esign

Results 276 - 300 of 2080Sort Results By: Published Date | Title | Company Name

National Instruments Use Oracle Fusion HCM to Align Business

Published By: Oracle     Published Date: Aug 15, 2013
National Instruments designs and manufactures hardware and software. Melissa Fuller, IT Human Resources, at National Instruments discusses Oracle Fusion HCM and how they are using it to align to their changing business processes.
Tags : 
national instruments, oracle, fusion, hcm, enterprise applications, human resource technology, business technology
    
Oracle

Health Plan Operations and Population Health Services: The Elements for Care Delivery Excellence

Published By: Lumeris     Published Date: Aug 04, 2014
For health plans, health systems and delegated payer operations, or health systems wanting to become their own payer, Lumeris’ turnkey outsourcing offers expert support to design, build, operate, measure, and optimize value-based health plan operations that can drive clinical and financial excellence. This can be evidenced by our ability to help clients achieve higher revenue, lower costs, higher market share, and meeting mandates for medical cost ratio contained in the Patient Protection and Affordable Care Act.
Tags : 
lumeris, health plan delivery, health plan operations, population health services, value based health plan operations, health plan outsourcing, operating a health plan
    
Lumeris

Real-world Attack Case Study: Misuse of Keys and Certificates Bypass Critical Security Controls

Published By: Venafi     Published Date: Mar 26, 2015
This technical case study addressing key and certificate security issues is designed for security conscious enterprises to understand real-life attack scenarios that threaten their businesses in today’s world. This white paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches. This paper should be read by more technical IT security sta? who are interested in detailed attack methods and remediation tactics. The executive summary is intended for IT Security leaders (CISOs and their direct reports) and addresses the proof-of-concept attack impacts on the business.
Tags : 
secutiry, certificates, keys, security attacks, business
    
Venafi

Three Steps to Securing Software Patches: Vulnerability Intelligence Matters

Published By: Flexera     Published Date: Sep 16, 2016
Download this white paper to learn more about these three steps to securing software patches: Play to strengths and know your weaknesses Prioritize for Bottom Line Value Design a Process to Support Desired Outcomes
Tags : 
software patch, patch management, third-party patching, software vulnerability management, vulnerability intelligence, enterprise risk, flexera, risk reduction
    
Flexera

Solving API Performance, Security & Reliability Challenges

Published By: Akamai Technologies     Published Date: Apr 25, 2018
APIs are increasingly powering mobile applications, websites, single-page applications, and data sharing. APIs connect across business and technology boundaries—meaning every enterprise has good reason to be developing, delivering, and consuming APIs. Learn more about: How to overcome API latency & traffic spike challenges Options to ensure 100% availability How to design a security stack for your APIs
Tags : 
api, performance, security, developing, applications, data
    
Akamai Technologies

Time to Reconsider Your Data Center Design

Published By: Juniper Networks     Published Date: May 04, 2018
Business leaders are eager to leverage new technologies, and IT leaders can't afford to fall behind. Hybrid IT environments take advantage of private and public clouds but need enhanced security, automation, orchestration, and agility.
Tags : 
    
Juniper Networks

5 Reasons To Run Your Business-Critical Workloads on Oracle Linux

Published By: Oracle APAC     Published Date: May 24, 2018
By optimizing their on-premises IT environments and moving processes and workloads to the cloud, businesses can reduce time-to-market, increase agility, and minimize total cost of ownership. Oracle’s Linux and Virtualization offerings are designed to help you easily optimize your current on-premises environment, and offer a clear path to cloud—so you can migrate your workloads when the time is right.
Tags : 
    
Oracle APAC

LTI Recognized as U.S. Market Leader for Next-Gen ADM Services by ISG

Published By: Larsen & Toubro Infotech(LTI)     Published Date: Apr 22, 2019
In the Overall segment, the ISG Provider Lens Next-Gen ADM Quadrant Report cited LTI’s idea-led innovation approach to delivering unique business solutions; the organization’s digital way of working (WoW), designed to deliver and amplify outcomes; and an IP-led growth strategy as key strengths that earned the market leader designation. The ISG Provider LensTM report recognized LTI’s extensive experience in working with both packaged and custom software, running multi-year maintenance deals, and a growing digital portfolio, as factors that make it an attractive alternative to large multinational providers.
Tags : 
    
Larsen & Toubro Infotech(LTI)

Five things you may be overlooking - Getting the Most from your Workplace Safety Programme

Published By: Skillsoft     Published Date: Apr 27, 2015
This paper examines five important factors to consider when designing and implementing a Health & Safety Compliance training programme.
Tags : 
workplace safety programme, training, safety, heatlh, heath and safety, compliance, workplace safety programme, compliance training programme, security management
    
Skillsoft

DEVOPS AND SECURITY: TOO LITTLE, TOO LATE

Published By: Entrust Datacard     Published Date: Jul 23, 2019
Security risks and breaches have become part of the daily landscape as companies and organizations of every size and in every vertical and industry announce that they have been compromised. In 2016 reported security breaches were up 40%, and this year is on pace to surpass that steep rise. Over the past year alone, there have been high-profile breaches in the gaming, financial services, hospitality, food service, consumer packaged goods, and retail sectors. Many of those breaches occurred due to vulnerabilities in applications and on websites. For example, this past April, the IRS announced a breach attributable to a tool designed to fetch data for the Free Application for Federal Student Aid (FAFSA) form.
Tags : 
    
