rules

Results 201 - 225 of 285Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Sep 21, 2016
Stephanie Fetzer, Product Architect at IBM, discusses various aspects of the Request for Interpretation process for rule questions within the HIPAA Implementation Guides.
Tags : ibm, healthcare, implementation, hippa, rules
     IBM
By: IBM     Published Date: Nov 04, 2016
Stephanie Fetzer, Product Architect at IBM, discusses various aspects of the Request for Interpretation process for rule questions within the HIPAA Implementation Guides.
Tags : ibm, commerce, b2b, b2b integration, hipaa, hipaa rules, request for interpretation, hipaa implementation guides, enterprise applications
     IBM
By: IBM     Published Date: Jan 09, 2017
As security threats increase and government regulations require more control over users and data, it is important for organizations to evolve their security measures. By aligning governance related policies and rules with all identity management processes, organizations can achieve continuous, sustainable compliance, thereby reducing the need for after the fact fixes and expensive, error prone manual remediation. IBM Security Identity Governance and Intelligence helps organizations effectively, comprehensively manage identities and application access
Tags : ibm, security, identity governance and intelligence, identity governance, enterprise applications
     IBM
By: Group M_IBM Q418     Published Date: Sep 25, 2018
There’s no getting around it. Passed in May 2016, the European Union (EU) General Data Protection Regulation (GDPR) replaces the minimum standards of the Data Protection Directive, a 21-year-old system that allowed the 28 EU member states to set their own data privacy and security rules relating to the information of EU subjects. Under the earlier directive, the force and power of the laws varied across the continent. Not so after GDPR went into effect May 25, 2018. Under GDPR, organizations are subject to new, uniform data protection requirements—or could potentially face hefty fines. So what factors played into GDPR’s passage? • Changes in users and data. The number, types and actions of users are constantly increasing. The same is true with data. The types and amount of information organizations collect and store is skyrocketing. Critical information should be protected, but often it’s unknown where the data resides, who can access it, when they can access it or what happens once
Tags : 
     Group M_IBM Q418
By: Group M_IBM Q2'19     Published Date: May 21, 2019
ODM is the evolution of business rules management. It provides a complete, easy-to-use system for automating day-today operational decisions and allows businesspeople and IT to collaborate on business rules by using an interface and a language that are comfortable and intuitive for both. ODM not only allows you to automate your business rules, but also it enables you to apply insights and analytics to operational decisions by bringing together data from different sources and looking at historical trends and patterns to determine the next best action. It ensures that you’re making the right decisions at the right time, when it can make a difference. What can this mean for your business? Adopting operational decision management can: • Improve customer centricity (acquisition and retention) by engaging individuals at the right time with the right offers
Tags : 
     Group M_IBM Q2'19
By: IBM     Published Date: Apr 20, 2017
Cybercrime is more sophisticated and dangerous than ever before, and the scope of newly emerging threats is unprecedented. At the same time, the growing number and diversity of endpoints in the enterprise is expanding the network edge to the point of disappearing. Both these trends will continue with ongoing bring your-own-device (BYOD) initiatives and explode with the emerging Internet of Things (IoT).
Tags : cyber crime, security compromise, software management, information security, it management
     IBM
By: Group M_IBM Q1'18     Published Date: Jan 16, 2018
An IBM Security webinar featuring Gartner analyst Anton Chuvakin Gone are the days of a clearly defined network perimeter, in which you can confidently rely on static rules to detect intruders. As the cyber threat landscape has evolved, so has the vendor landscape. With all the options available, do you know which threat detection solutions to invest in – much less which ones will still exist in five years? Listen to this IBM Security webinar featuring Gartner analyst Anton Chuvakin to learn: Similarities and differences between SIEM and UEBA solutions Predictions on the future of these two markets How QRadar’s single-platform approach to SIEM and UEBA can help you not only detect more threats, but also more accurately determine if a threat is real versus benign
Tags : webinar, threat detection, ueba, siem, ibm security, qradar, single-platform approach
     Group M_IBM Q1'18
By: IAG Consulting     Published Date: Aug 24, 2010
Requirements quality is tangible. It is possible to look at the specific characteristics of requirements documentation and determine if it is sufficiently clear, accurate and complete to lead to a successful project. Since flawed requirements trigger about 70% of all project failures,1 this paper will present some hard and fast rules for looking at requirements documents, in any format, and being able to determine if they are reasonably well constructed. It will outline the key points to look for in a requirements document, and why this can save a company hundreds of thousands of dollars. Finally, it will offer five straightforward questions to address when evaluating requirements quality. The paper is not intended to be a full audit of requirements, but rather act as a guide and checklist for evaluation.
