HIT Consultant Insightful coverage of healthcare innovation
 

best practices

Results 2676 - 2700 of 2720Sort Results By: Published Date | Title | Company Name
Published By: Tideway Systems     Published Date: Dec 11, 2007
A world class IT organization needs to be better than even the regulators require – and good IT governance doesn't have to tie the IT department up in red tape. Judicious application of IT best practices, frameworks and methodologies can help achieve this, based on an accurate picture of the IT environment, at which point regulatory compliance becomes a happy side effect. Find out how you can have an up-to-date true view of your infrastructure on a daily basis – not just at a point in time by reading this white paper.
Tags : 
compliance, regulation, regulations, regulator, regulators, governance, compliant, infrastructure
    
Tideway Systems
Published By: Computhink     Published Date: Dec 10, 2007
To properly serve their customers, Cortes & Hay must create files of documents that need to be distributed to appropriate parties. The documents that comprise a title insurance binder come from two places. There are documents generated internally, and documents that come from external sources.
Tags : 
document management, title insurance, paperless, cortes & hay, insurance, documents, electronic document management, best practices
    
Computhink
Published By: Shunra     Published Date: Nov 27, 2007
"Best Practices for Selecting a WAN Optimization Solution: Benchmarking Performance ROI" includes best practices for defining requirements and comparing alternative solutions, and offers a metric that IT organizations can use to select the WAN optimization solution that delivers the greatest value.
Tags : 
wan, wide area network, wide area networks, best practices, network performance, wan performance, shunra, ppi
    
Shunra
Published By: TamoSoft     Published Date: Sep 28, 2007
This white paper examines the problems related to the deployment and usage of software-based network monitoring solutions, methods of achieving network traffic visibility in various network configurations that include hubs, switches, routers, etc.
Tags : 
monitoring, lan, wan, best practices, networking, wlan, wireless security, tamosoft
    
TamoSoft
Published By: BlueCat     Published Date: Sep 14, 2007
This paper introduces and describes the principal concepts and techniques involved with DNS best practices.
Tags : 
dns, dns server, dns servers, server, servers, ip network, ip networks, ip address
    
BlueCat
Published By: Nevis Networks     Published Date: Sep 04, 2007
While 802.1X has a growing presence, it's still immature and may not provide all the policy enforcement features commonly required in most organizations. This white paper focuses on the 802.1X standard for authentication and access control and how it compares to the Nevis approach for LAN security.
Tags : 
security policies, policy management, authentication, access control, lan, lan security, 802.1x, nevis
    
Nevis Networks
Published By: Nevis Networks     Published Date: Sep 04, 2007
The ability to monitor, track and report usage based on actual user identity and applications provides for quicker reaction time, easier reporting for compliance, as well as more visibility into the network. Learn about a complete line of solutions for effective identity-based policy enforcement.
Tags : 
lan, lan security, network security, security policies, security policy, policy management, best practices, nevis
    
Nevis Networks
Published By: Nevis Networks     Published Date: Sep 04, 2007
Companies are yearning for a solution to guard their network from security risks such as external or untrusted users, and unmanaged endpoints on their internal LAN. NAC technology works well, but a strategic solution is required to fully address the problem of the dissolving network perimeter.
Tags : 
lan, local area networking, nac, access control, network security, infrastructure, lan security, nevis
    
Nevis Networks
Published By: OneNeck IT Services     Published Date: Aug 24, 2007
Outsourcing Best Practices describes how to create a governance environment that fosters a successful outsourcing relationship.
Tags : 
oneneck, erp hosting, erp outsourcing, it outsourcing, it hosting, j.d. edwards, oracle, baan
    
OneNeck IT Services
Published By: Ecora Software     Published Date: Aug 16, 2007
Deep dive into the first 4 PCI DSS requirements. Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial
    
Ecora Software
Published By: XaSystems     Published Date: Aug 16, 2007
This list of Frequently Asked Questions provides answers to important questions affecting ITIL professionals, including the significant differences between version 2 and 3, the impact on investments in publications and training, and how other standards align with version 3.
Tags : 
itil, faq, faqs, frequently asked questions, it infrastructure library, xa systems, xasystems, best practices
    
XaSystems
Published By: XaSystems     Published Date: Aug 16, 2007
This quick reference guide provides an easy to use snap shot of key ITIL version 3 practices and concepts.  In addition, it provides a visual map between ITIL Version Service Delivery and Support books to the new ITIL Version 3.
Tags : 
itil, it infrastructure library, xa systems, xasystems, best practices, infrastructure, itil v3, itil v2
    
XaSystems
Published By: Ecora Software     Published Date: Aug 15, 2007
Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial
    
