HIT Consultant Insightful coverage of healthcare innovation
 

2015

Results 251 - 275 of 560Sort Results By: Published Date | Title | Company Name
Published By: Okta     Published Date: Jul 01, 2015
Gartner has named Okta as the only leader in its 2015 Identity & Access Management as a Service (IDaaS) Magic Quadrant. Access your complimentary Gartner report today.
Tags : 
mobile, apps, mobile apps, s&r, fraud, okta
    
Okta
Published By: Okta     Published Date: Aug 12, 2015
Gartner has named Okta as the only leader in its 2015 Identity & Access Management as a Service (IDaaS) Magic Quadrant. Access your complimentary Gartner report today.
Tags : 
    
Okta
Published By: Marketo     Published Date: Nov 23, 2015
CRM lead management matures amid strong user interest and a more complex vendor environment.
Tags : 
marketo, gartner, magic quadrant, crm, lead management, b2b
    
Marketo
Published By: Marketo     Published Date: Dec 14, 2015
Read this complimentary copy of the Gartner Magic Quadrant for CRM Lead Management, and find out why Marketo was named a leader based on completeness of vision and the ability to execute.
Tags : 
marketo, gartner, magic quadrant, crm, lead management, b2b
    
Marketo
Published By: Marketo     Published Date: Aug 04, 2016
Read this complimentary copy of the Gartner Magic Quadrant for CRM Lead Management, and find out why Marketo was named a leader based on completeness of vision and the ability to execute.
Tags : 
marketo, gartner, magic quadrant, crm, lead management, b2b
    
Marketo
Published By: Altiscale     Published Date: May 28, 2015
Big Data technologies are maturing and quickly moving into the next phase - one that expands in data use-cases as Hadoop moves into more influential roles throughout IT infrastructures. In this just-released report, Gartner is recognizing four Big Data vendors as "cool." Gartner says these vendors can meaningfully and synergistically combine multiple types of functionality.
Tags : 
big data, vendors, functionality, cool vendors, consistent performance, it management, data management; add - gartner, hadoop
    
Altiscale
Published By: Waterline Data & Research Partners     Published Date: Jun 15, 2015
Information governance and master data management initiatives are complex and require participation from a broad range of enterprise constituents. We focus on five small and innovative vendors that may help information managers reach their information governance and MDM goals.
Tags : 
vendors, governance, information, mdm, management
    
Waterline Data & Research Partners
Published By: MobileIron     Published Date: May 07, 2018
Enterprises and users continue to be concerned about mobile apps and mobile malware because they have been trained by legacy antivirus software packages. Look for a known malware file and remove it. The issue with this logic on mobile devices is the mobile operating systems evolve and add features very rapidly. The mobile operating systems add millions of lines of code in a year and therefore introduce unintended consequences, bugs and vulnerabilities. In 2017, there were more CVEs registered for Android and iOS than all of 2016 and 2015 combined. In 2017 there were 1229 CVEs awarded. Over half of these CVEs that received scores of 7 or greater indicated that the vulnerabilities are severe and exploitable. This trend is expected to continue as the mobile operating systems mature and more features are added.
Tags : 
global, threat, report, mobile, malware, software, antivirus
    
MobileIron
Published By: New Relic     Published Date: Apr 07, 2015
Enterprises from industries of all shapes and sizes are increasingly migrating to the cloud, and for good reason. Here’s why we believe having a cloud strategy in 2015 is not only going to be a key business initiative, but a business imperative as well.
Tags : 
    
New Relic
Published By: Aerohive     Published Date: Jun 15, 2015
Ce document apporte des conseils permettant d’évaluer les réseaux Wi-Fi d’entreprise grâce à l’étude des exigences clés, des considérations de l’architecture, des 10 éléments inhérents à un réseau Wi-Fi et de l’utilisation du processus DDP pour sélectionner un fournisseur.
Tags : 
wi-fi, wlan, wlan networks, networks, technology, wlan architectures, wlan traffic, enterprise wlan networks, evaluate enterprise wlan networks
    
Aerohive
Published By: Infor     Published Date: Mar 07, 2017
En 2015, la mayoría de los fabricantes obtuvieron unos modestos niveles de rentabilidad debido a los bajos precios de los productos básicos y a la inflación salarial. Este entorno dio lugar a que se empezara a considerar el rol que las nuevas tecnologías ”disruptivas” podrían tener en las empresas manufactureras y posibles estrategias de inversión.
Tags : 
software, manufacturing software
    
Infor
Published By: SmartFocus     Published Date: May 27, 2015
Your customer wants a personalized and relevant experience, with every interaction, tailored around THEIR location, activity and device. Are you delivering that? In a recent webinar hosted by Forrester Research Inc and SmartFocus they discuss taking personalization to the next level with context-aware marketing - the emerging theme of 2015 that is changing the way we do marketing.
Tags : 
forrester, mobile, marketing, personalization, contextualization, customer journey, customer behavior, customer experience, customer engagement, customer relationships, marketing strategy, campaigns.
    
