fte

Results 251 - 275 of 1805Sort Results By: Published Date | Title | Company Name
Published By: CareerBuilder     Published Date: Apr 24, 2019
AKAs can be any alternative name or date of birth used by or associated with the candidate in the past. Conducting the search on AKA names can help ensure that you do not miss records that were logged under another name, for example a maiden name or an abbreviated version of a first name. When someone is arrested, if they do not have an ID on them they’ll be booked under whatever name they give to the police. Richard could be Rick, Elizabeth could be Beth, and John Joseph Smith-Johnson could be Joe Smith. These additional names are called alias names. When we look for records, we only have the name and date of birth to go on. Today, very often the individuals arrested provide an alternate name. If you are ONLY using the current legal name, or have search limitations such as LAST NAME ONLY, you might be missing records.
Tags : 
    
CareerBuilder
Published By: Castlight Health     Published Date: May 06, 2014
Poor quality of care takes a tremendous toll, not just on the system as a whole, but on the patients and their families at the center of that system. It also has a tremendous effect on employers, who already face unsustainable health care costs. When we evaluated one of our customer's claims, we found numerous signs of preventable complications that had cost our client significant amounts, not to mention the toll on the individual. Specifically, we identified the following preventable hospital- acquired conditions (HACs): • Fourteen instances of stage III and IV pressure ulcers • Twelve instances of vascular catheter-associated infections • Thirteen instances of catheter-associated urinary tract infections • One instance of a patient dying or experiencing a serious disability associated with intravascular air embolism • Five instances of foreign objects remaining in patients after a procedure. Please download the whitepaper to learn more!
Tags : 
healthcare, healthcare quality, intravascular air embolism, preventable complications, castlight health, hospital-acquired conditions, medical errors, health insurance, inappropriate care, unsustainable costs
    
Castlight Health
Published By: Castlight Health     Published Date: Feb 14, 2017
Tired of year after year of healthcare cost increases, Steel Dynamics decided to fight back. They partnered with Castlight Health, a cloud-based provider of healthcare management services. Castlight Health’s health benefits platform armed employees with buying information — when and how they needed it. As a result, Steel Dynamics cut healthcare spending by approximately $500,000 in their first year with Castlight Health.
Tags : 
    
Castlight Health
Published By: Catalyst SF     Published Date: Apr 30, 2008
This white paper is intended to provide an overview of the mobile marketing options available to marketers today. It is designed for the person who wants an entry level perspective on the platform. Ultimately, this document is meant as a starting point in your pursuit for greater understanding of emerging media options, in this case mobile. After reading, you should have some idea of how to proceed to explore digital marketing for your brand.
Tags : 
catalyst, mobile marketing, mobile, cell, cell phone, smart phone
    
Catalyst SF
Published By: CCSS     Published Date: Jul 05, 2007
Is a lack of availability costing your business thousands or even hundreds of thousands of dollars? Assessing the true financial impact of unplanned downtime may surprise you. Placing a dollar amount on this issue is often the first step and biggest motivator to meeting your ongoing availability requirements.
Tags : 
availability, high availability, business continuity, network monitoring, server monitoring, down time, ccss, availability monitoring, monitoring, profitability
    
CCSS
Published By: CCSS     Published Date: May 01, 2008
IT Managers are not in the business of luck. They need to prepare for every disaster scenario, every contingency and ensure that even when every object, job and process is running 100% perfectly on the system, some other unforeseen network element doesn't swoop in and ruin all their efforts, just because it resides outside the parameters of the System i. After all, in a situation like this, people remember the one thing that went wrong – not the millions of things that went right – it's unfortunate, but that's life.
Tags : 
network, network management, network monitoring, ccss, networking
    
CCSS
Published By: CDW     Published Date: Nov 12, 2012
When data center technology such as servers or storage area networks are aligned with specific applications or organizational departments, the result is often inefficiency. Through data center convergence, IT resources can be managed more easily.
Tags : 
data center convergence, it infrastructure, converged data center, server consolidation, virtualization, business technology, data center
    
CDW
Published By: CDW     Published Date: Feb 24, 2015
Software piracy, whether accidental or malicious, is a problem for software vendors as these activities can directly affect the bottom line. Organizations that use software are affected as well. Along with rising software prices, they can face stiff fines and other costs for noncompliance with software licenses. This can come as a result of an audit that software vendors are more inclined to initiate in a lackluster economy. This white paper will discuss actions to take before, during and after an audit. As well as outline the best ways for the enterprise to remain compliant with software licenses.
Tags : 
software piracy, software vendors, audit, software licenses, software compliance, piracy misconceptions, business technology
    
