HIT Consultant Insightful coverage of healthcare innovation
 

2014

Results 151 - 175 of 354Sort Results By: Published Date | Title | Company Name
Published By: Coupa Software     Published Date: Nov 04, 2014
The benefits of eInvoicing include fewer lost invoices, quicker approval cycles, increased on-time payments, and improved vendor satisfaction. Yet only 20% of companies receive more than 50% of their invoices electronically. This Paystream Advisors survey report includes data on how eInvoicing is improving AP efficiency and why some organizations are still slow to adopt (and why they shouldn't be).
Tags : 
einvoicing, approval cycles, vendor satisfaction, efficiency, on-time payments, invoicing
    
Coupa Software
Published By: Coupa Software     Published Date: Nov 04, 2014
Modern eProcurement solutions promise greater efficiency through improved AP integration, tighter controls, standardized processes, and supplier connectivity. This Paystream Advisors survey report focuses on current attitudes toward eProcurement solutions, how they're being used, and why (and how) that usage is changing. The report also includes an overview of eProcurement capabilities, best practices, and selection criteria.
Tags : 
eprocurement solutions, efficiency, integration, tighter controls, standardized process, best practices, procurement, p2p
    
Coupa Software
Published By: Okta     Published Date: Nov 09, 2015
Microsoft made a massive push to the cloud in 2014, and as a result Office 365 is taking off. However, Office 365 is unlike any other cloud app in its complexity. Read this eGuide to learn how IT can eliminate the identity and mobility management that accompany an Office 365 migration.
Tags : 
okta, office 365, microsoft, cloud services, mobility management, identity management, office 365 migration
    
Okta
Published By: Delta Risk     Published Date: Jun 07, 2016
Nowhere else could that wise advice be more relevant than in contemplating the effects of cyber attacks on financial institutions. As stated in a recent issue of the FDIC’s Supervisory Insights, the risks presented by cyber attacks have become “one of the most critical challenges [in the last decade] facing the financial services sector due to the frequency and increasing sophistication of cyber attacks.” In just a year’s time, from 2014 to 2015, the occurrence of security incidents increased 38 percent as reported in a survey of 10,000 security, IT, and executive personnel. Just as concerning, the attackers perpetrating these breaches were able to compromise the victim organization within a matter of minutes in 60 percent of cases.
Tags : 
cyber threats, security breaches, malware and vulnerabilities, internet security, security
    
Delta Risk
Published By: Delta Risk     Published Date: Sep 21, 2016
Nowhere else could that wise advice be more relevant than in contemplating the effects of cyber attacks on financial institutions. As stated in a recent issue of the FDIC’s Supervisory Insights, the risks presented by cyber attacks have become “one of the most critical challenges [in the last decade] facing the financial services sector due to the frequency and increasing sophistication of cyber attacks.” In just a year’s time, from 2014 to 2015, the occurrence of security incidents increased 38 percent as reported in a survey of 10,000 security, IT, and executive personnel. Just as concerning, the attackers perpetrating these breaches were able to compromise the victim organization within a matter of minutes in 60 percent of cases.
Tags : 
cyber threats, security breaches, malware and vulnerabilities, internet security, security
    
Delta Risk
Published By: Interactive Intelligence     Published Date: Jan 17, 2014
Learn about how the expanding guidelines for compliance have changed and how compliance has never been more relevant within the Accounts Receivable Management (ARM) industry.
Tags : 
compliance, cloud solutions, interactive intelligence, customer support, workforce management, data solution, customer experience
    
Interactive Intelligence
Published By: Enterprise Management Associates     Published Date: Jul 20, 2015
Research from leading IT analyst firm Enterprise Management Associates (EMA) has evidenced strong and growing interest in cloud deployment models. While public cloud has gotten the earliest attention, stronger adoption is happening within private and hybrid models. In the EMA April 2014 report “Managing Networks in the Age of Cloud, SDN, and Big Data Network Management Megatrends 2014,” over 50% of respondents reported public/hybrid cloud initiatives were driving network management priorities. Since 2012, cloud projects have moved from early adopter status to mainstream business initiatives, and their impact on network management grew from 36% in 2012 to over 50% in 2014.
Tags : 
network optimization, application delivery, public/hybrid cloud initiatives, network management
    