SmartFocus
Published By: F5 Networks Inc     Published Date: Dec 08, 2017
The NSA’s Information Assurance Directorate left many people scratching their heads in the winter of 2015. The directive instructed those that follow its guidelines to postpone moving from RSA cryptography to elliptic curve cryptography (ECC) if they hadn’t already done so. “For those partners and vendors that have not yet made the transition to Suite B elliptic curve algorithms, we recommend not making a significant expenditure to do so at this point but instead to prepare for the upcoming quantum-resistant algorithm transition.” The timing of the announcement was curious. Many in the crypto community wondered if there had been a quantum computing breakthrough significant enough to warrant the NSA’s concern. A likely candidate for such a breakthrough came from the University of New South Wales, Australia, where researchers announced that they’d achieved quantum effects in silicon, which would be a massive jump forward for quantum computing.
Tags : 
quantum computing, quantum, computing, browser encryption. encryptionm
    
F5 Networks Inc
Published By: Netsuite DWASF Leads Display Q1 2015     Published Date: Oct 06, 2015
A detailed TCO evaluation shows cloud-based solutions can deliver significant savings compared to on-premises business applications.
Tags : 
mid-market enterprises, small business, cloud-based solutions, tco benefits, cloud computing, business applications
    
Netsuite DWASF Leads Display Q1 2015
Published By: Dell     Published Date: Jan 26, 2015
Infrastructure and operations leaders must create a strategy and budget to outfit workers with devices, software, and services to improve their productivity. Additionally, I&O leaders play a critical role in both the strategy and budgetary support of customer-facing interaction technologies. This report helps you benchmark your organization against your peers as you work with business partners to develop and implement technology strategies that drive business results for your company. Read this Forrester Research report, offered compliments of Dell, for more information on strategies to devise the right technology fits for your organizational needs.
Tags : 
dell, windows, workforce, customer facing technology, infrastructure, operations, software, productivity
    
Dell
Published By: Microsoft Dynamics     Published Date: Oct 05, 2015
CSO Insights analysts gathered 100+ metrics from 1,500+ sales executives to develop insights on three key areas: • the challenges facing their sales teams • why those problems exist • how they are successfully reengineering their teams to overcome those challenges Based on this data, the whitepaper How to Build a World-Class Sales Organization clearly outlines how to increase productivity and collaboration so reps can spend more time selling.
Tags : 
sales strategies, sales performance, sales performance management, sales organization, sales effectiveness, sales efficiency, how to increase sales, how to improve sales, how to boost sales, how to improve sales performance, how to grow sales, improve sales performance, improving sales performance, improving sales, increase in sales, increase sales performance, ways to improve sales, ways to increase sales, sales closing techniques, closing sales
    
Microsoft Dynamics
Published By: MuleSoft     Published Date: Apr 13, 2016
Today everything truly is connected to everything, and APIs are the connection mechanisms. Many companies are finding that their use of APIs has accelerated over the past 12 months, and that it will continue to accelerate during the next 12 months. APIs aren't really a new technology; they've actually been around for a long time. What is new is that they are in far broader usage today than they have been in the past. As of late 2015, the ProgrammableWeb API directory listed more than 14,000 APIs. When thinking about designing and managing APIs, a number of important questions arise. Why are APIs so well used and what effect would they have on your business? What is the impact of the expanding API economy on both providers and consumers? What are API tools and how can an investment in tools be an extremely cost efficient foundation for production grade API use cases?
Tags : 
best practices, business optimization, business management, application management, enterprise application, business intelligence, api management
    
MuleSoft
Published By: Amazon Web Services     Published Date: Oct 09, 2017
As easy as it is to get swept up by the hype surrounding big data, its just as easy for organisations to become discouraged by the challenges they encounter while implementing a big data initiative. Concerns regarding big data skill sets (and the lack thereof), security, the unpredictability of data, unsustainable costs, and the need to make a business case can bring a big data initiative to a screeching halt. However, given big data's power to transform business, it's critical that organisations overcome these challenges and realise the value of big data. The cloud can help organisations to do so. Drawing from IDG's 2015 Big Data and Analytics Survey, this white paper analyses the top five challenges companies face when undergoing a big data initiative and explains how they can effectively overcome them.
Tags : 
amazon, web services, intel, migration, data warehousing, organization optimization, security, software
    
