HIT Consultant Insightful coverage of healthcare innovation
 

2015

Results 351 - 375 of 559Sort Results By: Published Date | Title | Company Name
Published By: Adobe     Published Date: Apr 03, 2015
Understanding which customer experiences and touchpoints are driving the best results can be hard. Adobe can help. The new eMarketer report, Omnichannel Trends 2015: Mobile is the New Retail Hub, exposes the importance of utilizing omnichannel (cross-channel) marketing to effectively reach, engage, and convert your customers. Read the report to learn: • The seven most important trends you’ll face this year • How retailers are dealing with the obstacles of cross-channel practices • Why smartphones are becoming the new retail hub
Tags : 
customer experience, personalization, mobile, retail, adobe, marketing, trends, cross-channel, smartphones
    
Adobe
Published By: Adobe     Published Date: Jun 03, 2015
Understanding which customer experiences and touchpoints are driving the best results can be hard. Adobe can help. The new eMarketing report, Omnichannel Trends 2015: Mobile is the New Retail Hub, exposes the importance of utilizing omnichannel (cross-channel) marketing to effectively reach, engage, and convert your customers.
Tags : 
adobe, mobile, retail, trends, device, sps, rsr, omnichannel, innovation, strategies
    
Adobe
Published By: Coupa     Published Date: Mar 07, 2016
The Hackett Group's 2015 e-invoicing poll reveals the ups and downs of e-einvoicing adoption. Benefits include a 42% reduction in the number of paper invoices and a 31% decrease in costs. But many struggle with the supplier onboarding process. This paper explores the challenges and provides recommendations for improving the process.
Tags : 
    
Coupa
Published By: Hewlett Packard Enterprise     Published Date: Mar 31, 2016
Cyberattacks are now a fact of life. Yet detection still lags. In 2015, the median amount of time attackers spent inside organizations before detection was 146 days. Why are we so vulnerable? MIT Technology Review asks Andrzej Kawalec, chief technology officer for HPE Security Services and Marshall Heilman, vice-president and executive director at Mandiant, a FireEye company, what we can do to make our systems more secure.
Tags : 
    
Hewlett Packard  Enterprise
Published By: Location3     Published Date: Aug 31, 2018
When we released our first white paper in February 2015 discussing the ways multi-location businesses were using online media to drive in-store visits, most of the strategic opportunities being leveraged by marketers revolved around using things like promotional coupons, beacons and other tactics. While those methods certainly provided incremental lift in in-store traffic and revenue, there existed a number of gaps in connecting online data associated with promotional efforts, to data that indicated a customer actually converted offline at a business location. At press time for our original “online-to-offline” white paper, digital industry giants were still very much in the early stages of evaluating data points that signified offline customer conversions. Many of these “conversions” were somewhat implied (i.e. Clicks on “Get Directions” link), while others were a bit more reliable in signifying in-store visits and purchases made by consumers (i.e. downloadable coupon redeemed in-store
Tags : 
marketing, local marketing, franchise, franchisor, digital marketing, online to offline, multi-location businesses, store visits, cross channel analytics
    
Location3
Published By: NetApp     Published Date: Jan 21, 2014
When your industry’s revenue projections flatten, how can you break away and continue to grow? Learn how Orange Business Services leveraged NetApp storage to reinvent their company by becoming a cloud services provider and exceeded their revenue goals of zero to €500 million by 2015.
Tags : 
cloud services, revenue projections, business growth, cloud provider
    
NetApp
Published By: NetApp     Published Date: Feb 19, 2015
When your industry’s revenue projections flatten, how can you break away and continue to grow? Learn how Orange Business Services leveraged NetApp storage to reinvent their company by becoming a cloud services provider and exceeded their revenue goals of zero to €500 million by 2015.
Tags : 
    
NetApp
Published By: NetApp     Published Date: Dec 17, 2013
When your industry’s revenue projections flatten, how can you break away and continue to grow? Learn how Orange Business Services leveraged NetApp storage to reinvent their company by becoming a cloud services provider and exceeded their revenue goals of zero to €500 million by 2015.
Tags : 
storage, it services, cloud computing, public cloud, hybrid cloud, best practices, technology, data management, multiple cloud
    
NetApp
Published By: NetApp     Published Date: Jan 21, 2014
Quando as projeções de receita de seu setor caem, como você pode escapar e continuar crescendo? Saiba como a Orange Business Services aproveita o storage da NetApp para se reinventar, tornando-se um fornecedor de serviços em nuvem e superando sua ambiciosa meta de receita de nuvem de € 500 milhões até 2015.
Tags : 
    
