HIT Consultant Insightful coverage of healthcare innovation
 

hr technology

Results 551 - 575 of 660Sort Results By: Published Date | Title | Company Name
Published By: Blue Coat Systems     Published Date: Jun 26, 2013
More than 2 million web pages are added every day, tens of thousands malicious. How do you keep up with the volume & increasing sophistication of web-based threats? Deploying modern web security solutions, such as Secure Web Gateways, can go some of the way to help. This white paper from BlueCoat acts as a buyer’s guide, designed to help you determine the key areas you should focus on during your search for the best Secure Web Gateway solution.
Tags : 
secure web gateway, web-based threats, web, solution, technology
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jun 26, 2013
CISOs recognize the risk threats such as phishing, fake antivirus (AV), and search engine poisoning bring, and are anxious to invest in web security technology to safeguard users. Unfortunately, it’s not so easy. Many security executives are struggling to answer questions about the most effective approach. This ESG white paper from BlueCoat explains why some CIOs are struggling to manage security in an increasingly complex and mobile landscape, and offers advice for what they should be looking for in web security.
Tags : 
web security, web threats, physical appliance, virtual appliance, saas, security, technology
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jun 26, 2013
All indicators are up when it comes to mobility: More devices, more users, more budget, and more applications. Business technology leaders must begin planning now for a security paradigm shift, one that will pull together disparate security policies into a single, user-centric, universal policy that can apply to whatever devices and apps employees use. This white paper from BlueCoat explores the new security challenges mobility trends are creating, and how security must change to meet them.
Tags : 
mobile threats, security, malicious applications, data loss prevention, fraud, technology, malware
    
Blue Coat Systems
Published By: Medsphere     Published Date: Jun 26, 2013
Learn how a single comprehensive tool can be leveraged across the continuum of acute, ambulatory, and long-term care environments as well as in multi-facility, multi-specialty healthcare organizations.
Tags : 
medsphere, openvista, electronic health record, ehr, electronic medical record, emr, health information technology, health it, computerized provider order entry, cpoe, electronic health records, health information exchange (hei), workforce management, meaningful use
    
Medsphere
Published By: Percussion     Published Date: Jun 11, 2013
Building a business case for investing in your web content strategy, whether through technology, additional people, or new processes will require that you justify to your senior executives that the investment will pay dividends. Use the folloing paper, and the four models that are presented here, as a framework to help guide your own investment justification process.
Tags : 
cms, cms best practices, cms software, content marketing, content marketing platform, digital content management, content marketing platform, wcms, wcms software, web based cms, website cms
    
Percussion
Published By: HP - Enterprise     Published Date: Jun 05, 2013
When asked how important technology is to driving innovation in their organizations, 100 percent of CEOs indicated it was important, with 80 percent pointing out that it’s very important, according to HP sponsored research. Even CIOs agree with their CEOs. According to the same research, when asked whether or not technology will be the innovation engine or administrative engine for a business or government, approximately two out of three CEOs said it would be the “innovation engine.” This represents a significant shift in the role that technology is playing in enterprises. Today, organizations demand new applications and more functionality delivered more quickly, and at a lower cost than ever before. Many organizations either want a mobile application or are already using one. In fact, according to analysts, by 2016 350 million employees will use smartphones at work and businesses will increase spending on mobile projects over 100 percent in the same time.
Tags : 
mobile, cloud, applications, apps, mobile apps
    
HP - Enterprise
Published By: Allscripts     Published Date: Jun 05, 2013
This paper examines these technologies in the context of a four step process that many successful practices are using to optimize their revenue cycles. The “Four Steps to Transformation” methodology represents the distillation of best practices from thousands of medical groups across the United States who leverage technology to improve their bottom lines.
Tags : 
physician, revenue cycle, technology, physician compensation, billing, reimbursement, policy and legislation, enterprise resource planning, healthcare reform, care coordination, financial / revenue cycle management, claims processing
    
