HIT Consultant Insightful coverage of healthcare innovation
 

any case

Results 176 - 200 of 280Sort Results By: Published Date | Title | Company Name
Published By: Microsoft Azure     Published Date: Apr 10, 2018
Learn how to break down silos, reinvent productivity, and help your sales team achieve success by unifying transactional systems, social networking, and strong customer relationships. Download this free Nucleus report that says teams using the Microsoft Relationship Sales solution increased productivity 12-15 percent.** You’ll also learn how to: Empower your sellers with savvy insights that engage and delight customers. Scale the power of one-on-one relationship selling by unifying the sales experience. Offer your team tools to reinvent the way they sell and help transform your company’s bottom line. Use Microsoft Dynamics 365 for Sales along with LinkedIn Sales Navigator to help sellers identify future customers and suggest ways to engage with them. **Claims based on a 2017 study by Nucleus Research that analyzed more than 50 ROI case studies on CRM deployments from 2015 to 2017. Companies ranged in size from small and medium-sized businesses to large multinational enterprises. Re
Tags : 
    
Microsoft Azure
Published By: Avaya     Published Date: Jun 15, 2016
Unlimited, anywhere connectivity for an always-on event center To support fan engagement, meet the demands of event organizers and performers, and enhance digital advertising opportunities, Montreal’s Bell Centre turned to a stable, flexible and powerful networking solution from Avaya. Read this case study to learn more.
Tags : 
connectivity, networking, best practices, software, technology
    
Avaya
Published By: Affirm     Published Date: Jan 22, 2016
Tradesy is a leader in designer fashion resale for women. The company recently partnered with Affirm to offer installment financing at the point of sale. It's been a perfect fit, with Tradesy seeing a 14% increase in conversions and a 34% increase in revenue per customer thanks to Affirm. This case study examines how Tradesy was able to get such positive results and whether this can work for other online retailers.
Tags : 
affirm, tradesy, financing, user experience, revenue, ecommerce, purchase
    
Affirm
Published By: Affirm     Published Date: Jan 22, 2016
Tradesy is a leader in designer fashion resale for women. The company recently partnered with Affirm to offer installment financing at the point of sale. It's been a perfect fit, with Tradesy seeing a 14% increase in conversions and a 34% increase in revenue per customer thanks to Affirm. This case study examines how Tradesy was able to get such positive results and whether this can work for other online retailers.
Tags : 
affirm, tradesy, financing, user experience, revenue, ecommerce, purchase
    
Affirm
Published By: AWS     Published Date: Jul 16, 2018
The Internet of Things (IoT) is composed of sensor-embedded devices and machines that exchange data with each other and the cloud through a secure network. Often referred to as “things” or “edge devices”, these intelligent machines connect to the internet either directly or through an IoT gateway, enabling them to send data to the cloud. Analyzing this data can reveal valuable insights about these objects and the business processes they’re part of, helping enterprises optimize their operations. Devices in IoT deployments can span nearly any industry or use case. Each one is equipped with sensors, processing power, connectivity, and software, enabling asset control and other remote interactions over the internet. Unlike traditional IT assets, these edge devices are resource-constrained (either by bandwidth, storage, or processing power) and are typically found outside of a data center, creating unique security and management considerations.
Tags : 
    
AWS
Published By: CrowdStrike     Published Date: Nov 28, 2018
Learn how cyber threat intelligence (CTI) helps you bolster defenses, hunt down adversaries, investigate incidents and make better security decisions. While once considered a “nice to have”, Cyber Threat Intelligence (CTI) is now widely considered an essential weapon against breaches. A recent study by Enterprise Strategy Group (ESG) found that 72 percent of organizations plan to increase CTI spending — further validation of its important role in your security strategy. Yet, because threat intelligence comes in many shapes and forms, it is often misunderstood. This white paper, “Threat Intelligence: Cybersecurity’s Best Kept Secret,” offers in-depth coverage of CTI, including the different categories of threat intelligence and use cases that demonstrate CTI’s effectiveness in thwarting today’s most dangerous and sophisticated attackers. You’ll also learn how the right CTI can empower better security and executive decisions, while dramatically improving your organization's security post
Tags : 
    
