HIT Consultant Insightful coverage of healthcare innovation
 

2015

Results 126 - 150 of 558Sort Results By: Published Date | Title | Company Name
Published By: Skillsoft     Published Date: Jun 23, 2016
In the latest developments in technology for HCM, Nucleus sees an inexorable march to upend conventional approaches to on-the-job learning. Training scheduled around static variables such as regulatory policy or company initiatives, for instance, is one-dimensional. This type of learning will persist. The emergence of prescriptive analytics made possible by real-time data models, however, makes trigger-based, in-the-moment learning possible (Nucleus Research p199 – The coming mass extinction in HCM, November 2015). Further supporting this are social media–style user interfaces (UIs), which promote continual collaboration. It’s learning that happens whenever an employee needs it, not when the organization or law decrees it. Data across HCM prompts these triggers.
Tags : 
best practices, business optimization, business management, organization, talent management, technology
    
Skillsoft
Published By: Cisco     Published Date: Jun 21, 2016
The demands on IT today are staggering. Most organizations depend on their data to drive everything from product development and sales to communications, operations, and innovation. As a result, IT departments are charged with finding a way to bring new applications online quickly, accommodate massive data growth and complex data analysis, and make data available 24 hours a day, around the world, on any device. The traditional way to deliver data services is with separate infrastructure silos for various applications, processes, and locations, resulting in continually escalating costs for infrastructure and management. These infrastructure silos make it difficult to respond quickly to business opportunities and threats, cause productivity-hindering delays when you need to scale, and drive up operational costs.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jun 21, 2016
The e-book describes a hypothetical company, referred to as Need ToChange, which has a traditional approach to WAN design. It then presents Cisco's response to how NeedToChange should evolve its WAN. This e-book includes a summary of the key components of some of the emerging approaches to WAN architecture and design and concludes with a call to action that outlines a project plan that network organizations can use to evolve their WAN.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jun 21, 2016
This IDC study provides an assessment of the capabilities and business strategies of 12 vendors in the worldwide enterprise WLAN market for 2015–2016.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jun 21, 2016
Provides new insights into how mobility is being approached by mid-market and enterprise organizations globally
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jun 21, 2016
Modern organizations are expanding mobility initiatives across virtually every business function. According to Cisco’s 2015 Mobility Landscape Survey, 72 percent of business leaders believe mobility is a strategic imperative for their organization’s success. In fact, in many businesses today, line-of-business (LoB) leaders are increasingly funding and making decisions about mobile applications and solutions.
Tags : 
    
Cisco
Published By: Oracle     Published Date: Jun 20, 2016
The number one technology issue in the C-suite today is cyber-security. And there’s no wonder—attacks are becoming more numerous and more sophisticated than ever. The cost of cyber-crime to the global economy has topped more than $445 billion2 – equivalent to 1% of global GDP. Sometimes cyber-crime can seem unstoppable – while firms spent more than $75 billion on cyber-defences in 20153 , cyber-crime grew by 38% that year. That’s why C-suite executives everywhere are asking: What can we do to make a difference in defending against hackers, cyber-criminals and digital spies?
Tags : 
    
Oracle
Published By: Cisco     Published Date: Jun 16, 2016
Attackers are commandeering legitimate infrastructure and reaping millions in profit. Defenders are struggling to detect and combat threats, and confidence is falling.
Tags : 
security, application security, access control, security policies
    
Cisco
Published By: Polycom     Published Date: Jun 08, 2016
There are an estimated 50 million huddle rooms, or small meeting spaces, around the world today.  But in 2015, only 10% of video systems purchased were for huddle rooms.  See how you can support the new ways people work by creating a productive huddle room meeting experience.  
Tags : 
best practices, business optimization, business management, application management, enterprise application, business intelligence, productivity
    
Polycom
Published By: Oracle HCM Cloud     Published Date: Jun 07, 2016
The United States’ largest department store, Macy’s, took to the stage at Oracle OpenWorld to talk about its shift from on-premise to the cloud, which is being facilitated by its need to completely redesign its HR function. See why Macy’s is calling Oracle’s HCM Transformation approach the model of the future.
Tags : 
    
Oracle HCM Cloud
Published By: Delta Risk     Published Date: Jun 07, 2016
Nowhere else could that wise advice be more relevant than in contemplating the effects of cyber attacks on financial institutions. As stated in a recent issue of the FDIC’s Supervisory Insights, the risks presented by cyber attacks have become “one of the most critical challenges [in the last decade] facing the financial services sector due to the frequency and increasing sophistication of cyber attacks.” In just a year’s time, from 2014 to 2015, the occurrence of security incidents increased 38 percent as reported in a survey of 10,000 security, IT, and executive personnel. Just as concerning, the attackers perpetrating these breaches were able to compromise the victim organization within a matter of minutes in 60 percent of cases.
Tags : 
cyber threats, security breaches, malware and vulnerabilities, internet security, security
    
Delta Risk
Published By: Tapinfluence     Published Date: Jun 07, 2016
In this eBook, based on a webinar by TapInfluence featuring PageFair and informed by data presented in PageFair and Adobe’s 2015 Ad Blocking Report, learn the eight facts you need to know about the state of ad blocking today so that you can make smart budget choices, reduce waste, and improve ROI tomorrow.
Tags : 
best practices, business optimization, business management
    
Tapinfluence
Published By: Oracle     Published Date: Jun 01, 2016
** White Paper Published By: Forrester Research, Inc. ** According to the July 2015 Forrester Research, Inc. report entitled "Brief: Oracle Commerce Gets the Cloud Treatment," nearly 73% of online retailers have already or plan to make a full or partial shift to using SaaS-based commerce technologies within two years.
Tags : 
    
