stage

Results 251 - 275 of 358Sort Results By: Published Date | Title | Company Name
Published By: HP     Published Date: Jul 22, 2014
HP offers an approach to the modern data center that addresses systemic limitations in storage by offering Tier-1 solutions designed to deliver the highest levels of flexibility, scalability, performance, and quality—including purpose-built, all-flash arrays that are flash-optimized without being flash-limited. This white paper describes how, through the incorporation of total quality management throughout each process and stage of development, HP delivers solutions that exceed customer quality expectations, using HP 3PAR StoreServ Storage as an example.
Tags : 
3par, storeserv, storage, data, solutions, flash, data management
    
HP
Published By: Symantec Corporation     Published Date: Jun 24, 2014
News headlines have been inundated with stories of massive personal and credit card data breaches. The rising intensity and sophisticated nature of cyber attacks has created a hostile and precarious environment for businesses charged with protecting their customers’ personal data. The lucrative business of selling credit card data on the black market has made point-of-sale (PoS) devices, PoS environments, and web kiosks a prime target for cybercriminals. Read this solution brief to learn how to protect your network and PoS terminal and web kiosk endpoints from costly multi-stage cyber attacks.
Tags : 
security, pos, data, malware, cyber attacks, point-of-sale, software development
    
Symantec Corporation
Published By: Lattice Engines     Published Date: Jun 19, 2014
Everyone is talking about predictive analytics these days, but what does it mean for B2B marketers? Find out how top demand generation professionals are using predictive applications powered by leading edge data science to optimize all stages of the funnel. Read Lattice Engine’s latest ebook, Decoding Predictive Marketing, and learn where predictive fits into your marketing mix.
Tags : 
lead scoring, marketing automation, predictive analytics, predictive marketing, predictive lead scoring, b2b marketing, lead nurturing, lead management, lead prioritization, lattice engines, demand generation, lead qualification, qualifying leads, score leads, lead score
    
Lattice Engines
Published By: HP and Intel ®     Published Date: May 27, 2014
This document from IDC discusses the results that more comprehensive datacenter virtualization delivers, and it lays out both the promises and the potential pitfalls of the journey through successive stages of datacenter virtualization.
Tags : 
intel, converged infrastructure, mobile users, applications, virtualization, enterprises, it management, enterprise applications
    
HP and Intel ®
Published By: HP     Published Date: May 27, 2014
This document discusses the results that more comprehensive datacenter virtualization delivers, and it lays out both the promises and the potential pitfalls of the journey through successive stages of datacenter virtualization.
Tags : 
intel, converged infrastructure, mobile users, applications, virtualization, enterprises, it management, enterprise applications
    
HP
Published By: Hewlett-Packard Company     Published Date: May 15, 2014
Traditional server management and provisioning can create unnecessary burdens for many organizations. Information technology (IT) administrators in today’s business environments need a more streamlined process to manage servers throughout the IT life cycle, including tools to help them diagnose problems and procedures for efficiently resolving errors. This white paper provides an in-depth look at the key capabilities of HP Integrated Lights-Out (iLO) embedded in every ProLiant Gen8 server, the solution’s scalable licensing offerings, and mobile-app features that support IT staff—anywhere, anytime.
Tags : 
server management, ilo, proliant gen8 server, it management, enterprise applications
    
Hewlett-Packard Company
Published By: Castlight Health     Published Date: May 06, 2014
Poor quality of care takes a tremendous toll, not just on the system as a whole, but on the patients and their families at the center of that system. It also has a tremendous effect on employers, who already face unsustainable health care costs. When we evaluated one of our customer's claims, we found numerous signs of preventable complications that had cost our client significant amounts, not to mention the toll on the individual. Specifically, we identified the following preventable hospital- acquired conditions (HACs): • Fourteen instances of stage III and IV pressure ulcers • Twelve instances of vascular catheter-associated infections • Thirteen instances of catheter-associated urinary tract infections • One instance of a patient dying or experiencing a serious disability associated with intravascular air embolism • Five instances of foreign objects remaining in patients after a procedure. Please download the whitepaper to learn more!
Tags : 
healthcare, healthcare quality, intravascular air embolism, preventable complications, castlight health, hospital-acquired conditions, medical errors, health insurance, inappropriate care, unsustainable costs
    
Castlight Health
Published By: Allscripts     Published Date: May 01, 2014
Meaningful Use Stage 2 increases many of the thresholds that were in Stage 1, but the main focus of Stage 2 is on exchanging structured information among providers and patients. With less than 7% of EHR vendors certified, are your systems and providers ready?
Tags : 
allscripts, ehr certification, portal challenges, cpoe adoption, direct messaging, technology upgrade, replacements, cloud reporting, vendor considerations, implementation, population health, meaningful use, triple aim, patient engagement, stage 2 requirements, electronic health record, ehr, best practices, business management, business process automation
    
