HIT Consultant Insightful coverage of healthcare innovation
 

cem

Results 326 - 350 of 629Sort Results By: Published Date | Title | Company Name
Published By: eDataSource     Published Date: Jun 15, 2015
Deliverability is the crucible of email marketing. Nothing good can happen when your email doesn’t even get to your customer’s inbox. eDataSource tracks and reports on deliverability with its Inbox metric, which nets out spam events against mailing quantity. eDataSource sees the full range of Inbox Placement performance, based on our visibility into the email activity of 53,000 brands and their customers engagement with those emails. Email marketers who’ve achieved Inbox Placement rates of at least 95% are thought to be doing pretty well. Still, we often see Inbox Placement rates in the 80s for overall brands, and in the 20s, or even less, for certain individual campaigns.
Tags : 
    
eDataSource
Published By: athenahealth     Published Date: Jun 08, 2015
This whitepaper serves as a guide to identifying an under-performing EHR and replacing it with a solution that delivers results. It offers answers to a number of common questions about EHR adoption and replacement and demonstrates how the right EHR can help practices get more money and more control, freeing up physicians to focus on patient care.
Tags : 
ehr, electronic health records, ehr adoption, ehr replacement, information technology, practice management
    
athenahealth
Published By: Iron Mountain     Published Date: Jun 01, 2015
Il constitue une étape cruciale non seulement pour assurer la conformité avec la législation, mais aussi pour contrôler les coûts et garantir que vos données sont disponibles à tout moment – quel que soit leur emplacement.
Tags : 
    
Iron Mountain
Published By: Delphix     Published Date: May 28, 2015
A new generation of tools is bringing agility to components of IT operations . Learn how recent advancements in agile data management, data virtualization, and data masking are combining to help companies achieve previously unachievable breakthroughs in IT security and risk management. Starting with a technical dive into data masking and the key concepts surrounding “virtual data”, this eBook also leverages exhaustive industry research and company surveys to translate the business value associated with these solutions.
Tags : 
    
Delphix
Published By: Workforce Software     Published Date: May 26, 2015
Inform your HR and labor practices with this list of issues to watch, compiled and analyzed by WorkForce Software’s Director of Compliance. Honing in on U.S. wage, hour, and absence regulations, this paper runs the gamut of compliance factors, including: • Legislative developments • Key court decisions • Enforcement actions • Common employer mistakes • Emerging trends
Tags : 
labor practices, hr practices, compliance, compliance update
    
Workforce Software
Published By: ThreatTrack Security     Published Date: May 21, 2015
This report provides a 360 degree view of organizations' security threats, response plans, processes, and investments. More than 800 security decision makers and practitioners were surveyed in December 2014 across North America and Europe.
Tags : 
cyberthreat, security, malware, defense
    
ThreatTrack Security
Published By: ThreatTrack Security     Published Date: May 21, 2015
Watch the Better Defend Your Network from Targeted Attacks webinar to learn about the broad array of enhancements and new capabilities that enable you to better defend your network from advanced malware threats.
Tags : 
targeted attacks, cyberattacks, malware threats, malware analysis sandbox, cybersecurity
    
ThreatTrack Security
Published By: Brightcove     Published Date: May 11, 2015
Tired of being stuck with average results for your video marketing efforts? Have no fear...the Hero’s Guide to Video Marketing is here to help!
Tags : 
brightcove, video marketing, gadgets, content, marketing results, marketing enhancements
    
Brightcove
Published By: Nexsan by Imation     Published Date: May 11, 2015
Heightened physical security concerns spanning all industries, coupled with technological advancements is driving the requirement for higher camera resolutions, more fields of view with wider dynamic range and longer storage retention periods.
Tags : 
imation, nexsan, physical security, camera, surveillence, storage, online surveillance
    
