identification

Results 51 - 75 of 92Sort Results By: Published Date | Title | Company Name
Published By: Zebra     Published Date: Jul 10, 2014
Detecting and preventing errors that threaten patient safety is a closed-loop process that begins at the point of care, extends to independent laboratories, and then back to the caregiver. Download to learn more!
Tags : 
zebra, patient safety, closed loop process, malpractice, misdiagnosis, error costs, financial implications, caregiver
    
Zebra
Published By: Zebra     Published Date: Jul 10, 2014
Maximizing patient safety and improving the quality of care is the ultimate goal for healthcare providers. Doing so requires staying within regulatory compliance, while also advancing staff retention and meeting fiscal constraints. Barcode technologies provide a “virtual voice” to patients, applications and workflows. Barcoding accomplishes this by laying a solid foundation for enhancing patient identification, providing visibility into medical practices, and driving efficiencies throughout healthcare applications, and is an integral part of electronic medical record (EMR) adoption. Download to learn more!
Tags : 
zebra, patient safety, closed loop process, malpractice, misdiagnosis, error costs, financial implications, caregiver
    
Zebra
Published By: Entrust Datacard     Published Date: May 15, 2014
Entrust Solutions for Compliance to U.S. Department of Homeland Security First Responder Authentication Credential (FRAC) Standards
Tags : 
entrust, homeland security, frac, identification standards, first responder
    
Entrust Datacard
Published By: Oracle     Published Date: Mar 10, 2014
A look into the relationship between talent and its financial impact on an organisation
Tags : 
hr management, talent management, talent identification, cfo, ceo, c-suite
    
Oracle
Published By: FireEye     Published Date: Feb 28, 2014
Today's threat landscape has never been more challenging for federal agencies. Governments face a growing torrent of cyber attacks that are growing increasingly sophisticated, stealthy, and dangerous. Legacy signature-based solutions and file-based sandbox analysis cannot detect these advanced attacks, let alone stop them. Without advanced identification and remediation tools, agencies can go weeks or even months before discovering system breaches - long after the damage is done. This paper outlines: The malware ""kill-chain"" model used in today's advanced attacks; What capabilities federal agencies need to combat advanced threats; A reimagined approach to IT security.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors
    
FireEye
Published By: Riverbed     Published Date: Jan 28, 2014
Forrester benchmark data on current state of application availability and performance within the enterprise. In conducting a survey of 159 IT professionals with direct responsibility for business-critical applications, Forrester found that all enterprises surveyed had fundamental issues while managing the performance of these applications and business services. Read the report to learn the key findings of this study.
Tags : 
riverbed, forrester consulting, application performance management, application availability, enterprise, it transactions, business services, business-critical applications
    
Riverbed
Published By: Qualys     Published Date: Nov 05, 2013
A zero-day threat is a vulnerability that becomes known to the vendor on the same day it becomes known to the public, meaning IT assets targeted by a zero-day threat won't have a patch available when it's needed. However, zero-day attacks operate in a realm of the probable - they work only because there are exploitable vulnerabilities within IT systems. Many of these can, and should be prevented. This guide describes why organizations are vulnerable to zero-day attacks, and what you can do to add a zero-day offense to your existing vulnerability management processes to protect your organization's assets and data.
Tags : 
qualys, qualys zero-day risk analyzer, zero-day, zero-day offense, vulnerability, vulnerability management, zero-day threat, patch availablity
    
Qualys
Published By: Neustar     Published Date: Feb 27, 2013
Neustar® Information Services introduces you to the buying behaviors and patterns of today’s insurance customer and explores the recent shifts impacting the acquisition and retention of policyholders.
Tags : 
web optimization, visitor experience, website customization, offer customization, website segmentation, marketing analytics, site personalization, site optimization
    
Neustar
Published By: McAfee     Published Date: Jan 23, 2013
Discover. Evaluate. Act. Reduce risk with real-time identification, assessment. This white paper discusses a new approach to protecting your network through a combination of active and passive network discovery and monitoring, in real-time.
Tags : 
mcafee vulnerability manager, mcafee asset manager, continuous monitoring, risk-based assessments, mcafee epo, vulnerability management, mcafee global threat intelligence
    
McAfee
Published By: Epsilon     Published Date: Sep 18, 2012
To be successful in the current landscape, retail marketers must adapt their marketing messages to match the specific format, time and methods of consumers. Download this whitepaper to learn how retailers are boosting their CEM strategies.
Tags : 
customer experience marketing, real-time messaging, rtm, cem, customers' needs, competitive advantage, customer identification, customer segmentation
    
Epsilon
Published By: Neustar     Published Date: Aug 20, 2012
TARGUSinfo introduces you to the buying behaviors and patterns of today's insurance consumer and explores the recent shifts impacting the acquisition and retention of policyholders.
Tags : 
web optimization, visitor experience, website customization, offer customization, website segmentation, marketing analytics, site personalization, site optimization
    
Neustar
Published By: Limelight Networks     Published Date: Jul 31, 2012
In this report you will learn how today's WCM platforms are fusing the best marketing automation practices with content management, allowing marketers to leverage content in new and innovative ways. Discover 10 of the top capabilities you should be considering for your website.
Tags : 
web content management, wcm, it management, it support, cms, marketing automation, visitor profiles, market segmentation
    
