HIT Consultant Insightful coverage of healthcare innovation
 

sufficient

Results 1 - 25 of 90Sort Results By: Published Date | Title | Company Name
Published By: ABB     Published Date: Mar 21, 2019
Many in the United States’ power generation industry no doubt long for the relative market tranquility of the late 20th century. The generation plants built and operated then were carbon-fueled or nuclear-powered, with a few hydro-electric plants sprinkled in. The economics were largely stable and predictable, often thanks to regulation that shielded utilities from market fluctuations. But even in those simpler times, when the market was far less volatile, there was still much due diligence required when investors and developers were considering multi-milliondollar commitments in new generation projects. Today’s market is more volatile, due in large part to the disruptive effect of low-cost natural gas and the subsequent, rapid growth of affordable renewable energy. As more uneconomical and inefficient generation plants go offline, there is, for the most part, sufficient carbon-free or carbon-reduced generation to meet the growing demand for electric energy. There are pockets of growth
Tags : 
    
ABB
Published By: ACTEK, Inc.     Published Date: Aug 30, 2007
Download this very brief guide now and reflect on the 9 Indicators. If you answer "no" to two or more of the questions listed within, there is undoubtedly sufficient ROI to strongly consider replacing your current incentive compensation system.
Tags : 
incentive compensation, incentive, sales, salesforce, salesforce management, sales manager, sales management, bonus
    
ACTEK, Inc.
Published By: ALE     Published Date: Jan 10, 2019
Providing an effective teaching and learning environment is the primary goal of all educational institutions. Traditionally, administrators concentrated on providing faculty with the tools to properly deliver the curriculum and structuring the learning process to sufficiently engage students. But, violent incidents over the past decade along with government regulations have put pressure on administrators to focus on the physical security and safety of staff, faculty, and students. To find out more download this whitepaper today.
Tags : 
    
ALE
Published By: Anaplan     Published Date: Mar 29, 2018
As businesses grow more optimistic about opportunities for growth, the pressure is on for sales organizations to meet ever higher revenue targets. In a global survey on sales performance optimization by CSO Insights, 94 percent of respondents said their 2014 revenue targets were higher than last year’s. It’s no wonder that “capture new accounts,” cited by 60 percent of respondents, topped the list of objectives for 2014 in the study. At the same time, many sales reps are struggling to meet even their current quotas. And in an Aberdeen Group survey, nearly half identified insufficient revenue growth as the top pressure motivating them to pursue sales management initiatives ranging from building out the capabilities of sales teams to improving management practices and investing in technology tools.
Tags : 
sales, performance, revenue, optimization, objectives, accounts
    
Anaplan
Published By: Anaplan     Published Date: Apr 02, 2019
49% surveyed cite insufficient revenue growth as the top pressure motivating sales performance management initiatives. And on top of that, 58 percent of sales reps are struggling to meet their current sales quotas. In this winner-takes-all market, sales leadership is faced with an uphill battle in driving sales performance. The pressure on sales to meet and exceed ever-increasing revenue targets is higher than ever before. Download this exclusive report to learn new insights on how sales performance data and analytics are driving peak sales performance.
Tags : 
    
Anaplan
Published By: APC     Published Date: Feb 19, 2008
Cooling for IT wiring closets is rarely planned and typically only implemented after failures or overheating occur. Historically, no clear standard exists for specifying sufficient cooling to achieve predictable behavior within wiring closets. An appropriate specification for cooling IT wiring closets should assure compatibility with anticipated loads, provide unambiguous instruction for design and installation of cooling equipment, prevent oversizing, maximize electrical efficiency, and be flexible enough to work in various shapes and types of closets. This paper describes the science and practical application of an improved method for the specification of cooling for wiring closets.
Tags : 
apc, power, cooling, it wiring, heat removal, green computing
    
APC
Published By: APSALAR     Published Date: Jun 03, 2015
Because a DMP is a complex piece of technology, it can feel daunting for a marketer to thoughtfully evaluate alternatives. That’s why we’ve created this paper – to help simplify and streamline the process by suggesting a short list of questions that get to the heart of what matters strategically in a DMP so that you can make your decision with a focused yet sufficient set of information.
Tags : 
    
APSALAR
Published By: APSALAR     Published Date: Jun 08, 2015
Because a DMP is a complex piece of technology, it can feel daunting for a marketer to thoughtfully evaluate alternatives. That’s why we’ve created this paper – to help simplify and streamline the process by suggesting a short list of questions that get to the heart of what matters strategically in a DMP so that you can make your decision with a focused yet sufficient set of information.
Tags : 
    
