HIT Consultant Insightful coverage of healthcare innovation
 

act

Results 14126 - 14150 of 14578Sort Results By: Published Date | Title | Company Name
Published By: Schneider Electric     Published Date: Apr 23, 2019
Manufacturing presents one of the largest opportunities for seizing the value of IoT integration — and among the fastest to adopt IoT solutions. Manufacturers see IoT as an improvement to help manage the large number of assets involved in manufacturing and to reduce the time it takes to make products. Still, many wonder what value IoT can actually bring their business. This interactive eBook from IDC and Schneider Electric identifies the top reasons to invest in IoT, and how to ensure manufacturers get the most out of their investments.
Tags : 
smart manufacturing, iot, digital
    
Schneider Electric
Published By: Engine Ready     Published Date: Sep 16, 2008
If your company provides services throughout a major metropolitan area, or even in multiple areas, you may think you're improving the odds of attracting new business by offering a toll-free 800 number on your web site. However, a recent test by the Engine Ready team actually proved the opposite. Read the results in this white paper.
Tags : 
800 number, toll-free, 1800, 1-800, 800, toll free, engine ready, engineready
    
Engine Ready
Published By: Bazaarvoice     Published Date: Jan 17, 2014
Consumer reviews can have an impact on sales, but did you know that negative reviews can actually improve purchase intent? The linchpin: How brands respond. Read new research about the power of responding to consumers.
Tags : 
consumer-centric, consumer engagement, brand messaging, branding, brand response, consumer conversations
    
Bazaarvoice
Published By: Bazaarvoice     Published Date: Aug 01, 2014
Consumer reviews can have an impact on sales, but did you know that negative reviews can actually improve purchase intent? The linchpin: How brands respond. Read new research about the power of responding to consumers.
Tags : 
bazaarvoice, marketing, brands, consumer, conversation, responsiveness
    
Bazaarvoice
Published By: Cisco     Published Date: Dec 27, 2017
Today all businesses battle with unprecedented competitive pressures. In order to succeed—or even survive— they must rapidly adapt to constantly changing environments, in every industry and sector. What does this mean for IT leaders? Transformation, on all fronts. The very factors driving digital transformation in businesses are also pressuring IT organizations to transform. Customer expectations have increased. Companies live and die by the applications they provide to their customers and employees. A smartphone is the modern bank branch. The palm of your hand is replacing traditional brick-and-mortar stores. Access without delay or interruption, 24/7, is the new normal. If they can’t get what they want, when they want it, customers go elsewhere.
Tags : 
    
Cisco
Published By: Jive Software     Published Date: Mar 29, 2013
How To Turn Customers Into An Extension Of Your Support Team, Cut Costs And Drive Satisfaction
Tags : 
customer service, client service, customer retention, communication, social, social media
    
Jive Software
Published By: Jive     Published Date: Apr 10, 2013
How To Turn Customers Into An Extension Of Your Support Team, Cut Costs And Drive Satisfaction
Tags : 
jive, customer service, cut support costs, customers
    
Jive
Published By: Dell Software     Published Date: Oct 03, 2013
Download Dell Software’s white paper When Did our API Become So Darn Important? and see how expanded API usage can help grow your business.
Tags : 
ecommerce, api, optimizations, online business expansion, best practices
    
Dell Software
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Encryption will help to protect data against unauthorized access by outsiders from lost or stolen devices such as laptops, thumb drives, and other removable media. But it does not protect against the insider threat-employees and contractors with authorized access to data who mistakenly or maliciously leak your most valuable assets.
Tags : 
trend micro, encryption, laptop, ediscovery, e-discovery, data protection, threats, leaks, assets, true protection, dlp, data breach, breaches, data breaches, data loss prevention, dlp, hackers, data protection solutions, midsize organizations, smb
    
Trend Micro, Inc.
Published By: Juniper Networks     Published Date: Aug 03, 2017
Agility creates more opportunities for new business and stronger bottom lines. Research from more than a half-dozen experts supports it all. What makes Uber’s and Airbnb’s network infrastructures unique The top factor shaping network strategies today Research from industry experts including Gartner and McKinsey
Tags : 
business agility, data usage, network infrastructure, information technology
    
