autho

Results 276 - 300 of 380Sort Results By: Published Date | Title | Company Name

The Medical Practice of the Future: Competitively positioning your products and services.

Published By: Medical Group Management Association (MGMA)     Published Date: Sep 23, 2009
In this highly informative piece, authors Cynthia L. Dunn, RN, FACMPE and Rosemarie Nelson, MS, healthcare industry leading experts and principal consultants for the MGMA Health Care Consulting Group (www.mgma.com/consulting) have composed an in-depth look at the medical practice of the future that will allow you to learn about the following.
Tags : 
mgma, connexion, medical, ehr, physician recruiting, medicare, private, ids, pfizer, medfusion, pmic, health, mgis, medical protective, sage software, ehr, lean, medical practices, medicine, moonlighting solutions
    
Medical Group Management Association (MGMA)

Choosing the Right Security Solution: Moving Beyond SSL to Establish Trust

Published By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 11, 2011
Learn how online businesses can instill trust and confidence in their web sites, protect valuable brands, and safeguard customers' sensitive information.
Tags : 
verisign, verisign.com, security, extended validation ssl, authentication, trust marks, certificate authority, search-in-seal, anti virus, application security, security management, security policies, ssl, vulnerability management
    
VeriSign Authentication Services, now a part of Symantec Corp.

Retain Top Talent - Here's How

Published By: Cornerstone OnDemand     Published Date: Jun 29, 2018
There is no time like the present to come up with an improved strategy for employee retention and development. It is critical for you as supervisors and managers to engage employees effectively if you don’t want your top talent to look for opportunities elsewhere to grow in their careers. Help your employees do their best work by removing obstacles, recognizing valuable contributions and promoting creative approaches to career advancement. Take action to retain employees: authorize them to make decisions; initiate conversations about performance, be transparent; and provide guidance during times of change or uncertainty.
Tags : 
employee, retention, development, talent
    
Cornerstone OnDemand

Post-Discovery Intelligent Applications - The Next Big Thing

Published By: Attivio     Published Date: Apr 07, 2010
In this paper, well known data management authority Mark Albala proposes replacing the reliance on data models as the fixed navigation scheme used for storing, reporting and analyzing information with a new unified information access capability that enables more agile, insightful and pro-active decisions.
Tags : 
attivio, post-discovery intelligent application, analytic information delivery, business intelligence, enterprise applications, executive information systems, eis, business analytics, enterprise software, analytical applications, information management
    
Attivio

BI and the Cloud

Published By: SAS     Published Date: Sep 30, 2014
Several months ago, the author was discussing BI at a conference when another attendee asked, “Can you use those two terms together—business and intelligence?” Not being one to be outdone, the author quickly answered, “You cannot have one without the other, at least if you want to be successful.” As you might imagine, that led to a long discussion of what BI is (or should be). The author continued to interject the notion that cloud computing must be at the core of BI today and that having BI that is not enabled by cloud resources is sort of like eating apple pie without vanilla ice cream: You are not getting the most out of the experience (at least, not from the author’s point of view!). BI needs the cloud to be most successful. This piece helps explains why.
Tags : 
business intelligence, cloud computing, cloud resources, sas, data center
    
SAS

Best Practices for Microsoft Exchange Post-Migration Operations

Published By: Quest Software     Published Date: Apr 19, 2012
In this Quest white paper, discover best practices for a successful post-migration operation. See why you MUST have the same level of post-migration planning that you had for pre-migration, and learn four key aspects of post-migration management.
Tags : 
scriptlogic, quest, desktop authority, best practices, post-migration, operation, pre-migration, security, enterprise applications
    
Quest Software

Four Steps Toward Planning a Successful E-Mail Migration

Published By: Quest Software     Published Date: Apr 19, 2012
In this Quest white paper, learn about the benefits - and hazards - of email migration. Then, discover the importance of a solid migration strategy, and get several pre-migration steps critical to your project's success. Read this paper today.
Tags : 
scriptlogic, desktop management, desktop authority, windows, software asset management, software license, tracking, automation, system center configuration manager, sccm, virtual application, security, enterprise applications
    
