HIT Consultant Insightful coverage of healthcare innovation
 

2014

Results 201 - 225 of 354Sort Results By: Published Date | Title | Company Name
Published By: Actiance, Inc.     Published Date: Nov 13, 2014
The overall archiving market was $1.76 billion in 2013 and is expected to grow at an 11.4% compound annual growth rate (CAGR) through 2019. EIA is emerging as a commonly used technology underpinning for higher-level use cases supporting compliance, information governance, e-discovery and historical preservation of data. Read the report now and learn more!
Tags : 
actiance, gartner, magic quadrant, enterprise information archiving, cagr, eia, compliance, e-discovery
    
Actiance, Inc.
Published By: Lumension     Published Date: Jun 05, 2015
Well-funded hackers with sophisticated tools made headlines and worried organizational leadership throughout 2014 yet the primary reason endpoint security risk has become more difficult in the past 24 months is due to negligent or careless employees who do not follow security policies says IT in the 2015 State of the Endpoint study by Ponemon Institute and commissioned by Lumension, a global leader in endpoint management and security. Learn more about the risks.
Tags : 
report, servers, cloud, applications, it network, business intelligence, productivity
    
Lumension
Published By: Kenshoo     Published Date: Oct 30, 2012
Per eMarketer, almost four billion dollars in advertising budgets were spent on Facebook ads during the past year, and that number is expected to grow to more than six billion in 2014. Read on to learn about efficient gender targeting with Facebook.
Tags : 
kenshoo, facebook, targeting, facebook ads, gender targeting, social networks, user engagement
    
Kenshoo
Published By: Oracle     Published Date: Apr 28, 2014
Oracle held their second annual Value Chain Summit February 3-5, in San Jose, California. The event once again attracted a few thousand Oracle customers who were interested in better understanding Oracle's various supply chain technologies and where they are heading.
Tags : 
oracle, value chain, agile plm, oracle innovation management
    
Oracle
Published By: IBM MaaS360     Published Date: Feb 05, 2015
Produced in conjunction with Integrated Solutions for Retailers, this National Retail Foundation (NRF) 2014 guide explores why mobile device, app and content management are critical components of success for large scale mobile deployment and ongoing security management.
Tags : 
mobile solutions, roi, mobile deployment, mobile security management, mobile hardware
    
IBM MaaS360
Published By: Qualys     Published Date: Jan 11, 2017
When web applications are breached, enormous amounts of sensitive business data can be lost. According to Verizon’s 2014 Data Breach Investigations Report, web application attacks more than doubled in 2013 to become the #1 cause of security incidents
Tags : 
information security, it compliance, it audit, it security, network security, web application security, application security
    
Qualys
Published By: Symantec     Published Date: Jan 15, 2014
This year’s ISTR once again covers the wide-ranging threat landscape, with data collected and analyzed by Symantec’s security experts. In this summary, we call out seven areas that deserve special attention.
Tags : 
symantec, cyberespionage, mobile security, mobile device security, threat report, cyberattacks, cyber attacks, data protection, spear phishing, phishing, spam, virus, malware, hackers, cyber criminals, internet security
    
Symantec
Published By: Qualys     Published Date: Jan 08, 2015
Learn what 488 IT professionals have to say in the 2014 Application Security Programs and Practices survey. Results indicate an increase in number of organizations with a formal application security program in place. Approximately 83% of respondents (up from 66%) have an Appsec program in place, and more than 37% (up from 33%) have a program that has been operating for more than five years.
Tags : 
application security programs, it professionals, formal application
    
Qualys
Published By: iCims     Published Date: Dec 29, 2014
In this recorded webinar, you will learn how implementing the iCIMS Recruiting Software will help increase your recruitment and reporting efficiencies while increasing candidate engagement with branded career portals.
Tags : 
icims, recruiting, social recruiting, recruitment advertising, new hires, onboarding, recruitment reporting, talent platform, icims connect, hire expectation, leverage data, review candidates
    
iCims
Published By: Logicalis     Published Date: Mar 07, 2014
Learn the top trends and concerns for choosing the right service desk provider.
Tags : 
logicallis, iaas, security, compliance, cloud, cloud security alliance board, data center, customer experience, customer satisfaction
    
Logicalis
Published By: Webroot Inc     Published Date: Mar 05, 2014
Learn the top 5 malware trends for 2014 and how your organization can best protect against hackers and cyber thieves.
Tags : 
malware, security, cyber thieves, malware trends, security systems, webroot
    
Webroot Inc
Published By: Webroot Inc     Published Date: Jan 14, 2015
PassMark Software® conducted objective performance testing on eight (8) security software products, on Windows 7 Ultimate Edition (64-bit) during January 2014. This report presents our results and findings as a result of performance benchmark testing conducted for these endpoint security products. The aim of this benchmark was to compare the performance impact of Webroot’s SecureAnywhere Business Endpoint Protection product with seven (7) competitor products.
Tags : 
endpoint performance, performance testing, security software
    
Webroot Inc
Published By: HP     Published Date: Jul 30, 2014
Changing nothing risks everything. In 2010, HP made a strategic choice to invest billions of dollars in modern storage architectures better suited for the New Style of IT. Join this session from HP Discover 2014 to learn why that bet is paying off for thousands of customers worldwide. Discover why HP is leaving legacy storage in the dust.
Tags : 
discover, storage, solution, legacy storage
    