Tags : iag, project management, project management, maturity, consulting, business requirements
     IAG Consulting
By: Microsoft Dynamics     Published Date: Jul 09, 2007
When White Pass & Yukon Route Railroad recast its business model, revenues gained speed, but the cumbersome UNIX system labored through long lines of customers, discouraged timely reporting, and imprisoned data behind arcane rules and menus.  Find out what WP&YR did to help increase sales 13 percent, clear out slow-moving items, save steps and stoke the profit engine.
Tags : unix, tourism, profitability, retail management, microsoft, microsoft retail management, dynamics, point-of-sale, customer service, inventory management, microsoft dynamics
     Microsoft Dynamics
By: Mentor Graphics     Published Date: Apr 03, 2009
A powerful signal integrity analysis tool must be flexibility, easy to use and integrated into an existing EDA framework and design flow. In addition, it is important for the tool to be accurate enough. This report reviews a validation study for the Mentor Graphics HyperLynx 8.0 PI tool to establish confidence in using it for power integrity analysis.
Tags : mentor graphics, pdn simulation, eda framework, mentor hyperlynx 8.0 pi, integrity analysis, virtual prototypes, esr, capacitor, power distribution network, vrm, voltage regulator module, signal, smas, analog models, backward crosstalk, capacitive crosstalk, controlling crosstalk, correct emc problems, correct emi problems, cross talk
     Mentor Graphics
By: Mentor Graphics     Published Date: Apr 03, 2009
For advanced signaling over high-loss channels, designs today are using equalization and several new measurement methods to evaluate the performance of the link. Both simulation and measurement tools support equalization and the new measurement methods, but correlation of results throughout the design flow is unclear. In this paper a high performance equalizing serial data link is measured and the performance is compared to that predicted by simulation. Then, the differences between simulation and measurements are discussed as well as methods to correlate the two.
Tags : mentor graphics, equalized serial data links, design flow, high loss channels, tektronix, pcb, bit error rate, ber, ieee, serdes, simulation, system configuration, mentor graphics hyperlynx, simplified symmetric trapezoidal input, duty cycle distortion, ber contours, electronics, analog models, backward crosstalk, capacitive crosstalk
     Mentor Graphics
By: Pardot     Published Date: Apr 29, 2009
Learn how to use marketing automation tools to streamline your process and push leads quickly through the pipeline without increasing your spend. Marketing automation suites offer an integrated option for generating and managing leads with landing page and email marketing tools, automated scoring and grading, drip nurturing emails, micro-level analytics and anonymous visitor identification.
Tags : pardot, web marketing value, leads, streamline, pipeline, marketing automation, lead management, lead generation, lead gen, leads, micro-level analytics, drip nurturing, scoring, grading, b2b, b2c, sales growth, sales team, sales, sales rep
     Pardot
By: Focus     Published Date: Nov 15, 2011
When it's time to expand your network, this guide will help you evaluate the needs of your organization and enable you to provide best performance for mission-critical applications.
Tags : network, infrastructure, best practices, mission critial, applications, network, scale
     Focus
By: SAS     Published Date: Oct 03, 2018
Unlike rules-based systems, which are fairly easy for fraudsters to test and circumvent, machine learning adapts to changing behaviors in a population through automated model building. With every iteration, the algorithms get smarter and more accurately find activities that represent risk to the firm.
Tags : 
     SAS
By: Oracle     Published Date: Nov 21, 2013
Today's Grande Guide explores a cutting edge marketing practice: Content Marketing. Our guide pays special, but not exclusive, attention to the role content marketing can play for B2B businesses.
Tags : zenithoptimedia, oracle, eloqua, rules on content, content marketing, grande guide, customer aquisition, lead generation, budget spent on content marketing, business development, conforming new ways, nurturing leads, content marketing fundamentals, identify audience, no spam, useful content
     Oracle
By: IBM     Published Date: Mar 04, 2014
Technology advances are changing the way employees work, consumers buy, and enterprises conduct business. Old methods for marketing products are taking a back seat to online distribution, and mobile devices are ubiquitous access points to the Internet. The resulting environment is ripe for the creation and distribution of new software for handling a constantly expanding array of functions. When there is an app for everything, organizations have no choice but to adapt or risk getting left behind as markets enter the era of the Web application programming interface (API).
Tags : ibm, mobile, mobile app, api, api management, web application, application programming interface, app, ubm tech, mobility, cloud, mobile devices, software, software development, it management, enterprise applications
     IBM
By: Kapost     Published Date: Jan 16, 2014
Today, the internet has changed the way buyers discover solutions. More people are meeting and researching vendors online than ever before. Your ideal customers are reading blog posts and articles, checking Facebook, Twitter, and LinkedIn profiles, and forming opinions based on what you say and share online. Before they call to get to know your company better, they turn to Google for answers and information. If a competing vendor appears smarter, more interesting, or more reliable than you, your buyers will reach out to them first. These online engagements have changed the rules of buyer/brand communications. So how can you and your company form meaningful relationships with buyers who are getting to know you long before they’ve been introduced?