APSALAR
Published By: ASG Software Solutions     Published Date: Jul 28, 2008
Targeted at IT executives responsible for both the financial and ultimate project oversight of an enterprise CMDB initiative, this white paper sets expectations for ROI calculations for CMDB initiatives, provides basic ROI best practices, and gives readers sufficient insight to move forward with their CMDB project.
Tags : 
asg, cmdb, bsm, itil, bsm, bsp, metacmdb, roi
    
ASG Software Solutions
Published By: AWS     Published Date: May 25, 2018
Effective security for cloud-hosted web applications requires full visibility into the environment in which the apps live and the potential exposure to vulnerabilities — and to do so consistently, while proactively monitoring for attacks without causing delays in application development and delivery. Cloud adoption means that a focus on perimeter security is not sufficient and may even be obstructive, because it can impact application performance and availability. Similarly, relying on your cloud service provider’s security services is insufficient; any provider will tell you that securing the cloud environment is a shared responsibility between cloud service provider and customer, and the responsibility for specifically securing web applications is the sole responsibility of the customer. And although the industry as a whole has become better at protecting lower-level network and server resources, as attackers look for targets, they are moving up the application stack.
Tags : 
    
AWS
Published By: AWS     Published Date: May 31, 2018
Effective security for cloud-hosted web applications requires full visibility into the environment in which the apps live and the potential exposure to vulnerabilities — and to do so consistently, while proactively monitoring for attacks without causing delays in application development and delivery. Cloud adoption means that a focus on perimeter security is not sufficient and may even be obstructive, because it can impact application performance and availability. By completing this form, I agree that I'd like to receive information from Amazon Web Services, Inc. and its affiliates related to AWS services, events and special offers, and my AWS needs by email and post. You may unsubscribe at any time by following the instructions in the communications received. Your information will be handled in accordance with the AWS Privacy Policy. https://aws.amazon.com/privacy/
Tags : 
    
AWS
Published By: Axeda Corporation     Published Date: Sep 06, 2007
Enabling IT equipment vendors to perform remote service on your data centers helps maximize uptime and lower TCO—but at what risk? Dial-up modems and VPNs introduce security vulnerabilities and lack sufficient auditing capabilities—making it virtually impossible to track external access and maintain data center security. Download this white paper to learn how you can manage security risks, lower service-related costs, achieve regulatory and internal compliance, and more.
Tags : 
remote, remote access, remote network, network management, network security, data center, datacenter, data center management
    
Axeda Corporation
Published By: BMC ESM     Published Date: Aug 20, 2009
Can consolidating your data center yield long-term savings sufficient enough to warrant the project? There is no doubt. By right-sizing your data center, you can often recoup the project costs in months, not years.
Tags : 
data center consolidation, consolidation, data center, bmc, cobit, cmdb
    
BMC ESM
Published By: Burton Group     Published Date: Jul 07, 2008
The identity federation market enjoys an exceptional supply of products. With well over a dozen products available to enterprise customers, most architects have more choices than time will allow for evaluation. This abundance of products is partly the result of the inherent difficulty of developing a truly multipurpose federation server. Although federation products are similar in name, each has its own personality and idiosyncrasies that make it suitable for certain environments but insufficient in others.
Tags : 
fim, federated identity management, identity federation, access control, identity management, passport, burton group
    
Burton Group
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
Un numero sempre crescente di aziende ricorre alla containerizzazione delle applicazioni per aumentare l'efficienza e la velocità dello sviluppo. Grazie ai container, gli sviluppatori possono inserire in un pacchetto, inviare ed eseguire qualunque applicazione sotto forma di container leggero e autosufficiente, eseguibile praticamente ovunque, per garantire la portabilità istantanea dell'applicazione. Per comprendere più chiaramente lo stato del monitoraggio dei container, abbiamo intervistato 100 executive e identificato i principali trend per i container. In questo eBook viene esaminato ogni singolo trend, quindi vengono forniti indicazioni concrete e passi successivi da compiere per garantire il controllo completo del monitoraggio dell'ambiente container.
Tags : 
    
CA Technologies EMEA
Published By: CarbonBlack     Published Date: Mar 16, 2016
It is now widely recognized that antivirus software is insufficient to protect organizations, large or small, from advanced threats and targeted attacks. In response, organizations are increasingly looking to adopt proactive approaches to security, such as application control, to ensure the fidelity and security of intellectual property.
Tags : 
application control, advanced threats, security, proactivity approaches, security
    
CarbonBlack
Published By: CarbonBlack     Published Date: Oct 26, 2016
It’s become increasingly clear that traditional antivirus is no longer sufficient in stopping advanced threats such as ransomware. Companies need a next-generation antivirus (NGAV) solution to successfully stop modern attacks. Hear what Trevor Albrecht from DraftKings has to say about his experience replacing AV with NGAV.
Tags : 
    