CDW
Published By: CDW     Published Date: Feb 24, 2015
All organizations require software systems to conduct daily operations. These strategic enterprise assets are often acquired or created in isolation of each other as an organization grows, particularly for those that provide services rather than physical products. Over time, these systems become complex, overlapping and highly dependent on one another, so more effort must be expended to discover the full effects of any system change. The ability of an entity to update, replace or improve the overall capabilities of the enterprise can become severely impaired. Moreover, support and administrative costs for these critical assets inevitably grow to be a major burden. Add to all this the need to control licensing, follow the organization’s policies and ensure security for the internal network, and it becomes clear that some manner of oversight is required for the enterprise to be successful.
Tags : 
sam, software asset management, strategic enterprise assets, license utilization, cloud based computing, business technology
    
CDW
Published By: CDW     Published Date: Mar 27, 2015
Many organizations are seeing clear and quantifiable benefits from the deployment of mobile technologies that provide access to data and applications any time, anywhere. These benefits often include increased profits, a more efficient and productive workforce, and enhanced customer service.
Tags : 
mobile, productive, workforce, deployment, customer service, benefit, success, data
    
CDW
Published By: CDW     Published Date: Apr 22, 2015
Today’s increasingly mobile workforce demands ubiquitous, fast wireless access to meet the changing needs of the modern organization. The Wi-Fi networks that used to support this access often grew organically and were not engineered to support the widespread, high bandwidth needs of users.
Tags : 
infrastructure, wireless, bandwidth, engineering, mobile, workforce, demands, it management
    
CDW
Published By: CDW     Published Date: Jan 15, 2016
Established in 1919, Junior Achievement USA is the world’s largest organization dedicated to educating K–12 students about workforce readiness, entrepreneurship and financial literacy through experiential, hands-on programs. The nonprofit organization reaches more than 4.6 million students per year in 201,444 classrooms and after-school locations. Nearly 220,000 volunteers, including businesspeople, parents, college students and retirees, support JA programs.
Tags : 
cdw, junior achievement usa, financial literacy, ja programs, networking, knowledge management
    
CDW
Published By: CDW     Published Date: Aug 04, 2016
IT decision-makers at most enterprises understand the benefits that the cloud has to offer: increased agility and more predictable budgeting, among others. In many organizations, in fact, “cloud first” has become the mantra when seeking out new software solutions. But often, enterprises are less clear on the specific use cases of Infrastructure as a Service (IaaS) and how providers can help deliver IT capabilities that meet their needs and help them to achieve desired business outcomes.
Tags : 
technology, cloud, data, productivity, enterprise, business management, business technology, data center
    
CDW
Published By: CDW     Published Date: Sep 15, 2016
This white paper displays how organizations see big wins after deploying apps to improve interactions.
Tags : 
    
CDW
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
Endpoint security is at a critical juncture. Increasingly, employees at organizations of all sizes are using a wider variety than ever of desktop and mobile devices, including smartphones, tablets and laptops, as they work from broadly dispersed locations, including home offices. Often, organizations are permitting and even encouraging employees to use their own devices under BYOD (bring your own device) policies. With these devices, employees are accessing not only corporate data and applications, but also social media, banking and shopping sites. Download this white paper to learn more about endpoint security.
Tags : 
endpoint security, desktop devices, mobile devices, byod, corporate data, technology, networking, it management, knowledge management
    
CDW-Trend Micro
Published By: CenTrak     Published Date: Jun 11, 2012
Learn why RTLS accuracy can make all the difference when managing your hospital equipment. See how much money a major Southern California Hospital saved after deploying the world's most accurate real-time location system.
Tags : 
hospital asset management, asset tracking system, real-time location system, hospital tracking system
    
CenTrak
Published By: Centrify Corporation     Published Date: Apr 13, 2018
As business models have become increasingly digital, high-profile, reputation-damaging security breaches are grabbing more news media headlines. Leading companies have ramped up their investments in cybersecurity, yet that spending is often not well aligned with actual threats. Studies have shown that server-focused solutions such as network anti-virus, malware detection and website firewalls attract the biggest investments, ignoring the fact that misuse of privileged credentials is by far the most common cause of breaches. The reasons for this disconnect are not well understood, in part because it sits at the intersection of the people and technology domains. This survey, conducted by WSJ Custom Studios with sponsorship from Centrify, seeks insights into senior-level thinking on this issue, including current cybersecurity priorities and the perceived degree of alignment between threats and solutions.
Tags : 
    
