care

Results 1 - 25 of 1542Sort Results By: Published Date | Title | Company Name
Published By: Amazon Web Services EMEA     Published Date: Apr 16, 2019
By placing the future of transportation in the cloud, governments can improve the performance of technology infrastructure and focus on delivering innovative services to citizens, without increasing costs. You can start that journey today. In this eBook, you will learn about: • Life-saving digital initiatives on US streets • Valuable data insights across UK airports • Scalable ticketing services for Turkey’s Istanbul Deniz Otobüsleri ferry passengers • Cost savings for Singapore’s Land Transport Agency • Scalable, secure innovation at speed
Tags : 
cloud computing, public sector, aws, healthcare, amazon web services
    
Amazon Web Services EMEA
Published By: Amazon Web Services EMEA     Published Date: Apr 16, 2019
Whether you are part of a community hospital or global pharmaceutical company, Amazon Web Services (AWS) can help you add agility, improve collaboration and security, create an environment of experimentation, and drive new technological innovation.
Tags : 
cloud computing, public sector, aws, healthcare, amazon web services
    
Amazon Web Services EMEA
Published By: IBM APAC     Published Date: May 14, 2019
Clients can realize the full potential of artificial intelligence (AI) and analytics with IBM’s deep industry expertise, technology solutions and capabilities and start to infuse intelligence into virtually every business decision and process. IBM’s AI & Analytics Services organization is helping enterprises get their data ready for AI and ultimately achieve stronger data-driven decisions; access deeper insights to provide improved customer care; and develop trust and confidence with AI-powered technologies focused on security, risk and compliance. Artificial intelligence (AI) is moving beyond the hype cycle, as more and more organizations seek to adopt AI-related technologies. These organizations are focusing on prioritizing functional areas and use cases, placing a stronger emphasis on topline growth, taking up a renewed interest in their data infrastructure and articulating greater unease about the skills of their knowledge workers. This report explores how they are approaching str
Tags : 
    
IBM APAC
Published By: Zscaler     Published Date: May 15, 2019
There’s no denying that Office 365 is a big deal. It’s a big part of the Microsoft Intelligent Cloud strategy. It’s big in terms of its user base. And it has a big impact on your network. Fully deployed, Office 365 will quickly become your greatest consumer of bandwidth and slayer of firewalls. Office 365 is unlike any other SaaS app and, even with careful planning, it’s fair to say that deployment doesn’t always go without a hitch. To help you get on the road to success, we’ve pulled together an overview of the most common pitfalls organizations make pre-deployment—and what you can do to avoid them.
Tags : 
    
Zscaler
Published By: Zscaler     Published Date: May 15, 2019
Is it possible to implement an Office 365-ready network, at scale, without a proof-of-concept (PoC)? Your CIO has tapped you to lead the effort to move to Office 365. Realizing it’s a great opportunity and distinction in your career, you reply with, “Sure, I’ll make sure it is a total success!” and then note that a PoC will not be needed.
Tags : 
    
Zscaler
Published By: CheckMarx     Published Date: Apr 03, 2019
Artificial Intelligence (AI) software is everywhere being leveraged by many industries such as healthcare, fintech, and e-commerce. But how does AI impact the security space? Join Maty Siman, Checkmarx Founder and CTO, to get both a white hat and black hat perspective to AI and security.
Tags : 
    
CheckMarx
Published By: Group M_IBM Q2'19     Published Date: Apr 01, 2019
In Forrester's evaluation of the emerging market for conversational computing platforms, we identified the seven most significant providers — Amazon, Google, IBM, Microsoft, Nuance Communications, Oracle, and Rulai — in the category and evaluated them. This report details our findings about how each vendor scored against nine criteria and where they stand in relation to each other. Application developers should use this review to select the right partners for their conversational computing platform needs.
Tags : 
    