CarbonBlack
Published By: CEB     Published Date: Nov 06, 2013
Talent is an increasingly critical differentiator of corporate performance and poses one of the most significant barriers to growth. CEB research finds that boards at top-performing companies are twice as likely to have a deep understanding of talent issues as boards at lower-performing competitors. However, most boards lack sufficient understanding of key talent issues facing the companies they oversee, particularly because the data and analysis they receive provide limited insight. This whitepaper outlines the critical talent conversations every board should have and shows how industry leaders are broadening their understanding of talent issues and assurance about critical talent risks by expanding the perimeter of talent issues they monitor beyond executive leadership and reshaping conversations on executive performance evaluation and succession.
Tags : 
talent risks, talent issues, talent management, development roi
    
CEB
Published By: CEB     Published Date: Jul 01, 2014
Employee engagement is necessary but not sufficient in achieving your company’s key business priorities. Learn how to ensure workers are engaged and aligned with your organization's strategy, and agile enough to create and sustain advantage in an ever-changing marketplace.
Tags : 
new work environment, agility, engagement, alignment, organization, strategy, marketplace
    
CEB
Published By: Cenzic     Published Date: Nov 11, 2008
This paper explores the role of white box vs. black box testing. White box testing technologies have a definite but limited use and value. From a Web application security perspective it must be understood that significant blind spots come with white box testing. Ultimately white box testing is not sufficient to secure your applications: simply put organizations that rely solely on white box technologies will be exposed to vulnerabilities in their applications, thus making it an ineffectual method of testing real-world risks. This paper will demonstrate black box or dynamic testing is ultimately the appropriate solution for “truly” securing Web applications.
Tags : 
cenzic, web application security, white box texting, black box testing, secure web applications, cenzic
    
Cenzic
Published By: Cisco Systems     Published Date: Dec 23, 2013
Does your WAN provide sufficient performance and reliability for your remote-site users? In this guide, discover how to design a full-service network with secure, encrypted communications using Cisco Dynamic Multipoint VPN technology. Download Design Guide
Tags : 
vpn, wan, cisco, cisco validated designs, cvds, remote-site user performance, full-service network, encrypted communications
    
Cisco Systems
Published By: CloudHealth by VMware     Published Date: Feb 26, 2019
Chances are, your organization is already on a path to a hybrid cloud architecture. But as an IT leader, can you confidently state that you have a clear and defined hybrid cloud strategy? With teams running in many different directions and little consensus on what hybrid cloud means, you may not know where to begin. This white paper will help you get started. It will guide you through the benefits and challenges of a hybrid cloud architecture and help you develop your hybrid cloud strategy, including: -The components of an effective hybrid cloud strategy -Selecting and managing cloud vendors -The people and skills you will need to accomplish your vision -Demonstrating sufficient ROI on your IT spend Download this free white paper today and get started building a world-class hybrid cloud strategy.
Tags : 
    
CloudHealth by VMware
Published By: Cohesity     Published Date: Apr 24, 2018
As organizational needs change and workloads become increasingly distributed, a key realization is emerging: traditional approaches to backup and recovery may no longer be sufficient for many organizations. These companies may have discovered that their existing tools are not keeping pace with other advancements in their computing environments, such as scale-out storage systems and hyperconverged systems, which seek to reduce data center complexity and help manage surging storage costs.
Tags : 
    
Cohesity
Published By: Corero     Published Date: Dec 05, 2014
Few hosting providers today offer sufficient protection from DDoS attacks, so those that can implement robust DDoS attack protection will be able to more efficiently protect their hosted infrastructure and gain a competitive advantage in the marketplace. They’ll also be positioned to create incremental revenue streams from high-value, managed DDoS attack protection services.
Tags : 
corero, ddos, distributed denial of service, data protection, ddos attack, threat protection, hosted threats
    
Corero
Published By: Datastax     Published Date: Aug 23, 2017
A holistic approach to using customer data to enable data-driven decisions for attracting, retaining, and delivering value through customer experience is what is going to drive many business initiatives over the next 12-month period. Though they each have varying degrees of capability to transform their customer experience applications and remain continuously available no matter what is critical to their success. Companies surveyed are eager to deliver a great customer experience and capture market share, but many CX journeys are hindered by business unit siloes, insufficient budget, and technical challenges. The responses provide key insights into the business priorities, challenges, and data technology needs of companies embarking on or in the midst of their CX journey.
Tags : 
datastax, customer data
    
Datastax
Start   Previous   1 2 3 4    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.