Tags : content marketing, content strategy, content management, content planning, content distribution, marketing campaigns, marketing campaign management, content marketing platform, content marketing software, editorial strategy, marketing campaign planning, content marketing best practices, content marketing companies, editorial content, content marketing workflow
     Kapost
By: McAfee     Published Date: Oct 10, 2013
Beyond the basics in a next generation firewall, to protect your investment you should demand other valuable features: intrusion prevention, contextual rules, advanced evasion analytics, secured access control, and high availability.
Tags : mcafee, next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques
     McAfee
By: Trapit     Published Date: Jun 02, 2016
To be successful, sometimes you need to be pointed in the right direction. That’s where our cheat sheet comes in. It answers your burning questions – like these: - Why do sales reps need social selling? - What are the ground rules for social selling? - How do you set up your social profiles to attract buyers? - How do you write tweets and LinkedIn updates that will spark engagement? - How do you find your buyers on social networks?
Tags : social selling, customer aquisition, trapit, social selling programs, content strategies
     Trapit
By: IBM     Published Date: Feb 11, 2015
Safety certification for avionics hardware and software is an expensive, complicated process, but absolutely necessary to ensure safe skies for commercial aircraft passengers and military jets flying in the national airspace. Now unmanned aircraft flight critical electronics will also have to meet these same safety requirements as the U.S. Federal Aviation Administration (FAA) starts to open up the national airspace to unmanned aerial systems (UASs). While the rules are still being drawn up, embedded software and hardware designers are already looking at ways for UAS platform integrators to solve certification challenges and manage the process of compliance with safety certification standards such as DO-178B & C. This webcast of industry experts will discuss how to enable safety certification of UAS platforms through efficient and cost-effective solutions.
Tags : uas platforms, safety certification, avionics hardware, cost-effective solutions, certification challenges, it management, platforms
     IBM
By: Act-On     Published Date: Mar 20, 2013
In this white paper, learn how top performing organizations approach digital engagement to maximize success, how to avoid pitfalls and lessons learned by top performers in 2012 and critical strategies that should be incorporated into your 2013 plan.
Tags : deep dive, rules of engagement, rules of digital engagement, new rules, act on, 2013 marketing plan
     Act-On
By: OutSystems     Published Date: Jan 06, 2014
Download this whitepaper to find out the 11 Usability Rules for IT Developers.
Tags : outsystems, usability rules, it developers, business solutions, mobile applications, web apps, it management
     OutSystems
By: Jive     Published Date: Apr 10, 2014
Different types of businesses will have different use cases for Social Business. In this whitepaper, we cover four different use cases at four very different types of businesses. But in each instance, the company's IT staff followed some key rules to minimize chances of failure and make it easier to convince employees and managers alike to dive into an enterprise social environment.
Tags : reachmail, customer relationships, engagement, customer support, best practices
     Jive
By: Business Software     Published Date: Apr 04, 2013
As today’s global marketplace becomes more sophisticated, the number and complexity of mission-critical financial transactions that companies conduct on a day-to-day basis continues to grow exponentially. Even small and mid-sized businesses are plagued by a rapidly increasing volume of financial processes that are highly intricate and multi-faceted. These activities, while important, are administrative in nature and often distract staff from more strategic planning initiatives that directly impact company prosperity and growth. Additionally, as legislative pressures continue to grow, and the rules imposed by Sarbanes Oxley, BASEL II, and other regulations become more stringent, businesses need to find better ways to ensure compliance by effectively logging, tracking, auditing, and reporting their financial data.
Tags : various types of business transactions, cost effectiveness, business-software.com, revealed
     Business Software
By: Business Software     Published Date: May 28, 2013
Professional Services Automation Software: What’s the Value for Your Business? Why Professional Services Automation Software? Your service business is highly competitive,regulated, and fast. Your project teams operate in multiple time zones and currencies. You have to deal with complex revenue recognition and cost accounting rules while at the same time meeting lofty utilization targets. You need dependable utilization and demand forecasts so you can staff and train your teams accordingly. At the same time, you have to deal with multiple billing scenarios since your projects range from fixed bid, milestone driven, or time and material. Not to mention keeping a good handle on your resource pool, both full time staff, part timers, and your consultants, the skills they have acquired, their experience, general interests and preferences, and availability.
Tags : professional services, psa, top 10 psa vendors, business software.com
     Business Software
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com