HIT Consultant Insightful coverage of healthcare innovation
 

iti

Results 14201 - 14225 of 14633Sort Results By: Published Date | Title | Company Name
Published By: HP     Published Date: May 30, 2008
Storage virtualization has been around for several decades. While technologies have advanced and capabilities have become more sophisticated over time, the motivations for virtualizing resources and the anticipated benefits have remained relatively stable. Storage virtualization continues to be an important topic because it addresses a number of significant challenges.
Tags : 
storage management, storage virtualization, virtualization, storageworks, storage, hp eva 4400, hp eva 4000
    
HP
Published By: IBM     Published Date: May 30, 2008
View to this webcast and learn how Memorial Health System, a 500-bed hospital system in Colorado Springs, Colorado, has recently implemented a portal strategy based on IBM WebSphere Portal and Lotus Web Content Management that allows them to quickly and securely provide online capabilities for their external and internal user constituencies.
Tags : 
hospital, portal, corporate portal, collaboration, ibm, websphere, ibm ep, ep campaign
    
IBM
Published By: IBM     Published Date: May 30, 2008
Collaboration. It is the critical element to success and IBM Lotus software is at the forefront. With collaborative innovations that enable users to work the way they want to, Lotus software offers a compelling portfolio that is based on open, integrated and secure solutions.
Tags : 
collaboration, web 2.0, ibm, ibm ep, ep campaign
    
IBM
Published By: IBM     Published Date: May 30, 2008
Lotus Notes software helps you access information more easily, work more productively and collaborate more effectively than ever before. It is a collaborative business tool that supports your ability to focus on what matters most to your business: innovation.  It achieves this through innovative functionality and an intuitive, compelling user experience.
Tags : 
collaboration, web 2.0, ep campaign, ibm, ibm ep
    
IBM
Published By: IBM     Published Date: May 30, 2008
In the age of Web 2.0, Internet users are rewriting the rules of social interaction, using blogs, forums, and social bookmarking for sharing information and sustaining relationships across borders. This IBM white paper looks at how organizations can achieve tangible business benefits through embracing these technologies.
Tags : 
ibm, collaboration, ibm ep, ep campaign, ibm
    
IBM
Published By: IBM     Published Date: May 30, 2008
Unified communications and collaboration strategies can help organizations deliver a user experience that brings together communications and collaboration silos across and beyond traditional business boundaries. This paper reviews how by providing users with a single, integrated experience across both business applications and communications and collaboration tools, organizations can cultivate more dynamic and flexible business systems.
Tags : 
unified communication, unified communications, collaboration, lotus, lotus notes, ibm ep, ep campaign, ibm
    
IBM
Published By: Oracle Corp.     Published Date: May 30, 2008
Current trends show that the vast majority of companies are moving to services-oriented architectures (SOAs) and deploying Web services within and across their IT infrastructure.However, the success of those deployments is determined by the integrations and innovations that Web services make possible and how Web services affect the quality and performance of the mission-critical applications with which they interface.
Tags : 
soa, soas, oracle, application testing suite, web services, mission-critical, enterprise java beans-based, quality assurance, ejb, user interface
    
Oracle Corp.
Published By: MessageLabs     Published Date: May 28, 2008
So-called "redirector" or "search engine" spam emerged in late 2007 and has now grown into a significant threat to businesses. In this new MessageLabs whitepaper, learn about the latest spammer ploy to get dangerous links past traditional defenses, and how MessageLabs delivers a proven, cost-effective solution.
Tags : 
spam, anti-spam, anti spam, email security, trojan, hacker, messagelabs, message labs
    
MessageLabs
Published By: IEX     Published Date: May 27, 2008
Customers and business leaders alike demand a great deal of contact centers which cannot easily be met using the simplistic approaches used to develop early, isolated contact centers. In order to provide a top-shelf customer experience, contact centers must adopt sophisticated processes which can evaluate and route calls quickly and effectively to the right agent, and which schedule agents based on their abilities as well as predicted call demand.
Tags : 
call center management, customer service, workforce management, contact management, iex, contact center, call center
    
IEX
Published By: IEX     Published Date: May 27, 2008
As more companies seek out performance management capabilities to gain a competitive advantage or keep pace with rivals who have already established an edge, the decision to build or buy a performance management solution must be considered. This paper will walk readers through the pros and cons of the build versus buy debate in order to help make practical business decisions for long-term success.
Tags : 
call center management, customer service, workforce management, contact management, iex, contact center, call center, performance management
    
IEX
Published By: 123Together     Published Date: May 27, 2008
Email has become THE mission critical application for businesses large and small. As a growing business continually striving to increase productivity, collaboration and corporate success, you understand the important role that Microsoft Exchange Server plays in any profitable business. Small and mid-size businesses alike see the productivity benefits of utilizing an enterprise-class solution but since many do not have the financial or human resources to bring it in house, more and more of them are turning to a hosted solution.
Tags : 
123together, it strategies, economy, stability, migration, collaboration, green it, outsourcing, microsoft exchange, hosted exchange, mobile services
    
123Together
Published By: BlackBerry     Published Date: May 22, 2008
Over the past decade, wireless technology has made huge strides in security, reliability and throughput. Companies that are moving forward with business mobility initiatives must plan for wireless security and mobile device management from the start. Learn about many of the notable trends and key issues associated with Business Mobility and where to find additional resources for consideration.
Tags : 
blackberry, mobile applications, cio, pim, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: Stratavia     Published Date: May 21, 2008
This white paper provides an overview of current challenges in the modern data center, the impact those challenges have on the business, and Stratavia’s approach to solving those problems.
Tags : 
data center automation, stratavia, automation, dca, rba, run book automation, operational maturity, operational efficiency, process automation, data center standardization, decision automation, database automation, server provisioning, process automation
    