Group M_IBM Q2'19
Published By: Motorola Solutions     Published Date: Apr 26, 2019
Healthcare organizations have the ultimate responsibility: caring for human lives. Your teams work every day to make sure the patients in your organization receive the best care and achieve patient satisfaction in a non-stop and unpredictable environment. Your facility faces security challenges unlike any other enterprise. Patients, visitors and staff coming and going 24x7. Valuable assets like pharmaceuticals and medical equipment to be secured and monitored. Patients to be cared for and protected.
Tags : 
    
Motorola Solutions
Published By: Virtela Communications, Inc.     Published Date: Oct 12, 2011
Find out how companies have deployed remote access SSL VPNs to increase remote user satisfaction, improve accessibility to corporate resources, support business continuity planning, and reduce overall implementation and ongoing management costs. The white paper also covers how cloud-based SSL VPN services address high availability requirements, support unforeseen spikes in activity and optimize network performance. Lastly, learn how a single SSL VPN platform can support all your mobile access, telecommuting and partner extranet requirements to improve your ROI.
Tags : 
virtela, healthcare, remote user satisfaction, roi
    
Virtela Communications, Inc.
Published By: CareerBuilder     Published Date: Sep 07, 2010
Whether you've had an employee referral program for years, are only in the initial stages of building one, or have never had one at all, this e-book is full of tips and advice on making your program the best it can be.
Tags : 
careerbuilder, employee referral, recruiting, qualified, ebook, social networking, roi, training, hiring, global hr management, human resources management, staffing, training and development
    
CareerBuilder
Published By: CareerBuilder     Published Date: Apr 24, 2019
Download Infographic Now!
Tags : 
    
CareerBuilder
Published By: CareerBuilder     Published Date: Apr 24, 2019
In the past, employers that ordered background checks on applicants and employees (“candidates”) would receive a report that captured the candidate’s background information at the time of the report. Employers that wanted to find out whether their incumbent employees had been, for example, arrested for or convicted of a new crime had to order a new background report, which can be costly.
Tags : 
    
CareerBuilder
Published By: CareerBuilder     Published Date: Apr 24, 2019
AKAs can be any alternative name or date of birth used by or associated with the candidate in the past. Conducting the search on AKA names can help ensure that you do not miss records that were logged under another name, for example a maiden name or an abbreviated version of a first name. When someone is arrested, if they do not have an ID on them they’ll be booked under whatever name they give to the police. Richard could be Rick, Elizabeth could be Beth, and John Joseph Smith-Johnson could be Joe Smith. These additional names are called alias names. When we look for records, we only have the name and date of birth to go on. Today, very often the individuals arrested provide an alternate name. If you are ONLY using the current legal name, or have search limitations such as LAST NAME ONLY, you might be missing records.
Tags : 
    
CareerBuilder
Published By: CareerBuilder     Published Date: Apr 24, 2019
As it stands today, 33 states – Alaska, Arizona, Arkansas, California, Colorado, Connecticut, Delaware, Florida, Hawaii, Illinois, Louisiana, Maine, Maryland, Massachusetts, Michigan, Minnesota, Missouri, Montana, Nevada, New Hampshire, New Jersey, New Mexico, New York, North Dakota, Ohio, Oklahoma, Oregon, Pennsylvania, Rhode Island, Utah, Vermont, Washington, West Virginia – and Washington D.C. now permit the medical use of marijuana. Currently, there are ten states that have authorized the legal use of marijuana for anyone 21 years old or older (Calif. is “over 21-yrs old”): Alaska, California, Colorado, Maine, Massachusetts, Michigan, Nevada, Oregon, Vermont and Washington (and Washington D.C.). Although criminal and civil penalties saw a dramatic change, it’s imperative to note that each of these states’ laws specifically provide that employers do not need to accommodate employee marijuana use at work. Employers are still authorized to prohibit the use of “recreational” marijuana,
Tags : 
    
CareerBuilder
Published By: Ounce Labs, an IBM Company     Published Date: Dec 15, 2009
Today, when you make decisions about information technology (IT) security priorities, you must often strike a careful balance between business risk, impact, and likelihood of incidents, and the costs of prevention or cleanup. Historically, the most well-understood variable in this equation was the methods that hackers used to disrupt or invade the system.
Tags : 
ounce labs, it securitym it risk, software applications, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography, identity management, internet security, security management, security policies, data protection, database security, vulnerability management
    
