electronic

Results 426 - 450 of 460Sort Results By: Published Date | Title | Company Name

Disk Encryption & Advanced Password Protection: A Necessity for Financial Services Enterprises

Published By: Data Guard Systems, Inc     Published Date: May 06, 2009
The data security challenges for financial enterprises have never been as challenging as they are in today's turbulent times. Not only must financial enterprises comply with regulations such as SOX, GBLA and PCI along with a multitude of state regulations concerning customer privacy and electronic data security, they must also guard against the staggering costs—both tangible and intangible—that a security breach can incur.
Tags : 
online identity theft, encryption software, advanced password protection, alertboot, identity, theft, dataguard, credit card, payment, fraud, anti-virus, anti-spam, pre-boot authentication, advanced password protection, file-based password protection, encryption, full disk, file encryption, breach, breaches
    
Data Guard Systems, Inc

The Need for Disk Encryption and Advanced Password Protection in Healthcare

Published By: Data Guard Systems, Inc     Published Date: May 06, 2009
The data security challenges in the healthcare industry have never been as challenging as they are today. Not only must healthcare providers comply with HIPAA regulations concerning patient privacy and electronic data security, they must also guard against identity theft as well more complex scenarios of insurance data theft, medical identity theft and the adulteration of health records.
Tags : 
online identity theft, encryption software, advanced password protection, alertboot, identity, theft, dataguard, credit card, payment, fraud, anti-virus, anti-spam, pre-boot authentication, advanced password protection, file-based password protection, encryption, full disk, file encryption, breach, breaches
    
Data Guard Systems, Inc

How e-Citation Systems Increase Productivity and Revenues While Improving Officer Safety

Published By: Intermec     Published Date: Sep 07, 2011
Using electronic-citation systems to increase number of citations issues and reduce time needed to process them.
Tags : 
intermec, electronic citation, productivity, officer safety, e-citation applications, mil standards, application integration, data protection, data quality, content management system, information management
    
Intermec

Five Things to Consider When Using Tablet Computers in Forklift Applications

Published By: Intermec     Published Date: Aug 09, 2012
Tablet computing is one of the fastest growing categories of consumer electronics, led by the Apple iPad. This buzz is leading many businesses to explore new uses for tablet computers, and some devices are finding their way into evaluation trials on forklifts and other vehicle applications in the distribution center. This white paper compares ruggedized enterprise tablets to purpose-built vehicle mount computers, and addresses mounting, survivability, power, compatibility, and cost considerations between the two product categories.
Tags : 
intermec, tablet, computing, ipad, computers, compatibility, wireless application software, wireless hardware, application integration, application performance management, ebusiness, sales automation, server virtualization, workforce management, business intelligence, content integration, document management, records management, spend management, employee monitoring software
    
Intermec

eDiscovery Compliance and Its New Requirements:The IT Manager's Guide to 100% Compliance

Published By: Symantec.cloud     Published Date: Feb 03, 2010
Email may be used as evidence for or against US and Canadian organizations in litigation. Learn how to preserve, protect, and produce legally compliant email.
Tags : 
messagelabs, symantec hosted services, ediscovery compliance, email security, esi, electronically stored information, compliance, internet security
    
Symantec.cloud

Email Retention and Archiving

Published By: Symantec.cloud     Published Date: Jan 26, 2011
Manage Electronic Records, Minimize Workplace Risks and Maximize Compliance. Learn about the legal and compliance regulations associated with maintaining your business critical emails. Understand how your business could face legal issues if a proper archiving solution is not in place.
Tags : 
symantec cloud, email retention, archiving, legal and compliance, epolicy institute, compliance, policy based management, email archiving, cloud computing
    
Symantec.cloud

Live Webinar: What's the ROI of eSignatures? Closing More Deals!