Ecora Software
Published By: Ecora Software     Published Date: Aug 15, 2007
21 CFR Part 11 continues to cause confusion. Recent FDA guidance documents help, but many IT departments still struggle to establish appropriate validation processes with limited time and resources. Ecora's FREE in-depth guide, "Achieving Sustainable IT Compliance to 21 CFR Part 11," gives you an overview of the regulation from an IT perspective. It also outlines how you can accurately and cost-effectively implement a systems-based best practices approach that will help you meet FDA requirements.
Tags : 
21 cfr part 11, compliance, electronic records, electronic data, electronic signatures, information management, pharm, pharmaceuticals
    
Ecora Software
Published By: Ecora Software     Published Date: Aug 15, 2007
Achieve and Maintain Compliance with PCI Data Security Standard – Part 4. Deep dive into PCI DSS requirements 10-12. Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial
    
Ecora Software
Published By: Ecora Software     Published Date: Aug 15, 2007
Deep dive into PCI DSS requirements 5-9. Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial
    
Ecora Software
Published By: SWsoft     Published Date: Aug 08, 2007
As virtualization becomes more pervasive in the datacenter, organizations are deploying complementary types of virtualization technologies. Read this white paper to learn how blending application and OS virtualization using Citrix and Virtuozzo will provide stronger and more robust virtualization solution.
Tags : 
os virtualization, virtualization, citrix, best practices, swsoft, sw soft, application virtualization, server virtualization
    
SWsoft
Published By: Inovis     Published Date: Aug 06, 2007
The challenges presented by multiple Value-Added Networks (VANs) and managing diverse trading partners create barriers to the efficiencies promised by EDI. Multiple providers mean multiple points of failure with no one entity to hold accountable. Also, as trading communities grow, end-to-end supply chain visibility becomes an essential operational requirement.
Tags : 
van, vans, value added, value-added, value added, edi, electronic data interchange, scm
    
Inovis
Published By: Knoa     Published Date: Jul 17, 2007
What is often overlooked is that application performance is just one of three key drivers of return on investment (ROI) from your Siebel application. An efficient infrastructure is critical. It's important to optimize the Siebel application for your own unique business environment, user needs and usage patterns. But, it's all for naught if you do not build and sustain adoption and efficient and effective use of the Siebel application by your end users.
Tags : 
epm, performance management, experience management, knoa, siebel, crm, customer relationship, end user
    
Knoa
Published By: SitePal     Published Date: Jul 02, 2007
Discover the benefits and potential pitfalls of using speaking avatars (virtual animated characters) for your small business websites. Learn the best practices to use to increase conversions with a talking character!
Tags : 
conversion analysis, landing page, landing pages, content personalization, ecommerce, e-commerce, e-business, live support
    
SitePal
Published By: Omniture     Published Date: Jun 27, 2007
In general, most organizations spend more time and money promoting their websites through acquisition channels such as search or affiliate marketing than they do optimizing existing conversion rates. Download this paper now to discover 7 steps to increase conversion engagement.
Tags : 
conversion, conversion analysis, lead generation, website analytics, web analytics, lead generation, lead optimization, omniture
    
Omniture
Published By: Ingate Systems     Published Date: Jun 21, 2007
A complete guide to SIP trunks, this whitepaper provides a comprehensive overview on the basics of SIP trunking, including a discussion of infrastructure needs and deployment issues and solutions. In-depth sections dedicated to interoperability, security as well as quality and reliability issues are also included.
Tags : 
pbx, phone, phone system, phone systems, best practices, sip, ip telephony, voip
    
Ingate Systems
Published By: Infor     Published Date: May 25, 2007
External forces can knock your business off balance with no warning. To meet these external challenges, you need the capability to extend supply chain visibility, respond to changes in real time, and improve performance measurement across the entire chain.
Tags : 
supply chain, scm, business management, bpm, best practices, customer service, manufacturing, manufacture
    
Infor
Published By: Salesforce.com     Published Date: Apr 26, 2007
This paper summarizes the key ingredients for a successful on-demand implementation. Find out how you can benefit from the knowledge gained by the Salesforce.com Global Services organization, as outlined in the seven domains described in this paper.
Tags : 
salesforce, salesforce crm, crm, customer relationship management, mobile, saas, sales tools, best practices
    
Salesforce.com
Published By: AirDefense     Published Date: Apr 24, 2007
This white paper will explore what security challenges wireless networks present, suggest best practices to ensure Wireless LAN security, and demonstrate how AirDefense Enterprise, a Wireless Intrusion Detection and Prevention System, can help you define, monitor and enforce your wireless security policy.
Tags : 
best practices, sox, sarbanes-oxley, sarbanes oxley, sarbox, compliance, wireless security, wlan
    
AirDefense
Start   Previous    95 96 97 98 99 100 101 102 103 104 105 106 107 108 109    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.