Allscripts
Published By: Logicalis     Published Date: Mar 12, 2014
We are pleased to present the findings of The Impact of IT Transformation on Enterprise Computing sponsored by Logicalis and HP. The objective of this research is to better understand how the different stages of IT transformation can affect an organization, the challenges of advancing through each stage and how successful progression can improve an organization’s IT effectiveness.
Tags : 
logicalis, it transformation, it strategy, it budget, it solutions, it system, it priorities, networking, security, software development, it management, knowledge management, data management
    
Logicalis
Published By: FireEye     Published Date: Mar 05, 2014
Never before have state and local governments been expected to do so much with so little. Even as budgets remain tight in a post-recession environment, tech-savvy citizens demand higher levels of service, they want to pay taxes by credit card, renew their driver's license online, and check traffic from their smartphone. These responsibilities make cyber security critical for state agencies, municipalities, and public utilities. Governments possess residents' most sensitive information - including inviolable personal data such as Social Security numbers and birth certificates. This white paper highlights: Why traditional tools fail to detect advanced attacks; Gaining a cohesive, correlated view of all major threat vectors; How to leverage signature-less, real-time security that thwarts zero-Day attacks.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors, real-time security, malicious code installs, block callbacks, threat intelligence, malware forensics, cyber warfare, security
    
FireEye
Published By: FireEye     Published Date: Mar 05, 2014
Cyber attacks are growing more sophisticated and, more often than not, target small and midsize businesses (SMBs). One unlucky click - a malicious email attachment, a link to a legitimate but compromised website - could result in a costly data breach that drains your bank account and customer trust. This paper explains targeted attacks and examines reasons cyber attackers are aiming at small and midsize businesses, including: Value of your data; Low risk and high returns for criminals; Why SMBs are easier targets.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors, real-time security, malicious code installs, block callbacks, threat intelligence, malware forensics, cyber warfare, security
    
FireEye
Published By: FireEye     Published Date: Mar 05, 2014
Whether they work for an up-and-coming startup or an industry giant, security response teams are under siege as never before. Today's cyber attacks are sophisticated, relentless, and devastating, costing U.S. businesses $8.9 million a year each on average. Attacking in multiple stages across multiple vectors, advanced persistent threats (APTs) and other sophisticated attacks easily evade signature-based detection and other traditional defenses. Thiswhite paper describes: The 10 most common mistakes, strategic and technical, that incident response teams make; The effect of these mistakes and how to avoid them with a well-defined incident response plan.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors, real-time security, malicious code installs, block callbacks, threat intelligence, malware forensics, cyber warfare, security
    
FireEye
Published By: FireEye     Published Date: Mar 05, 2014
Today's cyber attacks have changed radically from just a few years ago. No longer are they the sole province of opportunistic crooks, online vandals and digitial ""hacktivists."" Today, advanced cyber attacks are the weapon of choice for organized criminal enterprises and nation-states. This white paper highlights: Why organizations need much more than fundamental security tools; Strategies for dealing with advanced targeted attacks.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors, real-time security, malicious code installs, block callbacks, threat intelligence, malware forensics, cyber warfare, security
    
FireEye
Published By: FireEye     Published Date: Mar 05, 2014
If information is the lifeblood of today's digital economy, data centers are the heart. These mini-metropolises of silicon, metal, and cable are as essential to modern business as steel, motors, and coal were to the last great industrial revolution. In addition to their vital role in most business processes, data centers are the building blocks of emerging trends such as Big Data, global collaboration, and even bring-your-own-device (BYOD). The white paper describes: The widening gap between the offensive capabilities of today's cyber attackers and the weak traditional defenses deployed in most data centers; How organizations can better protect data centers.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors, real-time security, malicious code installs, block callbacks, threat intelligence, malware forensics, cyber warfare, security
    
FireEye
Published By: FireEye     Published Date: Mar 05, 2014
From sophisticated new forms of malware to nation-state sponsored attacks and the advanced persistent threat, cybersecurity incidents have evolved at a rapid pace and are taking down entire networks, successfully stealing sensitive data and costing organizations millions to remediate. In this white paper this report, you'll receive a comprehensive overview of survey results and expert analysis on: The top security threats for global organizations in 2013; The largest gaps in organization's detection and response to threats; How these gaps will be filled in the coming year - new staff, tools or services; What organizations must do to stay ahead of these advanced threats.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors, real-time security, malicious code installs, block callbacks, threat intelligence, malware forensics, cyber warfare, security
    
FireEye
Published By: Skillsoft     Published Date: Mar 05, 2014
A paper providing and insight into the importance learning is to every stage of the talent management lifecycle
Tags : 
talent management, recruitment, workforce, development, training, workforce development, elearning
    
