-related IT services you will offer or procure. Document the internal processes that will be affected by the identified cloud services. Map applications and workloads to the associated cloud services."
Tags : 
    
Riverbed
Published By: Riverbed     Published Date: Jul 15, 2014
Your business is complex. Big data promises to manage this complexity to make better decisions. But the technology services that run your business are also complex. Many are too complex to manage easily, fueling more complexity, delays, and downtime. Forrester predicts this will inevitably get worse. To combat this onslaught, you can no longer just accelerate current practices or rely on human intelligence. You need machines to analyze conditions to invoke the appropriate actions. These actions themselves can be automated. To perform adaptive, full-service automation, you need IT analytics, a disruption to your existing monitoring and management strategy.
Tags : 
big data analysis, it analytics, manage, complex, automation, monitoring, management strategy
    
Riverbed
Published By: Riverbed     Published Date: Nov 02, 2016
"Infrastructure and operations leaders often struggle to understand the role of cloud computing and to develop strategies that exploit its potential. I&O leaders should complete the prerequisites before making the technology decisions required for successful, service-centered cloud computing strategies. Read the Gartner report to learn more about key recommendations: Identify the cloud-computing-related IT services you will offer or procure. Document the internal processes that will be affected by the identified cloud services. Map applications and workloads to the associated cloud services."
Tags : 
    
Riverbed
Published By: RMS     Published Date: Jul 18, 2019
The more holistic view of risk a property underwriter can get, the better decisions they are likely to make. In order to build up a detailed picture of risk at an individual location, underwriters or agents at coverholders have, until now, had to request exposure analytics on single risks from their portfolio managers and brokers. Also, they had to gather supplementary risk data from a range of external resources, whether it is from Catastrophe Risk Evaluation and Standardizing Target Accumulations (CRESTA) zones to look-ups on Google Maps.
Tags : 
    
RMS
Published By: RMS     Published Date: Jul 18, 2019
Reduce underwriting overhead and make more informed decisions faster than ever
Tags : 
    
RMS
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
When your solution needs deep packet inspection (DPI) application awareness as a key enabling feature, highly reliable and accurate identification of network traffic and applications - in real time - is an expected requirement. Whether it’s for software defined networks to enable policy control and critical traffic steering or to protect corporate networks, IoT devices, and cloud platforms from malicious attacks, it’s crucial to choose the right DPI solution.
Tags : 
signatures, cybersecurity, dpi, frameworks, automated, application, customers, benefits
    
Rohde & Schwarz Cybersecurity
Published By: RSA     Published Date: Aug 28, 2014
Learn how connecting a Data Loss Prevention (DLP) system to an access governance solution can enable organizations to make informed decisions within a proper access governance framework, appropriately evaluate and manage risk, and obtain maximum benefit from their chosen DLP solution.
Tags : 
data loss, prevention, risk management, dlp, governance, framework
    
RSA
Published By: RSA     Published Date: Aug 28, 2014
A major shift has occurred with Identity and Access Management (IAM) in the past few years. Organizations have realized that the traditional approach to IAM doesn't work. It doesn't work because IT doesn't have the context to make the decisions around access. It's the lines of business that have the intelligence and business context to make decisions about Identity and Access Management.
Tags : 
access management, iam, intelligence, business context, identity
    
RSA
Published By: RSA Security     Published Date: Aug 28, 2014
Learn how connecting a Data Loss Prevention (DLP) system to an access governance solution can enable organizations to make informed decisions within a proper access governance framework, appropriately evaluate and manage risk, and obtain maximum benefit from their chosen DLP solution.
Tags : 
    
RSA Security
Published By: RSM US     Published Date: Dec 20, 2017
There is an increasing demand for finance and accounting outsourcing (FAO) among middle market companies, as organizations become more comfortable with the solution. FAO helps companies enhance the efficiency and effectiveness of the finance and accounting function through process and technology improvements, enabling internal employees to focus on the core business. RSM US LLP’s FAO platform goes beyond out-of-the-box functionality within technology solutions, integrating additional intellectual property, including workflows, business processes and organizational frameworks. By leveraging this comprehensive platform, our FAO team can help middle market companies overcome a myriad of finance and accounting challenges. These include hiring, training and developing staff, and most importantly producing actionable finance and accounting information in a timely manner to make critical business decisions.
Tags : 
    
RSM US
Published By: RSM US     Published Date: Feb 08, 2019
The term outsourcing can have a negative connotation, conjuring images of layoffs and relocating jobs to third parties in remote locations. However, outsourcing can take many forms, and finance and accounting outsourcing (FAO) does not always mean the displacing of the finance back office. Specifically, FAO leverages digital technology to complement and support the back office, streamlining processes while providing enhanced transaction processing, reporting and analytics capabilities. It also allows key resources to focus on strategy, analysis and decision-making.
Tags : 
    
RSM US
Published By: Rubrik EMEA     Published Date: Jan 04, 2019
Moving applications and workloads to the cloud has become a major goal for most IT decision-makers. But cloud migration can come with challenges and pitfalls for organizations that haven’t done their homework. This paper examines some real-world examples of organizations that successfully made the transition with the help of an experienced vendor with bold new ideas
Tags : 
cloud, data, archiving, backup, applications, infrastructure, recovery, workloads, vendor, organizations
    
Rubrik EMEA
Published By: Ruckus Wireless     Published Date: Oct 21, 2015
Before you make a long term investment in your wi-fi infrastructure let us tell you the real story. After reading this paper you can make an informed decision by asking all the right questions.
Tags : 
wi-fi capability, digital education, e-rate expansion funding, wi-fi deployment
    
Ruckus Wireless
Published By: Ruckus Wireless     Published Date: Jul 11, 2018
In an era of "lean IT," the centralized management capabilities of cloud-managed Wi-Fi make it an attractive option to manage and maintain wireless LANs (WLANs) across multiple locations. The decision to move WLAN management to the cloud requires one key assurance: end-to-end security from user devices to the cloud. This means that user data must be protected over the WAN and in the data center. These security measures should not require on-staff WLAN security expertise to manage. And security measures should be largely transparent to users. This paper provides an overview of the security architecture of Ruckus Cloud Wi-Fi, as well as best practices for specific security scenarios.
Tags : 
    
Ruckus Wireless
Published By: RuleStream     Published Date: Aug 21, 2009
The ability to harness intellectual property and product know-how is a key to competitive advantage. RuleStream appears to have broken through past technological barriers in rules-driven knowledge capture and reuse.
Tags : 
product development, market intelligence, business intelligence, competitive, business process automation, business process management, bpm, bpa, rulestream
    
RuleStream
Published By: S.Himmelstein     Published Date: Jun 13, 2019
Inaccurate torque readings can lead to product inefficiencies and shortened overall product life. Learn how to accurately determine the perfect torque sensor for your application.
Tags : 
torque, torque sensor, torque readings, product life
    
S.Himmelstein
Published By: Safari Books Online     Published Date: Jun 08, 2009
This white paper explores how project management professionals (PMPs), their technology teams, and other key stakeholders can minimize technology project delays by supplementing best practice processes and popular project management software with digital libraries that provide on-demand access to critical technology information.
Tags : 
pmp, how project management professionals, safari books online, project lifecycle, collaboration, digital library, business initiatives, budget, cost cutting, decision making, search engine platform, free form search, api
    
Safari Books Online
Start   Previous    138 139 140 141 142 143 144 145 146 147 148 149 150 151 152    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.