HIT Consultant Insightful coverage of healthcare innovation
 

hr software

Results 301 - 324 of 324Sort Results By: Published Date | Title | Company Name
Published By: ASG Software Solutions     Published Date: Nov 09, 2009
Composite applications can provide multiple benefits, such as business agility, better utilization of business software assets through code reuse, development efficiencies, and cost optimization. Once companies are skilled at deploying them, many find that they roll out new applications and integrations faster, while maximizing the value of "tried and true" software components.
Tags : 
asg, cmdb, bsm, itil, roi, configuration management, metadata, metacmdb
    
ASG Software Solutions
Published By: Medical Group Management Association (MGMA)     Published Date: Sep 23, 2009
In this highly informative piece, authors Cynthia L. Dunn, RN, FACMPE and Rosemarie Nelson, MS, healthcare industry leading experts and principal consultants for the MGMA Health Care Consulting Group (www.mgma.com/consulting) have composed an in-depth look at the medical practice of the future that will allow you to learn about the following.
Tags : 
mgma, connexion, medical, ehr, physician recruiting, medicare, private, ids
    
Medical Group Management Association (MGMA)
Published By: IBM     Published Date: Sep 11, 2009
Discover the hidden dangers posed by privileged users and the damages they have caused. This webcast features two senior analysts from Burton Group Identity and Privacy Strategies, as well as IBM identity and access management solutions address this security and compliance challenge.
Tags : 
ibm, access management solutions, christopher bauseman, ibm tivoli software, lori rowland, senior analyst, mark diodati
    
IBM
Published By: IBM     Published Date: Sep 10, 2009
Read this Trend and Risk report from IBM® ISS X-Force® to learn statistical information about all aspects of threats that affect Internet security, including software vulnerabilities and public exploitation, malware, spam, phishing, web-based threats, and more!
Tags : 
ibm iss x-force threat and risk report, ibm, web-related security threats, spam and phishing, malware, cvss, top vendor list, web application vulnerabilities
    
IBM
Published By: BMC Control M     Published Date: Jul 22, 2009
Enterprise job scheduling is a mature and mission-critical IT capability that supports some of the most important business processes throughout a modern enterprise. Areas like accounting, ordering, inventory, and procurement are all likely to rely on job scheduling technology. Most common job scheduling architectures involve deploying agent software on every system in the enterprise. However, depending on the parameters of the situation, these agents may be more expensive to install and maintain. Learn more today!
Tags : 
bmc, ema, tco, security, job, scheduling, agent, faster
    
BMC Control M
Published By: BMC Control M     Published Date: Jul 16, 2009
Enterprise job scheduling is a mature and mission-critical IT capability that supports some of the most important business processes throughout a modern enterprise. Areas like accounting, ordering, inventory, and procurement are all likely to rely on job scheduling technology. Most common job scheduling architectures involve deploying agent software on every system in the enterprise. However, depending on the parameters of the situation, these agents may be more expensive to install and maintain. Learn more today!
Tags : 
bmc, ema, tco, security, job, scheduling, agent, faster
    
BMC Control M
Published By: Medical Group Management Association (MGMA)     Published Date: Jun 25, 2009
MGMA Connexion™ magazine is the medical group practice professional's power resource. This popular magazine is filled with insight from peers, advice from experts and timely information on a variety of cutting-edge healthcare industry topics. MGMA Connexion™ magazine ranks as the "must-read" magazine for nearly 23,000 Medical Group Management (MGMA) members. MGMA's flagship publication is distributed ten times per year with a circulation well beyond the nearly 23,000 readers. About 50% or readers report the MGMA that they pass the issues on to other readers. This sample issue includes trend stories and member case studies, providing you a behind-the-scenes perspective on the group practice industry.
Tags : 
mgma, connexion, medical, ehr, physician recruiting, medicare, private, ids
    
