HIT Consultant Insightful coverage of healthcare innovation
 

ddi

Results 376 - 400 of 988Sort Results By: Published Date | Title | Company Name
Published By: ForeSee Results     Published Date: Jul 20, 2007
Online retailers are always on the lookout for ways to improve the online shopping experience and stay ahead of the competition. Adding consumer product reviews is one such way. As part of the analysis of the Spring 2007 edition of the Top 100 Online Retail Satisfaction Index, we delved into the data specific to consumer product reviews to answer pertinent questions.
Tags : 
customer reviews, reviews, purchase decision, referral, recommendation, customer satisfaction, online retail, e-commerce
    
ForeSee Results
Published By: ForeSee Results     Published Date: Jul 20, 2007
Online retailers are always on the lookout for ways to improve the online shopping experience and stay ahead of the competition. Adding consumer product reviews is one such way. As part of the analysis of the Spring 2007 edition of the Top 100 Online Retail Satisfaction Index, we delved into the data specific to consumer product reviews to answer pertinent questions.
Tags : 
customer reviews, reviews, purchase decision, referral, recommendation, customer satisfaction, online retail, e-commerce
    
ForeSee Results
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
If your organization is one of the 95% of enterprises that operate in the cloud, you are already grappling with cloud security. And if your organization is one of the 85% of companies that use multiple Infrastructureas-a-Service (IaaS) and Software-as-a-Service (SaaS) clouds, you have additional issues to consider. Compared to the days when organizations managed everything on-premises or only had a handful of cloud deployments, this new multi-cloud world exacerbates the expansion of the attack surface and makes threat containment and accountability more difficult. Further, pressure on security teams to protect everything in the multi-cloud environment is leading to reactive and expensive threat management. If you are a security leader tasked with meeting the challenges of a multi-cloud environment, eventually you’ll find that siloed cloud security strategies fall short of the mark. But don’t wait. Now is the time to consider a holistic security approach that reclaims control from dispa
Tags : 
    
Fortinet EMEA
Published By: GAO RFID Inc.     Published Date: Feb 28, 2007
Barcodes, magnetic stripes, and proximity readers all rely on the user to either make contact or place the badge very close to the reader. In addition, bar codes can only be read one at a time and the respective embedded information cannot be updated. Find out how an RFID access control system can provide an easy and efficient solution.
Tags : 
rfid, rfid tags, mobile data systems, access control, identity management, gao, gao group, gao rfid
    
GAO RFID Inc.
Published By: GENBAND     Published Date: Sep 11, 2014
GENBAND’s NUViA™ voicemail solution changes the economics of acquiring and managing voicemail. Eliminate end of life platforms that are expensive to maintain while adding new mobility services that make users more productive. Integrates with your existing PBXs or IP-PBXs.
Tags : 
voicemail, solution, managing, economics, platforms, pbx, mobility, messaging
    
GENBAND
Published By: Genesys     Published Date: May 07, 2009
This white paper provides insights on the key attributes of SIP for customer service; how businesses can prosper with adoption of SIP; and flexible deployment strategies for migrating from TDM to VoIP. In addition, this paper will look at the available software, including relatively new arrivals such as unified communications, which can enhance a distributed customer sales and service strategy. Learn more today!
Tags : 
genesys, virtualization, ip migration, voip, sip, session initial protocol, voice over ip, customer service
    
Genesys
Published By: Genesys     Published Date: Oct 16, 2013
The existing upgrade paths from legacy PBX and ACD suppliers make it difficult for contact center executives to contemplate the future of customer service on their own terms. If your ACD-based contact center has become a road block for adding capacity or adding channels such as social media and mobile, you might want to think about making the switch to a SIP-based contact center solution. SIP delivers two important advantages over legacy switching: 1. SIP is based on open standards, so you can choose hardware and software that is best suited for your environment. 2. SIP’s capability extends beyond voice to new media types such as mobile, social media and video. SIP-based contact centers provide a roadmap to sophisticated features without the complexity and expense of traditional proprietary ACDs. Learn more about how to build the next-generation customer service platform.
Tags : 
contact center, customer service, social media, mobile, sip, technology solution, technology
    
