info systems

Results 176 - 200 of 299Sort Results By: Published Date | Title | Company Name
Published By: netForensics     Published Date: Jan 04, 2008
Securing Federal information and systems is an ongoing challenge. By implementing comprehensive security compliance management methods for data collection, retention, monitoring and reporting, federal agencies can successfully demonstrate a sound framework that meets FISMA requirements.
Tags : 
fisma, fisma compliance, information protection, data protection, monitoring, information management, regulations, regulatory compliance, netforensics
    
netForensics
Published By: SAS     Published Date: Aug 06, 2019
With the combination of electronic health records, rich repositories of claims data, medical device outputs, laboratory and prescription systems, real-world data and the data mined from other information technology systems, the health and life sciences ecosystem can now gain new perspective. Download this complimentary paper to learn more about how health care data has the power to transform the sector, helping to address the industry’s biggest challenges surrounding costs and quality of patient care. By adopting solutions that allow them to both produce and consume data analytics insights in a way that better guides clinical and business strategies, innovative health care organizations can learn not only to survive but also thrive in the decades to come.
Tags : 
    
SAS
Published By: IBM Corporation     Published Date: May 21, 2012
The IBM PureSystems family is comprised of platform systems and infrastructure systems that include built-in "patterns of expertise" to address complex business and operational tasks for smarter computing.
Tags : 
deployment, information technology, smarter computing, integrated systems, platform systems, infrastructure systems
    
IBM Corporation
Published By: Tealium     Published Date: Mar 12, 2014
In this paper, Web Analytics Demystified presents an approach towards big data that has the potential to simplify the quest for “whole customer” data and improve your company’s odds of success.
Tags : 
tealium, big data, data analytics, business analytics, information technology, data distribution, tag management systems, marketing, marketing optimization, web analytics
    
Tealium
Published By: Tealium     Published Date: Mar 12, 2014
“The Rise of Data Activism: How Digital Data Distribution Platforms (D3P) Enable Marketers to Act on Their Data” discusses how marketers can solve the optimization gap and leverage new solutions to take action on their most actionable audience segments in real time.
Tags : 
tealium, big data, data analytics, business analytics, information technology, data distribution, tag management systems, digital data distribution platform, d3p, marketing, data, data activism, data consolidation, digital marketing
    
Tealium
Published By: IBM     Published Date: Aug 07, 2012
Databases and information management systems let you describe, categorize, store, modify and analyze data. What if you could do the same with decisions? Your systems could learn from previous choices and manipulate them to fit new parameters to intelligently mold future decisions made by executives, everyday business users and even your systems to optimize outcomes. Read this a specially selected excerpt from James Taylor's new book, "Decision Management Systems: A Practical Guide to Using Business Rules and Predictive Analytics" to discover the guiding principles for building decision management systems that can help your organization differentiate itself from the competition at virtually every decision point.
Tags : 
ibm, technology, decision management systems, business rules, predictive analytics, data, james taylor
    
IBM
Published By: IBM     Published Date: Oct 01, 2012
The IBM PureSystems family is comprised of platform systems and infrastructure systems that include built-in "patterns of expertise" to address complex business and operational tasks for smarter computing.
Tags : 
deployment, information technology, integrated systems, ibm puresystems
    
IBM
Published By: IBM     Published Date: Nov 29, 2012
The healthcare industry is poised for a transformation in patient care. Learn how IBM Patient Care can help leverage the full breadth of patient information, from across systems and providers to create a complete picture of health and more.
Tags : 
ibm, patient care, insights, treatment opportunities, deliver coordination, personalized care, patient analytics, healthcare
    
IBM
Published By: CDW     Published Date: Apr 22, 2015
To get a handle on what was possible, and all that would be involved, Bob Stirton, director of information technology for the Kansas City Chiefs football organization, sent Network Engineer Scott Fletcher on a scouting mission to the 2012 Super Bowl at Lucas Oil Stadium in Indianapolis. Fletcher watched first-hand the inner workings of a recently installed Cisco Systems wireless network in full-on, gameday action.
Tags : 
wifi, wireless, technology, network
    
CDW
Published By: Paycor     Published Date: Jun 05, 2014
Did you know the Department of Labor assessed $82 million in penalties in 2013? Misclassified employees, lack of documentation, payroll errors and employment discrimination lawsuits add up to costly mistakes for healthcare organizations every day. If you’re using spreadsheets to track employee data and relying on disconnected information systems, your organization is at risk of becoming a statistic. This whitepaper will empower you to mitigate risk and ensure your organization can continue to serve its mission.
Tags : 
healthcare, compliance, labor law, wage and hour, tax law, healthcare reform
    