Quest Software

Implementation Strategies for Fulfilling and Maintaining IT Compliance

Published By: Quest Software     Published Date: Apr 19, 2012
In this four-part eBook, get a better understanding of the real-world issues associated with IT compliance, how they affect the business, and how you can simplify your compliance challenges. Get your copy today.
Tags : 
scriptlogic, quest, desktop authority, best practices, post-migration, operation, pre-migration, security, enterprise applications
    
Quest Software

Compliance is Easy When You Do It In Advance

Published By: Quest Software     Published Date: Apr 27, 2012
Is your business reactively implementing compliance? You're wasting time and money - get proactive! In this Quest white paper, see how centralized monitoring and reporting is more secure, saves money and helps you adapt and manage compliance needs.
Tags : 
scriptlogic, quest, desktop authority, best practices, post-migration, operation, pre-migration, enterprise applications, data management, data center
    
Quest Software

How is Social Changing the Way You Do Business?

Published By: Oracle     Published Date: Jan 13, 2014
Oracle, Leader Networks, and Social Media Today recently conducted an online survey of over 900 marketing and technology leaders at more than 500 organizations from around the world to explore what it means to be a socially enabled enterprise. Technology and Marketing executives from Chubb & Son, Shell and Whole Foods Market participated in in-depth interviews as part of the study and share lessons learned and provide practical insights from their perspective. Paul Gillin, veteran technology journalist and co-author of the bookAttack of the Customers, adds perspective based on his experience with applying social media to marketing, customer service and internal communications Download this exclusive White Paper, The Socially Enabled Enterprise to learn more about the opportunities and challenges global organizations are facing in the transition to becoming socially enabled enterprises.
Tags : 
socially enabled enterprise, social business, social media monitoring, social marketing, social media management, social relationship management, social marketing platform, social marketing tools, social media tools, customer experience, customer insight, knowledge management
    
Oracle

Take control of your data

Published By: HP     Published Date: Aug 26, 2014
Make sense of modern storage technologies and architectures and how they might impact your business. HP helps you understand unstructured data, block and object storage, storage system architectures, and storage networking options. Discover how the right mix or technologies such as virtualization, file sharing, and deduplication can help control storage costs, protect your data from loss or corruption, and provide reliable access to critical business information for every authorized user. See how.
Tags : 
data, business, technology, portfolio, cloud-based, support, portal, solution, consolidate, islands, access, reliable, retention, protection, storage, data management
    
HP

“An Introduction to DocuSign for Purchasing Management”

Published By: DocuSign     Published Date: Feb 13, 2017
"O-Demand Webinar: See how workflow can be sped up significantly by removing of paper frmo the equation. A paperless environment with eSignature functionality paves the way for secure, authorized signing of documents in minutes plus the tracking all forms to completion with full visibility anytime, anywhere, on any device. "
Tags : 
    
DocuSign

Digital Thought Leadership: Jack Miles Embraces Digital Simplicity

Published By: DocuSign     Published Date: Feb 13, 2017
Procurement authority Jack Miles believes that digital and mobile platforms are the fast ticket to quick and efficient workflows in business. Watch this short video to learn more.
Tags : 
    
DocuSign

Equilibrium: The Secret to Success in Self-Service Business Intelligence

Published By: Gleanster Research     Published Date: Oct 11, 2012
Authored by two luminary Business Intelligence (BI) industry analysts. This 9 page report exposes best practices on Self-Service BI. The findings come from a Q3'12 survey on BI, which captured the experiences of 327 organizations.
Tags : 
business intelligence, cio, self-service, business analytics, data warehouse, data, analysis, business technology
    
