HIT Consultant Insightful coverage of healthcare innovation
 

fundamental

Results 126 - 150 of 427Sort Results By: Published Date | Title | Company Name
Published By: DellEMC and Intel®     Published Date: Oct 25, 2017
A new industrial revolution is barreling ahead, fueled by the Internet of Everything, social media, and cloud computing - bringing about fundamental changes in the way that we live and act. CIOs today are in a unique position to utilize technology to create business value and opportunity. This requires a careful balance of the traditional skills of the CIO, managing the data center infrastructure while driving business strategy and impacting the customer experience. Learn more about Dell EMC enterprise solutions in collaboration with Intel®. Intel Inside®. Nya möjligheter på utsidan. Intel® Xeon® processor Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, and Xeon Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside, intel core, intel inside, intel inside logo, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon, xeon phi
    
DellEMC and  Intel®
Published By: DellEMC and Intel®     Published Date: Oct 25, 2017
A new industrial revolution is barreling ahead, fueled by the Internet of Everything, social media, and cloud computing - bringing about fundamental changes in the way that we live and act. CIOs today are in a unique position to utilize technology to create business value and opportunity. This requires a careful balance of the traditional skills of the CIO, managing the data center infrastructure while driving business strategy and impacting the customer experience. Learn more about Dell EMC enterprise solutions in collaboration with Intel®. Intel Inside®. Para un mundo de nuevas posibilidades. Procesador Intel® Xeon® Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, el logotipo de Intel, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, el logotipo de Intel Inside, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi y Xeon Inside son marcas comerciales de Intel Corporation o de sus filiales en Estados Unidos y/o en otros países.
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, el logotipo de intel, intel atom, intel atom inside, intel core, intel inside, el logotipo de intel inside, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon
    
DellEMC and  Intel®
Published By: DocStar     Published Date: Jun 11, 2018
Accounts Payable is a fundamental activity for nearly all businesses. Pick any enterprise and you can bet there is an AP function at the heart of financial operations. The obligation to pay off short-term debt is one that every company must satisfy. But more than that, the process to do it must be efficient and productive. If you get behind on your obligations you risk missing important financial discounts, defaulting with creditors, and damaging your reputation with suppliers and stakeholders. CFOs face the challenges associated with Accounts Payable…and it’s easy to lose sleep. As other areas of business and commerce have become more and more paperless, the accounts payable process in most organizations remains mired in paper copies and manual workflow. The result is an often costly and people intensive process that leaves companies vulnerable to competitors and financial executives with a growing unease over the inherent inefficiencies.
Tags : 
    
DocStar
Published By: Dyn     Published Date: Jul 29, 2015
This whitepaper reviews three fundamental reasons to add IPM services to your performance management arsenal including: • Performance management considerations for websites and cloud-based services • The role APM and NPM solutions can play in optimizing code and enterprise IT infrastructure • How complementary IPM services can help you make educated cloud and network service provider partnering decisions to improve user experiences, customer interactions, and business outcomes
Tags : 
apm, npm, internet performance management, application performance management, network performance management, enterprise it infrastructure, user experience, customer interactions
    
Dyn
Published By: Eaton     Published Date: Feb 08, 2017
From plug and receptacle charts and facts about power problems to an overview of various UPS topologies and factors affecting battery life, you’ll find a wealth of pertinent resources designed to help you develop the optimum solution.
Tags : 
    
Eaton
Published By: Eaton     Published Date: Feb 08, 2017
Not so many years ago, network closets, server rooms and data centers were designed from a “room to rack” standpoint. Deciding specifically where to store your technology typically came later in the design process. However, rapid technology refresh cycles, the need to rackmount more equipment and the desire for increased cooling capacities in an enclosed rack (known as an enclosure), have all begun to reverse that trend. Today, IT professionals are designing these critical workspaces with more of a “rack to room” methodology.
Tags : 
    
Eaton
Published By: Egencia     Published Date: Aug 04, 2014
Over the past decade, procurement fundamentals have redefined travel management. As the industry refreshes its position on traveler satisfaction, however, travel management and procurement concepts find a new balance in best-in-class programs.
Tags : 
egencia, modern travel management, business travel, managing expenses, travel dollars, travel policy
    
Egencia
Published By: EMC Corporation     Published Date: Aug 05, 2014
To develop the visibility, agility and speed to deal with advanced threats, traditional security strategies for monitoring, often based around security information and event management (SIEM) systems need to evolve into a central nervous system for large-scale security analytics. In particular, four fundamental capabilites are required: 1. Pervasive visibility 2. Deeper analytics 3. Massive scalability 4. Unified view Download here to learn more!
Tags : 
big data, data management, security threats, advanced analytics, security management, predictive analytics, compliance
    
