HIT Consultant Insightful coverage of healthcare innovation
 

technology management

Results 701 - 725 of 790Sort Results By: Published Date | Title | Company Name
Published By: Splunk     Published Date: Sep 17, 2012
Read this whitepaper to discover how Cricket Communications sought out Splunk for a combined system that monitored and integrated applications, data and operational business intelligence (BI).
Tags : 
information technology, enterprise management associates, roi, list management, crm, customer relationship management
    
Splunk
Published By: Sprinklr     Published Date: Feb 28, 2018
"“Analyze This” highlights key points from recent Forrester Wave Reports to help you work smarter. Read on for an overview of what Forrester – and Sprinklr – say about: - Social Advertising Technology - Content Marketing Platform - Social Media Management Solutions"
Tags : 
research reports, analyst reports, marketing technology, forrester wave, forrester wave reports, report, marketing trends. trends, marketing
    
Sprinklr
Published By: Sprinklr     Published Date: Mar 13, 2018
"“Analyze This” highlights key points from recent Forrester Wave Reports to help you work smarter. Read on for an overview of what Forrester – and Sprinklr – say about: - Social Advertising Technology - Content Marketing Platform - Social Media Management Solutions"
Tags : 
    
Sprinklr
Published By: SPSS     Published Date: Jun 30, 2009
Read how Cabelcom recognized the key to tackling churn and was able to identify the point at which customers become dissatisfied with their service.
Tags : 
spss, cablecom, customer retention, crm, churn rate, reduce churn, predictive analytics, statistics
    
SPSS
Published By: SPSS, Inc.     Published Date: Mar 31, 2009
Read how Cabelcom recognized the key to tackling churn and was able to identify the point at which customers become dissatisfied with their service.
Tags : 
spss, cablecom, customer retention, crm, churn rate, reduce churn, predictive analytics, statistics
    
SPSS, Inc.
Published By: STANLEY Healthcare     Published Date: Mar 24, 2015
Founded in 1997, Benchmark Senior Living is the largest senior living provider in New England. The community in Shelton, Connecticut is just a short drive from the Connecticut coastline—the Split Rock community is home to about 50 assisted living and memory care residents. In addition to being a LEED-certified facility, Split Rock also exemplifies Benchmark Senior Living’s goal to leverage technology to enrich the lives of residents. To that end, the facility incorporates a range of communication technologies to promote engagement with family and the community. Read this case study to learn about how Benchmark Senior Living selected an integrated solution from STANLEY Healthcare and STANLEY Security encompassing emergency call from portable pendants and fixed call points, wander management, environmental monitoring and access control to improve resident's lives.
Tags : 
healthcare, resident safety, senior living, assisted living, locating system, wi-fi, information technology, practice management
    
STANLEY Healthcare
Published By: STANLEY Healthcare     Published Date: Mar 24, 2015
Throughout its operations, Broadlawn Manor Nursing & Rehabilitation Center has embraced technology as a means of enhancing resident safety and independence, and staff productivity. The facility had been a satisfied user of STANLEY Healthcare’s WatchMate wander management system for many years, but in 2010, Vice President of Senior Services Gerard Kaiser and his team embarked on a review of Broadlawn Manor’s wander management needs and took the decision to migrate to a new generation of technology with greater functionality. Read this case study to learn how Long Island Nursing & Rehabilitation Center achieves more accurate, convenient and efficient wander management with RoamAlert® Solution.
Tags : 
wander management, healthcare, nursing, rehabilitation, resident safety, resident independence, medical technology, information technology
    
STANLEY Healthcare
Published By: SumTotal     Published Date: Feb 01, 2013
Most HR professionals are ready for a completely different approach to HR technology. This engaging paper from SumTotal explains why that is — and how one system is revolutionizing the industry in response.
Tags : 
sumtotal, sumtotal systems, elixhr, talent expansion, integrated hr solutions, human resources, hr technology, hr solutions
    