Genesys
Published By: Genesys     Published Date: Jun 19, 2019
With a proven customer experience platform and provider, you can overcome the limitations of legacy contact center technology and meet the needs of your customers –today and tomorrow. And, you’ll avoid the risk and uncertainty of maintaining an outdated contact center, from challenges that affect service quality to time-consuming and costly upgrades. It’s time to move forward. Read this ebook to learn: Steps to mitigate risk by minimizing your reliance on aging technology Proven and successful deployment options and migration strategies How to migrate at your own pace Benefits of adding the Genesys customer experience platform and solutions to your existing contact center environment
Tags : 
    
Genesys
Published By: GFI     Published Date: Jul 24, 2007
This white paper explains what makes spam such an unbearable problem and how spamming tactics are evolving daily to beat anti-spam software. The latest tactic is to use the common PDF file format to send image spam. By using PDF attachments to send images instead of embedding them in the body of the email message, spammers have taken the cat-and-mouse game with anti-spam software developers to a new level.
Tags : 
adobe, adobe acrobat, acrobat, gfi, spam, image spam, pdf spam, anti-spam
    
GFI
Published By: GFI     Published Date: Mar 25, 2008
This white paper explains what makes spam such an unbearable problem and how spamming tactics are evolving daily to beat anti-spam software. In the space of two months, spammers have switched from image spam to using PDF, Excel and ZIP file attachments. By using these attachments to send images instead of embedding them in the body of the email message, spammers have taken the cat-and-mouse game with anti-spam software developers to a new level.
Tags : 
attachment spam, filter attachment spam, image spam, pdf spam, excel spam, xls spam, stock spam, gfi
    
GFI
Published By: GFI     Published Date: Jun 03, 2009
More than ever, SMBs need to focus on security as part of their IT infrastructure, building around it rather than considering it as an afterthought. This has become even more critical over the past few years as many businesses have unwittingly lost their customers’ personal data due to security breaches, and as states and countries have responded by enacting laws to force the businesses to implement additional levels of protection.
Tags : 
gfi, smbs, small, medium, business, it infrastructure, security, windows nt
    
GFI
Published By: Gigamon     Published Date: Mar 26, 2019
As the hunger for bandwidth and the number of devices within enterprise networks continue to increase, collaboration between NetOps and SecOps for a fast, secure network is a must. Download the SANS whitepaper Network Architecture with Security in Mind and learn about a new security approach that relies on pervasive visibility to send the right data to the right tools that are already in place, rather than adding more performance-hindering layers of security.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Jun 10, 2019
As the hunger for bandwidth and the number of devices within enterprise networks continue to increase, collaboration between NetOps and SecOps for a fast, secure network is a must. Download the SANS whitepaper Network Architecture with Security in Mind and learn about a new security approach that relies on pervasive visibility to send the right data to the right tools that are already in place, rather than adding more performance-hindering layers of security.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Jun 21, 2019
As the hunger for bandwidth and the number of devices within enterprise networks continue to increase, collaboration between NetOps and SecOps for a fast, secure network is a must. Download the SANS whitepaper "Network Architecture with Security in Mind" and learn about a new security approach that relies on pervasive visibility to send the right data to the right tools that are already in place, rather than adding more performance-hindering layers of security.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Sep 03, 2019
Network performance and security are vital elements of any business. Organisations are increasingly adopting virtualisation and cloud technologies to boost productivity, cost savings and market reach. With the added complexity of distributed network architectures, full visibility is necessary to ensure continued high performance and security. Greater volumes of data, rapidlyevolving threats and stricter regulations have forced organisations to deploy new categories of security tools, e.g. Web Access Firewalls (WAFs) or Intrusion Prevention Systems (IPS). Yet, simply adding more security tools may not always be the most efficient solution.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Feb 20, 2019
As the hunger for bandwidth and the number of devices within enterprise networks continue to increase, collaboration between NetOps and SecOps for a fast, secure network is a must. Download the SANS whitepaper Network Architecture with Security in Mind and learn about a new security approach that relies on pervasive visibility to send the right data to the right tools that are already in place, rather than adding more performance-hindering layers of security
Tags : 
    
Gigamon
Published By: Global Software     Published Date: Aug 13, 2018
Going forward, CFOs will continue to implement processes and systems to reduce the overall cost of financial reporting while improving accuracy, visibility of data beyond the general ledger, and accessibility at all levels of the organization. In addition, there will continue to be greater demand for more advanced dynamic reporting — including enhanced cost and profitability reporting, rolling forecasts, and zero-based budgeting — in an environment finance teams are comfortable with, such as Excel, so they can work more efficiently.
Tags : 
financial, reporting, cfo, organization, data
    