Oracle
Published By: Pega     Published Date: May 25, 2016
The shift to digital business continues to gain momentum with no signs easing anytime soon. Smart organizations realize this and are accelerating investments in projects that put digital technologies at the center of their business models. The new requirements of digital transformation are forcing a major change in how companies evaluate and deploy Business Process Management (BPM) platforms and services. In “The Forrester Wave™: BPM Platforms For Digital Business, Q4 2015” report, the research organization used a 31 criteria evaluation process identifying the 12 most significant software providers in the category. Download this Forrester Wave report and gain insight regarding how well each vendor fulfills the criteria and where they stand in relation to each other to help enterprise architecture (EA) professionals select the right partner to manage their business’ critical content.
Tags : 
digital business, technology, best practices, forrester, enterprise
    
Pega
Published By: Pega     Published Date: May 25, 2016
Customer service is the cornerstone of a great customer experience. However, in today’s digital consumer age, organizations no longer decide how customer-centric their companies are, the customers do. According to the “The Forrester Wave™: Customer Service Solutions For Enterprise, Q4 2015” report, customer service technology investments are one of the top five most focused on investments that companies made in 2015. Why? Because good customer service boosts long-term loyalty. This report identifies the 11 most significant customer service solutions with Pegasystems ranking as a leader. Download this Forrester Wave report and get detailed findings on how well each vendor fulfills Forrester’s criteria and where they stand in relation to other vendor solutions in order to help customer service professionals select the right partner for their customer service initiatives.
Tags : 
best practices, customer service, forrester, wave report, technology
    
Pega
Published By: Pega     Published Date: May 25, 2016
Customer insights professionals face the challenging task of delivering contextually relevant experiences across the customer life cycle. They need to work with their business technology counterparts to integrate enterprise marketing technologies that manage customer data, provide real-time analytics and insights, and automate cross-channel interactions. Here is where Real-Time Interaction Management (RTIM) is critical, according to The Forrester Wave™: Real-Time Interaction Management, Q3 2015 report, which identified the 11 most significant technology providers in this space across 35 criteria. Forrester defines RTIM as “Enterprise marketing technology that delivers contextually relevant experiences, value, and utility at the appropriate moment in the customer life cycle via preferred customer touchpoints,” and identifies Pegasystems as one a leader in this very diversified pack. Download this Forrester Wave report to
Tags : 
interaction management, business technology, enterprise, forrester, best practices, pegasystems
    
Pega
Published By: Pega     Published Date: May 25, 2016
CRM Provides The Cornerstone Of A Great Customer Experience
Tags : 
best practices, competitive advantage, pegasystems, business practices
    
Pega
Published By: Puppet     Published Date: May 20, 2016
This July 2015 Forrester Report explores: - Why consistent, automated DevOps processes are essential to closing vulnerabilities and limiting exposure. - Practices, such as infrastructure as code and automated provisioning, for closing holes as soon as patches are available. - How DevOps and security professionals can work together to adopt DevSecOps.
Tags : 
    
Puppet
Published By: VMware AirWatch     Published Date: May 19, 2016
In Forrester’s 25-criteria evaluation of enterprise mobile management (EMM) vendors, we identified the 11 most significant EMM providers — AirWatch by VMware, BlackBerry, Citrix, Good Technology, IBM, Landesk, Microsoft, MobileIron, SAP, Sophos, and Soti — and analyzed their offerings. This report details our findings about how well each vendor fulfills our criteria and where they stand in relation to each other to help infrastructure and operations (I&O) professionals select the right partner for their enterprise mobile management.
Tags : 
mobile management, best practices, providers, vendors, enterprise
    
VMware AirWatch
Published By: VMware AirWatch     Published Date: May 18, 2016
VMware AirWatch gives enterprises identity, productivity and collaboration solutions through enterprise mobility management. The VMware AirWatch platform gives end users a seamless digital workspace, so they can be more effective on the go. A future-proof mobility platform enables IT to support business initiatives now and in the future with features: • Broadest OS and device support with same-day updates • Unified identity management framework across solutions • Suite of integrated productivity and collaboration apps • Centralized content management and collaboration • Global scalability with multi-tenant framework AirWatch offers a unique vision for identity, mobile, network and Infrastructure that is trusted by more than 16,000+ organizations, including 500 of the Global 2000, and has been positioned as a leader by Gartner in the 2015 Magic Quadrant for Enterprise
Tags : 
productivity, best practices, business intelligence, business management, information technology, device support, device management, content management
    
VMware AirWatch
Published By: illusive networks     Published Date: May 18, 2016
In 2015, the average cost of a data breach was $3.79 million, a 23% increase from 2013. While a data breach of just average magnitude could be enough to cripple numerous companies, there are still organizations failing to take the necessary cyber security precautions.
Tags : 
    
illusive networks
Published By: IBM     Published Date: May 17, 2016
Digital business requires organizations to improve customer, employee, and partner engagement and satisfaction in the midst of an explosion of information, devices and apps. Portal offerings must step up to meet escalating demands.
Tags : 
ibm, horizontal portals, magic quadrant, digital business, engagement, portal
    
IBM
Published By: Xactly     Published Date: May 11, 2016
Read on to discover how companies are designing and administering their sales compensation plans, and to get additional considerations and summary findings from Xactly analysts based on an analysis of the results.
Tags : 
sales, sales planning, business management
    
Xactly
Published By: SAP     Published Date: May 05, 2016
Leading experts share insights in new e-book from Accounts Payable News
Tags : 
sap, ariba, finance, purchase, pay, accounts payable
    
SAP
Published By: SAP Ariba     Published Date: May 05, 2016
Leading experts share insights in new e-book from Accounts Payable News
Tags : 
sap, ariba, finance, purchase, pay, accounts payable
    
SAP Ariba
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.