Amazon Web Services
Published By: Limelight     Published Date: Feb 16, 2018
DDoS attacks have long been known as the main form of cyber attack risk. “The Financial Inspection Manual” revised by the Japanese government’s Financial Services Agency in April 2015, identifies the risk of "DDoS attacks", and the need to take countermeasures is strongly emphasized. Other government agencies also acknowledge the frequency and severity of DDoS attacks. However, a clear method to completely prevent DDoS attacks has not been established yet. Why is that? What are the best measures that companies can take at the present time?
Tags : 
content delivery network, cybersecurity, ddos, waf, web application firewall, cdn, distributed denial of serivde, cloud security, ddos attack, digital rights management, drm
    
Limelight
Published By: HP     Published Date: Nov 05, 2014
Microsoft® will end support for Windows® Server 2003/R2 on July 14, 2015. This can have a dramatic impact on your business, because without any more updates or patches from Microsoft, your organization’s infrastructure will be less stable and secure. HP can help you to make a smooth migration to Microsoft Windows Server 2012 and to private cloud solutions built on HP Converged Infrastructure and Microsoft System Center, HP has created a Microsoft Virtualization and Cloud Center of Excellence.
Tags : 
technology services, microsoft windows, microsoft migrations, stabilize infrastructure, secure infrastructure, compliance, detection systems, migrations
    
HP
Published By: IBM     Published Date: Apr 04, 2016
The 2015 C-Suite Cybersecurity Study "Securing the C-Suite - Cybersecurity Perspectives from the Boardroom and C-Suite". IBM conducted a survey of over 700 C-Suite executives - excluding the CISO - from 28 countries, across 18 industries - to understand any patterns, as well as any differing or aligning attitudes on cybersecurity. 60 percent of respondents are located in mature markets and 40 percent from emerging markets. Participants spanned traditional C-Suite roles, from CEOs and Board members to CFOs, Chief Risk Officers, CMOs, COOs, CHROs, Chief Compliance Officers and Legal Counsel. This report will cover: C-Suite views of the risks and actors - Is the C-Suite view versus reality aligned? IT and business alignment and collaboration - Who's engaged and who's not? The tone from the top on external collaboration and sharing of incident information. Characteristics of more "Cyber-Secure" companies based on C-Suite responses to what their organization has accomplished
Tags : 
ibm, c-suite study, cybersecurity
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
The 2015 C-Suite Cybersecurity Study "Securing the C-Suite - Cybersecurity Perspectives from the Boardroom and C-Suite". IBM conducted a survey of over 700 C-Suite executives - excluding the CISO - from 28 countries, across 18 industries - to understand any patterns, as well as any differing or aligning attitudes on cybersecurity. 60 percent of respondents are located in mature markets and 40 percent from emerging markets. Participants spanned traditional C-Suite roles, from CEOs and Board members to CFOs, Chief Risk Officers, CMOs, COOs, CHROs, Chief Compliance Officers and Legal Counsel. This report will cover: C-Suite views of the risks and actors - Is the C-Suite view versus reality aligned? IT and business alignment and collaboration - Who's engaged and who's not? The tone from the top on external collaboration and sharing of incident information. Characteristics of more "Cyber-Secure" companies based on C-Suite responses to what their organization has accomplished
Tags : 
ibm, security, maturity, c suite, cybersecurity
    
IBM
Published By: IBM     Published Date: Jan 06, 2016
PureApplication Enterprise Grade System, Service, and Software Options
Tags : 
hybrid cloud, ibm, software options, cloud strategy, enterprise
    
IBM
Published By: IBM     Published Date: Apr 11, 2016
IBM’s 2015 annual February customer conference was a massive event combining multiple conferences of yesteryear. This EMA impact brief discusses IBM’s hybrid cloud strategy at a high level with particular focus on IBM’s latest announcements related to the PureApplication portfolio.
Tags : 
ibm, ibm pureapplication, ema, application platform
    
IBM
Published By: IBM     Published Date: Jan 07, 2016
IBM Executive Summary: 2015 CISO Insights Study: From Checkboxes to Frameworks. Identifying How Firms Manage Cybersecurity Investment.
Tags : 
ibm, ciso, insight, cybersecurity
    
IBM
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.