HIT Consultant Insightful coverage of healthcare innovation
 

managed it

Results 351 - 375 of 524Sort Results By: Published Date | Title | Company Name
Published By: OneLogin     Published Date: Oct 24, 2017
SaaS has fundamentally changed security requirements. We used to just go into work, and everything—corporate applications, sensitive customer data, employee health records, etc.—was within the “safe” four walls of the corporate network behind a firewall. Now employees work remotely and use mobile devices, including unmanaged, personal devices. They access SaaS apps that live in the cloud without any sort of firewall that IT can use to monitor and manage access. Prominent examples include Salesforce.com, Google Apps, Office 365, Box, and many others. As employees use these SaaS apps, they are creating proprietary company data, often confidential in nature, that exists outside the control of IT, creating new challenges for security teams. In this new world, IT needs to track sensitive corporate data in third-party SaaS apps, and ensure that only the right people have the right level of access to it. In this whitepaper, we’ll explain ten steps on how to do that
Tags : 
    
OneLogin
Published By: OpenText     Published Date: Apr 13, 2012
SharePoint is now an important element of the information management infrastructure in many of the world's largest organizations. In many cases, these organizations must now consider how SharePoint, and the massive (and growing) amount of content it creates, will be managed as well as how it will integrate within the broader information infrastructure.
Tags : 
opentext, technology, sharepoint, application integration, user security, technology security
    
OpenText
Published By: OpenText     Published Date: Aug 19, 2014
A lot of talk is in the marketplace about enterprise software deployment models: on-premises, cloud, hybrid, managed/hosted. The conversation is an important one for every enterprise as it considers enterprise applications. This document is designed to help you evaluate the available deployment options for enterprise fax solutions. It includes easy-to-follow tables that will allow you to build selection criteria based on your organization’s requirements and needs.
Tags : 
opentext, fax, document delivery, workflow improvements, automation systems, transactional paper documents
    
OpenText
Published By: OpenText     Published Date: Aug 19, 2014
A lot of talk is in the marketplace about enterprise software deployment models: on-premises, cloud, hybrid, managed/hosted. The conversation is an important one for every enterprise as it considers enterprise applications. This document is designed to help you evaluate the available deployment options for enterprise fax solutions. It includes easy-to-follow tables that will allow you to build selection criteria based on your organization’s requirements and needs.
Tags : 
opentext, fax, document delivery, workflow improvements, automation systems, transactional paper documents
    
OpenText
Published By: OpenText     Published Date: Mar 02, 2017
Market-leading research group Ovum recently conducted a comparison of B2B integration managed services providers. Get your copy for a full vendor comparison and see why OpenText™ is positioned as the leader in B2B integration managed services.
Tags : 
ovum report, b2b integration, managed services, edi solutions
    
OpenText
Published By: OpenText     Published Date: Mar 02, 2017
Leave it to the experts to manage your EDI for you, so you can focus on your business. Read about the benefits of B2B managed services in this white paper.
Tags : 
b2b integration, document exchange, edi, erp, b2b managed services
    
OpenText
Published By: Oracle     Published Date: Nov 01, 2013
Being responsible for one-third of a business’ success already puts HR in a critical role. But it’s not just about finding the best people—it’s about finding the best people, at the lowest cost, with the lowest possible attrition and the best possible performance. And it’s about guiding your executive team to the right decisions using the language they understand best: numbers. Talent management—covering everything from recruiting and compensation to ongoing education and retention—has traditionally been managed in silos, with a series of disparate systems and disconnected processes and reports. In today’s data-driven world, CEOs demand more. This new study conducted by HR.com explores what’s working for organizations today and the biggest gaps to fill.
Tags : 
zenithoptimedia, oracle, successful hr leadership, talent management, core business strategy, human resources, transactional to strategic, financial decisions, smart recruiting, talent scarcity and recruitment, technology advances, competitive compensation, quality of hire, hire smartly
    
Oracle
Published By: Oracle     Published Date: Nov 01, 2013
The next generation of talent management practices and solutions will largely be driven by economic evolution, demographic changes, and technology advancements. These factors are dramatically influencing the way people work, the way companies are organized, and the way talent is managed. Current business and talent management processes and technology must evolve to effectively deliver business value over the next few years. This paper explores how current business and talent management processes and technology must evolve in order to effectively deliver business value in the next 5 to 10 years. The research presented in this paper is supported by interviews with thought leaders in talent management, including practitioners, academics, and technologists from around the globe.
Tags : 
zenithoptimedia, oracle, future of talent management, economic factors, the knowledge economy, globalization, structural unemployment, generational geographies, workplace diversity, technology factors, digitization, telecommunications, change management
    
