HIT Consultant Insightful coverage of healthcare innovation
 

2014

Results 251 - 275 of 354Sort Results By: Published Date | Title | Company Name
Published By: Oracle     Published Date: Jul 12, 2017
If anyone remained skeptical about the cloud’s utility— and staying power—as a delivery mechanism for everything from infrastructure as a service (IaaS) to platform as a service (PaaS), software as a service (SaaS), and more, a quick look at recent statistics would surely change their mind. Indeed, with the cloud software market reaching US$48.8 billion in 2014 and anticipated to grow to US$112.8 billion by 2019, it’s clear that cloud computing is not just the way of the future, it’s also the way of the present.
Tags : 
erp, cloud, iaas, paas, saas, cloud computing
    
Oracle
Published By: Silver Peak     Published Date: Apr 18, 2014
Gartner has published its latest Magic Quadrant for WAN Optimization. Be among the first to get complimentary access to this new report now! Silver Peak is leading the way into a new era of software-defined WAN optimization. Now more than ever, organizations like yours depend on the wide area network to connect their data centers, branch offices and the cloud. They see that better network performance means better bottom-line results, and Silver Peak gives them the most comprehensive and flexible options for network acceleration, and the most innovative approach to the next-generation WAN.
Tags : 
wan optimization, silver peak, gartner, software-defined, wide area network, data centers, next-generation wan, netowork acceleration, cloud, cloud computing, magic quadrant
    
Silver Peak
Published By: Okta     Published Date: Apr 29, 2015
2014 was a banner year for security breaches. According to the Identity and Theft Research Center, there were 783 reported U.S. data breaches, a 27.5% increase from 2013. Keeping your company and customer data safe is no longer just an IT problem; it's a top concern for C-level executives as well. Your company's reputation and bottom line depend on keeping corporate data secure — yet employee mobility is making this a huge challenge. Read this eGuide to learn how to avoid these challenges with simpler, smarter authentication.
Tags : 
theft, research center, c-level, okta, theft research
    
Okta
Published By: AlienVault     Published Date: Oct 21, 2014
The Public Services Network (PSN) is a programme intended to improve communication services across the UK government by reducing the cost and complexity of digital communication across the public sector. The PSN will create one logical network, based on industry standards, thus improving performance and security. The PSN is a replacement to the GSi (Government Secured Intranet), and all Public Sector agencies must migrate to the PSN by 31 October 2014. AlienVault’s Unified Security Management (USM) platform can provide you with the single solution you need to address many of the network- and security-related questions required to complete your PSN IA documentation.
Tags : 
communication, government, reducing cost, digital, network, public sector, logical, industry, standards, performance, security, management, unified, solution
    
AlienVault
Published By: Marketo     Published Date: Oct 03, 2014
The marketing automation platform (MAP) market is rapidly changing, and businesses that "get it" know that marketing automation is essential to their long-term success. In fact, in their 2014 update to the SiriusView for Marketing Automation Platforms report, SiriusDecisions suggests that marketers who do not use and understand marketing automation are quickly becoming a dying breed. In essence, marketing automation is here!
Tags : 
marketo, marketing automation, map, marketing automation platforms, lead nurturing, lead scoring, crm
    
Marketo
Published By: Marketo     Published Date: Mar 23, 2015
The marketing automation platform (MAP) market is rapidly changing, and businesses that "get it" know that marketing automation is essential to their long-term success. In fact, in their 2014 update to the SiriusView for Marketing Automation Platforms report, SiriusDecisions suggests that marketers who do not use and understand marketing automation are quickly becoming a dying breed. In essence, marketing automation is here!
Tags : 
marketo, siriusdecisions, marketing automation, marketing automation platforms, map
    
Marketo
Published By: Logicalis     Published Date: Mar 21, 2014
Learn the top trends and concerns for choosing the right managed services partner.
Tags : 
logicalis, modular computing, data optimization, cloud computing, network rationalization
    
Logicalis
Published By: Qualys     Published Date: Jan 11, 2017
When web applications are breached, enormous amounts of sensitive business data can be lost. According to Verizon’s 2014 Data Breach Investigations Report, web application attacks more than doubled in 2013 to become the #1 cause of security incidents
Tags : 
information security, it compliance, it audit, it security, network security, web application security, application security
    