Juniper Networks
Published By: Symantec.cloud     Published Date: May 11, 2012
Read When Good Backups Go Bad: Data Recovery Failures and What to Do About Them to understand backup challenges, impacts, and solutions. Don't let your business fall victim to downtime because of a computer or system failure.
Tags : 
symantec, cloud, backup, technology, system failure, recovery
    
Symantec.cloud
Published By: FICO EMEA     Published Date: Aug 28, 2019
There is a proliferation of payment methods that provide people with faster ways to make and receive payments – but they are not all the same. Understanding the differences and unique characteristics of different 'fast' payment types is vital to those who need to develop and service payments fraud strategy. Download our executive brief to understand: The differences between real-time payment schemes, e-wallets and person to person payments The implications on fraud from the fast transfer of money Where to start building your real-time payments fraud strategy
Tags : 
real-time payment, p2p payment
    
FICO EMEA
Published By: Crimson Hexagon     Published Date: Jan 17, 2013
In this webinar, Rebecca Bley will be presenting on finding actionable insight generated around media buzz. With everyone giving their own opinions on the internet, often unfiltered, when does negative feedback become positive feedback? Watch now.
Tags : 
crimson hexagon, marketing, internet buzz, media buzz, hype, actionable insight, research
    
Crimson Hexagon
Published By: McAfee     Published Date: Feb 25, 2015
This report summarizes key steps organizations can take to harden their infrastructure, improve their responsiveness, and actively disrupt targeted attacks by paying attention IoAs.
Tags : 
siem, real-time siem, attacks, real-time security, mcafee, attack prevention, targeted attacks, siem solution, siem security, security, security intelligence solution
    
McAfee
Published By: McAfee     Published Date: Feb 25, 2015
This report aggregates front-line experience to present the key steps organizations can take to harden their infrastructure, improve their responsiveness, and actively disrupt targeted attacks by paying attention IoAs.
Tags : 
siem, real-time siem, attacks, real-time security, mcafee, attack prevention, targeted attacks, siem solution, siem security, security, security intelligence solution
    
McAfee
Published By: McAfee     Published Date: Nov 20, 2014
A survey commissioned by Intel Security and conducted by Evalueserve, in conjunction with the report, suggests that a majority of companies lack confidence in their ability to detect targeted attacks in a timely manner. Even companies best prepared to handle targeted attacks are taking the time to investigate high volumes of events. Key findings include 78% of those able to detect attacks in minutes had a proactive, real-time SIEM solution.
Tags : 
siem, incident response, ir capabilities, threat intelligence, indicators of attack, indicators of compromise, foundstone, ioas, iocs, evalueserve, real-time siem
    
McAfee
Published By: Infoblox     Published Date: Nov 07, 2013
Attacks on the computing infrastructure directly impact network management teams. Security is also a network management issue. This paper explains how your network management team is key to securing your business against cyber-attacks.
Tags : 
infoblox_dns_dhcp_ipam, infoblox_ddi, infoblox_dns, infoblox_ipam, infoblox_dhcp, infoblox_ip_address_management, dhs_dhcp_ipam, dns, domain_name_server, dhcp, dynamic_host_configuration_protocol, ipam, ip_address_management, internet_protocol_address_management, ddi, dns server, dhs_dhcp_server, network_control, network_automation, network_availability
    
Infoblox
Published By: Confident Technologies     Published Date: Mar 16, 2011
This paper will examine the security threats associated with weak authentication practices on the Web, why businesses need to strengthen online authentication, and new approaches for delivering one-time passwords.
Tags : 
authentication, it security, website security, two-factor authentication, passwords, login, one-time passwords, otp, 2fa, multifactor authentication, identity and access management, user authentication, web authentication, mobile authentication
    
Confident Technologies
Published By: Kaon     Published Date: Jul 07, 2011
In this complimentary white paper, discover how new interactive technologies allow companies to obtain quick ROIs - in the hundreds of thousands - while creating emotional customer connections at events. Learn how your 2011 marketing programs will generate greater ROI with new interactive marketing technologies.
Tags : 
kaon interactive, roi, marketing technologies, virtual product demonstrations, trade show trends, sales team, virtual technology
    