HP
Published By: Adobe     Published Date: May 15, 2014
Adobe strives to help marketers not only collect and analyze data, but to turn data into relevant actions that reach customers in personal ways. Forrester has gathered the trends of big data and rich data to give you a sense of how they'll be used differently in 2014.
Tags : 
adobe, forrester, customer insights, big data, social media, mobile marketing, cross channel marketing, multi-touchpoint, mobile marketing, business analytics
    
Adobe
Published By: Adobe     Published Date: Aug 14, 2014
Download the Forrester 2014 Mobile Trends report to discover the trends that are transforming business as we know it—and the strategies you need to gain a competitive edge. You’ll learn about the mobile innovations that will shape 2014, and the overhyped fads that are likely to fizzle. Get the report now to uncover crucial mobile insights for the coming year and learn how to: Use mobile analytics to meet customer needs in real time Make a business case for mobile marketing Improve customer and employee processes with mobile strategies
Tags : 
mobile trends, mobile analytics, mobile marketing, mobile strategies, mobile innovations
    
Adobe
Published By: Adobe     Published Date: Nov 05, 2014
As advertising continues to evolve, we continue to provide the latest insights and trends. The Adobe Advertising Benchmark 2014 report gives you the information you need to identify better opportunities to make the most of your advertising efforts.
Tags : 
advertising, spend trends, search engines, mobile spend, ctr
    
Adobe
Published By: Adobe     Published Date: Nov 05, 2014
Download the new Adobe Digital Index report to see how your online marketing practices compare to the best-of-the-best websites across five industries, including retail, media and entertainment, travel and hospitality, financial services, and high tech. You’ll see critical metrics on everything from mobile trends to conversion rates—so you can develop new strategies for success in 2014.
Tags : 
adobe, adobe digital index, benchmarking, marketing, smartphone, tablet, stick rate, conversion rate, customer engagement, online marketing
    
Adobe
Published By: Adobe     Published Date: Jan 12, 2015
As advertising continues to evolve, we continue to provide the latest insights and trends. The Adobe Advertising Benchmark 2014 report gives you the information you need to identify better opportunities to make the most of your advertising efforts.
Tags : 
adobe, benchmark, search, spend, cpc, pla, advertising, google, yahoo, bing, tends. device, ctr, germany, mobile, keywords, audience
    
Adobe
Published By: Olapic     Published Date: Sep 09, 2014
When the numbers get this big, we tend to think of them only in the abstract: 500 million photos were shared per day in 2013 and 1.8 billion photos are being shared per day in 2014. That’s 75 million per hour, 1.25 million per minute and 20,833 per second. Olapic’s new visual commerce white paper places this content explosion in context. We filled it with data that matters, insights from our experience with over 150 brands and retailers, and strategic guidance for companies ready to plan their approach to the visual commerce opportunity. Download From Ripple to Wave: The Ascent of Authentic Visual Content now.
Tags : 
user generated content, visual commerce, visual marketing, visual content
    
Olapic
Published By: Dell Cloud Marketplace     Published Date: Jan 07, 2015
In a second-quarter 2014 Gigaom Research survey of 500 IT decision-makers at large U.S. companies, we identified strategic buyers as those who report using cloud resources for new business and revenue streams as opposed to those who don’t.
Tags : 
    
Dell Cloud Marketplace
Published By: Exablox     Published Date: Jan 27, 2015
Object-based storage (referred to as OBS throughout this document) platforms continue to perpetuate cloud and enterprise IT infrastructure. As businesses move toward petabyte-scale data storage, OBS solutions are turning out to be the right choice for balancing scale, complexity, and costs. By way of their core design principles, OBS platforms deliver unprecedented scale at reduced complexity and reduced costs over the long term. Early OBS platforms suffered from "necessity crisis," were too cumbersome to deploy and, in some cases, caused a platform lock-in because of their proprietary access mechanisms. In spite of their from-the-ground-up design, a departure from how traditional SAN and NAS arrays are deployed and, more importantly, a lack of standard interfaces made it difficult for IT organizations to deploy OBS solutions in the infrastructure. Thanks to Amazon S3 and OpenStack Swift becoming de facto access interfaces, this situation has changed.
Tags : 
network attached storage, nas arrays, storage efficiency, idc storage marketscape, storage data resiliency, storage platform scalability, exablox, oneblox
    
Exablox
Published By: Secunia     Published Date: Sep 30, 2015
In 2014, the world saw an increased number of security breaches in high profile companies. We will take a look back at some of these cases, and why it’s not only the high profile companies that were breached. Plus we will show you steps you can take to prevent yourself from being hacked in 2015. We will focus on “getting back to the basics” going into detail on why complete patch management means a safer year for any organization.
Tags : 
managing vulnerability, security breaches, security threats, hack prevention, third party software
    
Secunia
Published By: AuditBoard     Published Date: Nov 26, 2018
When the IASB and FASB issued a joint press release on May 28, 2014 1 announcing new revenue recognition standards for revenue from contracts with customers, the adoption deadline seemed a long way off. After pushback from companies across various industries, the implementation date was extended by one year, granting companies more time to update their policies and systems to adhere to the new standards.
Tags : 
    
AuditBoard
Published By: EMA     Published Date: Apr 01, 2014
Application-aware Network Performance Management (AANPM) practices and products provide detailed insights into exactly who is using which resources, what quality of experience is taking place, and where to look when things go wrong. Such information can significantly improve planning, monitoring, and troubleshooting efforts.
Tags : 
ema, application aware network performace, aanpm, quality of experience, research, it management, data management, consulting
    
EMA
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.