Medical Group Management Association (MGMA)
Published By: VeriSign Incorp.     Published Date: May 08, 2009
Web Application Threats Are Evolving. Are Your Security Efforts Keeping Pace? Today, Web application security threats are not only becoming more abundant than ever, but also more difficult to detect, and more complex to solve. Many organizations are responding to these unique vulnerabilities with traditional network security approaches. However, sophisticated Web applications threats require a more sophisticated security strategy. What’s worked in the past won’t necessarily work today; and what’s more, Web application security requires a comprehensive solution, not simply a series of a la carte provisions. For detailed steps toward improving your Web application security strategy, download the VeriSign® Enterprise Security Services white paper, Best Practices That Improve Web Application Security.
Tags : 
verisign, web application security, sensitive data, intellectual property, business processes, operational costs, verisign enterprise security services, point-of-sale
    
VeriSign Incorp.
Published By: National Instruments      Published Date: Feb 06, 2009
This article introduces the three levels of data-logging software for use with National Instruments DAQ devices – NI LabVIEW SignalExpress, NI LabVIEW SignalExpress LE and NI LabVIEW.
Tags : 
national instruments, data acquisition devices, data logging software, ni labview, data acquisition applications, data logging applications
    
National Instruments
Published By: Trend Micro SaaS     Published Date: Oct 08, 2008
According to experts at TrendLabs, spam now makes up close to 95% of all email and continues to grow. In the first three months of 2008 spam rates almost doubled over rates observed at the end of 2007 and TrendLabs predicts that average daily spam volumes will increase by 30 to 50 billion messages per day within the year.1 As spam continues to grow at dramatic rates, traditional on-premise email security products are failing to keep up. This limitation is one of the primary reasons that IDC predicts demand for hosted security solutions -also known as SaaS (Software as a Service) solutions-will grow by more than 30% annually through 2012.2 For context, the growth rate for hosted email security is projected to be more than eight times that of the traditional software email security market, and more than 60% faster than appliance-based email security solutions.
Tags : 
saas, trend, trend micro, software as a service, trendlabs, email security, security, interscan messaging
    
Trend Micro SaaS
Published By: CA Mainframe     Published Date: Sep 12, 2008
Business and IT executives should not have to choose between their desire to innovate for future growth and the desire to avoid disrupting current operations. Enterprise innovation that embraces and extends existing infrastructure and applications is possible through modern software architectures such as web services and SOA – as long as those investments perform competitively when measured against alternative platforms and they are able to be modernized to participate in these architectures.
Tags : 
ca mainframe, mainframe, infrastructure, architecture, platforms
    
CA Mainframe
Published By: CA ITAM     Published Date: Sep 09, 2008
Learn more on how improving the efficiency of software inventory and license management processes can provide you with a host of benefits, including improved IT governance through stronger software compliance standards and processes, automated correlation of relevant software products within an organization’s infrastructure to their respective licenses, and reduced costs in the areas of license procurement, use rights and software purchases.
Tags : 
    
CA ITAM
Published By: IBM     Published Date: May 30, 2008
Many healthcare providers have gone through several challenging years of organizing their electronic records systems. And during that time, consumer-driven healthcare has gained momentum. This executive brief explains how an IBM WebSphere Portal software–based solution can provide a flexible and valuable long-term solution compared to other options, with personalized user experiences that help deliver agile, security-rich access to relevant information.
Tags : 
healthcare, hospital, medicine, medical, websphere, ibm, ep campaign, ibm ep
    
IBM
Published By: CA WA     Published Date: May 12, 2008
This IDC White Paper presents an overview of key concerns driving IT management and how they translate into needs that can be addressed through modern approaches to job scheduling and workload automation. The paper traces evolutionary trends in job scheduling software, which is growing from traditional batch job schedulers to cross-platform and event-driven capabilities. It also explores the role of job schedulers in providing automation capabilities.
Tags : 
roi, soa, job scheduling, ca wa, workload automation
    
CA WA
Published By: BlueArc Corporation     Published Date: Apr 24, 2008
BlueArc’s Titan Architecture creates a revolutionary step in file servers by creating a hardware-based file system that can scale throughput, IOPS and capacity well beyond conventional software-based file servers. With its ability to virtualize a massive storage pool of up to 4 petabytes of usable, tiered storage, Titan can scale with growing data requirements and provide a competitive advantage for business processes by consolidating applications while ensuring optimal performance.
Tags : 
bluearc, storage, titan
    