Global Software
Published By: Global Software     Published Date: Aug 13, 2018
Humans excel at tasks that require creativity, the opportunity to respond to the unexpected, and general attentiveness to the surrounding environment. Technology and machines, on the other hand, are built to process a lot of information quickly without getting bored; technology reliably completes the task it is assigned without deviation. The most powerful approach to adding technology to a team takes the strengths of both humans and technology into account and from that, creates a superior, collaborative system. For example, reporting software such as Spreadsheet Server and Atlas for Dynamics AX/365 by Global Software, Inc. both serve as machine learning intelligence that uses automation to reduce errors, while at the same time preserving humans’ ability to create reports and outcomes from the data the way they need to see it.
Tags : 
technology, machines, dynamics, global, software
    
Global Software
Published By: Globalscape     Published Date: Jun 27, 2014
The PCI Security Standards Council issued version 3 of their PCI DSS guidelines for processing electronic payments. Our whitepaper details the newest additions to the guidelines as well as tools and resources to help organizations comply with the standards.
Tags : 
globalscape, file transfer, security, compliance, payment information, electronic payments, ecommerce, security
    
Globalscape
Published By: GoCardless     Published Date: Oct 08, 2019
With Strong Customer Authentication (SCA) coming into force on 14 September 2019 as the final part of PSD2, many online businesses are required to add additional security measures to large parts of their online payment experience. Key goals of SCA include reducing payment fraud and creating a safer payment experience for the customer.
Tags : 
    
GoCardless
Published By: Godfrey     Published Date: Oct 02, 2008
Branding has always been about much more than logos and graphics. It comprises the total experience customers and prospects have with your company. By adding newer, richer choices, today’s new communications technologies – everything from blogs and podcasts to wikis and mobile – are changing the fundamental basis of business-to-business marketing. Almost daily. While some are saying that branding is no longer relevant in that increasingly fragmented media world, we believe branding actually is more important than ever. In fact, it’s critical to your success.
Tags : 
godfrey, b-to-b branding, business-to-business branding, b-to-b branding in web 2.0, b-to-b interactive media, brand guardians, brand ambassadors, media proliferation
    
Godfrey
Published By: Godfrey     Published Date: Oct 02, 2008
Differentiation is a business decision made at the highest levels about the company’s positioning and values–how the company adds value to a customer relationship. There are many ways a company can make those decisions, and many different approaches to doing so. The most successful companies adopt a positioning that offers sustainable competitive advantage–a way of adding value that competitors cannot easily duplicate.
Tags : 
godfrey, b-to-b, business-to-business, branding, b-to-b branding, b-to-b differentiation, brand differentiation, branding differentiation
    
Godfrey
Published By: Google     Published Date: Aug 05, 2019
"Agile BI requires more than just agile dashboards. True agility means prototyping data models quickly so business users can continuously iterate on them. Application development and delivery professionals working on BI initiatives should consider adding DWA platforms to their BI toolbox. This Forrester report discusses how seven data warehouse automation vendors bring Agile options to all phases of BI/analytics application development. Read more to find out how these platforms help facilitate shorter development cycles."
Tags : 
data warehouse automation, forrester, agile solutions, business intelligence, analytics
    
Google
Published By: Google Apigee     Published Date: Mar 05, 2019
API monetization is a key way to unlock value from your API programs and increase API adoption. Monetization enables API providers to reach beyond current business models, scale API programs, and open new opportunities with customers, developers, and partners. Google Cloud’s new eBook, Maximizing the Business Value of Digital Assets Through API Monetization, maximizing the business value of digital assets via API monetization. Read the real-use cases and learn about best practices to realize additional value from your API products. Explore how to generate revenue from API products and grow API programs with field-tested best practices, real-world use cases and a checklist to help your team get started. What's Inside? ? Field-tested best practices ? Real-world use case: Telstra ? API monetization checklist
Tags : 
    
Google Apigee
Published By: Great Bay Software     Published Date: Jan 04, 2018
IoT device capabilities are constantly evolving and enterprise adoption is increasing at a rapid pace. As adoption grows, these connected devices provide additional entry points for external threats, thus broadening the organizations' attack surface. The enterprise must now look for solutions to address an increasingly complex problem: how to detect, monitor and control unmanaged devices that are connecting to the network and may lack consistent security protocols, putting critical business data at risk.
Tags : 
iot, iot security, iot endpoint security
    
Great Bay Software
Start   Previous    9 10 11 12 13 14 15 16 17 18 19 20 21 22 23    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.