Allscripts
Published By: BambooHR - HR Software     Published Date: May 28, 2013
HR’s role varies from cheerleader to counselor to Chief Culture Officer- we get it! Tracking employee data in spreadsheets is a headache you don’t have time for, we make it simple- to free you up for more meaningful work. Watch the webinar!
Tags : 
hris, human resources, employee data, talent management, pto, time off management, hr software, employee management, hr systems, vacation tracking, employee retention, employee policy, employee calendars, human capital, employee data, employee records, benefit tracking, online documents, personnel files, benefit enrollment
    
BambooHR - HR Software
Published By: Cisco     Published Date: May 14, 2013
Not long ago, if you asked an IT executive about transformation, there was a good chance you’d get a technology-centric response. You’d hear about consolidation and virtualization, power and cooling, security and availability. Today, the responses are different. This edition of Unleashing IT is all about transformation. Not technology change, but business change through the use of technology.
Tags : 
innovation, change management, cost reduction, cloud, virtualization
    
Cisco
Published By: Sponsored by HP and Intel®     Published Date: May 13, 2013
Learn more about this offering that includes a self-service infrastructure portal for quick auto-provisioning, along with built-in infrastructure lifecycle management to optimize infrastructure, manage the resource pools, and help ensure uptime. CloudSystem Matrix is integrated by design with broad support of heterogeneous environments, including VMware, Microsoft® Hyper-V, and KVM through OpenStack as an enabling technology that manages and provisions virtual machines to the Red Hat KVM hosts.
Tags : 
    
Sponsored by HP and Intel®
Published By: IBM     Published Date: May 09, 2013
Federal agencies must take a proactive approach to information and network security due to increasing cybersecurity threats. IBM Tivoli Endpoint Manager, built on BigFix technology, is the leading enterprise cybersecurity solution to help combat cyber threats and eliminate vulnerabilities.
Tags : 
network, security, cybersecurity, endpoint manager, solution, eliminate vulnerabilities, technology
    
IBM
Published By: Polycom     Published Date: Apr 30, 2013
One of the simplest, most effective ways to bring healthcare to the community level is through video collaboration. When video technology is enabled through a standards-based, scalable platform, community members can all join a multipoint video call to collaborate and work together with professionals and even with groups of similarly afflicted, empathetic peers to address health issues. Patients benefit from more regular evaluations and better access to specialty support. They participate in live or recorded education sessions—regardless of location or ability to travel. And with today’s move to ubiquitous video, you cannot only do one-to-one video sessions, but groups can meet over video to share ideas and best practices.
Tags : 
healthcare, re-hospitalization, video collaboration, collaboration, video conferencing, video platform, telepresence
    
Polycom
Published By: Verint     Published Date: Apr 18, 2013
The vision for Celent’s Model Bank research was to try to answer an apparently simple question: “What would it look like for a bank to do everything right with today’s technology?” Of course, the question is not nearly as simple as it appears. The terms “everything” and “right” will mean very different things to different banks depending on their size, the complexity of their operations and product sets, and their technological starting points. While there is no such thing as a “Model Bank”—every bank does some things well, and others not as well when it comes to technology—it is possible to conceive of a “Model Bank” through real world examples of effective usage of technology.
Tags : 
banking, big data, technology, financial, effective use, analytics
    
Verint
Published By: Salesforce.com     Published Date: Apr 16, 2013
By 2014, smartphones and tablets will put power in the pockets of a billion global consumers, including your employees and partners and customers. However, mobile is not simply another device for IT to support with a shrunken website or a screen-scraped application. Rather, mobile is the visible manifestation of a much broader shift to systems of engagement that marry physical context and digital intelligence to deliver service directly into a person's hands. This shift will add value and take cost out of every business service, workflow process, and business application. But mobile engagement will also require wholesale changes to your app design, service delivery, IT skills, technology assets, and even your business model. This report lays out a vision for mobile engagement and introduces the strategic elements developed further in The CIO's Mobile Engagement playbook.
Tags : 
mobile, smartphones, tablets, engagement, experience, applications
    