Qualys
Published By: Mass Relevance     Published Date: Jun 12, 2014
See how USOC partnered with Spredfast (formerly Mass Relevance) to create a single, responsive social media hub for the Sochi 2014 Winter Olympic Games that combined onsite, online and mobile apps to engage fans and athletes throughout the games.
Tags : 
spredfast, mass relevance, responsive social media hub, social media strategy, sochi 2014 winter olympic games, mobile apps, fan and athlete engagement, responsiveness
    
Mass Relevance
Published By: Symantec     Published Date: Oct 07, 2014
The rising intensity and sophisticated nature of cyber-attacks has created a precarious environment for businesses charged with protecting their customers’ personal data. In 2012, credit card and debit card fraud resulted in losses amounting to $11.27 billion. In January 2014 alone, a single cyber-attack exposed more than 105 million identities. To steal this data, one option is to target the point at which a retailer first acquires that card data – the Point-of-Sale (PoS) system. PoS systems are increasingly being targeted by these attackers, which is why it's more important than ever to protect these devices and the systems they are connected to. Read more into the research on these attacks in this Symantec Security Response special report.
Tags : 
point of sale systems, cyber-attacks, precarious environment, fraud, personal data, pos, security response
    
Symantec
Published By: Damballa     Published Date: Oct 24, 2014
Damballa’s Q3 State of Infections report discusses the state of continuous breach that enterprises face today. Key findings include: * Malware dwell time equates to loss * How to minimize risk of a POS malware breach * Where the security gaps are and how to close them
Tags : 
damballa, state of infection, enterprise, attacks, reduce risk, infection rate
    
Damballa
Published By: DNN Corp.     Published Date: May 14, 2014
What do the most valuable online communities have in common? Research from The Community Roundtable says deeper engagement, ability to measure impact, and seeking external guidance are key. Download now for essential statistics and best practices for building a top-performing community that delivers business results.
Tags : 
dnn, online communities, marketing communities, community management, email marketing
    
DNN Corp.
Published By: Druva     Published Date: Aug 04, 2016
The rise of the mobile workforce, combined with an increasing risk of litigation, has created a crisis for businesses. When faced with a request for eDiscovery—the production of electronically-stored information (ESI) in the course of a lawsuit or investigation—legal and IT teams must identify and place costly, time-consuming holds on responsive files. These holds apply across devices and repositories, both inside and outside the organization, including SaaS-based cloud applications such as Office 365, Google for Work, and Box. And lest these teams become complacent, saying “It won’t happen here,” it should be noted that in 2014, 34 percent of companies faced at least one lawsuit with more than $20 million at issue.
Tags : 
    
Druva
Published By: Druva     Published Date: Aug 04, 2016
The rise of the mobile workforce, combined with an increasing risk of litigation, has created a crisis for businesses. When faced with a request for eDiscovery—the production of electronically-stored information (ESI) in the course of a lawsuit or investigation—legal and IT teams must identify and place costly, time-consuming holds on responsive files. These holds apply across devices and repositories, both inside and outside the organization, including SaaS-based cloud applications such as Office 365, Google for Work, and Box. And lest these teams become complacent, saying “It won’t happen here,” it should be noted that in 2014, 34 percent of companies faced at least one lawsuit with more than $20 million at issue.
Tags : 
best practices, storage, mobile workforce, technology, data, office 365, mobile device
    
Druva
Published By: Dell Cloud Marketplace     Published Date: Jan 07, 2015
In a second-quarter 2014 Gigaom Research survey of 500 IT decision-makers at large U.S. companies, we identified strategic buyers as those who report using cloud resources for new business and revenue streams as opposed to those who don’t.
Tags : 
    
Dell Cloud Marketplace
Published By: Symantec     Published Date: Nov 21, 2014
The monthly intelligence report, provides the latest analysis of cyber security threats, trends, and insights from the Symantec intelligence team concerning malware, spam, and other potentially harmful business risks. Key Findings • The .doc file type was the most common attachment type used in spear-phishing attacks, making up more than 52.9 percent of all attachments in September. • The largest data breach reported in September actually took place in April, and resulted in the exposure of 56 million identities. • There were 600 vulnerabilities disclosed in the month of September, the highest number so far in 2014 and second-highest in the last 12 months.
Tags : 
cyber security threats, harmful business risks, malware, spam, intelligence team
    
