HIT Consultant Insightful coverage of healthcare innovation
 

2015

Results 251 - 275 of 554Sort Results By: Published Date | Title | Company Name
Published By: Citrix Systems     Published Date: Feb 10, 2016
IT Pros vote NetScaler as ADC market leader for third consecutive year, sweeping all six ADC categories.
Tags : 
    
Citrix Systems
Published By: LogMeIn     Published Date: Jul 18, 2014
This report will explore some of the support services issues, and how support organizations can make the shift needed to meet their customers' needs.
Tags : 
logmein rescue, support services, customer support, reoporting, system management
    
LogMeIn
Published By: LogMeIn     Published Date: Oct 08, 2015
This eBook reveals the 5 best practices to emerge from data to help enable sales teams exceed targets.
Tags : 
optimise sales revenue, sales, social selling, optimise virtual selling
    
LogMeIn
Published By: LogMeIn     Published Date: Oct 08, 2015
Read this report to find out how remote support tools are used across service disciplines in a variety of use cases.
Tags : 
remote support trends, remote support, web collaboration, support solutions, remote support tools
    
LogMeIn
Published By: Adobe     Published Date: Apr 30, 2015
Web content management (WCM) isn’t new. But customer demands and expectations are changing. That’s why finding the right WCM solution that supports delivering better digital experiences is important. Forrester Research, Inc. evaluates 10 vendors and names Adobe a Leader in The Forrester Wave™: Web Content Management Systems, Q1 2015. Again.
Tags : 
adobe, forrester wave, web content management, application development, experience, sitecore
    
Adobe
Published By: Tharpe Robbins     Published Date: Mar 05, 2015
Employee recognition is constantly evolving. As people’s tastes change, new generations enter the workforce and recognition’s effectiveness in driving employee engagement continues to get results. This e-book from TharpeRobbins explains the top five employee recognition trends to watch for in 2015.
Tags : 
employee engagement, rewards, awards, recognition, performance recognition, length-of-service recognition, organization performance, attract talent, retention, social recognition, sales performance, career recognition, retirement recognition, employee incentives, recognition software, engagement platform, career, performance, social, service award
    
Tharpe Robbins
Published By: Polycom     Published Date: May 12, 2015
The infographic Top Challenges of 2015 for Financial Institutions outlines the industry’s trends and landscape.
Tags : 
polycom, finance, best practices, fsi, business model, technology
    
Polycom
Published By: Oracle     Published Date: Jul 08, 2015
This eBook summarizes the top priorities every retail CIO should have on their radar. From Securing Data to Co-developing Consumer Journeys with the CMO, this eBook provides clear direction and actionable recommendations to get tech leaders started.
Tags : 
    
Oracle
Published By: Workforce Software     Published Date: May 26, 2015
Inform your HR and labor practices with this list of issues to watch, compiled and analyzed by WorkForce Software’s Director of Compliance. Honing in on U.S. wage, hour, and absence regulations, this paper runs the gamut of compliance factors, including: • Legislative developments • Key court decisions • Enforcement actions • Common employer mistakes • Emerging trends
Tags : 
labor practices, hr practices, compliance, compliance update
    
Workforce Software
Published By: Workforce Software     Published Date: Nov 23, 2015
By downloading this trend survey you’ll learn: The high cost of payroll errors How organizations cover employee leave The impact of fatigue in the workplace Strategies for improving employee satisfaction Employers’ top compliance concerns And much more
Tags : 
workforce management, workforce, employee time, scheduling, employee leave, payroll, employee satisfaction
    
Workforce Software
Published By: Bounty Jobs     Published Date: Oct 14, 2015
The BountyJobs Direct Hire Agency Benchmarking Reports are released twice a year to provide business leaders with key insights into trends and past performance of the agency recruiting marketplace, where companies seek some of the most highly sought-after candidates.
Tags : 
    
Bounty Jobs
Published By: Bounty Jobs     Published Date: Oct 14, 2015
In this e-book, we discuss several factors that are creating greater challenges for hiring managers in 2015, including rising employment (meaning more competition for those hard-to-find candidates), scarcity of key skilled workers, and a rising number of people who say they plan to look for new jobs this year.
Tags : 
hiring managers, recruitment, direct hire agency, job candidates
    
Bounty Jobs
Published By: Rosetta Stone     Published Date: Apr 03, 2018
Manufacturing is a prominent pillar of American growth and prosperity. According to the National Association of Manufacturers, every $1 invested in the manufacturing sector returned $1.81 to the economy in 2015.
Tags : 
    
Rosetta Stone
Published By: LogRhythm     Published Date: Aug 08, 2016
Security threats continue to be more sophisticated and advanced with each day, with the majority often going completely undetected. • Organizations are usually scrambling to keep up and implement new security controls to protect themselves, which adds a new layer of complexity. • With the rise of Advanced Persistent Threats (APTs) and insider attacks, it becomes extremely difficult for security staff to detect all the risks. • Many IT and IT Security staff are already stretched thin by keeping track of many different security technologies that already exist.
Tags : 
security, technology, best practices, information technology
    
