RSS feed Get our RSS feed

News by Topic

scribe

Results 251 - 275 of 813Sort Results By: Published Date | Title | Company Name
By: Oracle     Published Date: Apr 03, 2012
This white paper describes how to successfully consolidate your database onto a private cloud through several deployment models.
Tags : orace, service models, cloud management, 11g, database services, database consolidation
     Oracle
By: CareCloud     Published Date: Aug 13, 2013
Installing your first practice management system or upgrading to a different system with the features described above is one major step toward improving your practice’s accounts receivable operations.
Tags : accounts receivable management, medical accounts, practice management systems, operations, billing
     CareCloud
By: ServiceSource     Published Date: Nov 01, 2013
In this book we describe best practices honed through 13 years of experience and partnership with some of the leading technology companies in the world. These best practices will give you insight into three key areas: • Data management & renewal opportunity generation • Sales strategy & execution • Continuing the renewal cycle We hope you enjoy this book!
Tags : reducing customer churn, servicesource, recurring revenue, higher profit margins, drive innovation, drive performance, saas companies, competitive markets
     ServiceSource
By: GE Healthcare     Published Date: Mar 04, 2014
Why prepare now for ICD-10? While the October 1, 2014 deadline for compliance may seem to be in the distant future, an informative whitepaper by GE Healthcare describes the importance of advance planning and outlines a plan for success.
Tags : ge healthcare, icd-10, service delivery, billing, claims processing, reimbursement, project management, emr
     GE Healthcare
By: Adobe     Published Date: Mar 03, 2017
Programmatic advertising is full of complex patterns. Very similar to patterns in nature. Our guide, Brilliant Advertising, shows how fractals in nature perfectly describe the complexity of programmatic ads and pave the way for how you should approach creative assets. Read the guide to learn five ways to overcome challenges to programmatic ads, including how to: • Bring marketers, creatives, IT, and data analysts together to ensure success • Save money and time while improving engagement and conversion • Customize multiple versions of one campaign and serve ads with strong creative in real time
Tags : adobe media optimizer, programmatic advertising, engagement and conversion, internet marketing
     Adobe
By: Box     Published Date: Jun 11, 2014
Box, the leader in Enterprise Content Collaboration, helps customers extend their SharePoint environments, quickly and easily meeting employees' needs for mobile productivity and secure external sharing with customers and partners. This whitepaper describes the top five ways that businesses are adding mobility and collaboration to SharePoint with Box.
Tags : box, sharepoint, mobility, collaboration, enterprise content, mobile productivity, mobile support, content management
     Box
By: Affirm     Published Date: Jan 22, 2016
You thought EMV was supposed to help eliminate fraud, right? While it will reduce card-present fraud, there is a high likelihood that card-not-present (i.e. e-commerce) fraud will increase now that EMV has been implemented in the U.S.. In fact, experts have predicted an increase in online fraud similar to what was seen after the European rollout of EMV. As a merchant, are you prepared for such an increase? This article describes the EMV implementation and gives actionable tips for how online retailers should prepare in order to avoid a potential onslaught of fraud.
Tags : affirm, ecommerce, fraud, risk, emv, online retail
     Affirm
By: GrowthIntel     Published Date: Feb 16, 2016
Business development and marketing programs have a tendency to underwhelm when it comes to actual results. As a result, we’re bombarded with SalesTech and MarTech apps endeavouring to plug the leaks. But these tools rarely tackle the core issues behind your lacklustre results. What’s needed is a fundamental change to your go-to-market approach. This ebook shows you what that change could look like, and describes how to make it happen.
Tags : marketing, business development, b2b, sales, business practices, data management/analytics
     GrowthIntel
By: Ciena     Published Date: Nov 15, 2016
"In healthcare, as the trends supporting eHealth accelerate, the need for scalable, reliable, and secure network infrastructures will only grow. This white paper describes the key factors and technologies to consider when building a private network for healthcare sector enterprises, including: Transport Network Equipment Outside Fiber Plant Converged Platforms Reliability, Redundancy, and Protection Reconfigurable Networks Management Software Security Services, Operation, Program Management, and Maintenance Download our white paper to learn more."
Tags : packet networking, packet networking portfolio, packet optical hie network, packet-optical transport, patient data security, private and hybrid cloud, private optical network for healthcare, private optical network for hospitals
     Ciena
By: OKTA     Published Date: Sep 26, 2017
Traditional web applications pre-date modern standards like SAML and OpenIDConnect, so they often use legacy authentication methods to grant end users access. Historically, providing Single Sign-On and centralized access management for end users across these legacy applications required a Web Access Management, or WAM, product. These on-premises software tools could be expensive to maintain and complex to deploy. Now, modern identity providers like Okta in conjunction with best-of-breed network management technologies offer a better way. This white paper describes how web applications that lack modern standard support can be integrated into a cloud-based Identity-as-a-service architecture.
Tags : 
     OKTA
By: BMC ASEAN     Published Date: Dec 18, 2018
Today’s IT environments are so dynamic and complex that traditional manual administration makes it virtually impossible to keep pace with changing business opportunities and challenges, such as scaling to support new applications and users. Manual administration is not just unsustainable—it’s dangerous. Delays in responding to security threats and compliance issues can have devastating effects: • Security breaches • Failed audits • Financial losses • Loss of customers and reputation • Other serious business consequences To sustain a high level of security and compliance, IT teams must implement a comprehensive, aggressive automation strategy that establishes and tracks key performance indicators. Automation helps to optimize resources, increase efficiencies, lower costs and improve quality of service. This white paper describes principles and best practices for implementing automation as a strategic asset in the ongoing effort to achieve security and compliance excellence in a dynamic
