bing

Results 101 - 125 of 134Sort Results By: Published Date | Title | Company Name

Six Rules for Effective Forecasting

Published By: Adaptive Planning     Published Date: Apr 25, 2012
In describing what forecasters are trying to achieve, Saffo outlines six simple, commonsense rules that smart managers should observe as they embark on a voyage of discovery with professional forecasters: Map a cone of uncertainty, look for the S curve, embrace the things that don't fit, hold strong opinions weakly, look back twice as far as you look forward, and know when not to make a forecast.
Tags : 
adaptive, business, finance, forecasting, business planning, budget
    
Adaptive Planning

State-by-state breakdown of opioid regulations

Published By: athenahealth     Published Date: Jul 22, 2019
Each U.S. state uses a number of different tactics to manage the opioid epidemic. Where is your state focusing its efforts, and how does it compare to other states? See the state-by-state breakdown for laws, policies, and prescribing patterns.
Tags : 
    
athenahealth

SteelCentral Portal ChalkTalk Video

Published By: Riverbed     Published Date: Apr 24, 2015
Short video describing common issues of application performance management and how steelcentral Portal can resolve them.
Tags : 
api, applications, monitoring, application management, communications, network management, network performance, network performance management
    
Riverbed

The Business Case for Account Lockout Management

Published By: Netwrix     Published Date: Oct 10, 2007
This white paper covers account lockout management process and introduces new cost-effective workflows of account lockout resolution, describing significant ROI enterprises can achieve through the use of automated management solutions.
Tags : 
authentication, account lockout, access control, network security, lockout, user lockout, user authentication, user validation
    
Netwrix

The Corporate Threat Posed by Email Trojans

Published By: GFI     Published Date: Jun 12, 2007
Describing what trojans are and why they pose a danger to corporate networks, this paper discusses the need and method to protect your network from the threat of trojans.
Tags : 
network security, trojan, trojans, anti virus, anti-virus, virus, email security, internet security
    
GFI

The data center impact of cloud, analytics, mobile, social and security

Published By: IBM     Published Date: Jun 16, 2015
An IBM white paper describing the infrastructure implications of today’s converging technology forces and the software defined, next-generation data center transformation vital to capitalizing on them.
Tags : 
enterprise infrastructure, big data, mobility, data center, it infrastructure, it security technologies, virtualizing infrastructure, converging technologies
    
IBM

The Data Center Impact of Cloud, Analytics, Mobile, Social And Security

Published By: IBM     Published Date: Oct 06, 2015
An IBM white paper describing the infrastructure implications of today’s converging technology forces and the software defined, next-generation data center transformation vital to capitalizing on them.
Tags : 
ibm, cloud, analytics, mobile, social, security, infrastructure, data center
    
IBM

The data center impact of cloud, analytics, mobile, social and security

Published By: IBM     Published Date: Feb 26, 2016
An IBM white paper describing the infrastructure implications of today’s converging technology forces and the software defined, next-generation data center transformation vital to capitalizing on them.
Tags : 
data center, cloud computing, analytcs, mobile, social, cyber security, ibm, infrastructure
    
IBM

The Information Governance Maturity Model: A Foundation for Responding to Litigation

Published By: ARMA     Published Date: Nov 04, 2014
The relationship between an organization's information-handling practices and the impact those practices have on its ability to respond to electronic discovery is recognized in the Electronic Discovery Reference Model (EDRM). But the EDRM falls short of describing standards or best practices that can be applied to the complex issues surrounding the creation, management, and governance of electronic information. ARMA International's Generally Accepted Record-keeping Principles and its information Governance Maturity Model are designed specifically to provide a scalable, broadly applicable framework to address these issues.
Tags : 
information-handling practices, edrm, electronic discovery, maturity model, it management, knowledge management, data management, best practices
    
ARMA

The Mid-Market Security Challenge

Published By: ThreatTrack Security     Published Date: May 21, 2015
In an interview recorded at RSA Conference 2015, Itkin discusses: The unique security challenges of the midmarket; Disturbing cyber-extortion trends; What larger organizations can learn from the midmarket.
Tags : 
security challenges, mid-market security, cyber-extortion, cyberthreat, security, it management, knowledge management, data management
    