Gleanster Research

Choosing the Right Security Solution

Published By: Thawte     Published Date: Oct 05, 2015
Choosing the right SSL solution for your business can be daunting. Recent breaches prove that all Certificate Authorities are not created equal; and with so many certificate types and additional measures including trust marks and Extended Validation available, selecting an SSL solution is challenging too. Discover how selecting the right SSL solution can increase customer trust and conversions in our new whitepaper.
Tags : 
security solution, ssl solution, certificate types, customer trust, extended validation, security
    
Thawte

Mobile Design Patterns: Push, Don't Pull

Published By: IBM     Published Date: Mar 13, 2014
When it comes to design patterns, the battle between push and pull has been ongoing since the start. Both models have their place. But the authors of this IBM® Redbooks® Point-of-View article, including IBM WebSphere® VP Jerry Cuomo, argue that in many situations, pushing data to users as it changes can consume far fewer resources than a conventional pull pattern.
Tags : 
ibm, ibm redbooks, ibm websphere, marketing, mobile, mobile marketing, mobile design, mobile applications, push design model, push notifications, pull, pull data
    
IBM

Profit Magazine: Everything You Know About Sales is Wrong

Published By: Oracle     Published Date: Jan 07, 2014
Everything You Know About Sales is Wrong. Daniel Pink, author of the book, To Sell Is Human unveils the secrets to selling - what makes sales people tick and the traits that make the best sellers successful in today’s marketplace.
Tags : 
oracle, crm, marketing, profit magazine, sales, daniel pink, to sell is human
    
Oracle

Understanding SSL Validation

Published By: GeoTrust     Published Date: Jan 21, 2016
Almost every website involves some exchange of information, whether it’s login details for an online application or contact details on a landing page, and visitors want to know that their information is secure. So deploying an SSL certificate from a trustworthy certificate authority (CA) like GeoTrust is a must for any site owner.
Tags : 
    
GeoTrust

Beginner's Guide to Thawte SSL/TLS

Published By: Thawte     Published Date: Jan 19, 2016
The Beginner’s Guide to Thawte SSL/TLS will rapidly demystify how SSL/TLS technology creates this trust, and explains why all SSL/TLS certificates and the Certificate Authorities issuing them are not created equal.
Tags : 
    
Thawte

The Art and Science of SSL Validation: A Visual Reference Guide

Published By: Thawte     Published Date: Jan 19, 2016
Download this visual reference guide to see why a highly reputable certificate authority like Thawte, the original international specialist in online security, gives you the credibility that your customers are looking for when assessing your website, no matter what sort of SSL certificate you choose.
Tags : 
    
Thawte

Erste Schritte mit Thawte SSL/TLS

Published By: Thawte     Published Date: Jan 19, 2016
In „Erste Schritte mit Thawte SSL/TLS“ erläutern wir in leicht verständlicher Form, wie SSL/TLS diese Vertrauenswürdigkeit herstellt und warum nicht alle SSL/TLS-Zertifikate und die ausstellenden Zertfizierungsstellen (Certificate Authority, CA) gleich sind.
Tags : 
    
Thawte

Not All Certificate Authorities Are Created Equal

Published By: Symantec     Published Date: Nov 30, 2015
As one of the world’s leading certificate authorities, we at Symantec take the responsibility for securing the transit of data on the Internet as a serious obligation to our customers.
Tags : 
    
Symantec

Not all Certificate Authorities are Created Equal (FR)

Published By: Symantec     Published Date: Nov 30, 2015
Prises pour cible à plusieurs reprises en 2011, certaines autorités de certification (AC) ne sont pas sorties indemnes de ces attaques. En tout état de cause, il ne faut certainement pas s’attendre à une accalmie sur ce front. Bien au contraire. Les hackers ne cessent de hausser leur niveau de jeu pour perfectionner leurs techniques d’exploitation des failles réseaux.
Tags : 
    
Symantec
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.