Salesforce.com
Published By: Peoplefluent     Published Date: Apr 02, 2013
HR has an important opportunity to drive enterprise social collaboration. Read how social technology enables employee productivity, how HR can add value to social communication, and how social tools can improve HR functions.
Tags : 
social, collaboration, social collaboration, enterprise social collaboration, social technologies, enterprise communication, social communication, social hcm, social talent management, talent management, workforce productivity, social hr improvements, social hr process, social hcm software, employee communication, employee engagement, intersection of social and hr, onboarding, employee retention
    
Peoplefluent
Published By: Peoplefluent     Published Date: Apr 02, 2013
Today’s “connected” generation is comprised of tech-savvy workers whose strengths must be harnessed for competitive advantage. Read how to reach “Gen C” and develop talent management strategies to attract, engage and retain this workforce segment.
Tags : 
collaboration, generation c, talent management, mobile, social, social hcm software, talent management software, talent management strategies, next generation workers, hcm technology, hr strategies, human resource management software, social recruiting software, mobile talent management, connected generation of workers, hr software, social collaboration, workforce management, mobile technology, social technologies
    
Peoplefluent
Published By: IBM     Published Date: Mar 22, 2013
This paper shows how the IBM Maximo software solution is the leading asset and service management software in the marketplace, through its highly flexible business components and technology architecture
Tags : 
ibm, ibm maximo, maximo, service management, it management, agile it, client devices, soa, tivoli software
    
IBM
Published By: FireEye     Published Date: Mar 20, 2013
In the last few years, the scale and sophistication of IT security threats have grown at an explosive rate.
Tags : 
fireeye, security gaps, threats, complex threats, fireeye technology
    
FireEye
Published By: McAfee     Published Date: Mar 08, 2013
Protect sensitive information in emerging computing models such as virtualized environments. Learn how to leverage the same security architecture to provide more effective and more efficient data security across dedicated database servers as well.
Tags : 
database security, virtual database environments, database virtualization, database activity monitoring, vm to vm transactions, virtual machines, virtual appliance, distributed database monitoring, memory based sensors
    
McAfee
Published By: Oracle     Published Date: Feb 14, 2013
In today’s lean business environment, your people are an asset that can be dramatically leveraged to increase success. This executive brief investigates how organizations can better understand the talent that is driving results.
Tags : 
hr technology, human resources, best practices, 2012, talent management, business environment
    
Oracle
Published By: Oracle     Published Date: Feb 14, 2013
In today’s lean business environment, your people are an asset that can be dramatically leveraged to increase success. This executive brief investigates how organizations can better understand the talent that is driving results.
Tags : 
top talent management, best practices, 2012, talent driving results, leveraging talent, hr technology, oracle
    
Oracle
Published By: SumTotal     Published Date: Feb 01, 2013
Most HR professionals are ready for a completely different approach to HR technology. This engaging paper from SumTotal explains why that is — and how one system is revolutionizing the industry in response.
Tags : 
sumtotal, sumtotal systems, elixhr, talent expansion, integrated hr solutions, human resources, hr technology, hr solutions, hr systems, enterprise resource planning, erp, human capital management, hcm, virtual system of record, talent management solutions, nurturing talent, integrate hr systems, traditional hr technology, business technology
    
SumTotal
Published By: iCims     Published Date: Jan 17, 2013
Check out this free webinar recording on ways to simplify social recruiting through technology.
Tags : 
recruiting, social media, social recruiting, human resources, icims
    
iCims
Published By: Sage     Published Date: Jan 15, 2013
Download this resource and learn about improving results and lowering costs with a Human Resource Management System.
Tags : 
hrms, human resource management system, sage hrms, sage, hr resources, hrms technology, strategic hr
    
Sage
Published By: Symantec     Published Date: Jan 10, 2013
In this guide, we will examine major types of threats to information security that  businesses face today as well as techniques for mitigating those threats. One of the most important tools available to us is SSL technology.
Tags : 
shortcut, business, security measures, ssl, security socket layer, ssl
    
Symantec
Start   Previous    13 14 15 16 17 18 19 20 21 22 23 24 25 26 27    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.