HIT Consultant Insightful coverage of healthcare innovation
 

2015

Results 151 - 175 of 558Sort Results By: Published Date | Title | Company Name
Published By: Aria Systems     Published Date: May 03, 2016
In Forrester’s 40-criteria evaluation of subscription billing platform solutions, we identified the eight most significant vendors in the category — Apttus, Aria Systems, Digital River, goTransverse, Recurly, SAP hybris, Vindicia, and Zuora — and researched, analyzed, and scored them. This report details our findings about how well each vendor fulfills our criteria and where they stand in relation to each other to help eBusiness professionals select the right partner as they seek to develop and support alternative business models for both existing and new products and services.
Tags : 
    
Aria Systems
Published By: Curalate     Published Date: May 03, 2016
By the end of 2015, millennials are set to overtake Baby Boomers as the largest living generation in the U.S. By 2017, they will carry the bulk of the spending power. The problem? This tech-savvy generation of consumers is also incredibly diverse. The key to effectively engaging millennials is recognizing that a “one-size-fits-all” strategy simply won’t cut it. In this guide, you’ll learn: - 14 influential millennial personas, from the “Brogrammer” to the “Millennial Mom”; - How to engage each of the 14 millennial personas through relevant imagery; - 5 proven ways to monetize your visual content across multiple marketing channels, from social to your website. Fill out the form to get your free guide, and start building lasting relationships with your millennial customers.
Tags : 
curalate, visual buyers, millenials, millenial personas, imagery, social media
    
Curalate
Published By: Cision     Published Date: May 02, 2016
The state of the media in 2015 was social, mobile and multiplatform. But as the way journalists engage with their audiences continues to evolve in the face of technological disruption, the most productive relationships between the media and communication professionals remain founded on the fundamentals which have always underpinned public relations best practices. Informed by a survey of 346 journalists, bloggers and influencers and supplemented with insights from Cision’s Media Research Team, Cision’s State of the Media 2016 Report takes a look back at the trends that shaped 2015 and anticipates the next public relations challenges.
Tags : 
cision, public relations, media, social, mobile, multiplatform
    
Cision
Published By: Act-On     Published Date: Apr 29, 2016
Traditionally, sales and marketing haven't always seen eye-to-eye. Our 2015 Sales and Marketing Alignment Survey clearly shows that in order to exceed revenue goals, outdated traditions need to change. In the eBook, we will show you the direct relationship between alignment and revenue performance and how the use of the right technologies will support business success.
Tags : 
market, management, marketing, business optimization, business strategies, sales, technology
    
Act-On
Published By: AdRoll     Published Date: Apr 28, 2016
Trends and benefits of re-targeting in the world's largest social network
Tags : 
facebook, targeting, social, impressions
    
AdRoll
Published By: IBM     Published Date: Apr 14, 2016
Ovum has produced this Ovum Decision Matrix to identify how the leading customer analytics vendors stack up against each other in terms of their technology, execution of strategy, and market impact.
Tags : 
ibm, ovum, ovum decision matrix, customer analytics solution, telcos, telecom
    
IBM
Published By: MuleSoft     Published Date: Apr 13, 2016
Today everything truly is connected to everything, and APIs are the connection mechanisms. Many companies are finding that their use of APIs has accelerated over the past 12 months, and that it will continue to accelerate during the next 12 months. APIs aren't really a new technology; they've actually been around for a long time. What is new is that they are in far broader usage today than they have been in the past. As of late 2015, the ProgrammableWeb API directory listed more than 14,000 APIs. When thinking about designing and managing APIs, a number of important questions arise. Why are APIs so well used and what effect would they have on your business? What is the impact of the expanding API economy on both providers and consumers? What are API tools and how can an investment in tools be an extremely cost efficient foundation for production grade API use cases?
Tags : 
best practices, business optimization, business management, application management, enterprise application, business intelligence, api management
    
MuleSoft
Published By: Coupa     Published Date: Apr 13, 2016
The Invoice Automation Navigator Report can assist in the initial selection of AP automation solutions. This report: Provides a comparative analysis of 10 leading solutions Provides a roadmap to the process of selecting a provider
Tags : 
    
Coupa
Published By: Coupa     Published Date: Apr 13, 2016
This analyst report compares eleven travel and expense management (TEM) solutions, including Concur, Chrome River and Coupa across over 100 criteria and scores them in eleven functional categories. Download your copy to determine the best fit for your organization.
Tags : 
    
Coupa
Published By: Cisco     Published Date: Apr 11, 2016
Cisco made Application Policy Infrastructure Controller Enterprise Module (APIC-EM) generally available on November 3rd, 2015. It is an SDN controller that supports apps that make WAN and access networks easier to deploy and manage. Cisco’s focus on a low-risk, incremental approach to adopting SDN will appeal to its user-base. Cisco needs to describe the policy control capabilities benefits of APIC-EM, and also highlight its power as a platform and its ability to distinguish apps from point solution offerings from many other companies with competitive features.
Tags : 
esg brief, cisco apic, sdn controller, wan, sdn
    
Cisco
Published By: Adobe     Published Date: Apr 11, 2016
A Adobe foi nomeada líder na Forrester Wave™: Plataformas de Experiências Digitais, segundo o relatório do último trimestre de 2015. Não importa o tamanho do seu negócio, a Adobe Marketing Cloud te dá o poder de entregar experiências individuais relevantes. Baixe o relatório para descobrir o que a Forrester tem a dizer sobre o que temos a oferecer.
Tags : 
adobe, experiências digitais, forrester
    
Adobe
Published By: IBM     Published Date: Apr 11, 2016
IBM’s 2015 annual February customer conference was a massive event combining multiple conferences of yesteryear. This EMA impact brief discusses IBM’s hybrid cloud strategy at a high level with particular focus on IBM’s latest announcements related to the PureApplication portfolio.
Tags : 
ibm, ibm pureapplication, ema, application platform
    
