HIT Consultant Insightful coverage of healthcare innovation
 

2015

Results 1 - 25 of 558Sort Results By: Published Date | Title | Company Name
Published By: Shell U.K. Limited     Published Date: Jul 29, 2019
Para 2030, se espera que el mercado de la energía eólica marina ascienda a 30.000 millones de libras esterlinas al año. Dando un salto en el tiempo hasta 2050, se prevé que la industria contribuya como mínimo a un tercio del suministro total de electricidad a nivel mundial. Si bien esto es una gran noticia para las empresas de generación de energía, investigaciones recientes han demostrado que los costes asociados con el mantenimiento de los parques eólicos se duplicarán entre 2015 y 2020. Para asegurar su lugar en el futuro panorama energético, proteger el valor y la producción de las turbinas eólicas mediante un mantenimiento eficaz será fundamental para lograr una ventaja competitiva. Hay pasos que se pueden tomar ahora para reducir los costes de mantenimiento hoy y mantenerlos más bajos en el futuro. Shell Omala S5 Wind 320 - aceite sintético avanzado para engranajes de turbinas eólicas que puede ayudar a asegurar que sus turbinas eólicas trabajen más duro durante más tiempo, i
Tags : 
    
Shell U.K. Limited
Published By: Shell U.K. Limited     Published Date: Jul 29, 2019
Es wird erwartet, dass der Offshore-Windenergie-Markt im Jahr 2030 jährlich 30 Milliarden Britische Pfund Wert sein wird. Schauen wir in das Jahr 2050, so wird die Windbranche dann mindestens ein Drittel der globalen Stromversorgung abdecken. Während das für die Stormerzeuger gute Nachrichten sind, zeigt sich aber auch, dass sich die mit der Wartung von Windfarmen einhergehenden Kosten zwischen 2015 und 2020 verdoppeln werden. Damit sich die Windturbinen ihren Platz im Energiemix der Zukunft sichern können, wird es für das Erreichen eines Wettbewerbsvorteils entscheidend sein, ihren Wert und Output mittels effektiver Wartung langfristig zu erhalten. Es gibt Möglichkeiten, die schon heute unternommen werden können, um Wartungskosten zu verringern und in der Zukunft zu senken. Shell Omala S5 Wind 320 ist ein synthetisches Gertriebeöl das speziell für den Einsatz in Windturbinen entwickelt wurde und sie dabei unterstützt , dass Ihre Windturbinen auch unter rauesten Bedingungen län
Tags : 
    
Shell U.K. Limited
Published By: Shell U.K. Limited     Published Date: Jul 29, 2019
Entro il 2030, il mercato eolico offshore dovrebbe valere 30 miliardi di sterline all'anno. Passando rapidamente al 2050, si prevede che il settore contribuirà per almeno un terzo alla fornitura globale di elettricità. Anche se questa è una grande notizia per le aziende produttrici di energia elettrica, recenti ricerche hanno dimostrato che i costi associati alla manutenzione dei parchi eolici raddoppieranno tra il 2015 e il 2020. Assicurarsi un proprio posto nel futuro mix energetico, proteggere il valore e la potenza delle turbine eoliche attraverso una manutenzione efficace si rivelerà fondamentale per realizzare un vantaggio competitivo. Ci sono passi che è possibile compiere ora, per ridurre i costi di manutenzione oggi e mantenerli bassi in futuro. Shell Omala S5 Wind 320 - olio per ingranaggi sintetico avanzato per turbine eoliche contribuisce a garantire un lavoro più duro e più lungo delle turbine eoliche, anche nelle condizioni più difficili. Shell Omala S5 Wind 320… • R
Tags : 
    
Shell U.K. Limited
Published By: Shell U.K. Limited     Published Date: Jul 18, 2019
The way we produce and consume energy globally is changing. Over the next decade, the energy mix will undergo a significant shift at both a supranational and domestic level as we work towards a cleaner future. By 2030, the offshore wind power market is expected to be worth £30 billion per year. Fast forward to 2050 and the industry is projected to contribute to at least a third of the total global electricity supply. While this is great news for power generation companies, recent research has showed that the costs associated with maintaining wind farms will double between 2015 and 2020. To secure its place in the future energy mix, protecting a wind turbines value and output through effective maintenance will prove critical to achieving a competitive edge. There are steps that can be taken now, to reduce maintenance costs today and keep them lower in the future. Shell Omala S5 Wind 320 – advanced synthetic wind turbine gear oil that can help to ensure your wind turbines work harde
Tags : 
    