Entrust Datacard

Four Key Challenges of Healthcare Reform. The First Challenge: Comply with Reform

Published By: The TriZetto Group     Published Date: Aug 01, 2011
Learn how to maximize efficiencies through greater system integration and automation, enable seamless interactions with providers, members and other constituents, and drive increased healthcare value with automated, value-based programs.
Tags : 
trizetto, trizeto, healthcare reform for payers, payers and healthcare reform, reform and payers, compliance with reform, administrative efficiency, technology, icd-10, 5010, claims administration, mlr requirement, value-based insurance design, value-based reimbursement programs, healthcare information technology, population health management, mlr
    
The TriZetto Group

Making the Business Case for Virtualization

Published By: VMware     Published Date: Aug 25, 2011
This guide is designed to help business leaders make a case for virtualization by showing how it reduces costs and improves continuity and efficiency.
Tags : 
vmware, vm ware, virtualization, virtual machine, virtual server, virtual pc, virtualization, gyro, storage virtualization, business technology, infrastructure
    
VMware

Increasing ROI in Responsive Web Design

Published By: Adobe     Published Date: Jan 27, 2014
Best practices, tips and examples for understanding responsive web design and its optimization.
Tags : 
technology, responsive web design, web design, responsive design, research
    
Adobe

Scott Brownrigg Success Story: Designing the Future

Published By: Adobe     Published Date: Feb 20, 2014
Award-winning design practice advances architecture, interior design, and planning excellence by standardizing on Adobe Creative Cloud and Adobe Acrobat® Pro.
Tags : 
adobe, adobe creative cloud, software, software deployment, enterprise agreement, license management, document security, compliance, collaboration, productivity, file management, pdf files, it management, document management, standardization, software development, contact management, content integration, content management system, information management
    
Adobe

Return on Responsive Web Design

Published By: Adobe     Published Date: Jul 09, 2014
This paper outlines factors that influence successful business results and provides tips to achieve efficiency in content design, management, and publishing, ultimately increasing the return on your investment in responsive design.
Tags : 
responsive web design, adobe
    
Adobe

E-Signatures and sales: How IT can enable the business to close deals faster

Published By: Adobe     Published Date: Aug 04, 2015
This white paper explores how cloud-based e-signature technology can drastically reduce the time it takes to complete deal making process and at the same time improve customer satisfaction, document security, and more.
Tags : 
esign, e-signatures, online signatures, digital signatures for sales, sales, clous computing, document security, signed documents, customer satisfaction, authentication, identity management, internet security, security management, security policies, customer experience management, document management, secure content management
    
Adobe

Using an e-signature solution to save time and money

Published By: Adobe     Published Date: Aug 04, 2015
The rapid adoption of e-signature solutions and the continued strong growth in the market for services and software is driven by several factors:
Tags : 
esign, e-signatures, online signatures, digital signatures for sales, sales, clous computing, document security, signed documents, customer satisfaction, e-signature solution, authentication, security management, document management, information management, secure content management
    
Adobe

The Three Graces of the Digital Experience

Published By: Adobe     Published Date: Aug 19, 2015
Redefining the Three Strategic Attributes of Designing, Managing, and Delivering Digital Experiences.
Tags : 
the digital experience, delivering digital experience, marketing, adobe marketing
    
Adobe

Die drei Grazien des digitalen Erlebnisses

Published By: Adobe     Published Date: Aug 19, 2015
Neuer strategischer Ansatz für Design, Verwaltung und Bereit-stellung digitaler Erlebnisse
Tags : 
the digital experience, delivering digital experience, marketing, adobe marketing
    
Adobe

Les Trois Grâces de l’Expérience Digitale

Published By: Adobe     Published Date: Nov 11, 2015
Redefining the Three Strategic Attributes of Designing, Managing, and Delivering Digital Experiences.
Tags : 
the digital experience, delivering digital experience, marketing, adobe marketing
    
Adobe

Accelerate Your Sales Performance: Believe It, E-Signatures Can Transform Your Business

Published By: Adobe     Published Date: Feb 10, 2016
Electronic signatures (e-signatures), which are easily implemented from the cloud, help speed up the sales process by reducing errors and bottlenecks, while also ensuring greater security and mobility.
Tags : 
esign, esignatures, electronic signatures, cloud computing, customer experience, digital signatures, content management system, customer experience management, virtualization
    
Adobe

Signed, Sealed, Delivered: Integrating Electronic Signatures into the B2B Sales Cycle

Published By: Adobe     Published Date: May 12, 2016
This white paper reveals the reason why integrating electronic signatures into the B2B sales cycle will save you both time and money.
Tags : 
esignature, digital signature, online signature, electronic signature, benefits of using esignatures, authentication, document management, information management, virtualization, cloud computing
    
Adobe

Beautiful Apps and Rapid App Dev

Published By: Adobe     Published Date: Jul 04, 2016
Mobile apps are a core – and essential – component of the modern digital experience. Whether the organization is a consumer-facing brand, a B2B leader, or an enterprise seeking to enhance employee productivity, well-designed mobile apps that deliver a great user experience play a unique role in building engagement.
Tags : 
mobility, mobile apps, customer engagement, app, mobile apps, mobile computing, smart phones
    
Adobe
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.