NetApp
Published By: Intralinks     Published Date: Oct 14, 2015
This report focuses on the use of CFSS tools in the workplace, the problems that their use causes, and it offers several recommendations as well as data from an in-depth survey on file-sharing practices conducted by Osterman Research during July 2015.
Tags : 
osterman, enterprise, file sync, share solutions, file-share, cfss, efss
    
Intralinks
Published By: Intralinks     Published Date: Nov 23, 2015
This report focuses on the use of CFSS tools in the workplace, the problems that their use causes, and it offers several recommendations as well as data from an in-depth survey on file-sharing practices conducted by Osterman Research during July 2015.
Tags : 
osterman, enterprise, file sync, share solutions, file-share, cfss, efss
    
Intralinks
Published By: Delphix     Published Date: Jun 27, 2014
ICD-10 migration projects can make even the Y2K projects of the 90s look small. As the October 2015 deadline looms, the stakes are high as IT teams fight delays and cost overruns. See why 40% of the top healthcare payers in the US use Delphix to improve their time-to-market and implement ICD-10.
Tags : 
icd-10, migration, projects, healthcare payers, time-to-market
    
Delphix
Published By: IBM     Published Date: Dec 10, 2015
Ovum has produced this Ovum Decision Matrix to identify how the leading customer analytics vendors stack up against each other in terms of their technology, execution of strategy, and market impact.
Tags : 
    
IBM
Published By: IBM     Published Date: Apr 14, 2016
Ovum has produced this Ovum Decision Matrix to identify how the leading customer analytics vendors stack up against each other in terms of their technology, execution of strategy, and market impact.
Tags : 
ibm, ovum, ovum decision matrix, customer analytics solution, telcos, telecom
    
IBM
Published By: OutSystems     Published Date: Oct 12, 2015
The Ovum Decision Matrix: Selecting a Mobile App Development Platform Solution highlights what companies should be looking for in a MADP solution. Given the amount of time, energy, money, anxiety, and attention that is being aimed at enterprise mobility right now, this report is quite timely.
Tags : 
outsystems, ovum, madp, mobile app, application development, ovum decision matrix, platform
    
OutSystems
Published By: CA Technologies     Published Date: Apr 06, 2017
A number of high-profile security breaches over the last two years have highlighted the damage that a rogue systems administrator or stolen privileged credentials can cause. Today, fewer than half of all business organizations have deployed the type of privileged identity management (PIM) solution that could help improve the situation. This Ovum Decision Matrix (ODM) provides an in-depth view of the leading PIM solutions that are available to deal with these issues. It compares their technology, the market position each vendor has achieved, their ability to execute, and the overall maturity of each offering.
Tags : 
data assets, risk management, it security, session management, authentication management, security intelligence, information management, infrastructure management, database platforms, account management
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 01, 2018
Within any organization, the most dangerous users are those with privileged access to the company’s most valuable and sensitive data assets. This includes systems administrators, business managers, partners, suppliers, and service providers, and also takes into account the automated interactions between business machines, systems, and applications. Privileged access has always been a high-risk issue, but for too long, organizations have not understood or have chosen to ignore the risks, preferring instead to rely on the integrity of the individuals and systems involved. A number of high-profile security breaches over the last two years have highlighted the damage that a rogue systems administrator or stolen privileged credentials can cause. Today, fewer than half of all business organizations have deployed the type of privileged identity management (PIM) solution that could help improve the situation. This Ovum Decision Matrix (ODM) provides an in-depth view of the leading PIM solution
Tags : 
    
CA Technologies
Published By: Entrust Datacard     Published Date: Oct 24, 2016
Today, mobility is no longer a trend. It’s the new reality — and it is reshaping the enterprise. Gone are the days of employees tethered to desktop computers, and they’re no longer dependent on an Ethernet or wi-fi connection to work remotely. More and more enterprise employees are conducting daily work transactions on mobile devices. Mobility surged to 1.3 billion workers in 2015, continuing a 33 percent growth trend since 2010. These mobile workers aren’t limiting themselves to a single device, either. In just the last year, the number of devices managed by enterprises grew an incredible 72 percent.
Tags : 
    
Entrust Datacard
Published By: Dell     Published Date: Feb 04, 2015
Migrating your enterprise to a modern Microsoft® Windows® operating system is a complex process that can strain IT resources. That’s why Dell is focused on helping customers meet the deadline of the decade: On 14 July 2015 support for Windows 2003 will cease. The strategic value to efficient Windows migration is application, hardware and deployment readiness.
Tags : 
dell, windows, microsoft, modernization, management, modernization, server, 2003, 2012, support, services, efficiency, cost, platforms, future, mobility, standardization, transformation, challenges, applications
    