Paycor
Published By: CrowdStrike     Published Date: Nov 28, 2018
Learn how fileless techniques work and why they present such a complex challenge. The arms race between cybersecurity vendors and determined adversaries has never been more heated. As soon as a new security tool is released, threat actors strive to develop a way around it. One advanced threat technique that is experiencing success is the use of fileless attacks, where no executable file is written to disk. The 2017 Verizon Data Breach Investigations Report found that 51 percent of cyberattacks are malware-free, so there’s no indication that these attacks will be subsiding anytime soon. Read this white paper to get the important information you need to successfully defend your company against stealthy fileless attacks. Download this white paper to learn: • The detailed anatomy of a fileless intrusion, including the initial compromise, gaining command and control, escalating privileges and establishing persistence • How fileless attacks exploit trusted systems — the types of processe
Tags : 
    
CrowdStrike
Published By: ScanLife     Published Date: Feb 25, 2012
The report details information such as overall barcode scanning trends, mobile operating systems scanning shares, representative demographics of users, and activities of overall states and/or countries with the highest scanning utilization.
Tags : 
scanlife, marketing, emerging marketing, mobile marketing, barcode, mobile phones, smart phones
    
ScanLife
Published By: Oco, Inc.     Published Date: Jun 24, 2008
As a Services Executive are you struggling with questions regarding what to measure, how to effectively engage with your customers, and what information should be leveraged and shared with service-chain partners and customers? Leading edge organizations are making tools and data available to their suppliers and customers with aggregated information from multiple data systems. Service-chain partners and customer personnel can now see the same views of service performance and activity. This is the next frontier to creating customer "stickiness" and business growth.
Tags : 
business analytics, oco, service management, analytical applications, dashboard, analytic, growth
    
Oco, Inc.
Published By: IBM     Published Date: Nov 05, 2014
This white paper provides insights into the current threat landscape for the financial services industry. Information is based on cyber security event data collected by IBM, as well as data derived from responding to, and performing forensics on, cyber security incidents.
Tags : 
ibm, security, cyber security, business intelligence, financial services, protection, secure protection, business security, intelligence index, cybercrime, risk threat, it risk, information systems
    
IBM
Published By: IBM     Published Date: Nov 05, 2014
How security and business continuity can shape the reputation and value of your company.
Tags : 
ibm, security, cyber security, business intelligence, financial services, protection, secure protection, business security, intelligence index, cybercrime, risk threat, it risk, information systems reputational risk, banking industry, company reputation
    
IBM
Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: Workday     Published Date: Nov 03, 2017
CIOs today face a delicate, difficult balancing act between meeting business objectives and securing information. Markets are becoming more global, product life cycles are shrinking, and profit margins are declining. Organisations need their finance, human resource, and planning systems to be agile and able to change as quickly as the business.
Tags : 
    
Workday
Published By: SAP     Published Date: May 15, 2008
Read this white paper by Don Tapscott and explore the criteria best-in-class hospitals use for selecting business intelligence solutions. Companies that learn to effectively harness the information generated by their IT systems will enjoy substantial productivity improvements.
Tags : 
sap, business intelligence, healthcare sector, healthcare industry, bi applications, bi tools, inter-departmental processes
    
SAP
Published By: SAP     Published Date: Jun 23, 2009
Discover the importance of data integration in your environment, and learn about the key challenges, benefits, and approaches to integrating data.
Tags : 
business intelligence, data integration, sap, businessobjects, data warehousing, sarbanes-oxley, data consolidation, data marts, enterprise information integration, eii, enterprise-class, operational data stores, operational systems, master data management, mdm, data transformations
    
SAP
Published By: SAP     Published Date: Jun 27, 2009
Read this white paper by Don Tapscott and explore the criteria best-in-class retailers use for selecting business intelligence solutions. Companies that effectively harness the vast quantities of information that IT systems generate - both within the corporation and outside its walls - are poised to gain competitive advantage.
Tags : 
sap, business intelligence, it systems, price, promotion, markdown, businessobjects, rfid, spar, netweaver
    
SAP
Published By: SAP     Published Date: Sep 02, 2009
Learn how solutions for large hospitals that provide intelligently aggregate and summarize clinical, operational, and financial data can offer CFOs faster, hospital-wide insight. When CFOs can immediately access information across existing systems, better decision making and financial outcomes result.
Tags : 
sap, cfo, hospital data, integration, cfo, aha, business intelligence
    
SAP
Published By: SAP     Published Date: Nov 22, 2011
FreshDirect found it very challenging to get operational insights from its information systems. In order to improve, it was critical to FreshDirect that they select a BI technology that allows the company to measure and report on operational metrics across departmental applications without requiring the building of IT-intensive data marts. With this requirement as one of the key selection criteria, the company evaluated multiple vendors. Download this case study to learn more.
Tags : 
sap, businessobjects, business, technology, case study, freshdirect, bi technology, information systems
    
SAP
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search Resource Library