Skillsoft
Published By: FireEye     Published Date: Feb 28, 2014
Today's threat landscape has never been more challenging for federal agencies. Governments face a growing torrent of cyber attacks that are growing increasingly sophisticated, stealthy, and dangerous. Legacy signature-based solutions and file-based sandbox analysis cannot detect these advanced attacks, let alone stop them. Without advanced identification and remediation tools, agencies can go weeks or even months before discovering system breaches - long after the damage is done. This paper outlines: The malware ""kill-chain"" model used in today's advanced attacks; What capabilities federal agencies need to combat advanced threats; A reimagined approach to IT security.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors, real-time security, malicious code installs, block callbacks, threat intelligence, malware forensics, cyber warfare, security, it management, network security, business intelligence, data protection
    
FireEye
Published By: athenahealth     Published Date: Feb 27, 2014
For providers, Stage 2 Meaningful Use raises the bar across the board on what it means to “meaningfully use” an EHR: there are more core measures, new menu measures, and higher reporting thresholds. Reap the rewards by following these five steps to help your practice successfully achieve Stage 2 Meaningful Use.
Tags : 
athena, healthcare, healthcare technology, meaningful use, stage 2 meaningful use, ehr, ehr vendors, core measures, menu measures, reporting, care coordination, patient engagement
    
athenahealth
Published By: IBM     Published Date: Feb 14, 2014
"Welcome to the age of Social CRM, a different way of thinking about customer relationship management that focuses on using social media to enhance customer engagement. How prepared are companies to make this shift? Despite widespread adoption of social media, for most, Social CRM is still in its early stages, execution is patchy and concerns about ROI remain. To fully exploit the power of social media to connect with customers, organizations need to move beyond isolated projects to integrated programs and, ultimately, a Social CRM strategy."
Tags : 
ibm, marketing, social media, crm, social crm, customer service, customer interaction, customer relationship, marketing management, marketing strategy
    
IBM
Published By: hightail     Published Date: Jan 17, 2014
Learn how the method of data collection and storage has changed and learn the 4 essential stages of managing your content in the digital age.
Tags : 
enterprise applications, data management, secure content management, content management
    
hightail
Published By: Kapost     Published Date: Jan 16, 2014
How can you, the modern marketer, create an efficient business process that facilitates content marketing and achieves your specific goals? The answer: by planning strategic marketing campaigns, establishing streamlined processes, and organizing your team to execute initiatives in a more aligned and productive way. Bridging the content gaps in your organization helps you coordinate the efforts of your teams, but also enables you to create superior customer engagements because you’re presenting a more united front to those who consume your content. This eBook will show you how to do just that. It will describe how to execute a cohesive plan aligned with your company’s goals, organize your campaigns, and coordinate content distribution across departments and stages of the funnel.
Tags : 
content marketing, content strategy, content management, content planning, content distribution, marketing campaigns, marketing campaign management, content marketing platform, content marketing software, editorial strategy, marketing campaign planning, content marketing best practices, content marketing companies, editorial content, content marketing workflow
    
Kapost
Published By: CareCloud     Published Date: Jan 08, 2014
While the terms “electronic health record” (EHR) and “electronic medical record” (EMR) are often used interchangeably, only EHRs make Meaningful Use attestation easy. Get The End of EMR free whitepaper today to learn: •The difference between EMR and EHR •How to attest for Meaningful Use •Stage-1 Meaningful Use requirements •Which technologies are right for you •The benefits of EHRs and more… Download this whitepaper to learn more!
Tags : 
emr, meaningful use, electronic health records
    
CareCloud
Published By: Oracle     Published Date: Nov 27, 2013
Social-enabled customer service requires three primary capabilities. The capability to: 1. Listen and Respond: Treat Social Media as an Integrated Interaction Channel Most social-enabled contact centers are at the early adopter stage, attempting to “bolt on” social media as a side process. Many are experiencing inconsistent customer experiences, higher costs and negligible return on investments. Download this White Paper for more info.
Tags : 
contact centers, business value, functions, applications, inbound, outbound calling, social media analytics, integration tools, mobile crm tools, technology, knowledge management
    
Oracle
Published By: Oracle     Published Date: Nov 27, 2013
Social-enabled customer service requires three primary capabilities. The capability to: 1. Listen and Respond: Treat Social Media as an Integrated Interaction Channel Most social-enabled contact centers are at the early adopter stage, attempting to “bolt on” social media as a side process. Many are experiencing inconsistent customer experiences, higher costs and negligible return on investments. Download this White Paper for more info.
Tags : 
crm best practices, crm software, customer data management, customer experience & engagement, customer relationship management (crm), lead generation, lead management, lead nurturing, lead quality, lead scoring, sales automation, sales channels, sales force automation, sales management, knowledge management
    
Oracle
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.