Ounce Labs, an IBM Company
Published By: ASG Software Solutions     Published Date: Apr 29, 2010
The key benefit of creating a case management methodology is to multiply its effectiveness by replicating it across the organization's patient-facing departments, practices and functions. In this way, your organization can reduce costs, increase quality and streamline its operations.
Tags : 
asg, case management, healthcare, physicians, p4p, hospital case management, case studies, case management bi, business intelligence, application integration, best practices, business integration, business process automation, business process management, enterprise software, hipaa compliance
    
ASG Software Solutions
Published By: Vision Solutions     Published Date: Feb 26, 2010
Achieving effective and efficient high availability protection for larger IBM i environments requires careful thought and clear understanding of the technology options. This white paper describes what you need to know in order to make an informed decision about IBM i high availability strategies so that your business requirements for Recovery Time Objective (RTO) and Recovery Point Objective (RPO) are not compromised
Tags : 
vision, high availability, ibm, cdp, aix, xsm, disaster recovery, policy based management, as/400
    
Vision Solutions
Published By: UMEED SOFTWARE SOLUTIONS PVT LTD     Published Date: Feb 18, 2013
OUR ORGANIZATION IS A PRIVATE LIMITED COMPANY AND EXTREMELY SOUND IN SOLAR PV APPOINTMENT SETTING/SURVEY,EVERY INFORMATION GETS CAPTURED VERY CAREFULLY SO THAT THOSE ARE QUALIFY-PRO AND REAL TIME CONVERTIBLE.
Tags : 
    
UMEED SOFTWARE SOLUTIONS PVT LTD
Published By: myStaffingPro     Published Date: Apr 19, 2012
Transform your career site into a user-friendly candidate experience with our complete Career Site Usability Guide.
Tags : 
    
myStaffingPro
Published By: Cox Business     Published Date: Apr 27, 2017
ealthcare workers understand the complexity of fighting infections better than most. As medications are developed, germs evolve and become resistant to those medications. Over time, germs become incredibly complex and difficult to treat as they continue to evolve and adapt. Unfortunately, computer viruses seem to be following a similar pattern—and the healthcare industry is struggling to catch up.
Tags : 
    
Cox Business
Published By: HPE APAC     Published Date: Jun 20, 2017
Enterprise IT is in the throes of a fundamental transformation from a careful builder of infrastructure that supports core enterprise applications to a lean and lively developer of business-enabling applications powered by infrastructure. But why is this change happening now at all, and why now? Read this paper to find out more.
Tags : 
infrastructure, devops, agile, hpe, it transformation, enterprise
    
HPE APAC
Published By: IFS     Published Date: Jan 18, 2019
To ensure loyalty and win new customers, leading brands are focusing on the quality of their customer care to stay ahead. This eBook will explain how you can: -Upgrade your support centers to deliver omni-channel customer care. -Introduce self-service and AI without sacrificing the human touch. -Deploy technology to empower support agents to go beyond transactional service and deliver personalized, proactive service. This eBook looks at the barriers which prevent companies delivering omni-channel service and then examines the process and technology changes required to overcome them.
Tags : 
    
IFS
Published By: Cisco EMEA     Published Date: Mar 08, 2019
And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless you’ve achieved that digital data nirvana (and you haven’t told the rest of us), you’re going to have some unknowns in your world. In the world of security, unknown threats exist outside the enterprise in the form of malicious actors, state-sponsored attacks and malware that moves fast and destroys everything it touches. The unknown exists inside the enterprise in the form of insider threat from rogue employees or careless contractors – which was deemed by 24% of our survey respondents to pose the most serious risk to their organizations. The unknown exists in the form of new devices, new cloud applications, and new data. The unknown is what keeps CISOs, what keeps you, up at night – and we know because we asked you.
Tags : 
    
Cisco EMEA
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.