Dell
Published By: Webroot Inc     Published Date: Aug 01, 2015
PassMark Software® conducted objective performance testing on eight (8) security software products, on Windows 8.1 (64-bit) during July and August 2015. This report presents our results and findings as a result of performance benchmark testing conducted for these endpoint security products. The aim of this benchmark was to compare the performance impact of Webroot’s SecureAnywhere Business Endpoint Protection product with seven (7) competitor products. Testing was performed on all products using 13 performance metrics, including: installation time, boot time, CPU Usage, Memory Usage, Browse Time and many others. Does your endpoint security measure up?
Tags : 
endpoint performance, software security, endpoint security products, performance metrics
    
Webroot Inc
Published By: Coupa Software     Published Date: Oct 05, 2015
The Invoice Automation Navigator Report can assist in the initial selection of AP automation solutions. This report: - Provides a comprehensive analysis of 10 solution providers - Provides a roadmap to the process of selecting a provider
Tags : 
automation solution, paystream, rfp
    
Coupa Software
Published By: Alert Logic and Rackspace     Published Date: Jun 20, 2014
With large data breaches affecting retailers in 2013 and the PCI DSS 3.0 January 1, 2015 deadline approaching, the Payment Card Industry Data Security Standard (PCI DSS) is an important topic for many organizations in 2014. PCI DSS requirements can be challenging to meet from a time, resources and cost perspective. Requirements 6, 10 and 11 can be some of the most costly and resource intensive, requiring log management, vulnerability assessment, intrusion detection and a web application firewall. Alert Logic delivers solutions to meet these and other PCI DSS requirements. As the security industry’s only provider of on-demand log management, threat management, web application security, and IT compliance automation solutions, Alert Logic provides organizations with the easiest and most affordable way to secure their networks and comply with policies and regulations.
Tags : 
alert logic, rackspace, pci, dss, data breaches, log management, it compliance, automation solutions
    
Alert Logic and Rackspace
Published By: Alert Logic and Sungard Availability Services     Published Date: Jun 20, 2014
With large data breaches affecting retailers in 2013 and the PCI DSS 3.0 January 1, 2015 deadline approaching, the Payment Card Industry Data Security Standard (PCI DSS) is an important topic for many organizations in 2014. PCI DSS requirements can be challenging to meet from a time, resources and cost perspective. Requirements 6, 10 and 11 can be some of the most costly and resource intensive, requiring log management, vulnerability assessment, intrusion detection and a web application firewall. Alert Logic delivers solutions to meet these and other PCI DSS requirements. As the security industry’s only provider of on-demand log management, threat management, web application security, and IT compliance automation solutions, Alert Logic provides organizations with the easiest and most affordable way to secure their networks and comply with policies and regulations.
Tags : 
alert logic, sungard, pci, dss, data breaches, log management, it compliance, automation solutions
    
Alert Logic and Sungard Availability Services
Published By: HP Ecommerce     Published Date: Aug 05, 2015
This July 2015 Forrester Research report is provided compliments of HP. Modern application delivery leaders realize that their primary goal is to deliver value to the business and its customers, faster. For many, this is a significant shift from the past, when they primarily focused on cost control and efficiency. Today, they must connect the work they do and the results they produce to business outcomes. To do this, application development and delivery (AD&D) leaders use a new set of metrics that help them monitor and improve the value they deliver, based on feedback from business partners and customers. In this report, we highlight these new metrics that connect business outcomes to app delivery performance — as well as the practices and tools that modern application delivery teams and their AD&D leaders use to collect and report them.
Tags : 
    
HP Ecommerce
Published By: Cyveillance     Published Date: Apr 06, 2015
In this white paper, we examine notable trends and events in physical security from 2014 and assess what security professionals should expect in 2015. 2014 was truly an unpredictable year in the physical security and executive protection worlds, as large scale events targeted for disruption were executed relatively smoothly, while unforeseen developments in Ukraine and the Ebola outbreak caught many off guard. Looking ahead to 2015, we predict that local issues will continue to gain global importance, threat actors and activists will find new ways to utilize social media to spread their messages, and the lines between physical and digital threats will continue to converge. We also highlight ongoing developments in France, Mexico, Ukraine, and Germany.
Tags : 
information security threat, information security, protection, security breach, internet security
    
Cyveillance
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.