Stratavia
Published By: Stratavia     Published Date: May 21, 2008
This document provides an overview of data center consolidation methodologies, the general impact of each method, and how Stratavia’s Data Palette helps data center consolidation initiatives.
Tags : 
data center consolidation, data center standardization, logical consolidation, data center rationalization, data center automation, stratavia, automation, dca, decision automation, database automation, database consolidation, server provisioning, server consolidation, process automation
    
Stratavia
Published By: Clickatell     Published Date: May 20, 2008
This white paper addresses the application of SMS messaging to the banking industry, and suggests how financial institutions can leverage multimodal messaging architecture to gain a competitive advantage.
Tags : 
clickatell, mobile banking, mobile marketing
    
Clickatell
Published By: Clickatell     Published Date: May 20, 2008
In meeting the challenges of an increasingly competitive banking landscape, Standard Bank seeks to differentiate itself by providing the highest levels of service to its customer base. An integral part of achieving this goal has been its partnership with Clickatell to deliver personalized and relevant messaging to bank customers via their mobile phones.  Read this case study to learn more.
Tags : 
customer centric messaging, clickatell, standard bank
    
Clickatell
Published By: CheetahMail     Published Date: May 19, 2008
This white paper provides a number of well-tested, organic methods for email acquisition – giving marketers actionable insight to attract and retain a loyal, profitable subscriber base. Download it now.
Tags : 
cheetah mail, email acquisition, list building, email marketing, cheetah, cheetahmail, experian
    
CheetahMail
Published By: Upstream Works     Published Date: May 15, 2008
It’s not surprising that first contact resolution (FCR) is becoming a high priority among forward-looking contact center managers. Increasing the percentage of contacts resolved during the initial contact provides three great benefits; customer satisfaction goes up, operating costs go down, and contact-center generated revenue goes up. There are also potential downsides, like extended handle time as agents strive to keep the caller on-line until the issue can be resolved.
Tags : 
customer, customer satisfaction, customer service, call center, call center management, contact center management, upstreamworks, upstream works
    
Upstream Works
Published By: Quocirca     Published Date: May 14, 2008
Virtual private networks (VPNs) are the technologies most widely used by organizations today in the provision of remote access to their networks for employees, business partners and suppliers. Of the VPNs available, IPSec (Internet Protocol Security) VPNs provide the most complete remote access solution, although they have traditionally been seen as costly and difficult to deploy. 
Tags : 
vpn, ipsec, remote access quocirca
    
Quocirca
Published By: UsedCisco.com     Published Date: May 14, 2008
An incredible array of organizations from both the public and private sector are buying pre-owned. These organizations include global public commercial enterprises, small businesses, ISP's, telecoms, non-profits, local and US government, military and educational institutions of all kinds. An overwhelming majority of the customers we've surveyed mention the same fact - they just didn't know pre-owned was a real, safe and viable option. In this guide, we'll present you with critical information you need to make the switch.
Tags : 
pre-owned, used, cisco, usedcisco, used cisco, green, cost, usedcisco.com
    
UsedCisco.com
Published By: Process Software     Published Date: May 14, 2008
Spyware is on the rise and has been the cause of many data breaches. Stopping it needs to be a strategic part of an organization's overall security plan. Reactive signature-based anti-virus and firewall technology is not a complete solution to prevention. Read this white paper to learn the top five behaviors associated with data theft and how advanced behavioral detection solutions is an effective technology for stopping spyware and can identify and prevent legitimate applications from being misused.
Tags : 
spyware, trojan, virus, malware, web security, internet security, process software, process, antispyware, hosts, spyware, threats, virus protection
    
Process Software
Published By: SAP     Published Date: May 14, 2008
As information flows more freely in the business world, decisions need to be made quicker and based on sturdier data. The analytical capability that was once reserved for large enterprises has now permeated the world of Small to Medium Businesses (SMBs) and provided a solid foundation of visibility into what really matters to these companies.
Tags : 
business intelligence, sap
    
SAP
Published By: P2 Security     Published Date: May 13, 2008
A large financial institution used a competitive product for Web Access Management. By working with P2 Security, the company was able to determine its true Total Cost of Ownership (TCO). An analysis following the installation of maXecurity revealed annual cost savings of millions of dollars per year. In addition, by switching to maXecurity, the Return on Investment (ROI) was measured in months.
Tags : 
maxecurity, tco, roi, web access management, internet security, web security
    
P2 Security
Published By: IBM     Published Date: May 12, 2008
In today's rapidly changing business environment, it's important to be ready to respond to every risk or opportunity. In this white paper, you'll learn how to determine risks, calculate impact, evaluate your current structure’s response and test overall resilience. Then you'll see how IBM can help you combine several risk management strategies into a single integrated one, so you’re better able to respond to the threat of disaster and stay ahead of the competition.
Tags : 
disaster recovery, d/r, business continuity, risk management, ibm, ibm g&rm, ibm grm, global services
    
IBM
Published By: IBM     Published Date: May 12, 2008
Challenges like competitive pressures, compliance activities and higher operational costs make service management more critical than ever. To keep up, IT operations must constantly improve visibility, control and automation while bridging the gaps among business, development and daily operations.
Tags : 
itil, service management, governance, risk management, ibm, ibm g&rm, ibm grm
    
IBM
Start   Previous    562 563 564 565 566 567 568 569 570 571 572 573 574 575 576    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.