SumTotal
Published By: SumTotal     Published Date: May 24, 2013
The Value Matrix is based on functionality and usability, the two core measures that Nucleus has found indicate an application’s ability to deliver initial ROI and, ultimately, maximum value over time. Leaders, Experts, Facilitators, and Core Providers are identified in this matrix. Discover how the current workforce management providers stack up in this streamlined and concise evaluation.
Tags : 
workforce management, streamline hr, workforce management solutions, sumtotal
    
SumTotal
Published By: SumTotal Systems     Published Date: Oct 10, 2013
If you’re like everyone else in HR today, you’re probably thinking about how your organisation can handle data better. Maybe your executives want the power to make data-driven decisions from comprehensive workforce analytics. Perhaps you’d like to streamline the efficiency of your HR operation or put more actionable information in the hands of your line managers and employees. With the elixHR Platform, you can integrate your HR data and processes so your people can access information quickly and easily, and make better decisions. You can also lower your operational costs because you can increase efficiency and eliminate the need to replace HR systems that you already have in place.
Tags : 
sumtotal, sumtotal elixhr, sumtotal elixhr platform, elixhr, human resources, hr data, hr processes, hr systems
    
SumTotal Systems
Published By: Sungard Availability Services     Published Date: Sep 28, 2016
Complexity, lack of time, and a skills shortage mean that UK IT Departments are failing to meet business expectations for digital technology.
Tags : 
it department, digital, digital expectations, digital technology, it management, sungard
    
Sungard Availability Services
Published By: Symantec     Published Date: Jul 29, 2013
Virtualization has been a game-changing technology for IT, providing efficiencies and capabilities that just aren't possible when constrained within a physical world. When searching for a backup and recovery solution for virtual environments, there are a few “must have” features to consider. Learn about the top four in this data sheet!
Tags : 
deduplication, virtual machines, symantec, enterprise, technology, server, virtualization, data protection
    
Symantec
Published By: Symantec     Published Date: Jul 29, 2013
Because of the outstanding economy, flexibility, and service levels it offers, virtualization is transforming data centers at breakneck speed: by 2016, an estimated 80 percent of the world's x86 servers will be Virtual Machines (VMs). But the speed of this transformation, along with the high resource utilization, ease of cloning, moving workloads, and other ways virtualization works its magic, raise challenges for “traditional” IT services and the teams that deliver them.
Tags : 
architect, deduplication, virtual machines, symantec, enterprise, technology, server, virtualization
    
Symantec
Published By: Symantec     Published Date: Jul 29, 2013
Backup and recovery has never been a higher priority for IT organizations than it is right now. But when it comes to Virtual Machine (VM) backup and recovery, the landscape has never been more confusing. Download this white paper and learn about the advantages of backup agents, agentless backup and agent-assisted backup so that you can decide for yourself and truly determine the best approach for your organization. We help you weigh in the pros and cons of each method.
Tags : 
architect, deduplication, virtual machines, symantec, enterprise, technology, server, virtualization
    
Symantec
Published By: Symantec     Published Date: Jul 30, 2013
In this whitepaper we will discuss what to look for in a virtualization protection solution as well as consider the merits of a separate solution for protecting one’s virtual environment, compared with using a unified solution that offers comparable virtualization protection capabilities. Download for more information.
Tags : 
architect, deduplication, virtual machines, symantec, enterprise, technology, server, virtualization
    
Symantec
Published By: Symplfiied     Published Date: Nov 07, 2011
Symplified's innovative On Demand Identity leverages the software-as-a-service subscription business model to deliver breakthrough identity services with disruptive pricing. This White Paper explains how identity services eliminates all capital outlays for hardware, software and infrastructure, expenses for support and staffing. You also can reduce the costs of training and integration to reduce identity lifecycle costs by more than 80% from enterprise identity software.
Tags : 
symplified, technology, security, identity management, white paper, cloud computing
    
Symplfiied
Published By: Systemware     Published Date: Sep 07, 2018
Five key trends are shaping the enterprise content management (ECM) space. New business objectives, new market imperatives, and new cloud-based platforms compel technology and business decision makers to take a fresh look at their strategy and underlying platforms. This report will help enterprise architecture (EA) professionals make informed decisions about their content management agenda.
Tags : 
systemware, content management, digital transformation, content cloud, top key trends, intelligent information, data storage, enterprise content management
    