Limelight Networks
Published By: Riverbed     Published Date: May 18, 2012
Data center consolidation and migration projects are fraught with risk. By using Network Behavior Analysis (NBA) systems to get a handle on dependency information, usage information, change impact information, and post-change problem identification, IT organizations can significantly reduce risk by automating and improving the planning process and minimizing disruption during implementation. Download this informative Riverbed white paper to learn more.
Tags : 
data center consolidation, migration, it infrastructure, network behavior analysis, nba analysis
    
Riverbed
Published By: Oracle Corporation     Published Date: May 11, 2012
With more accurate sales forecasts and enhanced identification of potential problems and opportunities, Oracle Sales Analytics helps close business faster and increase overall sales revenue. Find out more today!
Tags : 
sales analytics, sales forecasts, kpis, key performance indicators
    
Oracle Corporation
Published By: Zebra     Published Date: Oct 12, 2011
Wireless bar code and radio frequency identification (RFID) label printing is widely recognized by major retailers globally as an essential technology for enhancing store operations. The pages that follow detail the far-ranging benefits of wireless bar code and RFID printing, and present innovative wireless printing solutions from Zebra.
Tags : 
zebra industry solutions, barcode industry solutions, barcode business solutions, bar code industry solutions, bar code business solutions, rfid industry solutions, rfid business solutions, rfid industry solutions
    
Zebra
Published By: DigitalPersona UK     Published Date: Jul 21, 2011
This whitepaper outlines the problems of traditional password-based authentication systems, and sets out how they can implement strong authentication systems that are secure and easy to use.
Tags : 
digital persona, password, fingerprint authentication, identity management, identity protection, data security, identity theft, loss prevention
    
DigitalPersona UK
Published By: DigitalPersona UK     Published Date: Jul 21, 2011
This white paper shows how integrated security suites can help organizations achieve high security and compliance with internal and external mandates, while also providing lower out-of-pocket costs, simplified management, and no compatibility issues.
Tags : 
fingerprint authentication, identity management, identity protection, data security, identity theft, loss prevention, compliance, strong authentication
    
DigitalPersona UK
Published By: DigitalPersona UK     Published Date: Jul 21, 2011
This whitepaper examines the common misconceptions about full disk encryption.
Tags : 
digital persona, encryption, myths, fingerprint authentication, identity management, identity protection, data security, identity theft
    
DigitalPersona UK
Published By: DigitalPersona UK     Published Date: Jul 21, 2011
This whitepaper takes a deeper look at the steps you can take to protect your critical data and provide secure access to that data via the cloud to improve your security posture and reduce cost.
Tags : 
end point security, digitalpersona, saas, security as a service, cloud, cloud security, cloud based security, saas security
    
DigitalPersona UK
Published By: Mentor Graphics     Published Date: Sep 01, 2010
This white paper discusses the conditions that have created the need for pattern matching techniques, the identification and creation of patterns, the Calibre Pattern Matching process, and the benefits derived from its use.
Tags : 
mentor graphics, calibre pattern matching, svrf, verification rules, ic design
    
Mentor Graphics
Published By: Zynapse     Published Date: Aug 17, 2010
An exclusive success story of a Fortune 200 enterprise. Learn how the master data management initiative delivered: . A unified view of the master data across the enterprise . Accelerated ROI realization from massive ERP investments . Inventory optimization by duplicate identification . Improved operational and process efficiencies
Tags : 
zynapse, erp projects, unspsc, data information, data management, governance, mdm, master data management
    
Zynapse
Published By: Epicor     Published Date: Feb 22, 2010
Download this white paper now and learn high level definitions, opportunity identification, and future potentials for: Service Oriented Architecture (SOA), Enterprise Resource Planning (ERP) Anytime, Anywhere Availability, Mobile Devices, Web 2.0, and Report Cards or Balanced Scorecards as a Business Intelligence (BI) capability.
Tags : 
epicor, distribution environment, service oriented architecture, soa, enterprise resource planning, erp, business intelligence, mobile devices
    
Epicor
Published By: Iovation     Published Date: Sep 25, 2009
Online businesses today face a daunting battle in combatting online fraud and abuse. Existing identity-based and credit risk scoring systems are being challenged by fraudsters and fraud rings. They capitalize on cheap identities they use to repeatedly target a business or industry. Using device identification to establish device reputations and expose repeat offenders and fraud rings changes everything.
Tags : 
software-as-a-service (saas) solution, device identification technology, discovery of hidden associations, fact-based fraud management, ip geolocation data, reputation sharing, audit logs, reputation trust rules
    
Iovation
Published By: PassGo     Published Date: Aug 21, 2009
Historically, before computers and the Internet, business transactions were conducted face to face; establishing your partner's identity in such situations presented few problems. As human beings, we are well equipped to discern the extraorginarily subtle variations of the human face and voice to enable positive recognition and identification of our partner.
Tags : 
token, tokens, authentication, password management, pki, identity management, identification, business transaction
    
PassGo
Published By: SPSS     Published Date: Jun 30, 2009
This paper briefly defines text analytics, describes various approaches to text analytics, and then focuses on the natural language processing techniques used by text analytics solutions.
Tags : 
spss, text analytics, data management, statistical analysis, natural language processing techniques, computational linguistics, web sites, blogs
    
SPSS
Start   Previous    1 2 3 4    Next    End
Search Resource Library