Enterprise Management Associates
Published By: TalentWise     Published Date: Jan 17, 2014
Start off the New Year by reviewing key HR trends for 2014. Our brief whitepaper offers insights into what's hot for HR this year including mobile-friendly solutions, video, talent analytics, and social tools.
Tags : 
human resources, hr trends, talent analytics, talent management, hr management, human resources management, hiring
    
TalentWise
Published By: IBM     Published Date: Jan 09, 2013
Is email dead? Not if it's still one of the top collaboration tools in business. IDC estimated there were over 400 million corporate email boxes in 2010 alone, with continued growth through at least 2014.
Tags : 
business of social white paper, ibm, idc, whitepaper, social, collaboration tools
    
IBM
Published By: Adobe     Published Date: Apr 17, 2014
Online video continues to be one of the hottest opportunities for marketing—if you know exactly where to focus your efforts. Our U.S. Digital Video Benchmark can help. Download it now to learn about the rise of video streaming on smartphones, the explosion of TV Everywhere, and the opportunities you should seize in 2014.
Tags : 
adobe, marketing, online marketing, online video marketing, online video, digital marketing, smartphone, video streaming
    
Adobe
Published By: Adobe     Published Date: Apr 17, 2014
Discover new opportunities for maturing your data practices—and building your business results. You’ll learn how to move beyond mere web analytics to build a more comprehensive marketing analytics approach that includes mobile, social, and offline channels. And you’ll see how your current analytics capabilities compare to those of similar organizations and where you have opportunities for improvement.
Tags : 
adobe, analytics, marketing, data collection, data automation, marketing automation, web analytics, marketing analytics
    
Adobe
Published By: Adobe     Published Date: Apr 17, 2014
Download the Forrester 2014 Mobile Trends report to discover the trends that are transforming business as we know it—and the strategies you need to gain a competitive edge. You’ll learn about the mobile innovations that will shape 2014, and the overhyped fads that are likely to fizzle.
Tags : 
adobe, mobile marketing, mobile trends, mobile analytics, customer exngagement, employee processes, mobile strategy
    
Adobe
Published By: Adobe     Published Date: Apr 17, 2014
Download our 2014 Digital Trends report, created in partnership with eConsultancy, to discover the trends that are driving exceptional customer experiences — and the tools you need to gain a competitive edge.
Tags : 
adobe, customer experience, customer engagement, digital intelligence, digital marketing, marketing, customer behavior, mobile
    
Adobe
Published By: CDW     Published Date: Mar 31, 2015
As mobile computing becomes an increasingly important technology, the need for robust, reliable wireless networks is growing. In addition to enterprise-issued devices, users are bringing their own tablets and smartphones and demanding access to IT resources. Organizations need a wireless infrastructure that can support these demands. Our research shows that in addition to mobile demands, aging hardware is driving many organizations' wireless upgrade plans. Download this white paper to read more about the research.
Tags : 
wireless, infrastructure, wi-fi, mobile computing, byod, upgrade
    
CDW
Published By: CDW     Published Date: Mar 18, 2016
The number of mobile devices managed by enterprises increased 72 percent from 2014 to 2015. This onslaught of technology such as notebooks, smartphones, tablets, watches and gadgets has transformed the way users work. These devices provide users in just about every sector with access to the information and tools they need to do their jobs, wherever and whenever they need them. They’re free to work at their desks, in conference rooms, while visiting clients on the road or during a child’s baseball practice. They can input data directly into a medical chart, an order form or an inspection report, rather than doubling their work by transcribing handwritten notes later in the day.
Tags : 
    
CDW
Published By: McAfee     Published Date: Jan 28, 2014
Leading analyst firm Gartner has positioned McAfee as a Leader in the Gartner Magic Quadrant for Endpoint Protection Platforms for six consecutive years.
Tags : 
gartner, endpoint protection
    
McAfee
Published By: SilverSky     Published Date: Dec 11, 2014
Forrester's 26-criteria evaluation of managed security service providers (MSSPs) included the 13 most significant vendors in the North American market that security and risk professionals can turn to for solving some of their most important security challenges. Forrester’s assessment evaluates MSS offerings based on current offering, market presence and strategy. SilverSky was named a “leader” in the report, with highest marks for delivery capabilities and services and its market presence in North America. Forrester states in the report that, “SilverSky capabilities rival those of larger companies."
Tags : 
mssps, managed security service, security challenges, security professionals
    