Symantec
Published By: Symantec     Published Date: Oct 07, 2014
The Internet Security Threat Report provides an overview and analysis of the year’s global internet threat activity. The report is based on data from the Symantec™ Global Intelligence Network, which Symantec’s analysts use to identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape. Highlights from the 2014 Internet Security Threat Report Key Findings • 91% increase in targeted attacks campaigns in 2013 • 62% increase in the number of breaches in 2013
Tags : 
internet security, target attacks, breaches, threat activity, emerging trends, cybercrime
    
Symantec
Published By: OC Tanner     Published Date: Dec 08, 2017
Workplace culture is trending everywhere. In 2014, culture was declared the most popular word of the year by Merriam Webster. In 2015, Deloitte research listed culture as a top-three business challenge for leaders. In 2016, 80 percent of executives rated employee experience as an important issue they need to tackle.
Tags : 
    
OC Tanner
Published By: Cornerstone OnDemand     Published Date: Apr 24, 2014
In the 2014 Workforce Talent and Workforce Management Outlook survey, Human Capital Media Advisory Group, the research arm of Workforce magazine, in partnership with Cornerstone OnDemand set out to discover where HR leaders are seeing their greatest successes and feeling the greatest pain. Additionally, we explored how HR leaders are setting priorities for the coming years. While there are surveys that address how the needs of HR vary, many focus on the difference between small and large organizations with the assumption that midsized organizations are similar enough to large organizations not to require extra focus. To get a different perspective, we looked specifically at how the HR function in midsized organizations compares to their much larger counterparts. Are they as similar as is popularly believed?
Tags : 
cornerstone ondemand, cornerstone, talent management software, performance management, recruiting software, connect, learning management software, learning software, lms, compensation management software, succession software
    
Cornerstone OnDemand
Published By: Lenovo and Intel®     Published Date: Feb 29, 2016
Since acquiring the x86 line of business from IBM in 2014, Lenovo has been a top vendor in the category.
Tags : 
lenovo, server, data management, laptop, reliability
    
Lenovo and Intel®
Published By: CDW     Published Date: Mar 31, 2015
As mobile computing becomes an increasingly important technology, the need for robust, reliable wireless networks is growing. In addition to enterprise-issued devices, users are bringing their own tablets and smartphones and demanding access to IT resources. Organizations need a wireless infrastructure that can support these demands. Our research shows that in addition to mobile demands, aging hardware is driving many organizations' wireless upgrade plans. Download this white paper to read more about the research.
Tags : 
wireless, infrastructure, wi-fi, mobile computing, byod, upgrade
    
CDW
Published By: VMware     Published Date: Dec 18, 2012
This presentation will be available to audience members until June 21, 2014 at 09:00 AM Pacific Daylight Time.
Tags : 
virtualization, cloud, vmware, security, compliance
    
VMware
Published By: HP     Published Date: May 05, 2014
Performance testing solves application issues potentially impacting revenue, productivity, and brand recognition: Discover how Telus has reduced the number of performance issues introduced by IT releases and saved well over $10M in business impact costs (revenue loss/workaround expenses/impact on brand name) since 2011 using HP Performance Center. TELUS is a leading national telecommunications company in Canada, with $10.9 billion of annual revenue and 13.1 million customer connections.
Tags : 
    
HP
Published By: HP     Published Date: May 05, 2014
Service virtualization and testing automation speed time-to-market: Discover how Walgreens has reduced application development cycle time (from 10 weeks to 5 to 7 weeks), transformed testing into a non-linear, agile process and ensured high quality of proprietary business applications using HP Application Lifecycle Management solutions. Walgreens is a leader in providing consumers with multi-channel access to pharmacy and health-and-wellness related goods and services
Tags : 
hp quality center, hp performance center, performance testing, hp application, hp software tools, it case study, lifecycle intelligence, lifecycle management, alm, telus
    
HP
Published By: Mobify     Published Date: Jul 22, 2014
Hoping to improve your Mobile ecommerce strategy and increase conversions? The 2014 Mobile E-Commerce Strategy Playbook will give you four strategic methods to increase mobile conversion rates, revenue and customer satisfaction.
Tags : 
mobile commerce, mcommerce, ecommerce, mobile shopping, m-commerce, e-commerce, retail, online retail, responsive websites, mobile websites, mobify, tablets, smartphones, phablets, mobile conversions, conversions, online sales, responsive design
    
Mobify
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.