Systemware
Published By: Tealium     Published Date: Mar 12, 2014
In this paper, Web Analytics Demystified presents an approach towards big data that has the potential to simplify the quest for “whole customer” data and improve your company’s odds of success.
Tags : 
tealium, big data, data analytics, business analytics, information technology, data distribution, tag management systems, marketing
    
Tealium
Published By: Tealium     Published Date: Mar 12, 2014
“The Rise of Data Activism: How Digital Data Distribution Platforms (D3P) Enable Marketers to Act on Their Data” discusses how marketers can solve the optimization gap and leverage new solutions to take action on their most actionable audience segments in real time.
Tags : 
tealium, big data, data analytics, business analytics, information technology, data distribution, tag management systems, digital data distribution platform
    
Tealium
Published By: Tealium     Published Date: Feb 20, 2015
Unify Your Marketing Technology and Data–It’s Easy Download our free guidebook, “Build Your Own Marketing Cloud™,” to learn how to maximize your technology investments and drive superior cross-channel experiences.
Tags : 
tealium, marketing, technology, cloud, tag management, stack, data, advertising
    
Tealium
Published By: Tealium     Published Date: Feb 20, 2015
Marketing Complexity Got You Down? Download our new guidebook: “How to Tame the Digital Marketing Beast™.”
Tags : 
tealium, marketing, technology, cloud, tag management, stack, data, advertising
    
Tealium
Published By: Tealium     Published Date: Jun 15, 2015
Marketing nirvana is all about driving consistent, real-time customer interactions across all digital touch points. See how Ancestry.com is using Tealium to make this long-held goal a reality.
Tags : 
tealium, marketing, technology, cloud, tag management, stack, data, advertising
    
Tealium
Published By: Tenable     Published Date: Feb 05, 2018
"This IDC Technology Spotlight examines the evolution of vulnerability management. By leveraging the cloud and new technologies that deliver greater visibility, organizations can gain an accurate picture of their assets and overall risk posture. This is a critical step toward addressing the current landscape where attackers are using a wide variety of vectors such as mobile, social, and cloud-based attacks to infiltrate organizations and steal data. By reading this report you will get an overview of: - Benefits of cloud-based security and vulnerability management - Challenges of adopting cloud-based vulnerability management - IDC assessment of Tenable.io cloud vulnerability management"
Tags : 
vulnerability management, analyst report, idc
    
Tenable
Published By: Tenable     Published Date: Feb 07, 2018
"This IDC Technology Spotlight examines the evolution of vulnerability management. By leveraging the cloud and new technologies that deliver greater visibility, organizations can gain an accurate picture of their assets and overall risk posture. This is a critical step toward addressing the current landscape where attackers are using a wide variety of vectors such as mobile, social, and cloud-based attacks to infiltrate organizations and steal data. By reading this report you will get an overview of: - Benefits of cloud-based security and vulnerability management - Challenges of adopting cloud-based vulnerability management - IDC assessment of Tenable.io cloud vulnerability management"
Tags : 
    
Tenable
Published By: Tenable     Published Date: Jan 25, 2019
"This whitepaper from the SANS Institute focuses on the growing use and benefits derived from information technology (IT) and operational technology (OT) convergence which includes more effective management and operation of contemporary control systems. IT/OT convergence carries unique challenges that make managing and securing an industrial control system (ICS) more difficult. This is due to greater technical complexity, expanded risks and new threats to more than just business operations. This paper explores the issues that arise with the blending of IT and OT into combined cyber-physical systems where risks must be identifed and managed. Download this report to get answers to these questions: -Why are digital asset inventories critical for IT/OT security risk management? -How does knowledge about risks and vulnerabilities to IT/OT systems lead to better risk management? -Can applying even a few of Center for Internet Security (CIS) Controls make a marked difference in the securit
Tags : 
    
Tenable
Start   Previous    18 19 20 21 22 23 24 25 26 27 28 29 30 31 32    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.