HIT Consultant Insightful coverage of healthcare innovation
 

blueprint

Results 76 - 100 of 119Sort Results By: Published Date | Title | Company Name
Published By: SAS     Published Date: Apr 16, 2015
The framework presented here is a way to avoid data dysfunction via a coordinated and well-planned governance initiative. These initiatives require two elements related to the creation and management of data: • The business inputs to data strategy decisions via a policy development process. • The technology levers needed to monitor production data based on the policies. Collectively, data governance artifacts (policies, guiding principles and operating procedures) give notice to all stakeholders and let them know, “We value our data as an asset in this organization, and this is how we manage it.”
Tags : 
    
SAS
Published By: Venafi     Published Date: Mar 26, 2015
The SANS 20 Critical Security Controls for Effective Cyber Defense offers a blueprint of prioritized guidance to reduce risk. New updates to the SANS 20 signify the growing need to secure digital certificates and cryptographic keys to preserve trusted communications for all of your critical systems and your organization’s interactions with customers and partners. Too often cyberattacks on keys and certificates are successful because basic security controls are not present or not properly configured. Download the Solution Brief to learn how you can effectively build scalable controls and reduce risk: • Manage the rapid growth in certificates • Gain visibility into where keys and certificates are located • Secure your certificates against cyberattacks • Enforce automation of certificate issuance and renewal
Tags : 
sans 20, security controls, cyber defense, cyber attacks, secure digital certificates, cryptographic keys, automation
    
Venafi
Published By: Skillsoft     Published Date: Mar 03, 2015
This ExecBlueprint is written by CEOs who “get it,” i.e., the challenges CEOs face in maintaining a suitable work–life balance. These leaders are dedicated to their organizations, and work the requisite long hours, yet they all recognize the value — and necessity — of taking time out to nourish the rest of their lives.
Tags : 
work-life balance, burnout, healthy balance, business practices, success strategies, coping mechanisms
    
Skillsoft
Published By: Skillsoft     Published Date: Mar 03, 2015
This ExecBlueprint describes effective approaches for recruiting and retaining this generation that has been alternatively described as entitled and creative. First, you may need to address conflicts with older workers if they resent millennials’ demands for flexible work arrangements, career advancement, and open relationships with leadership.
Tags : 
managing millennials, recruiting, retaining, millennial practices, development programs, benchmarking, mentoring programs
    
Skillsoft
Published By: Skillsoft     Published Date: Mar 03, 2015
This ExecBlueprint discusses how companies can successfully leverage talent relocations to develop people and achieve business results.
Tags : 
mobility, career growth, leveraging technology strategies, employee motivation, leverage talent relocation, employee satisfaction
    
Skillsoft
Published By: Teradata     Published Date: Feb 04, 2015
How can the 21st century CMO create a cohesive, creative and streamlined marketing department that delivers a better product and message to the customer, leading to an ideal customer experience? This report aims to be a blueprint—a roadmap even—for CMOs who want to build better-integrated marketing teams, increase customer engagement and turn bigger profits, but who find that silos are a persistent, nagging barrier.
Tags : 
terada, forbes, insights, marketing, silos, roi, customer, satisfaction, integration, brand, vision, experience, message, connected, cooperation, motivate, success, scaling, sales, groups
    
Teradata
Published By: Pentaho     Published Date: Jan 16, 2015
If you’re considering a big data project, this whitepaper provides an overview of current common use cases for big data, from entry-level to more complex. You’ll get an in-depth look at some of the most common, including data warehouse optimization, streamlined data refinery, monetizing your data, and getting a 360 degree view of your customer. For each, you’ll discover why companies are investing in them, what the projects look like, and key project considerations, including tools and platforms.
Tags : 
big data, nosql, hadoop, data integration, data delivery
    
Pentaho
Published By: Comcast Business     Published Date: Jan 15, 2015
It’s the challenge businesses of every size wrestle with: How to improve employee productivity while driving down costs. Technology can help achieve that goal – when the right tools are used.
Tags : 
comcast, technology, business, blueprint, plan, start-up, start, future, strategy, needs, requirements, cloud, backup, data, communication, collaboration, servers, network, pos, ecommerce
    