Oracle
Published By: Oracle     Published Date: Nov 13, 2013
Being responsible for one-third of a business’ success already puts HR in a critical role. But it’s not just about finding the best people—it’s about finding the best people, at the lowest cost, with the lowest possible attrition and the best possible performance. And it’s about guiding your executive team to the right decisions using the language they understand best: numbers. Talent management—covering everything from recruiting and compensation to ongoing education and retention—has traditionally been managed in silos, with a series of disparate systems and disconnected processes and reports. In today’s data-driven world, CEOs demand more. This new study conducted by HR.com explores what’s working for organizations today and the biggest gaps to fill.
Tags : 
zenithoptimedia, oracle, successful hr leadership, talent management, core business strategy, human resources, transactional to strategic, financial decisions, smart recruiting, talent scarcity and recruitment, technology advances, competitive compensation, quality of hire, hire smartly
    
Oracle
Published By: Oracle     Published Date: Mar 06, 2017
This whitepaper explores how Oracle Database Exadata Express Cloud Service is the ideal entry-level service for running Oracle Database in Oracle Cloud. It delivers an affordable and fully managed Oracle Database 12c Release 2 experience, with enterprise options, running on Oracle Exadata.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Jul 05, 2017
Improve the performance, security and reliability of your DNS infrastructure by adding a supplemental DNS service to your IT environment. Best-of-breed managed DNS service providers have the global DNS infrastructure and deep DNS network operations expertise to ensure your success. Adding a secondary DNS service can help you deliver consistent, high-quality user experiences across the world and mitigate outage risk. To learn more read our white paper: High Availability DNS Reduces Downtime Risk and Improves End-User Experience
Tags : 
dns, service, serve traffic, corporate firewall, service features, api daemon
    
Oracle
Published By: Oracle     Published Date: Nov 30, 2017
DDoS attacks can impair your website, tarnish your brand, and impact your bottom line. Conventional security products like firewalls and intrusion prevention systems and newer cloud-based scrubbing services can’t protect your DNS infrastructure against today’s increasingly sophisticated attacks. The best way to defend against DDoS attacks is to trust the operation of your DNS infrastructure to a managed service provider that lives and breathes DNS. Best-of-breed managed DNS providers operate global anycast networks that mitigate DDoS threats to keep your online business up and running.
Tags : 
dns, provider, global, anycast, network, customer, pop, business
    
Oracle
Published By: Oracle     Published Date: Feb 15, 2018
In the past, companies have been able to adopt and utilize a business-as-usual IT infrastructure and get away with it. They purchased hardware to keep pace with data growth, managed multiple servers, and hired an ever-increasing workforce to ensure their organization succeeded. But with diminishing budgets and fewer resources, these institutions can no longer afford to carry out each and every one of these processes to maintain their IT infrastructure.
Tags : 
integration, hardware, software, workforce, organisation, infrastructure
    
Oracle
Published By: Oracle     Published Date: Feb 16, 2018
In the past, companies have been able to adopt and utilize a business-as-usual IT infrastructure and get away with it. They purchased hardware to keep pace with data growth, managed multiple servers, and hired an ever-increasing workforce to ensure their organization succeeded. But with diminishing budgets and fewer resources, these institutions can no longer afford to carry out each and every one of these processes to maintain their IT infrastructure.
Tags : 
integration, hardware, software, workforce, organisation, infrastructure
    
Oracle
Published By: Oracle APAC     Published Date: May 24, 2018
Enterprises are rapidly embracing cloud services to speed innovation and drive cost savings. The most innovative IT organizations in these enterprises are shifting to software-defined “virtual data centers” that connect, aggregate, and configure public and private computing resources in unprecedented ways. These IT organizations use open private cloud infrastructure within a corporate data center or at a hosting site (managed cloud services) in conjunction with public cloud services to meet all their business requirements.
Tags : 
    
Oracle APAC
Published By: Oracle Dyn     Published Date: Dec 06, 2017
DDoS attacks can impair your website, tarnish your brand, and impact your bottom line. Conventional security products like firewalls and intrusion prevention systems and newer cloud-based scrubbing services can’t protect your DNS infrastructure against today’s increasingly sophisticated attacks. The best way to defend against DDoS attacks is to trust the operation of your DNS infrastructure to a managed service provider that lives and breathes DNS. Best-of-breed managed DNS providers operate global anycast networks that mitigate DDoS threats to keep your online business up and running.
Tags : 
dns, provider, global, anycast, network, customer, pop, business
    
Oracle Dyn
Published By: Ping Identity     Published Date: May 05, 2009
Web Services are emerging as the preeminent method for program-to-program communication across corporate networks as well as the Internet. Securing web Services has been a challenge until recently, as typical Web authentication and authorization techniques employed browser-to-server architectures (not program-to-program). This resulted in user identity ending at the Web Application Server, forcing the Web Services Provider to trust blindly that the Web Services Requester had established identity and trust with the end user.
Tags : 
pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml, security assertion markup language, pki, public key infrastructure, soa, oasis, ws-trust, sso, single sign-on, service oriented architecture, rest, user identity mapping, ldap
    