Published By: EchoSign     Published Date: Jun 21, 2010
Register for this live event: Date: Wednesday, August 4th, 2010 Time: 2:00pm EDT / 11:00am PDT Leading companies are signing contracts electronically because there is no faster, easier or more secure way to get agreements signed. Join our webinar, see a live product demo, and learn how electronic signatures make it easy for : •your customers can easily sign your agreements so it's easier to do business with you •your customers can quickly sign your agreements on a smart phone (i.e. Blackberry, iPhone) -- which means they can sign your agreements on the weekend or when they are out of the office •you can track and manage the status of all your agreements online •you can decrease post sale paperwork by 50% •you can make an document a signable contract by adding initial and signature fields on the fly
Tags : 
echosign
    
EchoSign

Emerging Topics In Health Care

Published By: SAS     Published Date: Jun 27, 2019
The health care world is changing. And data has a role to play in that change. Traditional health care systems are becoming more accessible and convenient, while also offering lower priced options. Proactive care — rather than reactive — is expected, including a shift from disease management to disease prevention. Likewise, a greater emphasis on personalized delivery, including understanding populations, has led to increased precision in holistic care management. Combining conventional data sources with data from previously untapped data sources — such as electronic health records, wearables, social determinants, social media, genetics and diagnostics — creates new possibilities for understanding the patterns, relationships, and predictors of wellness and health. Keep reading this e-book to discover how health care leaders are generating new opportunities for innovation and transforming how care is delivered.
Tags : 
    
SAS

Proactive and Reactive Approaches to Obsolescence Management

Published By: SiliconExpert Technologies     Published Date: Dec 23, 2010
A case for proactive component management using lifecycle forecasting algorithms from independent component databases.
Tags : 
obsolescence, component, bill of materials, boms, electronic parts
    
SiliconExpert Technologies

Understanding ESI Technology and Workflows

Published By: Forensics Consulting Solutions     Published Date: Jan 31, 2011
A guide to understanding electronically stored information and workflows used to produce data for litigation.
Tags : 
e-discovery, esi, electronic discovery, electronically stored information, workflows, data governance, database security
    
Forensics Consulting Solutions

Understanding RoHS and REACH: Impacts on your Global Markets

Published By: SiliconExpert Technologies     Published Date: Feb 08, 2011
An overview of two important environmental regulations, their impacts on the global electronics industry and upcoming legislation changes.
Tags : 
reach, rohs, environmental compliance, environmental regulation, electronic part, boms
    
SiliconExpert Technologies

Filtering companies by multiple criteria

Published By: ETNA Software     Published Date: Feb 10, 2011
This whitepaper discusses various ways of filtering companies for electronic trading purposes.
Tags : 
filtering software, finance software, investment software, financial tools, trading, technology, software, financial services, stocks, equities, filtering companies, filter, electronic trading, back-office
    
ETNA Software

Free desktop application to e-Sign PDF and files, Timestamp and Smart Verification

Published By: Xolido Systems     Published Date: Mar 09, 2011
Free desktop application to e-Sign, Smart verify and TimeStamp documents and files
Tags : 
    
Xolido Systems

Future of supply chain strategy for consumer electronics

Published By: Wipro Technologies     Published Date: Jun 28, 2011
The whitepaper discusses maturing models of supply chain management in the dynamic consumer electronics landscape.
Tags : 
consumer electronics, scm, supply chain management, supply chain
    
Wipro Technologies

Measuring-ROI-on-a-Document-Management-System

Published By: ITAZ Technologies     Published Date: Aug 17, 2011
This white paper discusses the quantitative and qualitative benefits offered by electronic document management systems.
Tags : 
document management, roi, return on investment, paperless office, small business, small office, software, document management system
    
ITAZ Technologies

Here’s a social story about building and rewarding brand advocates from RadioShack, a national elect

Published By: Spredfast, Inc.     Published Date: Mar 04, 2014
Here’s a social story about building and rewarding brand advocates from RadioShack, a national electronics retailer.
Tags : 
spredfast, marketing, social strategy, media strategy, social network, consumer behaviors
    
Spredfast, Inc.