ThreatTrack Security

The Multi-tiered Hybrid Data Center

Published By: HP Data Center     Published Date: Mar 25, 2009
To accommodate increasingly dense technology environments, increasingly critical business applications, and increasingly stringent service level demands, data centers are typically engineered to deliver the highest-affordable availability levels facility-wide. Within this monolithic design approach, the same levels of mechanical, electrical, and IT infrastructure are installed to support systems and applications regardless of their criticality or business risk if unplanned downtime occurs. Typically, high redundancy designs are deployed in order to provide for all eventualities. The result, in many instances, is to unnecessarily drive up both upfront construction or retro-fitting costs and ongoing operating expenses.
Tags : 
hp data center, hybrid data center, dense technology environments, hybrid data center, critical business applications, it infrastructure, high redundancy designs, pods
    
HP Data Center

The Positive Impact of SD-WAN on Healthcare

Published By: VMware SD-WAN by VeloCloud     Published Date: May 20, 2019
The healthcare industry is evolving at a rapid pace from both technology and business perspectives. New technologies are dramatically improving healthcare, from diagnostic imaging and scanning tools to the digitization of medical records. From the business side, the industry continues to consolidate, with metropolitan or regional medical providers absorbing local clinics and rural practices, and large retailers acquiring pharmacies, minute clinics, and urgent care facilities. As a result, many healthcare companies are now competing with retailers for business. This competition may be good for the customers (i.e., the patients) who are demanding higher levels of care and a better overall experience. This could mean better access to new diagnostic tests, test results, and specialists who may be located far from the patient’s location. Healthcare providers need to work toward providing the same care and experience to customers in their main facilities as they do in distributed clinics, ur
Tags : 
    
VMware SD-WAN by VeloCloud

The Positive Impact of SD-WAN on Healthcare: Leverage Technology to Enhance Patient Experience

Published By: VMware SD-WAN by VeloCloud     Published Date: Feb 19, 2019
The healthcare industry is evolving at a rapid pace from both technology and business perspectives. New technologies are dramatically improving healthcare, from diagnostic imaging and scanning tools to the digitization of medical records. From the business side, the industry continues to consolidate, with metropolitan or regional medical providers absorbing local clinics and rural practices, and large retailers acquiring pharmacies, minute clinics, and urgent care facilities. As a result, many healthcare companies are now competing with retailers for business.
Tags : 
healthcare, patient experience, sd-wan
    
VMware SD-WAN by VeloCloud

The ROI of Application Performance Management

Published By: XO Communications     Published Date: Apr 13, 2015
Application performance management (APM) tools allow enterprises to proactively manage their investments in bandwidth and the business-critical applications used every day. An application performance management solution is recognized as an essential component of WAN optimization-techniques that help businesses get the best possible performance from existing networks. However, building a business case for an application performance management solution requires more than a belief in its benefits. It requires some data to quantify the value of a bottom-line result. This white paper reviews ten business scenarios in which application performance management solutions are used to monitor applications across the WAN deliver a quantifiable Return on Investment (ROI). Example cases and calculations are provided for each scenario, describing how companies have quantified the value of an APM solution in that area.
Tags : 
    
XO Communications

The Seven Types of Power Problems

Published By: Schneider Electric     Published Date: Feb 12, 2018
Many of the mysteries of equipment failure, downtime, software and data corruption, are the result of a problematic supply of power. There is also a common problem with describing power problems in a standard way. This white paper will describe the most common types of power disturbances, what can cause them, what they can do to your critical equipment, and how to safeguard your equipment, using the IEEE standards for describing power quality problems.
Tags : 
    
Schneider Electric

The Seven Types of Power Problems

Published By: APC     Published Date: Apr 08, 2010
Many of the mysteries of equipment failure, downtime, software and data corruption, are the result of a problematic supply of power. There is also a common problem with describing power problems in a standard way. This white paper will describe the most common types of power disturbances, what can cause them, what they can do to your critical equipment, and how to safeguard your equipment, using the IEEE standards for describing power quality problems.
Tags : 
apc, power, cooling, it wiring, heat removal, green computing, ieee, equipment failure
    
APC

The Seven Types of Power Problems

Published By: Schneider Electric     Published Date: Feb 12, 2018
Many of the mysteries of equipment failure, downtime, software and data corruption, are the result of a problematic supply of power. There is also a common problem with describing power problems in a standard way. This white paper will describe the most common types of power disturbances, what can cause them, what they can do to your critical equipment, and how to safeguard your equipment, using the IEEE standards for describing power quality problems.
Tags : 
    
