Skip to main content
 

software

Results 1 - 25 of 4124Sort Results By: Published Date | Title | Company Name
Published By: Boston Software Systems, Inc.     Published Date: May 25, 2016
If you are migrating to a new EHR or are considering a migration, there are five myths that will cause chaos throughout your organization. This white paper describes these myths, the chaos they cause and what can be done to eliminate it.
Tags : 
    
Boston Software Systems, Inc.
Published By: Boston Software Systems, Inc.     Published Date: May 25, 2016
All phases of an EHR migration require planning and an understanding of what data is needed to provide a complete EHR that supports clinical adoption, patient care, safety and satisfaction. This white paper examines the strategic considerations and challenges encountered when migrating data to a new system.
Tags : 
    
Boston Software Systems, Inc.
Published By: Boston Software Systems, Inc.     Published Date: May 25, 2016
When moving to a new EHR all hospitals face the challenges of cross platform migration which includes migrating all types of historical patient data from legacy systems to new systems. In this white paper you’ll learn the steps involved in data migration, the pitfalls to avoid, steps to success.
Tags : 
    
Boston Software Systems, Inc.
Published By: McKesson     Published Date: May 27, 2015
The shift to value-based care creates a sharp increase in healthcare organizations and networks’ need for data collection, aggregation and analysis. This white paper outlines the challenges involved with performing population-level analyses, developing cost accounting and profitability analyses across care settings, evaluating care episodes and integrating quality data. It explores the limitations of targeted software solutions to provide cross-enterprise insights. Finally, it provides advice for healthcare executives regarding how to approach gathering quality and cost-related data and how to leverage technology and analytical expertise to drive risk-based contract success.
Tags : 
    
McKesson
Published By: Akamai Technologies     Published Date: Aug 17, 2017
The cloud is a network of servers housing data, software, and services. Cloud services are commonly accessed via the Internet, instead of locally in a data center. Businesses are increasingly relying on the cloud for cybersecurity for two key reasons: 1. Due to a changing threat landscape, there’s a need for more scale, accuracy, experience, and collective intelligence. These resources are out of reach internally for most organizations. 2. There are fundamental limits with on-premises hardware mitigation appliances and enterprise data centers for Distributed Denial of Service (DDoS) and web attack protection.
Tags : 
cloud security, scale, data center, ddos
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Aug 17, 2017
Die Cloud ist ein Servernetzwerk, das Daten, Software und Services umfasst. Auf Clouddienste wird für gewöhnlich über das Internet, und nicht lokal in einem Rechenzentrum, zugegriffen. Wenn es um Cybersicherheit geht, verlassen sich immer mehr Unternehmen auf die Cloud. Die zwei Hauptgründe: 1. Aufgrund der sich ständig ändernden Bedrohungslandschaft wird immer mehr Umfang, Genauigkeit, Erfahrung und kollektive Intelligenz benötigt. Diese Anforderungen können die meisten Unternehmen intern nicht erfüllen. 2. Lokale Appliances und Unternehmensrechenzentren haben prinzipiell ihre Grenzen, wenn es um Abwehrmechanismen gegen DDoS- (Distributed Denial of Service) und Webangriffe geht.
Tags : 
    
Akamai Technologies
Published By: Juniper APAC DWA Cloud Leads July 2017     Published Date: Aug 10, 2017
The digital economy is transforming the financial services sector. The pace of innovation is accelerating, customers have higher expectations than ever, and new competitors are emerging from nontraditional markets. At the same time, financial services has long been a favorite target of cyber attackers, and despite firms’ best efforts, cybersecurity threats are rising and attacks are more successful than ever. Financial services firms need a more effective, adaptable approach to detecting and stopping cyberthreats.
Tags : 
account security, data management, network security, secure systems, application security, network performance, network diagnostics
    
Juniper APAC DWA Cloud Leads July 2017
Published By: Juniper APAC DWA Cloud Leads July 2017     Published Date: Aug 10, 2017
OpenLab is a centre of innovation provided by Juniper, for business leaders who want to build network-integrated software applications and solutions quickly and securely. This is done by offering hands-on and cloud-based access to Juniper and third-party solutions including SDN sandboxes and NFV interoperability testing.
Tags : 
technology efficiency, market dynamics, data privacy, data security, device management, platform management, enterprise management
    
Juniper APAC DWA Cloud Leads July 2017
Published By: Juniper APAC DWA Cloud Leads July 2017     Published Date: Aug 10, 2017
To maximize the benefits of its next-generation systems and successfully execute its information strategy, CU had to overcome its aging network. Most of CU’s network infrastructure, which was built from solutions by another vendor, was introduced in 2007, when its computing center was first built. Over time, the equipment began to fail, affecting the stability of applications which relied on network connectivity. Technical support also became a major issue as the equipment faced obsolescence and maintenance contracts with vendors expired.
Tags : 
data management, data system, business development, software integration, resource planning, enterprise management, data collection
    
