HIT Consultant Insightful coverage of healthcare innovation
 

aci

Results 576 - 600 of 2477Sort Results By: Published Date | Title | Company Name
Published By: Zendesk     Published Date: Dec 10, 2018
En el mercado global de software de atención al cliente, Zendesk nuevamente se destaca como líder en el Cuadrante mágico de CRM para centros de interacción con los clientes de Gartner 2018. Cada año, la firma Gartner lleva a cabo un análisis exhaustivo de los proveedores de servicio de atención al cliente y las aplicaciones de soporte. Creemos que el informe Cuadrante mágico de CRM para centros de interacción con los clientes de Gartner proporciona información valiosa para los líderes empresariales interesados en soluciones tecnológicas diseñadas para interactuar con sus clientes. Una vez más, Zendesk se destaca en el cuadrante de líderes del informe de 2018, algo que, para nosotros, refleja el éxito de nuestros 125.000 clientes, como Airbnb, Tesco y la Universidad de Tennessee. Solo el último año hemos conquistado varios avances importantes, como el lanzamiento de funciones de autoservicio impulsadas por tecnología de IA, hecho que nos ha permitido proyectar ingresos de más de $500 mi
Tags : 
    
Zendesk
Published By: FICO EMEA     Published Date: Sep 12, 2019
Hay una proliferación de métodos de pago que nos proporcionan formas más rápidas de hacer y recibir pagos, pero todos no son iguales. Entender las diferencias y características únicas de los diferentes tipos de pagos "rápidos" es crítico para los equipos encargados de velar por el fraude en las transacciones. Descargue nuestro whitepaper para entender: • Las diferencias entre las transacciones en tiempo real, los monederos electrónicos y los pagos de persona a persona • Las implicaciones que las transacciones “rápidas” tienen sobre el fraude • Cómo planificar su estrategia Anti-fraude en las transacciones en tiempo real
Tags : 
transacciones tiempo real, pagos en tiempo real, fraude, anti fraude, antifraude, blanqueo capitales, pagos p2p
    
FICO EMEA
Published By: Infor     Published Date: Mar 07, 2017
El objetivo de las operaciones de un almacén es dar una respuesta perfecta los pedidos: entregar exactamente lo que un cliente pide, a tiempo y con una eficiencia óptima. El módulo de almacenes de una solución de planificación de recursos empresariales (ERP – Enterprise Resources Management) puede ayudar a los almacenes más pequeños. Pero los módulos de gestión de almacenes de los ERP tienen limitaciones y, en el caso de empresas con operaciones más complejas, puede ser más inteligente optar por las capacidades adicionales de un sistema de gestión de almacenes avanzado (WMS, Warehouse Management System).
Tags : 
    
Infor
Published By: VMware Dell     Published Date: Jun 05, 2008
The First American Corporation is America’s largest provider of business information. Their numerous acquisitions and diverse lines of business meant that First American had multiple datacenters dispersed throughout the country. They turned to VMware virtualization technology to consolidate facilities. They standardized on VMware technology and avoided purchasing 700 physical machines.
Tags : 
server consolidation, server containment, desktop manageability, vmware infrastructure, vmware, green it, green
    
VMware Dell
Published By: Rackspace     Published Date: Aug 28, 2014
In this webinar an expert panel will examine the infrastructure needs of customer-facing applications by examining the challenges faced by businesses in the most demanding industries.
Tags : 
rackspace, cloud applications, customer service, consumer applications, ebusiness, data center, cloud computing, cloud hosting
    
Rackspace
Published By: ForgeRock     Published Date: Sep 02, 2014
Watch this Gigaom Research On-Demand Webinar ; we will examine the immediate need to extend identity to customer audiences, the risks of doing so using legacy software, and the most effective path businesses can take to build for the future while recognizing value today.
Tags : 
forgerock, api, customer service, crm, business intelligence, business data, access management, identity management
    
ForgeRock
Published By: ForgeRock     Published Date: Mar 10, 2015
In the modern age, customers are in control of when, where, and how they consume information. In this environment, customer-focused companies strive to make their content available to an ever-growing number of connected users and devices on a much larger scale than ever before, and to gather as much data and insight from these interactions as possible. To achieve this securely, companies need identity and access management (IAM) platforms that are adaptable, scalable, responsive, and high velocity— not typical characteristics of employee-facing IAM, but all too typical of other systems of engagement. This species of solution is worthy of a unique name: identity relationship management (IRM).
Tags : 
iam, irm, forrester, forgerock, platforms, relationship management
    