Tags : 
     BMC ASEAN
By: Schneider Electric     Published Date: Mar 03, 2015
This paper explains how to plan for VoIP power and cooling needs, and describes simple, fast, reliable, and cost effective strategies for upgrading old facilities and building new facilities.
Tags : voip power and cooling needs, building new facilities, upgrading old facilities, ip telephony applications
     Schneider Electric
By: Schneider Electric     Published Date: Jun 04, 2015
This paper describes the science and practical application of an improved method for the specification of cooling for wiring closets.
Tags : cooling, cooling strategies, cooling for wiring closets, wiring closets. cooling solution
     Schneider Electric
By: Aprimo     Published Date: May 01, 2012
The real-time buzzword is back. Marketers, vendors, and service providers use this term in a variety of scenarios to describe technologies, analytics, customer service, and processes. In this report, Forrester outlines how firms should evaluate the need to build an agile and real-time environment using a combination of analytics, technology, and business processes.
Tags : aprimo, marketing, customer relations, crm, customer satisfaction, customer data, marketing strategy, crm solutions/software
     Aprimo
By: Arcserve     Published Date: Jul 23, 2010
This white paper describes an approach that provides these performance metrics for specific IT stakeholders, all drawn from data collection and analytics that support a holistic, integrated approach to optimizing IT service delivery.
Tags : ca technologies, performance metric, it service, monitoring, productivity, customer retention, service assurance
     Arcserve
By: AppDynamics     Published Date: Dec 08, 2017
This white paper describes how containers and microservices work, the benefits and challenges of using them, and how a unified view of the enterprise stack and effective application performance monitoring (APM) can help to fortify their benefits and address their challenges.
Tags : 
     AppDynamics
By: AppDynamics     Published Date: Dec 08, 2017
This white paper describes how containers and microservices work, the benefits and challenges of using them, and how a unified view of the enterprise stack and effective application performance monitoring (APM) can help to fortify their benefits and address their challenges
Tags : 
     AppDynamics
By: IBM APAC     Published Date: May 12, 2017
This white paper describes omnichannel IT support, why it has become critical for a superior personalized user experience and how organizations can begin incorporating this more cognitive strategy into their IT support organizations.
Tags : it support, internet of things, iot, cognitive strategy, digital transformation
     IBM APAC
By: Return Path     Published Date: Jan 29, 2013
Measuring your data can be difficult, but knowing what to do next is even harder. Identify issues quickly with the “Email Metrics Troubleshooter” checklist, so you can focus less time on identifying problems and more time on reaching your goals.
Tags : email failure, high unsubscribe rate, low click-through rate, drop in open rate, low response rate, rise in traffic but not in conversion, email trends, email marketing trends
     Return Path
By: HP     Published Date: Jul 29, 2008
This white paper describes an energy audit tool which can lead to significant decreases in the costs of running a data center.  Thermal Zone Mapping (TZM) is a visualization tool developed to present in graphical format high level thermal metrics developed by HP and targeted for use as part of the HP Data Center Thermal Assessment service. This tool uses data generated from computer models of the data center and generates metrics, which are then post-processed and visualized in the three-dimensional data center space.
Tags : heat, data center, heat monitoring, hardware, datacenter, mission critical
     HP
By: HP     Published Date: Jul 29, 2008
This white paper describes critical steps IT executives must take to prepare for change and manage an ITSM implementation to maximize its value and ensure that it achieves the full transformation effect it is capable of delivering. IT Service Management (ITSM) is a proven and effective framework for helping IT organizations become more adaptive, flexible, cost effective, and service oriented.
Tags : itsm, it service management, service management, itil, mission critical, change management
     HP
By: Entrust Datacard     Published Date: May 15, 2014
On November 22, 2011, the CA/Browser Forum adopted “Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates, Version 1.0” (hereafter referred to as the “BR 1.0”) to take effect on July 1, 2012. This document explains the differences between non-qualified and Fully-Qualified Domain Names (FQDN), the reasons behind the CA/Browser Forum’s change and suggests alternatives for affected subscribers.
Tags : entrust, non fqdns, certificates, forum changes, publicly trusted certificates
     Entrust Datacard
By: Entrust Datacard     Published Date: Jul 21, 2014
This white paper discusses the advantages of using smart credentials for multifunction access; describes the hardware and software components used in a smart credential environment; and provides questions to ask when searching for a smart credential solution provider.
Tags : smart credentials, hardware, software, passwords, features, outdated physical access
     Entrust Datacard
By: Entrust Datacard     Published Date: Jul 21, 2014
This document explains the differences between non-qualified and Fully-Qualified Domain Names (FQDN), the reasons behind the CA/Browser Forum’s change and suggests alternatives for affected subscribers.
Tags : non-fqdns, depreciation, internal server names, reserved ip addresses
     Entrust Datacard
By: Entrust Datacard     Published Date: Jan 16, 2015
If your company relies on passwords to prevent unauthorized computer access, or low-tech memory cards (e.g., swipe cards) for facility access, you have security on par with the average 1980s car. Smart credentials — embedded in plastic smartcards, USB tokens or mobile devices — offer companies advanced and versatile user authentication features. This white paper discusses the advantages of using smart credentials for multifunction access; describes the hardware and software components used in a smart credential environment; and provides questions to ask when searching for a smart credential solution provider.
Tags : entrust, security, certificate, b2b, application, browser, applications, saas
     Entrust Datacard
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics