information technology

Results 1 - 25 of 471Sort Results By: Published Date | Title | Company Name
Published By: 123Together     Published Date: Sep 19, 2008
Today's economy is especially hard on small businesses. How does your small business keep revenue coming in when your customers are spending less? How do you attract new customers in a cost efficient manner? How do you protect your businesses' valuable information assets without making a huge technology investment?
Tags : 
123together, it strategies, contact management, email, economy, stability, collaboration, green it, outsourcing, microsoft exchange, hosted exchange, mobile services
    
123Together
Published By: 8x8 Inc.     Published Date: Feb 13, 2017
The right contact center solution should integrate tightly with your CRM solution and add value to it. Your contact center software should be able to capture all email, chat and standard telephone interactions and link them to the customer records database. Not only does this ensure continuity in all your customer communications, it gives the CRM database more information to use in constructing a better picture of your customers’ behavior. So how do you choose the right contact center for your organization? Following are three examples of forward-thinking businesses that found the right answer with cloud communication technology.
Tags : 
contact center, crm, telephone interactions, communications
    
8x8 Inc.
Published By: A10 Networks     Published Date: Aug 21, 2009
Compliance with SOX and other new corporate reporting requirements is costly and challenging for many companies to implement, as the SOX act covers many different areas of business practices for internal controls and financial reporting. Get this whitepaper now and see the impact the Sarbanes-Oxley Act has on Information Technology.
Tags : 
compliance, sarbanes oxley, sox, identity management, finance, regulatory compliance, financial reporting, a10, a10 networks, sox compliance
    
A10 Networks
Published By: Actiance, Inc.     Published Date: Jan 15, 2015
Healthcare providers are starting to realize that using electronic communication, collaboration, and social networks to keep in touch with each other and with patients can improve the quality of care they provide. However, it also exposes them to risk since the information they share on these networks has to be protected in order to meet specific regulatory guidelines, like those mandated by HIPAA. The prescription for success is to consider compliant use of these networks before and while they are being used and the technology that helps achieve that goal. Read this paper to gain an understanding of: What the regulatory landscape of the healthcare industry looks like What concerns you should be aware of from a legal perspective
Tags : 
electronic communications, hipaa requirements, social networks, compliance
    
Actiance, Inc.
Published By: Actiance, Inc.     Published Date: Jan 15, 2015
But what seems like a spoon full of sugar is often a tough pill to swallow when you consider regulatory requirements from agencies like the FDA for use of these networks. Adopting new technologies that allow employees to share information and exchange ideas with each other and with your customers is often the best way to achieve better business results, but doing so can involve considerable risk. That’s because the content people create using these technologies is subject to the scrutiny of regulators, legislators, and litigators. On top of that, increasing litigation has made it a business requirement to consider solutions that help bring down skyrocketing legal costs. Pharmaceuticals companies must be knowledgeable of, and abide by, specific information retention regulations in every country where they do business, including those countries that prohibit data from leaving the countries’ borders. Not having technology in place to help manage these requirements and increasing risks, or
Tags : 
collaboration, social media risk and reward, retention regulations, data, business requirements
    
Actiance, Inc.
Published By: Actiance, Inc.     Published Date: Jan 15, 2015
Social Media Risks and Benefits for the Pharmaceuticals Industry Drug makers are just beginning to realize how social networks can improve business processes. Social media helps your organization share information and exchange ideas with your customers quickly, but doing so can involve considerable risk. That’s because social media is subject to the scrutiny of regulators, legislators, and litigators. So, what seems like a spoon full of sugar is often a tough pill to swallow when you consider regulatory requirements from agencies like the FDA. On top of that, increasing litigation has made it a business requirement to consider solutions that help bring down skyrocketing legal costs. Not having technology in place to help manage these requirements and increasing risks, or doing so without careful planning, can be a costly mistake. Read this paper to gain an understanding of: What the regulatory landscape of the pharmaceuticals industry looks like What concerns you should be aware of f
Tags : 
social media, increased risks, business processes, regulatory requirements
    
Actiance, Inc.
Published By: Adobe     Published Date: Oct 05, 2016
The cloud has been the hottest topic in information technology for the better part of the last decade. Software-as-a-Service (SaaS), Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), and now a new wave of Anything-as-a-Service (XaaS) continue to drive adoption of what we collectively call cloud services.
Tags : 
security, security application, cloud, cloud computing, cloud security
    
Adobe
Published By: Adobe     Published Date: Feb 01, 2017
information technology for the better part of the last decade. Software-as-a-Service (SaaS), Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), and now a new wave of Anything-as-a-Service (XaaS) continue to drive adoption of what we collectively call cloud services.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Feb 01, 2017
The cloud has been the hottest topic in information technology for the better part of the last decade. Software-as-a-Service (SaaS), Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), and now a new wave of Anything-as-a-Service (XaaS) continue to drive adoption of what we collectively call cloud services.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Feb 01, 2017
The cloud has been the hottest topic in information technology for the better part of the last decade. Software-as-a-Service (SaaS), Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), and now a new wave of Anything-as-a-Service (XaaS) continue to drive adoption of what we collectively call cloud services.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Nov 10, 2015
Download this white paper to hear from more than 1,500 line-of-business leaders, IT leaders, and information workers about the effectiveness of their organization’s document-based business processes.
Tags : 
adobe, information technology, data management, business technology, document disconnect, sales management, contracts, e-signatures, quote to cash, sales contract management
    
Adobe
Published By: Adobe     Published Date: Feb 12, 2016
IT and marketing teams must work together to use, manage and maximize customer data to deliver meaningful interactions that build loyalty and propel their company ahead of the competition.
Tags : 
adobe, information technology, marketing, digital, customer data
    
Adobe
Published By: Adobe     Published Date: Sep 20, 2016
With a world of information and accessibility in their pockets, customers can engage with a brand whenever and wherever they want. This flexibility has made mobile technology an essential part of the way both customers and businesses interact. And to deliver experiences that feel personal and intimate, your plan needs to account for a critical building block to any relationship: trust. Read Circles of Trust: Use Mobile to Engage Better, to understand how you can leverage trust to deliver a better customer experience. Read the white paper to learn: • The four major circles of trust as a fresh approach to successful customer experience • The seven steps to effective optimization • The 3 C’s of mobile marketing • The steps for developing a mobile optimization plan across your organization
Tags : 
adobe, mobile, data driven marketing, marketing, marketer
    
Adobe
Published By: Adobe     Published Date: Mar 03, 2017
With a world of information and accessibility in their pockets, customers can engage with a brand whenever and wherever they want. This flexibility has made mobile technology an essential part of the way both customers and businesses interact. And to deliver experiences that feel personal and intimate, your plan needs to account for a critical building block to any relationship: trust. Read Circles of Trust: Use Mobile to Engage Better, to understand how you can leverage trust to deliver a better customer experience. Read the white paper to learn: • The four major circles of trust as a fresh approach to successful customer experience • The seven steps to effective optimization • The 3 C’s of mobile marketing • The steps for developing a mobile optimization plan across your organization
Tags : 
mobile engagement, branding, mobile marketing, mobile optimization
    
Adobe
Published By: Akamai Technologies     Published Date: Mar 15, 2016
The richness of the data combined with the increasing interconnectedness of healthcare technologies makes the industry ripe for cyberattacks.
Tags : 
healthcare, information security, web security, data management, technology, cloud services
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: May 05, 2017
Web applications are valuable tools for businesses of all sizes. These applications enable businesses to communicate with customers, prospects, employees, partners, and other information technology (IT) systems. By definition, web applications must be open, interactive, and accessible at all times.. This report, authored by Frost & Sullivan analysts, takes a comprehensive look at the current Web Application Firewall (WAF) vendor landscape and analyzes the current web application threat landscape and how vendors will scale to face it.
Tags : 
web applications, waf, ips
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Aug 17, 2017
APIs are the unseen language of the Internet. They power digital transformation across industries by allowing applications to talk to one another and operate as crucial backend services to websites and mobile apps. As a dynamic and somewhat hidden technology, it can be challenging to find detailed information about the API space. We combined findings from our recent API survey of business leaders from over 400 leading technology companies with industry data to compile four need to know facts about APIs.
Tags : 
api, mobile app, technology, backend service
    
Akamai Technologies
Published By: AlienVault     Published Date: Oct 20, 2017
Security Information and Event Management (SIEM) is a critical security capability for threat detection and compliance. However, many organizations who start down the path of a SIEM deployment run into surprises in terms of the cost, resources and expertise required to effectively implement and maintain a SIEM deployment. This free SIEM Analyst Research Bundle compiles research reports from leading industry analysts - 451 Research, Frost & Sullivan, and SANS - to help you understand different approaches to SIEM and considerations to help you find the right solution for your needs. Learn more about: Primary SIEM use cases and technology requirements Critical SIEM capabilities Considerations for cloud environments Approaches to SIEM for resource-constrained organizations
Tags : 
    
AlienVault
Published By: AlienVault     Published Date: Oct 20, 2017
Security Information and Event Management (SIEM) is a foundational cyber security technology. However, a properly executed SIEM strategy is difficult to execute even in static network environments with limited assets, much less for companies that have heterogeneous networks, transient end users, and plans of expansion. In this analyst report from Frost & Sullivan, you’ll read about several factors that companies big and small need to consider when purchasing and deploying a SIEM. You’ll also learn about AlienVault’s unified approach to solving for these challenges, with its on-prem appliance (USM Appliance™), and cloud-based SIEM-as-service, (USM Anywhere™). Download this report now to learn more about the changing SIEM market and AlienVault’s unified approach to security information and event management.
Tags : 
    
AlienVault
Published By: Allscripts     Published Date: Oct 20, 2014
Download this case study to learn how Allscripts Professional solutions have enabled Pulmonary Associates of Richmond to meet Meaningful Use, earning incentives of $714,000.
Tags : 
allscripts, pulmonary associates, health information technology, reduce paperwork, technology core, value based care, value based contracts, risk based contracts
    
Allscripts
Published By: Allscripts     Published Date: Oct 20, 2014
Download this case study to learn how Allscripts Professional solutions have helped Cornerstone Medical Care in Brandon, Florida negotiate value-based contracts, accounting for a seven-figure increase in revenue.
Tags : 
allscripts, health information technology, reduce paperwork, technology core, value based care, value based contracts, risk based contracts
    
Allscripts
Published By: Allscripts     Published Date: Feb 18, 2015
Value-based care has arrived. Does your practice have a strategy ready? Download this step-by-step guide to planning and executing a value-based care strategy that's right for your individual practice needs.
Tags : 
allscripts, health information technology, reduce paperwork, technology core, value based care, value based contracts, risk based contracts
    
Allscripts
Published By: Allscripts     Published Date: Feb 18, 2015
Download this case study to learn how Allscripts Professional solutions have helped Cornerstone Medical Care in Brandon, Florida negotiate value-based contracts, accounting for a seven-figure increase in revenue.
Tags : 
allscripts, health information technology, reduce paperwork, technology core, value based care, value based contracts, risk based contracts
    
Allscripts
Published By: ASG Software Solutions     Published Date: Nov 03, 2008
The Information Technology Infrastructure Library (ITIL) provides guidance for the management of IT, and has quickly become the worldwide standard for IT Service Management (ITSM).
Tags : 
asg, sla, cmdb, bsm, metadata, itsm, metacmdb, lob, ecommerce, bpm, workflow, itil, cmdmdb, service optimization
    
ASG Software Solutions
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library