Requirements Gathering for Electronic Document Management

Published By: CloudDocs by eGistics, Inc.     Published Date: Sep 30, 2011
This paper identifies important criteria for gathering user requirements for an EDMS project.
Tags : 
    
CloudDocs by eGistics, Inc.

eBook: Implementing Electronic Lab Notebooks

Published By: Accelrys     Published Date: Feb 08, 2012
In this 18-page Scientific Computing eBook, Bennett Lass Ph.D. PMP shares best practices based on his experiences planning and managing ELN deployments in large and small pharmaceutical and biotechnology research organizations.
Tags : 
accelrys, eln, symyx, scientific computing, electronic lab notebook, electronic, notebooks, lass, eln deployments, pharmaceutical, pharm, biotech, biotechnology, research, compliance
    
Accelrys

How to Achieve 100% Electronic AR Invoicing: Realistic Steps to Quit Paper

Published By: Esker     Published Date: Apr 12, 2012
This paper illustrates that solutions exist today, both as traditional software and Software as a Service, with a proven track record of success in helping companies make the transition to 100% electronic AR invoicing.
Tags : 
order to cash, procure to pay, fax software, fax service, fax server, document automation, accounts payable, accounts receivable, ocr software, workflow, enterprise applications, ssl, sla
    
Esker

Converged Medical Infrastructure and the Business Value for Healthcare Organizations

Published By: HP-Intel®     Published Date: Feb 28, 2013
As the use of electronic medical records (EMR) continues to grow, healthcare organizations must address the explosion of data and ensure that information is secure.
Tags : 
healthcare, medical infrastructure, healthcare organizations, electronic medical records
    
HP-Intel®

Accounts Payable Automation Study: Trends in automated data capture in invoice processing

Published By: Concur     Published Date: Apr 17, 2013
In-depth survey results from research conducted by International Accounts Payable Professionals (IAPP). Insights include, 94.9% of AP respondents still use paper checks for business-to-business payments despite all the talk about electronic payments.
Tags : 
ap trends, ap automation, accounts payable, invoice management, invoice automation, invoicing, ap report, ap study
    
Concur

Case Study: How Practice Fusion Strengthened DevOps Collaboration

Published By: ExtraHop     Published Date: Jul 25, 2013
Practice Fusion, the leading provider of web-based electronic medical records, used ExtraHop to improve collaboration between its Development and Operations teams. “We’re not just remediating problems faster, but preventing problems from occurring in the first place,” says John Hluboky, VP of Technical Operations.
Tags : 
collaboration, storage, technology, extrahop, best practices, knowledge management, data management, business technology
    
ExtraHop

Four Steps to Effectively Protecting Your Organization from Phishing Attacks

Published By: Cyveillance     Published Date: Jun 20, 2014
Phishing is defined by the Financial Services Technology Consortium (FSTC) as a broadly launched social engineering attack in which an electronic identity is misrepresented in an attempt to trick individuals into revealing personal credentials that can be used fraudulently against them. In short, it’s online fraud to the highest degree. Although it’s been around for years, phishing is still one of the most common and effective online scams. The schemes are varied, typically involving some combination of spoofed email (spam), malicious software (malware), and fake websites to harvest personal information from unwitting consumers. The explosive rise of mobile devices, mobile applications, and social media networks has given phishers new vectors to exploit, along with access to volumes of personal data that can be used in more targeted attacks or spear phishing. The fact that phishing attacks are still so common highlights their efficacy and reinforces the need to implement comprehensive phishing and response plans to protect organizations. An effective phishing protection plan should focus on four primary areas: Prevention, Detection, Response, and Recovery. High-level recommendations for each of the four areas are outlined in this whitepaper.
Tags : 
cyveillance, phishing, security, cyberattacks, cybercriminals, threats
    
Cyveillance

IDC Techology Spotlight: E-Discovery Success Starts at the Beginning

Published By: Mimecast     Published Date: Oct 02, 2019
Often, e-discovery solutions focus on the middle of the electronic discovery reference model (EDRM) and only concern themselves with review and production. Certainly, the majority of e-discovery cost is at the review stage and often the focus is on making that process as efficient as possible. The less you collect then the less you must review. A focus on best practices on the left?hand side of the EDRM can sow great rewards to be reaped later. Organizations that wait until they are sued before they start preparing for litigation lose no matter what the case outcome is. Sponsored by Mimecast, this paper from IDC details how e-discovery trends are changing to accommodate more in-house control and key recommendations on building a next-generation solution.
Tags : 
    
Mimecast
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.