Juniper APAC DWA Cloud Leads July 2017
Published By: Juniper APAC DWA Cloud Leads July 2017     Published Date: Aug 10, 2017
OpenLab provides an environment and set of resources where customers representing telecommunications, education, government, financial services, and virtually every other vertical market can explore new technologies, all in the spirit of network transformation. By examining SDN/network automation solutions such Network Functions Virtualization (NFV), software-defined WAN (SD-WAN), and others, OpenLab offers a platform for developing and delivering new network-integrated functionality that serves the greater need.
Tags : 
technology efficiency, cloud storage services, mobile devices, applications, online collaboration tools, client services, data encryption, remote access
    
Juniper APAC DWA Cloud Leads July 2017
Published By: VMware AirWatch     Published Date: Jul 19, 2017
VMware AirWatch® features a new – and more efficient – approach to Windows lifecycle management across any use case – whether deploying the OS to your remote workers, onboarding employees’ BYO machines, corporate deployments across your branch offices or managing a special line of business terminal. The unified endpoint management technologies fundamentally changes how organizations approach PC lifecycle management, allowing IT to deploy security patches and remediate vulnerabilities faster, install software more reliably and quickly and consolidate operational processes across devices on or off the domain.
Tags : 
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: Jul 19, 2017
Anytime, anywhere access to work is now a basic need for the modern workforce. Whether remote, in the field or in the office, workers are no longer physically connected to your network or data center. Today’s employees work in a digital workspace that features virtualized laptops, desktop and workstations; a variety of personal systems and smart devices that may be part of BYOD programs and a diverse app ecosystem with desktop, remote, mobile, SaaS and Universal apps. In this mobile-cloud world, new and unpredictable forms of malicious software continue to evolve. Traditional network security, perimeter protection and firewalls are no longer enough to combat these new threats to the corporate IT infrastructure and company data integrity.
Tags : 
    
VMware AirWatch
Published By: CA Technologies     Published Date: Jul 26, 2017
The industry is adopting agile and DevOps practices throughout IT to increase business agility. In this book, explore the potential for DevOps in your organization, told from a mainframe point of view. Talking Points: • Digital transformation is essential in the modern software factory, and mainframes are mission-essential elements in many industries, including, finance, transportation, insurance and others • The industry is adopting agile and DevOps practices throughout IT to increase business agility • Explore the potential for DevOps in your organization, told from a mainframer’s point of view
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jul 26, 2017
To deliver on the potential for transformative innovation, businesses must maximize the latent value of legacy application code and data—and fast. Talking Points: • Go Agile with Agile processes and tools that speed innovation on legacy applications • Onboard your team quickly with modern toolsets and languages that seamlessly integrate legacy code • Integrate legacy code and simplify how you manage the software development lifecycle
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jul 26, 2017
Extending DevOps to mainframe applications and teams is essential towards the agility and velocity that enterprises require to remain innovative in today’s turbulent digital business environment. Talking Points: • For enterprises with mainframes, trying to achieve the benefits of Digital Transformation without dealing with existing mainframe assets is a fool’s errand. • Breaking down silos and moving to DevOps is central to what it means to undergo Digital Transformation. • Including the mainframe in modern software development approaches can improve quality overall, reduce test cycles and deployment timeframes, and ensure mainframe-based applications support the end-to-end performance requirements that today’s customers demand.
Tags : 
    
CA Technologies
Published By: VMware     Published Date: Jul 24, 2017
There’s no denying that today’s workforce is “mobile.” Inspired by the ease and simplicity of their own personal devices, today’s workforce relies on a variety of tools to accomplish their business tasks — desktops, smart phones, tablets, laptops or other connected devices — each with varying operating systems.  The specific tasks they need to accomplish? That depends on the person. But it’s safe to say remotely logging in and out of legacy, desktop, mobile, software as-a-service (SaaS) and cloud applications is a given. And the devices on which they work? They could be owned by the enterprise or the end user, with varying levels of company oversight, security and management. The result? An overabundance of “flexibility” that leads to fundamental IT challenges of security and manageability.
Tags : 
    
VMware
Published By: New Voice Media     Published Date: Jul 24, 2017
Herkömmliche Contact-Center benötigen kostspielige Vor-Ort-Technologien für die automatisierte Anrufweiterleitung, interaktive Sprachantworten, computerbasierte Telefonie-Integration, Anrufaufzeichnung und die Berichterstellung für das Management. Das ist sowohl kosten- als auch arbeitsaufwändig. Ohne eine zusätzliche Bereitstellung ist es zudem schwierig, eine gleichbleibend hohe Sicherheit, Verfügbarkeit und Leistung zu gewährleisten.
Tags : 
salesforce, cloud-kontakt-center-software, • plattform für den internen vertrieb
    