EMC Corporation
Published By: Emulex Corporation     Published Date: Nov 07, 2013
Organizations don’t know what’s going on inside their networks, and that’s costing them real money. Deploying an intelligent recording fabric with guaranteed 100% packet capture, accuracy, and storage is fundamental to solving the problem. But how do you embrace the new paradigm? To get started, create a list of the system criteria that are mandatory to delivering reliable and complete visibility information to your engineers, so you can be sure their decision-making is on target. The impact of network performance problems on worker productivity has become a serious business risk. To mitigate it, organizations need to strategically embrace a network recording infrastructure that provides them with accurate, network-wide visibility. Only accurate visibility will empower them to slash maximum and mean response and repair times and keep network-reliant business applications and processes running. Download this Whitepaper for more information.
Tags : 
network monitoring, network visibility, technology, endace, best practices
    
Emulex Corporation
Published By: Endace     Published Date: Aug 20, 2012
Organizations don't know what's going on inside their networks, and that's costing them real money. Deploying an intelligent recording fabric with guaranteed 100% packet capture, accuracy, and storage is fundamental to solving the problem. But how do you embrace the new paradigm? To get started, create a list of the system criteria that are mandatory to delivering reliable and complete visibility information to your engineers, so you can be sure their decision-making is on target.
Tags : 
endace, technology, white paper, network, intelligent recording fabric, infrastructure, business risk, intelligent network
    
Endace
Published By: EngageSciences     Published Date: Nov 04, 2014
Discover the latest research on the fundamental impact UGC is having on brands, and how it can drive audience acquisition, boost engagement and optimise commerce.
Tags : 
user generated content, ugc, advocacy marketing, content aggregation, content curation, social commerce, social media marketing, the power of user generated content, social media, marketing, interactive marketing, marketing software, social hubs, social commerce, online retail, web socialisation, social media retail
    
EngageSciences
Published By: Entelo     Published Date: Sep 06, 2017
With tech talent in high demand, understanding the networks engineers live and work in is fundamental to finding qualified people and establishing rapport. Learn how to leverage GitHub, Stack Overflow, and Hacker News to identify relevant candidates, assess their skill sets, and boost your company's engineering brand to stand out from competing recruiters. GitHub Lead Talent Strategist Tessa Wilder joins us to share recommendations on how to best use GitHub to connect with engineers. In this webinar, you'll learn: How to read a GitHub profile to understand an engineer's contributions, impact, and how to cross-reference this info with resumes and other social profiles Ways to use Stack Overflow's reputation score and tags to find active, notable engineers How to (tastefully) utilize Hacker News beyond a social news site to generate interest with tech candidates and find those actively seeking new opportunities
Tags : 
    
Entelo
Published By: Entrust Datacard     Published Date: Oct 24, 2016
The mobile device is part and parcel of daily life. It’s fundamentally changed the way consumers behave, and this influence has spread to the enterprise sector as well. For instance, patron-owned mobile devices have largely helped pave the way for the widespread emergence of bring-your-own-device (BYOD) policies. Ten years ago, the idea of a company employee logging into the enterprise system while they’re on an airplane over the Atlantic would seem far-fetched, but today such behavior is relatively commonplace. Mobility is changing how we shop, work and live our daily lives.
Tags : 
    
Entrust Datacard
Published By: Epicor     Published Date: Jun 30, 2014
Manufacturers that address the fundamental requirements know that “Top-to-Shop” isn’t an urban legend anymore. Those that have eliminated the disconnect between the shop floor and the top floor have succeeded in enhancing the extended supply chain. More importantly, their executive leadership consistently achieves business goals—with the help of those on the line and in plant, operations and management.
Tags : 
epicor, manufacturing, operations, cost cutting, machinery, labor, contract manufacturing
    
Epicor
Published By: Epicor     Published Date: Jun 06, 2018
Accounts Payable is a fundamental activity for nearly all businesses. Pick any enterprise and you can bet there is an AP function at the heart of financial operations. The obligation to pay off short-term debt is one that every company must satisfy. But more than that, the process to do it must be efficient and productive. If you get behind on your obligations you risk missing important financial discounts, defaulting with creditors, and damaging your reputation with suppliers and stakeholders. CFOs face the challenges associated with Accounts Payable…and it’s easy to lose sleep. As other areas of business and commerce have become more and more paperless, the accounts payable process in most organizations remains mired in paper copies and manual workflow. The result is an often costly and people-intensive process that leaves companies vulnerable to competitors and financial executives with a growing unease over the inherent inefficiencies.
Tags : 
    
Epicor
Published By: Epicor     Published Date: Jan 09, 2019
For some, “Industry 4.0” and “digital transformation” are synonymous—alternative terms for the fundamental business changes facing manufacturers. For others, the former refers more narrowly to a set of manufacturing technologies at the heart of a wider digital transformation.
Tags : 
    