BlueArc Corporation
Published By: ESET     Published Date: Jan 30, 2008
As another year draws to a close, few can have failed to notice the plagues of malicious software, floods of fraudulent emails and the generally increased pestilence of our online world, marking out 2007 as one of the most remarkable in the history of malware.  This report covers the top malware threats in 2007 and provides monthly summaries.
Tags : 
malware, global threats, 2007, threats, email, threat summary, threat report, viruses
    
ESET
Published By: ESET     Published Date: Jan 30, 2008
Spam looks like a simple enough issue until you have to try to define it: after all, we all think we know it when we see it. Most people have a working definition along the lines of “email I don’t want.” While that’s perfectly understandable, it is difficult to implement technical solutions based on such a subjective definition. Read this paper to learn why SPAM is more than just unwanted email.
Tags : 
malware, threats, email, threat summary, viruses, eset, antivirus, nod32
    
ESET
Published By: ESET     Published Date: Jan 30, 2008
Anti-virus does much more than reactively detect known viruses; it proactively scans for unknown ones too. So, how do scanners really work? The aim of this paper is to reduce some of the confusion around the workings of AV technology, and to clarify what is realistic to expect from AV protection, particularly heuristic analysis.
Tags : 
heuristics, threat analysis, how av works, av signatures, traditional antivirus, norton, symantec, trend micro
    
ESET
Published By: ESET     Published Date: Jan 30, 2008
Steganography is the science of hiding data inside of items, such as sound and picture files.  Listen to this podcast to learn more about steganography and the potential IT security concerns it poses.
Tags : 
embedded files, steganography, hiding data, secret files, coding, av signatures, traditional antivirus, norton
    
ESET
Published By: NetSuite     Published Date: Nov 27, 2007
Where should mid-market companies invest valuable resource? Two out of three businesses are either buying or considering buying software via the subscription model.  This white paper will explain how Software-as-a-Service is revolutionizing the economics of growing businesses.
Tags : 
saas, software as a service, on demand, on-demand, software development, development, programming, web services
    
NetSuite
Published By: Trend Micro SaaS     Published Date: Oct 07, 2007
Der umfassende Hosted-Service wehrt Bedrohungen ab, ehe sie das Netzwerk erreichen, und kombiniert dazu leistungsfähige Anti-Spam- und Anti-Phishing-Funktionen mit mehrfach ausgezeichnetemViren- und Spyware-Schutz. Trend Micro, einer der Marktführer im Bereich der Sicherheits-Software, aktualisiert und optimiert die Lösung, um das Netzwerk des Kunden zuverlässig zu schützen und gleichzeitig wertvolle IT-Ressourcen einzusparen.
Tags : 
trend, messaging hosted security, e-mail, netzwerk, mx-datensatzes, spyware-schutz
    
Trend Micro SaaS
Published By: Ecora Software     Published Date: Aug 15, 2007
High-profile data losses are grabbing more and more headlines every week, threatening the reputation, customer base, and overall bottom line of organization whose systems have been exploited. In addition to this lurking threat, now organizations face potential fines for PCI non-compliance from VISA, beginning in September 2007. Ecora Software will provide you with the information you need to proactively address PCI compliance and, of equal importance, minimize your risk of a costly data breach.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial
    
Ecora Software
Published By: Microsoft Dynamics     Published Date: Apr 13, 2007
This white paper walks through the key areas of a financial management solution so when you are evaluating current and future financial management software, you are prepared to avoid challenges and maximize your investment.
Tags : 
financial management, finance software, financial software, microsoft, microsoft white paper, microsoft white papers, microsoft paper, microsoft crm
    
Microsoft Dynamics
Published By: Blue Lane     Published Date: Apr 03, 2007
One of the biggest challenges mirrors a problem in the physical server world: security patching. This paper describes in greater detail the benefits and challenges of server virtualization, and offers insight into how Blue Lane customers are utilizing the PatchPoint(r) System to combat the threat of software vulnerabilities.
Tags : 
virtualization, patching, security, vmware, network security, blue lane, patchpoint, server virtualization
    
Blue Lane
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.