LogRhythm
Published By: LogRhythm     Published Date: Aug 08, 2016
Over the past three years, ransomware has jumped into the spotlight of the cyber threat landscape. Kaspersky Lab reports that in 2015, its solutions detected ransomware on more than 50,000 computers in corporate networks—double the figure for 2014. Even at this rate of detection, Kaspersky admits that the real number of incidents is several times higher than what has been detected and reported.1 In just the first quarter of 2016, $209 million was paid out to cyber criminals using ransomware. The FBI estimates that losses to be incurred in 2016 due to ransomware will top $1 billion.2 Once again, this is just the tip of the iceberg.
Tags : 
security, technology, best practices, information technology
    
LogRhythm
Published By: Oath     Published Date: May 31, 2017
Understanding smartphone users’ behavior in the physical world is fueling the rise of location-based retargeting. Digital consumption on mobile devices surpassed desktop in 2015 and continues to grow. Using location as a signal of consumer activity and interest, advertisers can drive relevance and increase user engagement with their ads. Learn more in our infographic.
Tags : 
native advertising, native ads, search ads
    
Oath
Published By: F5 Networks Inc     Published Date: Feb 18, 2015
Organizations in every industry rely on applications to drive customer engagement, employee productivity and revenue. Deployed between users and the applications are a wide variety of “application services” designed to enhance security, improve performance and ensure reliability. F5 set out to evaluate the state of these services by asking IT professionals about their current and planned use of application services. Read the report to learn which strategic initiatives are driving application deployments including the most important trend for the next 2-5 years.
Tags : 
application services, customer engagement, employee productivity, application deployment
    
F5 Networks Inc
Published By: Cisco     Published Date: Jun 16, 2016
Attackers are commandeering legitimate infrastructure and reaping millions in profit. Defenders are struggling to detect and combat threats, and confidence is falling.
Tags : 
security, application security, access control, security policies
    
Cisco
Published By: Okta     Published Date: Feb 24, 2015
This report outlines the future look of Forrester’s solution for security and risk (S&R) executives working on building an identity and access management strategy for the extended enterprise. We designed this report to help you understand and navigate the major business and IT trends affecting identity and access management (IAM) during the next five years. IAM in 2015 has become a tool not just for security but also for business agility. Competitive challenges push businesses into the cloud and encourage mobile device use even without full-fledged access controls in place.
Tags : 
identity and access management, security and risk, extended enterprise, it trends, business agility
    
Okta
Published By: Okta     Published Date: Aug 12, 2015
Gartner has named Okta as the only leader in its 2015 Identity & Access Management as a Service (IDaaS) Magic Quadrant. Access your complimentary Gartner report today.
Tags : 
    
Okta
Published By: Okta     Published Date: Aug 12, 2015
The Forrester Wave report identifies the six most significant identity solution providers in the market, evaluating the strengths and weaknesses of each vendor against 15 criteria, including current offering, strategy and market presence. Access your complimentary Forrester Wave report and learn why Okta is named a leader in the space.
Tags : 
    
Okta
Published By: Skillsoft     Published Date: Jun 23, 2016
In the latest developments in technology for HCM, Nucleus sees an inexorable march to upend conventional approaches to on-the-job learning. Training scheduled around static variables such as regulatory policy or company initiatives, for instance, is one-dimensional. This type of learning will persist. The emergence of prescriptive analytics made possible by real-time data models, however, makes trigger-based, in-the-moment learning possible (Nucleus Research p199 – The coming mass extinction in HCM, November 2015). Further supporting this are social media–style user interfaces (UIs), which promote continual collaboration. It’s learning that happens whenever an employee needs it, not when the organization or law decrees it. Data across HCM prompts these triggers.
Tags : 
best practices, business optimization, business management, organization, talent management, technology
    
Skillsoft
Published By: Jive Software     Published Date: Dec 02, 2014
Millennials have changed the way we communicate and as they move into the workforce, they expect the flexibility to be as productive, collaborative and connected in the workplace as they are in their personal lives. By 2015, millennials will make up the majority of the workforce, requiring companies to change the way they do business to accommodate these new workstyles. This shift starts with technology, but in the end is about creating a more collective and connected way to work for everyone.
Tags : 
workforce statistics, millenials, collaborative workforce
    
Jive Software
Published By: NetApp     Published Date: Dec 17, 2013
When your industry’s revenue projections flatten, how can you break away and continue to grow? Learn how Orange Business Services leveraged NetApp storage to reinvent their company by becoming a cloud services provider and exceeded their revenue goals of zero to €500 million by 2015.
Tags : 
storage, it services, cloud computing, public cloud, hybrid cloud, best practices, technology, data management, multiple cloud
    
NetApp
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.