Nexsan by Imation
Published By: Dell     Published Date: May 07, 2015
Protect against hackers by upgrading to new desktops featuring Intel’s hardware-enhanced security and supporting software. Innovative hardware enhancements, built into Intel®-powered desktops since mid-2013, “harden” key information and commands normally executed in software, giving your business maximum protection. Read this paper to learn what your organization can do to overcome security challenges.
Tags : 
    
Dell
Published By: Dell     Published Date: May 04, 2015
Replacing an aging desktop fleet is an important investment in your business. Faster and more reliable systems that offer the latest technology provide your employees an opportunity to be more productive with less waiting while they work. New desktops also benefit your IT staff, with significantly lower power costs and support for out-of-band management to reduce costly desk side visits.
Tags : 
performance, repair, aging desktops, desktop replacement, employee productivity
    
Dell
Published By: MobileIron     Published Date: Apr 13, 2015
THV Group, a Belgian company, is a worldwide market leader in replacement parts and accessories for material-handling industrial and agricultural equipment, new and second-hand forklifts, aerial platforms and internal handling equipment. With MobileIron, TVH launched a successful Bring Your Own Device (BYOD) program, built an enterprise app store that gives employees easy access to productivity apps, and automated the process of giving employees and guests the right level of mobile network access.
Tags : 
mobileiron, byod, enterprise app store, productivity apps, mobile network access
    
MobileIron
Published By: Cisco     Published Date: Apr 08, 2015
Most large organizations address network security with an army of tactical point tools like firewalls, VPN gateways, IDSs/IPSs, network proxies, malware sandboxes, web and e-mail gateways, etc. This messy array of independent technologies was adequate ten years ago, but now presents a plethora of operational, policy enforcement, and monitoring challenges. Worse yet, network security defenses are becoming less and less effective at blocking targeted and sophisticated threats and advanced malware attacks.
Tags : 
next generation, firewall, malware, threat, complexity, costs, visibility, protection, network, enterprise, solution
    
Cisco
Published By: Cisco     Published Date: Apr 08, 2015
This document will identify the essential capabilities you should seek in an advanced malware protection solution, the key questions you should ask your advanced malware protection vendor, and shows you how Cisco combats today’s advanced malware attacks using a combination of four techniques: ? Big data analytics ? Collective global security intelligence ? Enforcement across multiple form factors (networks, endpoints, mobile devices, secure gateways, and virtual systems) ? Continuous analysis and retrospective security
Tags : 
protection, analytics, global security, intelligence, virtual, gateway, attacks, malware, big data
    
Cisco
Published By: eDataSource     Published Date: Apr 07, 2015
Watch this short webinar today and see for yourself how you can gain access to email competitive data, real-time inbox placement and improve your email campaign performance.
Tags : 
inbox placement, email marketing, email marketing roi, real time email marketing
    
eDataSource
Published By: OpenDNS     Published Date: Mar 31, 2015
"Security solutions are getting more sophisticated, but so are the advanced threats that you are up against. While businesses have the power to gather more intelligence from more sources, it can be difficult to share that intelligence and apply enforcement on any device, anywhere, anytime."
Tags : 
    
OpenDNS
Published By: Venafi     Published Date: Mar 26, 2015
Digital certificates have become vital to MDM/EMM, WiFi and VPN access for mobile-device-to-enterprise authentication. But most struggle to identify who has access, audit that access, and terminate access if needed. IT teams need a central certificate security platform that delivers issuance and distribution, visibility, and policy enforcement, as well as the control needed to terminate access.
Tags : 
digital certificates, mdm/emm, wi-fi, vpn, mobile devices, device-to-enterprise authentication, certificate security platform, mobility solutions
    
Venafi
Published By: Venafi     Published Date: Mar 26, 2015
We rely on cryptographic keys and digital certificates for encryption and authentication. But certificates can, and do, expire, creating costly outages. Organizations need visibility, continuous surveillance, policy enforcement, and automation to eliminate outages caused by expired certificates and secure their keys and certificates.
Tags : 
outages, digital certificates, encryption, authentication, surveillance, automation
    