Centrify Corporation
Published By: ChannelAdvisor     Published Date: Nov 29, 2017
"The days of a consistent and reliable “search, click, buy” process are long gone. In its place is often a complicated web of deliberate steps, each one inching your target consumer closer to the “buy now” button over the course of many days, weeks or months. This continually-evolving journey is no longer a clear-cut funnel, but more of a maze. Each consumer path is unique and uncertain — which means today’s e-commerce seller hasn’t reached its full potential until it’s maintaining a strong presence at every twist and turn. Download this eBook to learn how to leverage a wide range of marketplace and digital marketing tactics to reach consumers at any stage of their journey."
Tags : 
ecommerce, retail, advertising, selling online, online shopping, online advertising, consumer behavior, consumer journey, marketing, digital marketing
    
ChannelAdvisor
Published By: ChannelAdvisor     Published Date: Nov 29, 2017
"There are millions of retailers and branded manufacturers on Amazon, selling billions of products annually. That means listing your products and waiting for sales to roll in doesn’t work anymore. If you’re on Amazon, you need to stand out. In this eBook, we’ll walk you through everything you could want to know about Sponsored Products, why sellers are using it and how to leverage the program to stand out among the billions of products on Amazon. We’ll also answer some of the questions we often hear about the popular program (and some questions we haven’t heard but think you may be curious about)."
Tags : 
ecommerce, retail, amazon, advertising, selling online, online shopping, online advertising, marketing, marketplace
    
ChannelAdvisor
Published By: ChannelAdvisor     Published Date: Jan 17, 2019
"Whether you call yourself a company, brand, brand manufacturer, manufacturer, wholesaler, branded manufacturer or one of the other myriad of categorizations out there, there’s never been a better time to focus on direct-to-consumer (D2C) marketplaces as part of your go-to market strategy. Some 60% of consumers are already visiting your website instead of your retailers’ sites, and more than half will opt to buy directly from brand manufacturers when given the option. After years of relying on marketplaces to handle so many mission-critical activities, it can be challenging to build a successful D2C model that thoroughly addresses them all. This process will require a new way of thinking for you, a cultural shift for your employees and a lot of logistics for everyone involved. But how can you know when it’s time to start selling on e-commerce marketplaces? While the benefits of transitioning to a D2C marketplace model are undeniable, it also requires a significant investment of time
Tags : 
    
ChannelAdvisor
Published By: CheckMarx     Published Date: Apr 03, 2019
In the early years of software development, you would often design it, build it, and only then think about how to secure it. This was arguably fine in the days of monolithic applications and closed networks, when good perimeter-based protection and effective identity and access management would get you a long way towards minimising the risk. In today’s highly connected, API-driven application environments, however, any given software component or service can be invoked and potentially abused in so many different ways. Add to this the increasing pace of change through iterative ‘DevOps-style’ delivery and ever-faster release cycles, and many understandably assert that security management and assurance nowadays needs to be an ongoing and embedded part of the development and delivery process.
Tags : 
    
CheckMarx
Published By: Cielo     Published Date: Mar 04, 2016
"Outsourcing" often gets a bad name. But when it comes to your recruitment function, partmering with an outside expert can successfully transform your approach to talent acquisition and deliver measurable business results faster.
Tags : 
cielo, talent practices, talent acquisition, recruitment, recruitment process outsourcing, rpo, outsourcing, hiring, human resources
    
Cielo
Published By: Cielo     Published Date: Mar 04, 2016
A few years ago, during one of the toughest economic periods in recent memory, companies were looking for the lowest-cost option for handling recruitment. “Recruitment Process Outsourcing (RPO) was an attractive solution, and cost was often the main driver when contracts were signed,” says Angela Hills, Executive Vice President at Cielo, Inc.
Tags : 
cielo, talent practices, talent acquisition, recruitment, recruitment process outsourcing, rpo, outsourcing, hiring, human resources
    
Cielo
Published By: Cirque Du Soleil     Published Date: Apr 04, 2017
We know “company event” is not the first thing that comes to mind when thinking about Cirque du Soleil. Cirque is known for its unique style of high quality entertainment, artistic acts that defy gravity and performances that remain in the guests’ hearts long after they have seen them…which is all the more reason why our shows are the perfect setting for a corporate outing!
Tags : 
corporate events, events, event catering, company events, event planning, company outing, entertainment
    
Cirque Du Soleil
Published By: Cisco     Published Date: Feb 12, 2009
Spam email continues to be a big problem, especially for small businesses. Small companies rely on email just as much as large enterprises, and their mail servers get clogged with unsolicited mail just as often. But, with fewer resources to spare to address the spam problem, small businesses need smarter solutions. To find out how you can use the Cisco Spam & Virus Blocker to eliminate spam, improve productivity, and boost security and network performance in your business download today!
Tags : 
cisco, spam, anti-virus, servers, firewall
    
Cisco
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.