CrowdStrike
Published By: McAfee     Published Date: Mar 31, 2017
The Adwind Remote Administration Tool is a backdoor Trojan written in Java language that targets various platforms that support Java files. Adwind does not exploit any vulnerabilities. In most cases, for an infection to succeed, the user must run the malware by double-clicking the .jar file that is usually distributed as an attachment, or opening an infected Microsoft Word document. The infection spreads if the Java Runtime Environment is installed on the user's computer. After the malicious .jar file is executed on the target system, the malware installs silently and connects to a remote server via a preconfigured port to receive commands from a remote attacker and perform other illegal operations.
Tags : 
backdoor trojans, trojan protection, malware, malware protection
    
McAfee
Published By: IBM     Published Date: Sep 30, 2013
The IBM Employee Experience Suite helps organizations leverage social software and real-time collaboration to deliver a personalized employee web experience across many channels. This white paper from IBM, showcases five organizations that are strategically integrating emerging social software and tools with their existing investments and seeing measurable results in return on investment.
Tags : 
ibm, ibm employee experience suite, intranet, social software, workforce management
    
IBM
Published By: IBM     Published Date: Jan 10, 2014
The IBM Employee Experience Suite helps organizations leverage social software and real-time collaboration to deliver a personalized employee web experience across many channels. This white paper from IBM, showcases five organizations that are strategically integrating emerging social software and tools with their existing investments and seeing measurable results in return on investment.
Tags : 
ibm employee experience suite, workforce, talent, social software, knowledge management, productivity, ibm
    
IBM
Published By: Cornerstone OnDemand     Published Date: Oct 15, 2010
Grass Valley, the world's second largest broadcast and professional solutionssupplier, is a leading provider and innovator in media production services and technology. Their cameras, production equipment, servers and other systems are the choice of many of the largest broadcast networks and production/post-production facilities around the globe. Read this case study to find out why they chose Cornerstone OnDemand.
Tags : 
cornerstone, grass valley, training, web-based training
    
Cornerstone OnDemand
Published By: Aria Systems     Published Date: Jan 27, 2015
This first-of-its-kind e-book on Recurring Revenue Innovators showcases 29 real-world examples of smart businesses that have boldly exploited recurring revenue business models to expand markets, boost sales, and reap greater profits. These daring recurring revenue innovators, many in the Fortune 1000, offer inspiring case studies on how to use recurring revenue models in new, innovative, and impactful ways. These cutting-edge companies are using recurring revenue to disrupt their markets or carve out new ones. You will find familiar names like Amazon, United Airlines and ESPN, under-the-radar surprises like Ingersoll Rand’s Nexia home automation service and Philips’ Community Without Walls, unexpected upstarts like BarkBox and Entitle, and market disruptors like Stitch Fix and Blue Apron.
Tags : 
recurring revenue innovation, smart businesses, revenue business models, expand markets, boost sales, profits, automation service
    
Aria Systems
Published By: Jobvite     Published Date: Mar 31, 2015
The recruiting industry is not what it used to be. Jobs, technology, candidates, and strategies have all changed immensely over the past few years, as STEM positions proliferate, social media explodes, and a new generation of workers—complete with new habits, wants, and needs—has emerged. You've probably felt the impact of this evolution firsthand, and you've realized that it doesn't matter how many people are actually out there looking for jobs (or not looking for them, as the case might be). If you’re having trouble finding the right candidates for the right positions at the right times, you’re dealing with a talent shortage. In this eBook, we outline four critical ways you can ensure the development of a rich talent pool.
Tags : 
talent pool, recruiting, technology, strategy, hiring, jobseekers, social media, employment, experience, sourcing, talent pools
    
Jobvite
Published By: AWS     Published Date: Jun 03, 2019
Companies worldwide are undergoing digital transformations. By modernizing applications, they can deliver better service to customers and keep pace in a competitive landscape. In many cases, Amazon Web Services (AWS) has helped companies modernize by implementing containers—and initiating cultural shifts—to streamline development. In this whitepaper, we discuss recommended best practices around containerization and how AWS can help you get started with containers today.
Tags : 
    
AWS
Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: SAP     Published Date: Nov 22, 2011
FreshDirect found it very challenging to get operational insights from its information systems. In order to improve, it was critical to FreshDirect that they select a BI technology that allows the company to measure and report on operational metrics across departmental applications without requiring the building of IT-intensive data marts. With this requirement as one of the key selection criteria, the company evaluated multiple vendors. Download this case study to learn more.
Tags : 
sap, businessobjects, business, technology, case study, freshdirect, bi technology, information systems
    