Venafi
Published By: VMTurbo     Published Date: Mar 25, 2015
This whitepaper examines the latency-inducing pitfalls of common VM placement tactics, as well as a network flow approach that minimizes network, compute, and storage latency all at once.
Tags : 
vmturbo, network flow, application performance, vm placement tactics, network flow approach, storage latency
    
VMTurbo
Published By: VMTurbo     Published Date: Mar 25, 2015
Managing the Economics of Your Virtualized Data Center The average datacenter is 50% more costly than Amazon Web Services. As cloud economics threaten the long-term viability of on premise data centers, the survival of IT organizations rests solely in the ability to maximize the operational and financial returns of their existing infrastructure. You will survive, and this brand new whitepaper will help you to follow these 4 best practices: - Maximize the efficiency of your virtual data center. - Optimize workload placement within your clusters. - Reclaim unused server capacity. - And show your boss that this saves money.
Tags : 
datacenter costs, virtualized data center, amazon web services, cloud economics, server capacity
    
VMTurbo
Published By: VMTurbo     Published Date: Mar 25, 2015
Intelligent N+X Redundancy, Placement Affinities, & Future Proofing in the Virtualized Data Center Virtualization brought about the ability to simplify business continuity management in IT. Workload portability and data replication capabilities mean that physical infrastructure failures no longer need impact application services, and they can rapidly be recovered even in the event of complete site failure. However, Enterprises and Service Providers face new challenges ensuring they have enough compute capacity in their virtualized data centers to support their business continuity requirements, while at the same time not over provisioning infrastructure capacity resulting in unnecessary capital expenditure.
Tags : 
continuity requirements, vmturbo, virtualization, workload portability, data replication
    
VMTurbo
Published By: Comcast Business     Published Date: Mar 24, 2015
The digitization of data has empowered both healthcare providers and patients to improve how, when and where healthcare is administered, giving patients greater control over their personal health and well-being. The key to success lies in the ability to get the right information to the right people at the right time. And a crucial enabler of improved communications is the ability to transfer data across like and disparate systems through mobile technology. This was the topic at a recent focus group Comcast Business held at HIMSS14 that included healthcare IT professionals from six leading healthcare providers. The participants shared the following insights on how advancements in data mobility can engage the entire healthcare ecosystem and help improve patient outcomes. Download this white paper to learn more.
Tags : 
healthcare, patient care, communication, electronic health records, remote diagnostics, mobile technology
    
Comcast Business
Published By: Skillsoft     Published Date: Mar 13, 2015
Most companies are well aware of the risks bribery and corruption pose when operating in the global marketplace. However, what companies may be overlooking is how quickly the landscape is changing—and how this dynamic shift can affect corporate compliance initiatives. With the recent up-tick in enforcement of the Foreign Corrupt Practices Act (FCPA) and the tightening of anti-corruption legislation in other areas of the globe, including upcoming legislation in Ireland, knowledge of bribery rules and regulations has never been more critical.
Tags : 
skillsoft, corruption, bribery, foreign corrupt practices act, fcpa, compliance, compliance initiatives
    
Skillsoft
Published By: CA Technologies     Published Date: Mar 06, 2015
L'app non è più semplicemente un metodo per comunicare. Rappresenta il nuovo punto critico di coinvolgimento, il volto dell'azienda, se non addirittura l’elemento chiave della fidelizzazione o meno del cliente.
Tags : 
    
CA Technologies
Published By: Skillsoft     Published Date: Mar 03, 2015
This ExecBlueprint describes effective approaches for recruiting and retaining this generation that has been alternatively described as entitled and creative. First, you may need to address conflicts with older workers if they resent millennials’ demands for flexible work arrangements, career advancement, and open relationships with leadership.
Tags : 
managing millennials, recruiting, retaining, millennial practices, development programs, benchmarking, mentoring programs
    
Skillsoft
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.