New Voice Media
Published By: New Voice Media     Published Date: Jul 24, 2017
Sie sind noch nicht lange als Vertriebsleiter im Inside Sales tätig? Oder leiten Sie bereits ein Inside-Sales-Team und möchten lediglich Ihr Wissen auffrischen? Dann sind Sie bei unserem ultimativen Leitfaden für den Inside Sales genau richtig. Hier erfahren Sie alles über die Personalbesetzung, Schulung, Organisation, Motivation und Optimierung Ihres Inside Sales, damit Sie bestmögliche Leistungen erzielen können.
Tags : 
salesforce, cloud-kontakt-center-software, • plattform für den internen vertrieb
    
New Voice Media
Published By: New Voice Media     Published Date: Jul 24, 2017
Durch eine Investition in Salesforce® beweisen Sie ein klares Interesse an Ihren Kunden und deren Erfolg. NewVoiceMedia sorgt dafür, dass Sie Ihre Investition noch umfassender nutzen können, indem Ihre Kommunikationsplattform mit Ihren Kundendaten in Salesforce® integriert wird. So bieten Sie einen hochwertigen, personalisierten und erstklassigen Service.
Tags : 
salesforce, cloud-kontakt-center-software, • plattform für den internen vertrieb
    
New Voice Media
Published By: New Voice Media     Published Date: Jul 24, 2017
Da Kunden heute zunehmend digital vernetzt und Big Data auf dem Vormarsch sind, wird ein herausragender und personalisierter Kundenservice immer wichtiger. Der Kundenservice ist das entscheidende Alleinstellungsmerkmal, das den größten Einfluss auf Kundenentscheidungen und somit Ihren Umsatz hat.
Tags : 
salesforce, cloud-kontakt-center-software, • plattform für den internen vertrieb
    
New Voice Media
Published By: New Voice Media     Published Date: Jul 24, 2017
Durch eine Investition in Salesforce® beweisen Sie ein klares Interesse an Ihren Kunden und deren Erfolg. NewVoiceMedia sorgt dafür, dass Sie Ihre Investition noch umfassender nutzen können, indem Ihre Kommunikationsplattform mit Ihren Kunden- und Neukundendaten in Salesforce® integriert wird. So bieten Sie einen hochwertigen, mit Kontext angereicherten Verkauf.
Tags : 
salesforce, cloud-kontakt-center-software, • plattform für den internen vertrieb
    
New Voice Media
Published By: Workday     Published Date: Jul 19, 2017
Multi-tenancy is a key feature of Workday and enables multiple customers to share one physical instance of the Workday system in a highly secure environment. Multi-tenancy is enabled through the Workday Object Management Server (OMS). Workday OMS allows servers to host multiple customer tenants simultaneously and builds “security walls” between each of the tenants. Thanks to Workday OMS, there is no way for any worker in one tenant to access the information of another tenant. Workday delivers its software using a continuous development model. Builds are rolled out weekly that contain new features, bug fixes, or performance improvements. Twice a year, Workday takes all the features put into preview and releases them to production for all customers. Workday customers are never landlocked on an old release, and all customers can utilize new features for the products they purchased as soon as they are live.
Tags : 
organizational security, site security, communication security, application security, database security, software licensing, installation
    
Workday
Published By: SecureAuth     Published Date: Aug 08, 2017
Office 365 has eclipsed all other cloud applications to emerge as the most widely used enterprise cloud service by user count. It’s easy to understand why: With Office 365, organizations no longer have to pay for hardware or resources to manage software in their own data centers, and their users always have the latest versions of applications. But Office 365 comes with significant security concerns, especially as organizations store more and more sensitive and business-critical data there. One study reports that virtually every organization experiences at least one cloud-based threat each month — and the average has soared to nearly 6 incidents every week. What can organizations do to protect their Office 365 environments? Read the white paper to learn.
Tags : 
    
SecureAuth
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Protecting your clients’ sensitive data is not optional. Data security is so important in finance that suspicion alone leaves many firms to reject modern cloud software as new or unproven. However, the facts tell a different story. Read this revealing e-book for 13 security facts your organization needs to make the best decision for your clients: How built-in data encryption keeps your data safe Why more security pros are concerned with user behavior than cloud tools What your firm should know to utilize the cloud with confidence
Tags : 
finance, data security, cloud software, data encryption, security
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Protecting PHI is not optional. Data security is so important in healthcare that fear of jeopardizing patient privacy and facing fines leads many providers to reject modern and more efficient cloud software. However, the facts tell a different story. Read this eye-opening e-book to get the facts on how the cloud can help your office provide better, more secure patient care: How built-in data encryption keeps your PHI, DICOM studies safe Why more security pros are concerned with user behavior than cloud tools What your organization should know about the cloud and compliance
Tags : 
healthcare, data security, cloud software, privacy, patient care
    
Citrix ShareFile
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.