Schneider Electric

The Spice House Brings Memorable Customer Experiences Online with Drip ECRM

Published By: DRIP     Published Date: Aug 23, 2019
The Spice House has a long history of pioneering how spices are sold. Since 1957, its flagship brick-and-mortar location has been a go-to hub for grabbing a cup of coffee and taking in the full spice experience—smelling, grinding, tasting, touching, and talkin’ spices and their backstories with the owners. Today, The Spice House sells more than 400 spices, blends, rubs, and extracts across several retail locations and the ecommerce store. See how Drip ecommerce CRM helps The Spice House bring a great instore experience to their online space.
Tags : 
    
DRIP

The State of Location - The Yext Quarterly

Published By: Yext     Published Date: Apr 15, 2013
The paper will show every small business owner the most common data location problems. It will explain why these problems need to be fixed and then show you the best strategies to fix them.
Tags : 
advertising, marketing, location, listings, maps, directories, yext, business
    
Yext

The Surprising Power of Online Experiments

Published By: Optimizely     Published Date: Apr 06, 2018
Getting the most out of A/B and other controlled tests. In the fast-moving digital world, even experts have a hard time assessing new ideas. Case in point: At Bing a small headline change an employee proposed was deemed a low priority and shelved until one engineer decided to do a quick online controlled experiment—an A/B test—to try it out. The test showed that the change increased revenue by an astonishing 12%. That experience illustrates why it’s critical to adopt an “experiment with everything” approach, say Ron Kohavi, the head of the Analysis & Experimentation team at Microsoft, and Stefan Thomke, an HBS professor. In this article they describe: How to properly design and execute A/B and other controlled tests ? Ensure test integrity ? How to interpret results and avoid pitfalls
Tags : 
    
Optimizely

The Ultimate Guide to Enterprise Mobility Management

Published By: MobileIron     Published Date: Apr 15, 2015
In addition to describing how EMM works, this guide also illustrates a typical implementation journey that explains how an organization goes about deploying and managing all the pieces of an EMM to transform business processes.
Tags : 
enterprise, management, mobility, workforce, operating system, device, productivity
    
MobileIron

Think Your Anti-Virus Software Is Working? Think Again

Published By: Lumension     Published Date: Mar 12, 2011
Studies show that even though most organizations use AV, more and more are succumbing to attacks.
Tags : 
virus, antivirus, whitelisting, endpoint security, anti spam, anti spyware, anti virus, application security
    
Lumension

This Website Converts for Retailers at 2.78%. [2012 Ecommerce Report]

Published By: CPC Strategy     Published Date: May 21, 2012
CPC Strategy looked at 4,274,820 clicks, 82,845 orders, $1,158,604.41 in spend $7,867,575.91 in revenue to find the highest converting shopping site for online retailers. Fill out the form below to download the free report.
Tags : 
comparison shopping, shopping site, marketing channel, data feed, product feed, shopping feed, cse, online marketing
    
CPC Strategy

Top Ten IT Systems Management Pain Points for Healthcare Organizations

Published By: Kaseya     Published Date: Mar 12, 2015
From dealing with manual maintenance to user disruptions, Kaseya presents solutions to common IT systems management pain points in the healthcare industry.
Tags : 
healthcare, daily operations, health record system, practice management, coding software, health statistics, prescribing systems, healthcare providers
    
Kaseya

Turn GDPR To Your Advantage

Published By: Selligent Marketing Cloud     Published Date: Mar 07, 2018
The General Data Protection Regulation – or GDPR – is a European Union (EU) law that protects the rights of individuals with respect to their data. Adopted as an EU law in April 2016, organizations that hold data about any resident of the EU must be compliant by May 2018. With attention-grabbing fines of €20 million or 4% of global annual turnover, GDPR commands attention at the highest levels. And despite the “legalese” that compliance suggests brands utilize, the brands that balance legal compliance with a human approach will turn GDPR to their advantage. This white paper provides a series of actions you can take to make the most of GDPR to both enhance your customer relationships and mitigate risk.
Tags : 
data driven marketing, gdpr, compliancy, data privacy, customer data, omnichannel, multichannel, automation
    
Selligent Marketing Cloud
Start   Previous    1 2 3 4 5 6    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.