Shell U.K. Limited
Published By: ExpertVoice     Published Date: Jun 17, 2019
Sunwarrior, a leading naturals brand, partnered with ExpertVoice to build product advocacy with influential experts to drive full-price consumer sales. Since 2015, they’ve been working with ExpertVoice to empower industry professionals — sales associates at Fresh Thyme, Sprouts, GNC, Vitamin Shoppe and more — with compelling behind-the-scenes content and exclusive product access to elevate their recommendations — and impact Sunwarrior’s bottom line.
Tags : 
    
ExpertVoice
Published By: Alert Logic     Published Date: May 23, 2019
A Payment Card Industry Data Security Standard (PCI DSS) audit can be passed by complying with the bare minimum requirements, but that falls short of the purpose of it: to secure and protect cardholder data. Meeting compliance is about passing an audit at a specific point in time and also maintaining it after the audit. The real challenge is sustaining continuous compliance to avoid costly breaches at the hands of motivated and skilled adversaries. Indeed, as detailed in Verizon's "2017 Payment Security Report," nearly half (45%) of the companies examined between 2015 and 2016 were not fully PCI DSS compliant.
Tags : 
    
Alert Logic
Published By: Schneider Electric     Published Date: Apr 23, 2019
Schneider Electric surveyed over 400 worldwide machine builders and factory end users in 2015. The questions they answered all centered around what their machines and plants would need to look like in 2020 if their businesses were to sustain growth and boost productivity. Their feedback has shaped (and will continue to shape) Schneider Electric digitized solution investments. Key requirements identified included: • Tools that could accommodate a younger, less skilled, and less experienced workforce • A need for simpler integration through open software connectivity and more open field buses • A need for whole lifecycle support of the products they purchase Read this eBook to see answers to some of these identified key points from those surveyed.
Tags : 
machine, digitization, industry 4.0, business models, smart machines
    
Schneider Electric
Published By: SAS     Published Date: Nov 16, 2018
Fraud is costing government programs more than ever. For example, Medicaid lost $36 billion in 2017 – 10 percent of its total expenditures – which represents a 27 percent increase over 2015. As explored in this paper, fraud numbers are on the rise because fraud rings are not only getting more effective at what they do, but because it’s easy for them to find soft targets across multiple government programs simultaneously. Learn about how next-generation analytic tools from SAS cut across data and program silos and empower investigators to go on the offensive with fraud operators – without disrupting the efficient and timely delivery of benefits, services or tax refunds.
Tags : 
    
SAS
Published By: Group M_IBM Q418     Published Date: Sep 10, 2018
Emid is a leading provider of managed ICT solutions and a pioneer of cloudbased banking systems in Africa. Based in Pretoria, Emid began as part of a major South African retail bank, providing core banking capabilities for other financial providers, and was acquired in 2015 by EOH, the largest technology service provider in Africa. Today, Emid provides managed services including networking, infrastructure, and IT support for businesses across industry sectors, as well as offering its C4 cloud-hosted, core-banking omni-channel platform.
Tags : 
    
Group M_IBM Q418
Published By: Location3     Published Date: Aug 31, 2018
When we released our first white paper in February 2015 discussing the ways multi-location businesses were using online media to drive in-store visits, most of the strategic opportunities being leveraged by marketers revolved around using things like promotional coupons, beacons and other tactics. While those methods certainly provided incremental lift in in-store traffic and revenue, there existed a number of gaps in connecting online data associated with promotional efforts, to data that indicated a customer actually converted offline at a business location. At press time for our original “online-to-offline” white paper, digital industry giants were still very much in the early stages of evaluating data points that signified offline customer conversions. Many of these “conversions” were somewhat implied (i.e. Clicks on “Get Directions” link), while others were a bit more reliable in signifying in-store visits and purchases made by consumers (i.e. downloadable coupon redeemed in-store
Tags : 
marketing, local marketing, franchise, franchisor, digital marketing, online to offline, multi-location businesses, store visits, cross channel analytics
    
Location3
Published By: BlackBerry Cylance     Published Date: Aug 22, 2018
Cylance engaged SE Labs to independently assess CylancePROTECT’s ability to predict and prevent previously unknown threats. SE Labs pitted the May 2015 version of CylancePROTECT® — without a cloud connection or updates — against some of the most destructive and disruptive threats that appeared between 2016 and 2018, after the model was trained and deployed.
Tags : 
predictive, advantage, cylance, protect, cloud, connect
    
BlackBerry Cylance
Published By: TIBCO Software     Published Date: Aug 13, 2018
The use of SaaS applications within an organization is the new normal. In fact, there's a good chance that just your marketing department alone is using over 10 SaaS products. According to Gartner, the 2015 worldwide market for SaaS software application sales was $33.4 billion, with projections to double to $67.2 billion by 2019. Integration needs are changing, with SaaS applications, as well as mobile traffic, social networks, IoT, suppliers, partners, and customer channels all new integration points that will need to be captured in your business processes. Read “Five Principles for Integrating Software as a Service Applications” to learn: Key principles for successful hybrid integrations New integration use cases to grow your business upward and outward The why and how of integration as both an enabler and a differentiator Benefits of the TIBCO integration platform and its various offerings
Tags : 
    