Comcast Business
Published By: Comcast Business     Published Date: Jan 15, 2015
For most small and mid-sized businesses the future is all about growth, and a cloud-based approach to information technology is inherently supportive of growth strategies.
Tags : 
comcast, technology, business, blueprint, plan, start-up, start, future, strategy, needs, requirements, cloud, backup, data, communication, collaboration, servers, network, pos, ecommerce
    
Comcast Business
Published By: Comcast Business     Published Date: Jan 15, 2015
Technology evolves at breakneck speed, and it plays an increasingly important role in the success of all types of businesses, regardless of size.
Tags : 
comcast, technology, business, blueprint, plan, start-up, start, future, strategy, needs, requirements, cloud, backup, data, communication, collaboration, accounting, payroll, servers, network
    
Comcast Business
Published By: Qualys     Published Date: Jan 08, 2015
Imagine putting first responders on your operational team instantly on alert about new network vulnerabilities – and how to fix them? This capability is called “continuous monitoring” (CM) and a new guide from Qualys shows you how it can dramatically boost security of your network. Learn how CM provides you with an always-on view of potential security holes. The guide explains how using CM is a vital step toward achieving continuous security of your network – the Holy Grail for every network security manager! In the guide, you will learn how to automatically leverage vulnerability scans with CM for stronger security. Continuous Monitoring: A New Approach to Proactively Protecting Your Global Perimeter offers an easy blueprint for using automation to achieve continuous security and compliance. Download the guide now to learn more about CM: Requirements—why CM is vital Scanning—value of continuous vulnerability scans Best Practices—for using CM Benefits—examples of how CM improves se
Tags : 
continuous monitoring, network security, vulnerability, best practices
    
Qualys
Published By: Symantec     Published Date: Oct 07, 2014
In this sophisticated threat environment,traditional security tactics are failing. Symantec encourages organizations to revisit their security posture to build a more cyber resilient enterprise. Resilience is not defined by a series of checklists, but through evaluations based on the current threat environment and the acceptable risk level for the organization. This whitepaper presents best practice-based approaches recommended for minimizing cyber risk. These are arranged across five pillars and provide specific actions for each pillar to be performed by identifiable IT jobs.
Tags : 
security, threat enviornment, security posture, cyber resilient enterprise, minimize cyber risk
    
Symantec
Published By: Skillsoft     Published Date: Jul 23, 2014
This ExecBlueprint discusses how companies can address these risks through the development of a comprehensive risk management framework that incorporates both company policy to enforce standards for safe social media and technology use and technical controls to monitor activity. Although no single blueprint exists, the framework should be sufficiently robust to prevent most employees from clicking on suspicious links and posting confidential information— and contain damage caused by inevitable human error, before the story ends up in The New York Times.
Tags : 
skillsoft, compliance, social media, online activity, security standards, awareness, risk management, malware, threats
    
Skillsoft
Published By: Skillsoft     Published Date: Jul 23, 2014
This ExecBlueprint provides practical advice for developing such a code that will go beyond “window dressing” and inspire leaders and employees alike to build and sustain a compliant and ethical culture. While acting ethically is important for its own sake, the authors also provide pragmatic reasoning for fostering such a culture: ethical organizations earn the trust — and loyalty — of employees, customers, and investors. Accordingly, the code should be simple to understand, widely circulated, and aggressively enforced. But most importantly: adherence starts at the top.
Tags : 
skillsoft, ethical workplace, compliance, code of conduct, industry standards, rules, employee behavior, corporate behavior
    
Skillsoft
Published By: uberVU via HootSuite     Published Date: Jul 08, 2014
The Beginner’s Guide to Social Media Metrics will provide a blueprint for getting started with social analytics.
Tags : 
hootsuite, social media, social media marketing, social media metrics, insights, business analytics, social metrics, social media data, social conversations, social data
    
uberVU via HootSuite
Published By: IBM     Published Date: Jul 07, 2014
The IBM Institute for Business Value conducted a global study to investigate how organizations were creating value from an ever-growing volume of data obtained from a variety of sources. This resulted from data-derived insights, which then guided actions taken at every level of the organization. The findings identified nine levers that enabled the organizations to create the most value.
Tags : 
ibm, midmarket, ibm global analytics study, analytics, business insights, profitability, big data, business analytics, data-driven insights, decision making
    