SAP
Published By: Mintigo     Published Date: Sep 05, 2018
Artificial intelligence (AI) enables marketers using a predictive marketing platform to address many strategic questions. Whether you’re new to AI for Marketing or more seasoned with the use of AI, this ebook is a great resource for you. In this ebook, you’ll learn how to: • Optimize your marketing spending • Increase conversion rate across the funnel • Optimize customer engagement • Cross-sell and upsell throughout your customer base • Segment leads and grow customer value • Grow your market and find new prospects Fill out the form to get your free copy!
Tags : 
    
Mintigo
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
VolitionRx Limited is a multi-national company which develops new ways to detect cancer. Their ideal product needed to be reliable, efficient, and easily manageable for their modestly-sized IT department. Additionally, the solution had to be readily deployable to their operations in four separate countries. According to Daniel Halter, Group IT Manager at Volition, traditional antivirus vendors were “offering the same old solution only slightly jazzier. The model they were offering, although new, was and is the same thing that has been around for a while.” Daniel also stated that Volition had little time to determine which vendors are “selling the truth and which ones are selling the dreams.” Seeking an ideal match, Daniel reached out to Khipu Networks for their security recommendation. Khipu Networks suggested CylancePROTECT®, Cylance’s artificial intelligence endpoint security product. Read the full case study to learn about the results Cylance was able to deliver.
Tags : 
volitionrx, cyber, security, data
    
BlackBerry Cylance
Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Matthew Coy, Safelite’s Vice President of Information Technology, is responsible for overseeing all aspects of the company’s IT infrastructure, including selecting, administering, and supporting technology products. The company handles personally identifiable information, including credit card information and insurance data collected from several sources, and must comply with insurance industry regulations and the Payment Card Industry Data Security Standard. Safelite is the target of constant external attacks. The organization experienced ongoing security issues stemming from infected software, drivebys and other malicious downloads. According to Matthew, “A lot of malware and email viruses were making it through the environment, all bypassing our email security and AV.” Not only were the security controls ineffective, the previous AV platform required nearly 150 hours per week to manage. Matthew knew Safelite needed to make a change, and fast. Having worked with Cylance® at two previous companies, he was confident CylancePROTECT® could significantly improve Safelite’s endpoint security. Read the full case study to learn about the results Cylance was able to deliver.
Tags : 
safe, lite, cybersecurity, data
    
BlackBerry Cylance
Published By: Druva     Published Date: Aug 03, 2016
Will your company will lose data in the cloud? Many organizations think SaaS providers will recover their data but that is not the case. Gartner assesses backup and recovery shortcomings of SaaS providers and provides considerations to close the gap.
Tags : 
druva, gartner, best practices, technology, data, cloud
    
Druva
Published By: Coveo     Published Date: Nov 13, 2013
Where does a $5.5 billion technology company with 15,000 employees and a $1 billion annual R&D spend turn for a more effective way to tap existing research & engineering knowledge and avoid duplicating work? Harris Corporation turned to Coveo. read this case study to learn how Harris has improved productivity, communications and innovation.
Tags : 
advanced enterprise search, increasing productivity, knowledge assets, unified enterprise search, enterprise search solutions
    
Coveo
Published By: K2     Published Date: Jan 07, 2016
The cloud is here to stay, and Microsoft SharePoint users are finally making the move. Since 2013, the number of SharePoint users with intentions of moving their SharePoint sites to the cloud has doubled, according to a 2015 AIIM survey.1 Many users are making the change to reduce IT costs, improve access for external partners and increase mobility. Casey, IT manager at a mid-size healthcare organization, is one of those users planning to move his organization to a cloud-based SharePoint infrastructure. But because Casey works in healthcare, he’s especially concerned about the security of the cloud. And he’s not alone with that concern — AIIM reports that 62 percent of SharePoint users cite security as their biggest concern when considering a cloud or hybrid solution for SharePoint. More specifically, many SharePoint users are concerned about the following three areas of security in the cloud: • Identity and access • Data protection and privacy • Compliance and governance
Tags : 
security confidence, cloud, microsoft sharepoint, cloud solution, hybrid solution
    
K2
Published By: Citrix Online     Published Date: Aug 09, 2010
This series takes you through the many issues that plague the modern help desk, and states the case for implementing user-centric remote support.
Tags : 
citrix, gotoassist, remote support, help desk, configuration, service delivery, return on investment, roi, mobile worker, performance measure
    
Citrix Online
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.