ForgeRock
Published By: VMTurbo     Published Date: Mar 25, 2015
Managing the Economics of Your Virtualized Data Center The average datacenter is 50% more costly than Amazon Web Services. As cloud economics threaten the long-term viability of on premise data centers, the survival of IT organizations rests solely in the ability to maximize the operational and financial returns of their existing infrastructure. You will survive, and this brand new whitepaper will help you to follow these 4 best practices: - Maximize the efficiency of your virtual data center. - Optimize workload placement within your clusters. - Reclaim unused server capacity. - And show your boss that this saves money.
Tags : 
datacenter costs, virtualized data center, amazon web services, cloud economics, server capacity
    
VMTurbo
Published By: Motorola Solutions     Published Date: Apr 26, 2019
In today’s competitive marketplace, an unexpected outage can easily lead to missed deadlines, frustrated customers, reduced orders, and debilitating long-term damage to your business. In the constant battle to minimize downtime and eliminate waste, a unified Team Communications platform can be an invaluable weapon. Motorola Solutions is here to help. Our Team Communications solution takes push-to-talk (PTT) beyond the boundaries of radio, allowing your employees to communicate instantly, from anywhere, and from any device, all while leveraging intelligence from a wide range of applications. Help your business succeed, keep your employees safe from harm, and ensure production lines remain in constant motion by connecting your entire facility with voice and data.
Tags : 
    
Motorola Solutions
Published By: Motorola Solutions     Published Date: Nov 29, 2018
In today’s competitive marketplace, an unexpected outage can easily lead to missed deadlines, frustrated customers, reduced orders, and debilitating long-term damage to your business. In the constant battle to minimize downtime and eliminate waste, a unified Team Communications platform can be an invaluable weapon. Motorola Solutions is here to help. Our Team Communications solution takes push-to-talk (PTT) beyond the boundaries of radio, allowing your employees to communicate instantly, from anywhere, and from any device, all while leveraging intelligence from a wide range of applications. Help your business succeed, keep your employees safe from harm, and ensure production lines remain in constant motion by connecting your entire facility with voice and data.
Tags : 
    
Motorola Solutions
Published By: Delta Risk     Published Date: Sep 21, 2016
Nowhere else could that wise advice be more relevant than in contemplating the effects of cyber attacks on financial institutions. As stated in a recent issue of the FDIC’s Supervisory Insights, the risks presented by cyber attacks have become “one of the most critical challenges [in the last decade] facing the financial services sector due to the frequency and increasing sophistication of cyber attacks.” In just a year’s time, from 2014 to 2015, the occurrence of security incidents increased 38 percent as reported in a survey of 10,000 security, IT, and executive personnel. Just as concerning, the attackers perpetrating these breaches were able to compromise the victim organization within a matter of minutes in 60 percent of cases.
Tags : 
cyber threats, security breaches, malware and vulnerabilities, internet security, security
    
Delta Risk
Published By: LogRhythm     Published Date: Apr 04, 2017
The third-annual Cyberthreat Defense Report pursues this same objective: to inform the IT security community not so much about what the bad guys are up to, but rather about how their peers globally are currently defending against threats and the changes they expect to make going forward. Based on a rigorous survey of IT security decision makers and practitioners – across not only North America and Europe, but for the first time, in Asia Pacific and Latin America as well – the Cyberthreat Defense Report examines the current and planned deployment of countermeasures against the backdrop of numerous perceptions.
Tags : 
    
LogRhythm
Published By: Palo Alto Networks     Published Date: Apr 25, 2017
Cyber criminals constantly innovate their threat tactics to more efficiently breach organizations and make off with valuable data. As cybercrime evolves, we see increased innovation in the hacking tools and techniques used to evade known security mechanisms. In the past few years, we have seen more advanced, targeted attacks, where hackers spent ample time investigating the target and tailoring the threat. Keeping up with new attack techniques, and effectively defending against advanced threats, is perhaps the biggest challenge facing security teams today. In a world of cyberthreats where the only constant is change, architecting a cybersecurity solution that dynamically adapts to constant change is crucial.
Tags : 
    
Palo Alto Networks
Published By: Delta Risk     Published Date: Jun 07, 2016
Nowhere else could that wise advice be more relevant than in contemplating the effects of cyber attacks on financial institutions. As stated in a recent issue of the FDIC’s Supervisory Insights, the risks presented by cyber attacks have become “one of the most critical challenges [in the last decade] facing the financial services sector due to the frequency and increasing sophistication of cyber attacks.” In just a year’s time, from 2014 to 2015, the occurrence of security incidents increased 38 percent as reported in a survey of 10,000 security, IT, and executive personnel. Just as concerning, the attackers perpetrating these breaches were able to compromise the victim organization within a matter of minutes in 60 percent of cases.
Tags : 
cyber threats, security breaches, malware and vulnerabilities, internet security, security
    