IBM
Published By: Spredfast, Inc.     Published Date: Jun 30, 2014
The Big 6 social networks offer tremendous marketing opportunites—and each one is very different. That’s why Spredfast has assembled our 6 Blueprints for Social Network Success. In this quick-read collection, you’ll discover more than 50 constructive, actionable marketing tips and real-world examples from major brands like Hyatt, British Airways, Target, and General Mills. Let’s start building!
Tags : 
spredfast, social media strategies, branding, social network, marketing opportunities
    
Spredfast, Inc.
Published By: Spredfast, Inc.     Published Date: May 08, 2014
The Big 6 social networks offer tremendous marketing opportunites—and each one is very different. That’s why Spredfast has assembled our 6 Blueprints for Social Network Success. In this quick-read collection, you’ll discover more than 50 constructive, actionable marketing tips and real-world examples from major brands like Hyatt, British Airways, Target, and General Mills. Let’s start building!
Tags : 
spredfast, social media strategies, branding
    
Spredfast, Inc.
Published By: Kapost     Published Date: Jan 16, 2014
How can you, the modern marketer, create an efficient business process that facilitates content marketing and achieves your specific goals? The answer: by planning strategic marketing campaigns, establishing streamlined processes, and organizing your team to execute initiatives in a more aligned and productive way. Bridging the content gaps in your organization helps you coordinate the efforts of your teams, but also enables you to create superior customer engagements because you’re presenting a more united front to those who consume your content. This eBook will show you how to do just that. It will describe how to execute a cohesive plan aligned with your company’s goals, organize your campaigns, and coordinate content distribution across departments and stages of the funnel.
Tags : 
content marketing, content strategy, content management, content planning, content distribution, marketing campaigns, marketing campaign management, content marketing platform, content marketing software, editorial strategy, marketing campaign planning, content marketing best practices, content marketing companies, editorial content, content marketing workflow
    
Kapost
Published By: Genesys     Published Date: Dec 11, 2013
Read Now: The Automatic Call Distributor (ACD) is no longer a core component in the contact center and has become a costly technology that is difficult to manage in a distributed enterprise environment. If you are looking to move away from your legacy call center infrastructure — to a modern, multi-channel Contact Center this white paper gives you a blueprint to modernization and replacing your ACD. Read this insightful resource to learn how building a multi-channel contact center based on IP/SIP technology can enable you to: • Enhance Customer Experience • Virtualize your customer service environment • Reduce Total Cost of Ownership (TCO) Get this whitepaper for best practices, and integration guidelines to help you transition to a modern, SIP/IP-based contact center environment. Read Now.
Tags : 
automatic call distributor, acd, contact senter, legacy call center infrastructure, multi-channel contact center, ip/sip technology, total cost of ownership, tco, genesys
    
Genesys
Published By: McAfee     Published Date: Nov 19, 2013
This technology blueprint discusses how implementing McAfee SaaS Email Protection and Continuity in a hybrid configuration with McAfee Email Gateway supports green initiatives through reduced on-premises email volume and equipment usage.
Tags : 
mcafee email gateway, mcafee email and security
    
McAfee
Published By: Oracle     Published Date: Aug 15, 2013
WEX Inc., a business payment and processing organization has grown from a US based company to a global player. Kelley Shimancky, VP of Organizational Development at WEX outlines the path to successful global HR with Fusion HCM.
Tags : 
wex inc, fusion, oracle
    
Oracle
Published By: Oracle     Published Date: Aug 09, 2013
WEX Inc., a business payment and processing organization has grown from a US based company to a global player. Kelley Shimancky, VP of Organizational Development at WEX outlines the path to successful global HR with Fusion HCM.
Tags : 
wex inc, fusion, oracle
    
Oracle
Published By: Aruba Networks     Published Date: Jul 03, 2013
The next-generation workplace is all about mobility. It has to be. By the end of 2013, there will be more Internet-connected mobile devices than people. Networking for the next-generation workplace must ensure that each device and business application has reliable service tailored to its performance needs. And that the network is right sized for mobility. Download this white paper to access the key characteristics of the network for the next-gen workplace…
Tags : 
802.11ac, mobile technology, migration, 5ghz
    
Aruba Networks
Published By: Globoforce     Published Date: Feb 20, 2013
Design your recognition program for true business results.
Tags : 
employee engagement, employee recognition, employee performance, human resources
    
Globoforce
Start   Previous    1 2 3 4 5    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.