SilverSky
Published By: NAVEX Global     Published Date: Mar 04, 2014
Review the past year and identify key trends with an eye towards planning for the year ahead with the recommendations of this research whitepaper.
Tags : 
navex global, compliance program, third party risk management, risk management, compliance implementation, effective compliance, identify and prioritize, risk assessment
    
NAVEX Global
Published By: NetProspex     Published Date: May 12, 2014
NetProspex manages B2B marketing data on a massive scale. When we analyzed the more than 61M the records we processed last year, here’s what we found.
Tags : 
marketing data services, marketing data management, marketing data quality, installed technology list, international contact data, business contact list, marketing database cleansing, marketing database services
    
NetProspex
Published By: NetProspex     Published Date: May 12, 2014
Only 8% of marketers classified their lead gen efforts as "very successful". Check ot the latest research on what successful lead generation will look like in 2014. See how you compare by taking the survey and then downloading the report!
Tags : 
marketing data services, marketing data management, marketing data quality, installed technology list, international contact data, business contact list, marketing database cleansing, marketing database services
    
NetProspex
Published By: RingCentral     Published Date: May 22, 2014
Telecommunications (Telecom) and mobility executives responsible for sourcing the next generation of products and services for their business face big challenges in 2014. Learn what insights and action plans top executives are taking to prepare their organization for change by downloading the Forrester Research Whitepaper.
Tags : 
ringcentral, phone system, business phone, mobile phone, business transition, phone provider, cloud based phone, changing attitudes
    
RingCentral
Published By: VSS Monitoring     Published Date: Apr 01, 2015
In May 2014 VSS Monitoring announced a significant expansion of its solution portfolio for providing packet visibility into high-speed 40G and 100G enterprise and service provider networks. With the release of the vBroker 6000 and vBroker 520, the company took aggressive and definitive steps to deliver high-performing solutions for high-density carrier and cloud infrastructure deployments and 100G transitions, allowing IT organizations to maintain operations monitoring and security integrity throughout upgrades to and new deployments of extreme high-speed networks.
Tags : 
ema, vss, 100g, visibility solutions, nvc, npb
    
VSS Monitoring
Published By: Cyveillance     Published Date: Apr 03, 2015
In this white paper, we recap notable trends and events in information security from 2014 and look forward to what information security professionals should expect in 2015. The past year was a landmark one in the information security field, with massive data breaches capturing the public’s attention, powerful bugs causing headaches for IT teams and end users, DDoS attacks breaking records, and phishing remaining a general annoyance – or worse – for all Internet users. In this whitepaper, we discuss these trends as well as key areas of concern for 2015, including: - The impact of the Internet of Things - The growing importance of threat intelligence - The increasing influence of BRICS nations - The evolution of encryption standards - The changing role of the CISO
Tags : 
information security threat, information security, protection, security breach, internet security
    
Cyveillance
Published By: Cyveillance     Published Date: Apr 06, 2015
In this white paper, we examine notable trends and events in physical security from 2014 and assess what security professionals should expect in 2015. 2014 was truly an unpredictable year in the physical security and executive protection worlds, as large scale events targeted for disruption were executed relatively smoothly, while unforeseen developments in Ukraine and the Ebola outbreak caught many off guard. Looking ahead to 2015, we predict that local issues will continue to gain global importance, threat actors and activists will find new ways to utilize social media to spread their messages, and the lines between physical and digital threats will continue to converge. We also highlight ongoing developments in France, Mexico, Ukraine, and Germany.
Tags : 
information security threat, information security, protection, security breach, internet security
    
Cyveillance
Published By: HP     Published Date: Oct 01, 2014
If your company is using cloud computing services today, it’s highly likely you are already in a hybrid cloud configuration. The key question is whether you are actively managing this reality. In January 2014, HP commissioned Forrester Consulting to evaluate the state of enterprise hybrid cloud environments and how they are being managed. Forrester developed a hypothesis that tested the assertion that enterprise IT operations teams struggle to recognize and manage this hybrid state — a hypothesis that was proven out.
Tags : 
hybrid, cloud, world, state, company, managing, reality, enterprise
    
HP
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.