IBM
Published By: Cherwell Software     Published Date: Apr 07, 2016
ITSM tools automate the tasks and workflows associated with the management and delivery of quality IT services to the business. In its 2015 Magic Quadrant for IT Service Support Management Tools, Gartner compares 10 vendors on the vision and execution.
Tags : 
best practices, customer support, business intelligence, business optimization
    
Cherwell Software
Published By: Intel Security     Published Date: Apr 06, 2016
The SANS 2015 Incident Response survey results reveal an increasingly complex response landscape and the need for automation of processes and services to provide both visibility across systems and best avenues of remediation. Read this paper for coverage of these issues, along with best practices and sage advice.
Tags : 
siem, incident response, sans, continuous monitoring
    
Intel Security
Published By: Cisco     Published Date: Apr 04, 2016
This IDC study represents the vendor assessment model called the IDC MarketScape. This research is a quantitative and qualitative assessment of the characteristics that explain a vendor's success in the marketplace and help anticipate the vendor's ascendancy. The study assesses the capability and business strategy of 12 of the top enterprise wireless LAN (WLAN) vendors. This evaluation is based on a comprehensive framework and a set of parameters expected to be most conducive to success in providing enterprise WLAN solutions, during both the short term and the long term.
Tags : 
cisco systems, idc marketscape, worldwide enterprise wlan, vendor assessment, idc study, wlan solutions
    
Cisco
Published By: IBM     Published Date: Apr 04, 2016
IBM BigFix is recognized as a leader in Gartner's Magic Quadrant for the fourth year in a row. Despite being a relatively mature technology, new product capabilities and diverging vendor strategies make selecting a client management tool vendor as challenging as ever for end-user computing and support managers.
Tags : 
ibm, ibm bigfix, gartner, magic quadrant, client management tools
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
What truly affects the cost of a data breach? Ponemon Institute’s latest study of 350 organizations around the globe details both the cost and impact of data breaches, with breakdowns by industry and country.
Tags : 
ibm, data breach, global, ponemon institute
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
What truly affects the cost of a data breach? Ponemon Institute’s latest study of 350 organizations around the globe details both the cost and impact of data breaches, with breakdowns by industry and in the United States.
Tags : 
ibm, data breach, united states, ponemon institute
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
The Cyber Security Intelligence Index offers a high-level overview of the major threats to businesses worldwide over the past year.
Tags : 
ibm, cybersecurity, cybersecurity intelligence index, security threats
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
The 2015 C-Suite Cybersecurity Study "Securing the C-Suite - Cybersecurity Perspectives from the Boardroom and C-Suite". IBM conducted a survey of over 700 C-Suite executives - excluding the CISO - from 28 countries, across 18 industries - to understand any patterns, as well as any differing or aligning attitudes on cybersecurity. 60 percent of respondents are located in mature markets and 40 percent from emerging markets. Participants spanned traditional C-Suite roles, from CEOs and Board members to CFOs, Chief Risk Officers, CMOs, COOs, CHROs, Chief Compliance Officers and Legal Counsel. This report will cover: C-Suite views of the risks and actors - Is the C-Suite view versus reality aligned? IT and business alignment and collaboration - Who's engaged and who's not? The tone from the top on external collaboration and sharing of incident information. Characteristics of more "Cyber-Secure" companies based on C-Suite responses to what their organization has accomplished
Tags : 
ibm, c-suite study, cybersecurity
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
Discover how covert threats from the dark web can impact your network, and what you can do to protect your assets.
Tags : 
ibm, ibm x-force threat intelligence, threat intelligence, asset protection, threat management
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
"Title/Main headline: IBM X-Force Threat Intelligence Quarterly - 4Q 2015 Sub Headline: How can your organization better prepare for a security incident? Blurb: 2015 has been a challenging year as insider threats, malware, and stealthy and mutating attacks have affected the threat landscape. Read the latest security research from IBM X-Force to learn: How low-level attacks can mask stealthier infiltrations The benefits of regularly maintained security procedures and response plans When patterns of irregularities can be the first indicators of compromise Call to Action/Action Statement: ""Download Now"" as the action statement"
Tags : 
ibm, ibm x-force threat intelligence, threat intelligence, asset protection, threat management
    
IBM
Published By: Hewlett Packard Enterprise     Published Date: Mar 31, 2016
Cyberattacks are now a fact of life. Yet detection still lags. In 2015, the median amount of time attackers spent inside organizations before detection was 146 days. Why are we so vulnerable? MIT Technology Review asks Andrzej Kawalec, chief technology officer for HPE Security Services and Marshall Heilman, vice-president and executive director at Mandiant, a FireEye company, what we can do to make our systems more secure.
Tags : 
    
Hewlett Packard  Enterprise
Published By: IBM     Published Date: Mar 28, 2016
The rise of social media, coupled with the desire to build more engaged and productive workforces, has brought “active employee listening” to the forefront of management attention. No longer is it enough to encourage employees to speak up about topics that matter to them. Organizations today need to more actively solicit, analyze and engage in ongoing conversations with past, present and even future employees. Having access to the collective “employee voice” can help leaders achieve diverse goals, including identifying innovations, preventing discord and improving productivity, as well as building a better connection to the organization and its mission. So, how can organizations establish and manage mutually beneficial listening programs? To better understand what companies are doing in the area of employee listening and the extent to which employees are willing to participate, we analyzed data from the 2015 IBM Smarter Workforce Institute WorkTrends Survey – a broad-based survey of ov
Tags : 
ibm, ibm smarter workforce, work trends, employee engagement
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.