Epicor
Published By: Epson     Published Date: Jun 22, 2018
Despite the digitization of business today, most organizations continue to rely on paper hard copies to get the job done. A great deal of printed information drives the fundamental workflow and success of nearly any business, especially in highimpact, high-touch areas like Marketing and Sales; Planning, Engineering and Design; and Human Resources. As a result, companies continue to look for ways to manage the ongoing cost, workflow and efficiency of using printed documents.
Tags : 
    
Epson
Published By: ExactTarget     Published Date: Aug 14, 2014
Marketing as you know it will never be the same. There’s a fundamental shift in relationships between brands and customers—fueled by smartphones, social media, and today’s always-on, always-connected mentality. Marketers have access to more customer data (big data) than ever before. But the quantity of data only matters if you’re smart about using it—to power 1:1 customer journeys.
Tags : 
marketing cloud, target, big data, brands, customers, social media, smartphones, always-on
    
ExactTarget
Published By: F5 Networks Inc     Published Date: Jan 22, 2009
Understanding HTTP and how these headers control behavior of web-based applications can lead to better end-user performance, as well as making it easier to choose an application acceleration solution that addresses the shortcomings of HTTP and browser-based solutions.
Tags : 
fundamentals of http, web-based applications, http, application acceleration solution, browser-based solutions
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Mar 30, 2018
In the face of all the challenges presented by the accelerating pace of application development and everexpanding options for deployment, IT organizations are changing how they deliver services. Traditional manual approaches are simply too slow to keep up. Yet, when application teams attempt to circumvent IT in order to speed up deployment, security, performance, and longterm manageability suffer. To get the most out of your multi-cloud deployments, you need to fundamentally rethink how you deliver the right application services that meet current and future needs, consistently across every cloud. Standardization is key. If too much is changing too quickly, start with standardization. As your organization evolves, you will be better positioned to take the next step in making those standardized services accessible to developers through the automation toolchains they rely on.
Tags : 
multi cloud, organizations, application, security, deployment, performance
    
F5 Networks Inc
Published By: FICO     Published Date: Mar 02, 2018
Improved availability of data and new technologies that use it are disrupting our lives, influencing the way we interact with other, and the way we gather and consume information to make decisions. Businesses too are living in a time of continuous technological upheaval. The application of key technologies such as Machine Learning and Artificial Intelligence and Optimization, are fundamentally changing the manner in which businesses make decisions. This paper is your first step in understanding: • how you can leverage and operationalize analytics in your everyday business processes • improve customer relationships • grow revenue in an increasingly competitive world
Tags : 
fico, customers, analytic, management, applications, solutions
    
FICO
Published By: Fidelis Cybersecurity     Published Date: May 15, 2019
Its the start of a new year and amidst the countless predictions flooding the internet, one things for certain 2019 is shaping up to be the year of cloud adoption. Analysts are expecting that enterprise adoption of cloud will ramp up significantly, but with this migration and the continued adoption of mobile and IoT technologies, the attack surface is changing dramatically and this has major implications for security. Fundamentally, security boundaries extend from on premises infrastructure to cloud service provider environments where perimeters no longer exist. Organizations cannot defend themselves with the same strategies and tactics that applied when it did. In this brave new world of cloud, IoT and mobile technology, organizations must be agile and shift, extend, and evolve their perimeter-based defense practices to those that are more robust. Further, a comprehensive defense in depth approach enables defense of high value assets amidst a more unpredictable cyber security landsca
Tags : 
    
Fidelis Cybersecurity
Published By: FireEye     Published Date: Feb 28, 2014
Organizations need much more than fundamental security tools. Do you know why? Learn more in this whitepaper.
Tags : 
fireeye, gartner research, cyber attacks, security posture, system exploitation, advanced attacks, malware download, control established, data exfiltration, lateral movement, file shares, business monitoring, security monitoring, organizational safety
    
FireEye
Published By: FireEye     Published Date: Mar 05, 2014
Today's cyber attacks have changed radically from just a few years ago. No longer are they the sole province of opportunistic crooks, online vandals and digitial ""hacktivists."" Today, advanced cyber attacks are the weapon of choice for organized criminal enterprises and nation-states. This white paper highlights: Why organizations need much more than fundamental security tools; Strategies for dealing with advanced targeted attacks.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors, real-time security, malicious code installs, block callbacks, threat intelligence, malware forensics, cyber warfare
    
FireEye
Published By: Fiserv     Published Date: Nov 07, 2017
"Recently, a number of factors have come together to decimate the profitability of the mortgage banking industry. To regain its footing, the industry must return to mortgage banking fundamentals. This paper carefully examines each function within the mortgage business to determine if there is a better approach that will save money and improve long-term profitability."
Tags : 
loan quality, loan data quality, mortgage quality, mortgage data quality, loan compliance, lending compliance, mortgage compliance, trid, tila respa integrated disclosure, lending efficiency, loan automation, lending automation, mortgage automation, ucd, uniform closing dataset, borrower satisfaction, borrower experience
    
Fiserv
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.