TIBCO Software
Published By: Workday Italy     Published Date: Aug 07, 2018
What is the current state of cloud adoption for Financial Applications? Financial applications have been slower to move to the cloud compared to other domains such as human capital management and procurement. However this is changing, Gartner predicts that within 4 years, 47% of total expenditure on financial management applications will be on cloud applications. That will be up from 30% in 2015. We have included four reasons why we see this tipping point happening right now.
Tags : 
    
Workday Italy
Published By: Microsoft     Published Date: Jul 20, 2018
Kevin Ashton founded the Auto-ID Center at the Massachusetts Institute of Technology, and has done pioneering work in radio-frequency identification and sensor technology. Ashton is known for coining the term “the Internet of Things” to describe a system where the Internet is connected to the physical world via ubiquitous sensors. In 2015, he spoke at a European customer service conference and noted that field service management is the first industry being transformed by IoT. Some people in the industry have noted that the entire IoT concept came from trying to solve field service problems in 1999. IoT’s origin story lies in field service management. Clearly, field service management and IoT are deeply intertwined. But how are the changes being implemented? And how can you benefit from them?
Tags : 
    
Microsoft
Published By: Alight Solutions     Published Date: Jul 17, 2018
As much as moving to the Cloud has been a hot trend over the past several years with Human Capital Management systems, in today’s world, financial management systems are not far behind. We’re starting to see the activity significantly ramp up within the financial management system space. So much so, that according to research done by Gartner, the Cloud is expected to become the dominant deployment model across all areas of financial management applications by 2025. Spending on cloud or SaaS-based applications will increase from 30% of the total market spend in 2015 to 47% by 2020. So which financial systems are organizations shifting to the cloud model and why is this happening—aside from following the trend in HR? Download now to learn more -
Tags : 
    
Alight Solutions
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
SE Labs tested CylancePROTECT® in an offline environment against major threats that subsequently appeared in the wild. The test explores the product’s ability to prevent new threats from attacking endpoint systems successfully. CylancePROTECT contains technology designed to identify and block malware using what it claims to be an “artificial intelligence” (AI) model. This model can be updated over time. However, in this test we used the model created in May 2015 and did not permit further updates so that the software was unable to receive new models or edit the existing one. The test exposed systems protected by this older version of CylancePROTECT to very impactful threats discovered and reported widely after May 2015. In this way, the test shows to what extent the product was able to predict how future threats would appear. This “Predictive Advantage” (PA), the advantage that users of the product have against future adversaries, is presented in this report.
Tags : 
malware, predictive, test, response
    
BlackBerry Cylance
Published By: LogRhythm     Published Date: Jun 19, 2018
Globally, sophisticated cyber-attacks are compromising organizations at an unprecedented rate and with devastating consequences. Modern attackers, including criminal organizations, ideological groups, nation states and other advanced threat actors are motivated by a wide range of objectives that include financial gain, industrial espionage, cyber-warfare, and terrorism. These attacks are often very expensive for compromised organizations, costing each company an average of USD $7.7M.1 1 Ponemon 2015 Cost of Cyber Crime Study 2 CyberEdge 2016 Cyberthreat Defense Report 3 Symantec, Underground black market: Thriving trade in stolen data, malware, and attack service. November 20, 2015; Medscape, Stolen EHR Charts Sell for $50 Each on Black Market, April 28, 2014 4 Deloitte, Beneath the Surface of a Cyberattack, 2016 The Modern Cyber Threat Pandemic 3 The odds that your organization will be compromised are high. In fact, a recent report indicates that 76 percent of surveyed organizatio
Tags : 
data, breaches, organizations, global
    
LogRhythm
Published By: DigiCert     Published Date: Jun 19, 2018
Many security-minded organizations utilize code signing to provide an additional layer of security and authenticity for their software and files. Code signing is carried out using a type of digital certificate known as a code-signing certificate. The process of code signing validates the authenticity of legitimate software by confirming that an application is from the organization who signed it. While code-signing certificates can offer more security, they can also live an unintended secret life providing cover for attack groups, such as the Suckfly APT group. In late 2015, Symantec identified suspicious activity involving a hacking tool used in a malicious way against one of our customers. Normally, this is considered a low-level alert, however, the hacktool had an unusual characteristic not typically seen with this type of file; it was signed with a valid code-signing certificate. Download this whitepaper to find out more about how you can protect your business from such threats.
Tags : 
    