Ping Identity
Published By: Ping Identity     Published Date: May 05, 2009
This white paper, intended for a management-level audience, describes why and how any organization can implement secure Internet single sign-on with a federated identity management system. Learn more today!
Tags : 
pingidentity, sso, secure internet, single sign-on, federated identity management system, software as a service, saas, business process outsourcing, bpo, ciso, attack, threats, personally-identifiable information, pii, trojan, virus, proprietary security mechanisms, crypto libraries, security assertion markup language, saml
    
Ping Identity
Published By: Ping Identity     Published Date: May 05, 2009
Web Services are emerging as the preeminent method for program-to-program communication across corporate networks as well as the Internet. Securing web Services has been a challenge until recently, as typical Web authentication and authorization techniques employed browser-to-server architectures (not program-to-program). This resulted in user identity ending at the Web Application Server, forcing the Web Services Provider to trust blindly that the Web Services Requester had established identity and trust with the end user.
Tags : 
pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml, security assertion markup language, pki, public key infrastructure, soa, oasis, ws-trust, sso, single sign-on, service oriented architecture, rest, user identity mapping, ldap
    
Ping Identity
Published By: Ping Identity     Published Date: May 05, 2009
With the success of single sign-on (SSO) inside the enterprise, users are calling for interoperability outside of the enterprise’s security domain to outsourced services, including business process outsourcing (BPO) and software as a service (SaaS) providers, and trading partners, as well as within the enterprise to affiliates and subsidiaries. Learn more today!
Tags : 
pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml, security assertion markup language, pki, public key infrastructure, soa, oasis, ws-trust, sso, single sign-on, service oriented architecture, rest, user identity mapping, ldap
    
Ping Identity
Published By: Polycom     Published Date: Sep 15, 2015
Polycom voice solutions for Microsoft Lync helped the Organization profiled achieve the following benefits (risk and present value [PV] adjusted) over three years: Improved productivity and collaboration: $12,341,123. Employee relocation cost savings: $452,351. Phone purchase and installation savings: $1,988,182. Managed services cost savings: $582,269. Total cost savings and benefits: $15,363,925.
Tags : 
collaboration, communications, conferencing, lync, microsoft, phone, polycom, skype, video, voice over ip
    
Polycom
Published By: Powered Inc.     Published Date: Mar 26, 2009
Read this report to learn how to harness the power of managed online communities to increase ROI and build relationships with your customers. Unlike other marketing programs, online communities allow businesses to engage with customers through a combination of expert content and online community interactions. Throughout the Customer Lifecycle - from Awareness to Advocacy – clients achieve measureable results with real-time data and insights.
Tags : 
powered, social marketing, roi, benchmarking, customer satisfaction, brand affinity, brand loyalty, customer lifecycle, purchase intent, persuasive communications, advocacy, word of mouth, managed online communities
    
Powered Inc.
Published By: Procore     Published Date: May 13, 2019
A huge portion of the world’s economy is managed through Excel; from small businesses all the way up to Fortune 500 corporations. But even the most experienced user can make mistakes, and Excel was not designed to be forgiving of errors. Nearly 90% of all large spreadsheets contain serious errors, with a 1.79% chance of error per cell. Download this eBook to learn: • The key concerns of Excel in construction • Alternatives to the Excel software • What to look for in these alternatives
Tags : 
    
Procore
Published By: Procore     Published Date: Jun 25, 2019
Did you know that more than 1.2 billion people use Microsoft Office? That’s one in 7 people. A huge portion of the world’s economy is managed through it: from small businesses all the way up to Fortune 500 corporations. Despite its popularity, Excel has its fair share of critics. What originated as rumblings among IT professionals and tech blogs, has quickly trickled into major business and technology publications. Some might think it harsh, but we want to show you the risks of using Excel in your business and help you understand how you can protect yourself, your company and your data from what Forbes refers to as ‘the most dangerous software on the planet’.
Tags : 
    
Procore
Published By: QTS Data Centers     Published Date: May 01, 2017
Discover the simplest and most cost-effective approach to hybrid cloud using a highly scalable, fully managed open cloud like Ubuntu OpenStack. Watch this on-demand webinar to find out from our experts how Canonical’s and QTS’ proven reference architectures, deployment methodologies, and unrivaled support offer IT organizations the biggest bang for their buck plus... • Why the evolution of technology and complexity of managing your hybrid clouds increases IT costs. • How open clouds can be designed to meet your anticipated growth needs. • Build versus buy? Why private open cloud is a financially sound choice. • Why companies like yours are choosing Canonical and QTS to build, operate and fully manage their OpenStack cloud. • A customer case study detailing the economic impact of open cloud.
Tags : 
    
QTS Data Centers
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.