Delta Risk
Published By: Group M_IBM Q119     Published Date: Feb 25, 2019
The advantages blockchain can bring to the automotive ecosystem, both in facilitating collaboration among participants and enabling capabilities for new mobility business models, have gotten the attention of automotive executives. In addition to enabling a single source of data, blockchain can facilitate device-to-device transactions, smart contracts, and real-time processing and settlement. For the automotive industry, this translates into improvements and operational efficiencies in areas such as supply chain transparency, financial transactions between ecosystem participants, authenticating access to cars, and customer experience and loyalty.
Tags : 
    
Group M_IBM Q119
Published By: Group M_IBM Q3'19     Published Date: Jun 24, 2019
The advantages blockchain can bring to the automotive ecosystem, both in facilitating collaboration among participants and enabling capabilities for new mobility business models, have gotten the attention of automotive executives. In addition to enabling a single source of data, blockchain can facilitate device-to-device transactions, smart contracts, and real-time processing and settlement. For the automotive industry, this translates into improvements and operational efficiencies in areas such as supply chain transparency, financial transactions between ecosystem participants, authenticating access to cars, and customer experience and loyalty.
Tags : 
    
Group M_IBM Q3'19
Published By: Aerohive     Published Date: May 13, 2015
This paper aims to facilitate understanding and addressing IT’s dilemma in a bring your own device (BYOD) world.
Tags : 
mobile computing, the increase in mobile workers, byod policy implications for it
    
Aerohive
Published By: HP Data Center     Published Date: Mar 25, 2009
Data centers are large, important investments that, when properly designed, built, and operated, are an integral part of the business strategy driving the success of any enterprise. Yet the central focus of organizations is often the acquisition and deployment of the IT architecture equipment and systems with little thought given to the structure and space in which it is to be housed, serviced, and maintained.
Tags : 
hp data center, data center, optimization, business strategy, hot spots, mission critical loads”, the it infrastructure, the availability
    
HP Data Center
Published By: Citrix     Published Date: Nov 14, 2016
Watch this Datacenter Automation on-demand webinar with Citrix NetScaler and Cisco ACI, featuring Sr. Solutions Marketing Manager, Cisco – Ravi Balakrishnan.
Tags : 
cisco, citrix, citrix netscaler, cisco aci, datacenter automation
    
Citrix
Published By: CenturyLink Technology Solutions     Published Date: Sep 02, 2014
With core competencies like security, facility management, and carrier access, CenturyLink provides comprehensive global colocation services that extend your infrastructure into a more efficient virtual environment.
Tags : 
centurylink, data center, colocation, infrastructure, facility management
    
CenturyLink Technology Solutions
Published By: CenturyLink     Published Date: Jan 02, 2015
With core competencies like security, facility management, and carrier access, CenturyLink provides comprehensive global colocation services that extend your IT infrastructure into a more efficient virtual environment. You manage your own hardware, software, and applications to maintain complete control while gaining the cost and growth benefits of colocation.
Tags : 
data center build, facility management, carrier access, global colocation services
    
CenturyLink
Published By: Panduit     Published Date: Nov 28, 2018
If you’re looking to build, expand, or modernize your facility with converged physical infrastructure solutions, be sure to download our cheat sheet Key Questions to Ask a Prospective Converged Physical Infrastructure Solutions Vendor.
Tags : 
panduit, colocation, converged infrastructure
    
Panduit
Published By: Intel Corp.     Published Date: Apr 25, 2012
Learn about strategies to optimize compute performance in data center facing power and cooling constraints to improve data center efficiency.
Tags : 
cloud, cloud computing, planning, intel, data center, unified networking, scaled-out storage, server pools
    
Intel Corp.
Published By: Cyxtera     Published Date: Jan 23, 2019
Download the new white paper from Cyxtera that provides a data center evaluation checklist to ensure you cover all selection criteria as you tour various facilities.
Tags : 
cyxtera, data centers, colocation, data center management, it infrastructure
    
Cyxtera
Published By: QTS Data Centers     Published Date: May 02, 2017
The Internet boom of the late 90s and early 2000s launched a mass migration of enterprises seeking the benefits of IT outsourcing. The emergence of virtualized infrastructure and cloud computing created a new business landscape of opportunities along with escalating challenges in capacity and complexity.
Tags : 
    
QTS Data Centers
Start   Previous    17 18 19 20 21 22 23 24 25 26 27 28 29 30 31    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.