DigiCert
Published By: Applause Israel     Published Date: Jun 19, 2018
obile Payments have emerged as a catalyst for transactions across all markets. In underdeveloped markets, mobile payment technology is enabling businesses to sell products and services to consumers that had previously been out of reach. In developed markets, it has made the process of purchasing products and services even simpler. PayPal, one of the most popular digital payment solutions on the market, facilitated $66 billion in payment volume throughout 2015, and now has 188 million active registered user accounts across the US. Furthermore, Statista projects that mobile payments will account for more than $210 billion in transactions by 2019. Mobile payment technology is a step forward in the process of connecting businesses to the people they are serving. However, some merchants will find themselves miles behind their competitors by the time the transition to mobile payments is complete. The reason? A failure to implement the correct mobile payment strategy. An ever-increasing numbe
Tags : 
    
Applause Israel
Published By: CA Technologies     Published Date: Jun 01, 2018
Within any organization, the most dangerous users are those with privileged access to the company’s most valuable and sensitive data assets. This includes systems administrators, business managers, partners, suppliers, and service providers, and also takes into account the automated interactions between business machines, systems, and applications. Privileged access has always been a high-risk issue, but for too long, organizations have not understood or have chosen to ignore the risks, preferring instead to rely on the integrity of the individuals and systems involved. A number of high-profile security breaches over the last two years have highlighted the damage that a rogue systems administrator or stolen privileged credentials can cause. Today, fewer than half of all business organizations have deployed the type of privileged identity management (PIM) solution that could help improve the situation. This Ovum Decision Matrix (ODM) provides an in-depth view of the leading PIM solution
Tags : 
    
CA Technologies
Published By: TIBCO Software     Published Date: May 31, 2018
The use of SaaS applications within an organization is the new normal. There is a good chance that just your marketing department is using more than 10 SaaS products, which is reflected in the amount you are spending on SaaS. According to Gartner, the 2015 worldwide market for SaaS software application sales was $33.4 billion, with projections to double that to $67.2 billion by 2019.1 Clearly, your integration needs are changing. SaaS applications, as well as mobile traffic, social networks, IoT, suppliers, partners, and customer channels are new integration points that will need to be captured in your business processes. This paper presents five principles for successful hybrid integrations.
Tags : 
    
TIBCO Software
Published By: MobileIron     Published Date: May 07, 2018
Enterprises and users continue to be concerned about mobile apps and mobile malware because they have been trained by legacy antivirus software packages. Look for a known malware file and remove it. The issue with this logic on mobile devices is the mobile operating systems evolve and add features very rapidly. The mobile operating systems add millions of lines of code in a year and therefore introduce unintended consequences, bugs and vulnerabilities. In 2017, there were more CVEs registered for Android and iOS than all of 2016 and 2015 combined. In 2017 there were 1229 CVEs awarded. Over half of these CVEs that received scores of 7 or greater indicated that the vulnerabilities are severe and exploitable. This trend is expected to continue as the mobile operating systems mature and more features are added.
Tags : 
global, threat, report, mobile, malware, software, antivirus
    
MobileIron
Published By: Akamai Technologies     Published Date: May 07, 2018
We are pleased to present the Cost of Web Application and Denial of Service Attacks, sponsored by Akamai Technologies. The purpose of this research is to understand changes in the cost and consequences of web application and denial of service attacks since the study was first conducted in 2015. For this study, Ponemon Institute surveyed 621 individuals in IT operations, IT security, IT compliance or data center administration.
Tags : 
web, application, attacks, security, akamai, technology
    
Akamai Technologies
Published By: B Channels     Published Date: Apr 27, 2018
The IoT World Forum regularly reviews and updates on IoT markets and solutions every year. In Dubai in 2015 there were 3 clear takeaways: Invest now, gain solution skills, build an ecosystem.
Tags : 
    
B Channels
Published By: Microsoft Azure     Published Date: Apr 10, 2018
Learn how to break down silos, reinvent productivity, and help your sales team achieve success by unifying transactional systems, social networking, and strong customer relationships. Download this free Nucleus report that says teams using the Microsoft Relationship Sales solution increased productivity 12-15 percent.** You’ll also learn how to: Empower your sellers with savvy insights that engage and delight customers. Scale the power of one-on-one relationship selling by unifying the sales experience. Offer your team tools to reinvent the way they sell and help transform your company’s bottom line. Use Microsoft Dynamics 365 for Sales along with LinkedIn Sales Navigator to help sellers identify future customers and suggest ways to engage with them. **Claims based on a 2017 study by Nucleus Research that analyzed more than 50 ROI case studies on CRM deployments from 2015 to 2017. Companies ranged in size from small and medium-sized businesses to large multinational enterprises. Re
Tags : 
    
Microsoft Azure
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.