Kaon
Published By: BlueJeans Network     Published Date: Jun 17, 2016
The concept of all centralizing all communication methodologies (presence, instant messaging, voice, video, and messaging services) within a single system, a.k.a. unified communications or UC, is not new. One of the most popular platforms is Microsoft. In fact, Microsoft has indicated that it has 110 million Skype for Business or Lync users around the world. However, many organizations have yet to fully embrace the video conferencing capabilities available within Skype for Business / Lync. Overall we view Skype for Business (SfB) video conferencing as an excellent choice for sessions involving only SfB users. However, the SfB experience is focused more on content sharing and less on live video. Download this whitepaper to learn 12 situations in which users may wish to use a different video conferencing tool. In this paper, Wainhouse also compares two options for companies seeking better video capabilities.
Tags : 
skype for business, microsoft lync, video conferencing, bluejeans, employee communications, unified communications
    
BlueJeans Network
Published By: Justworks     Published Date: Sep 27, 2017
Business owners and entrepreneurs create their businesses for a number of reasons: to grow an idea, build and inspire a team, make a difference. And all too quickly, those business owners can face the other side of running a business: paying employees, negotiating the best benefits for your teams, keeping up with myriad government regulations. Workplaces are getting even more complicated - for good reasons. Teams have more flexibility to work remotely. And the gig economy is exploding; in fact, about a third of the U.S. workforce works on something other than a full-time basis.
Tags : 
    
Justworks
Published By: Venafi     Published Date: Oct 26, 2015
This is the second part of the Ponemon Institute’s 2015 Cost of Failed Trust Report, which reveals the damaging impacts on global business from unprotected cryptographic keys and digital certificates. This new report reveals that most companies lose customers, suffer costly outages, fail audits, and experience breaches due to unprotected and poorly managed keys and certificates.
Tags : 
security controls, security, security applications, ssl/tls certificates, secure connection, security network
    
Venafi
Published By: IBM     Published Date: Jun 13, 2018
In the digital era, businesses in every industry are becoming technology companies. New business models such as “product as a service” (in which traditional manufacturers and distributors are driving new revenue streams by integrating software-based services into their offerings) and new operational models, such as collaboration, social business, and mobile platforms, mean that nearly every company is deriving at least part of its revenue from cloudbased solutions. So, why are so many of these new cloud solution providers building their businesses on shaky foundations? The truth is, when your business is based in the cloud, you need more than on-demand leased compute and storage capacity. You need a cloud that is enterprise-grade, secure, and resilient. Equally important—and overlooked by too many cloud solution providers—you need a cloud platform that is able to grow your business into the future, supporting next-generation functionality like Artificial Intelligence (AI). No matter wh
Tags : 
    
IBM
Published By: PGi     Published Date: Oct 01, 2018
Large companies have made considerable investments in video webcasting to their external audiences. Now they need to turn their attention toward internal communications—for reasons that can enhance their competitiveness and bottom line. As companies undergo a digital transformation, the playing field becomes increasingly technology-democratized and fierce. In this climate, an organization’s employees are one of its most, if not the most, valuable competitive differentiators. And the same energy and focus that companies put toward reaching their external audiences needs to go toward reaching and engaging their employees. Here’s where strong internal communications can pay big dividends. High-performing companies recognize the significant impact effective internal communication has on their business. Chief among the gains are: • Increased productivity. • Improved brand trust and company loyalty among employees. • Increased company alignment within and between departments and remote loc
Tags : 
    
PGi
Published By: Riversand     Published Date: Oct 30, 2017
MDM can add value to the business in many different ways. It most often does so indirectly, as an enabler for other business and IT initiatives. Some of these areas of potential benefit support shorter-term or tactical efforts at helping the business operate more efficiently — that is, they help to reduce the cost bases to "run the business." Some benefit areas of MDM are related more to helping users "grow the business." That is, they help to increase the revenue and market share within a given business model or framework. Yet other areas of opportunity fall into the "transform the business" arena — for example, allowing customer support representatives to perform inside sales activities enabled by trusted customer and product master data.
Tags : 
    
Riversand
Start   Previous    559 560 561 562 563 564 565 566 567 568 569 570 571 572 573    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.