HIT Consultant Insightful coverage of healthcare innovation
 

any case

Results 126 - 150 of 295Sort Results By: Published Date | Title | Company Name
Published By: CA Technologies     Published Date: Aug 22, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders.1 There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 21, 2017
CA Technologies recently released version 8.5.1 of its flagship United Infrastructure Management (UIM) platform. The company continues its efforts to make it a powerful contender in the highly competitive and crowded hybrid IT management market. The latest enhancements, and those coming soon in the next release, should help strengthen its position as an intelligent and predictive toolset that enables administrators to quickly – and in some cases proactively – react and remediate performance and capacity anomalies.
Tags : 
    
CA Technologies
Published By: Akamai Technologies     Published Date: Aug 17, 2017
The rapid rate of mobile adoption provides today’s users with nearly unlimited access to data and information anytime, anywhere. While “always on” users represent a tremendous opportunity for businesses to increase engagement, revenue, and customer loyalty, they also create unprecedented mobile delivery challenges. In this e-book, we will delve into these challenges and learn how to master them by optimizing for fast APIs, mobile apps, and mobile sites. But before we do that, let’s start our mobile story with some perspective: Approximately half of you reading this e-book will do so on mobile. That fact alone should be a compelling enough reason to keep reading, but in case it’s not, the following data illustrates the impact mobile growth has had on our technological landscape.
Tags : 
mobile, mobile adoption, customer loyalty, always on
    
Akamai Technologies
Published By: Juniper Networks     Published Date: Aug 08, 2017
Network automation is becoming increasingly important for organizations of any size that are striving to make their IT infrastructure more agile, reliable and cost-efficient. While companies of all sizes have embraced server and storage virtualization, the network typically has not kept pace. In many cases, network provisioning and management are still handled by manual processes that slow down deployments, increase overhead costs and add risk in the form of human error.
Tags : 
    
Juniper Networks
Published By: IBM     Published Date: Jul 26, 2017
While there has been improvement in the amount of time an attacker spends in a network before detection — decreasing from years to days in many cases — the ongoing delay illustrates just how elusive attackers still are compared to an organization's ability to detect a problem. IDC believes that actionable threat intelligence is going to be a significant factor in improving this metric. Threat intelligence has historically been seen as a complex set of activities reserved for security operations centers (SOCs) and advanced security analysts. The tools to collect and apply threat intelligence have generally not existed commercially and the ability to integrate threat intelligence into the traditional security workflow has not been available. Over the last few years, threat intelligence has been growing in importance within the security workflow.
Tags : 
data security, threat intelligence, security operations, advanced security analysts
    
IBM
Published By: VMware AirWatch     Published Date: Jul 19, 2017
VMware AirWatch® features a new – and more efficient – approach to Windows lifecycle management across any use case – whether deploying the OS to your remote workers, onboarding employees’ BYO machines, corporate deployments across your branch offices or managing a special line of business terminal. The unified endpoint management technologies fundamentally changes how organizations approach PC lifecycle management, allowing IT to deploy security patches and remediate vulnerabilities faster, install software more reliably and quickly and consolidate operational processes across devices on or off the domain.
Tags : 
    
VMware AirWatch
Published By: NAVEX Global     Published Date: Jul 17, 2017
The 2017 EMEA & APAC Whistleblower Hotline Benchmark report was produced with data from companies of all sizes and industries across the region. Use the findings to put your company’s whistleblowing report data in context or gain organisational alignment to start your whistleblower programme. Use this report to answer questions like: • Am I getting too few or too many reports compared to like-sized companies? • Is my organisation following up on cases in an appropriate timeframe? • How can I more effectively follow-up on anonymous reports?
Tags : 
emea, apac, ethics, whistleblowing, incident management, reporting data, case closure, reporting systems
    
NAVEX Global
Published By: Oracle     Published Date: Jul 12, 2017
Enterprises tend not to view project management as a holistic process. Much like the disparate systems they have in place, they see a disparate collection of issues. They typically look to solve specific pain points with single applications. Rather than migrate an entire enterprise to a new system, they are looking to manage a problem spot and have it flow into a specific component (e.g., cost, human capital leverage, or how demand is driven) as needed. In many cases, however, the pain points are symptoms of a larger issue, and to remove them the situation must be viewed in the context of the full project life cycle. Oracle Project Portfolio Management (PPM) Cloud, part of the integrated suite that is Oracle ERP Cloud, not only does this, but it’s also built with the user in mind… solving the PPM pain points through role-based analytics, social collaboration, optimization, costing, control, and mobile solutions for today’s project team.
Tags : 
ppm, project portfolio management, erp, oracle, cloud
    
Oracle
Published By: AdRoll     Published Date: Jul 11, 2017
The sums spent on digital advertising are so vast; any inefficiencies become costly disadvantages. Attribution models identify such waste, but too many marketers struggle to understand the opportunities of attribution. And even if marketers want better attribution, getting budget support and C-suite approval can prove daunting. This guide addresses three issues to help marketers implement better attribution: ? What attribution models are available and which is the right one for my brand? ? Whom will I need to work with and how can I get buy-in? ? How do I build a business case for attribution?
Tags : 
attribution, digital advertising, marketing, advertising efficiency
    
AdRoll
Published By: Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017     Published Date: Jul 11, 2017
Customers hate waiting for engineers to show up. The hours drift by. Clocks tick slower. They may have taken the day off work, but feel unable to start anything productive in case the doorbell rings. Fury builds. They call the contact centre – they’re told to keep waiting. It’s unacceptable. And in the 21st Century totally unnecessary. Solutions exist to provide customers with an accurate forecast of when field service agents will arrive and how long the job will take.
Tags : 
scheduling accuracy, jobs completed per day, customer satisfaction, skills, habits, driving style, qualifications
    
Oracle APAC ZO OD Prime Volume CX ABM Leads June 2017
Published By: Oracle     Published Date: Jul 11, 2017
Customers hate waiting for engineers to show up. The hours drift by. Clocks tick slower. They may have taken the day off work, but feel unable to start anything productive in case the doorbell rings. Fury builds. They call the contact centre – they’re told to keep waiting. It’s unacceptable. And in the 21st Century totally unnecessary. Solutions exist to provide customers with an accurate forecast of when field service agents will arrive and how long the job will take.
Tags : 
scheduling accuracy, jobs completed per day, customer satisfaction, skills, habits, driving style, qualifications
    
Oracle
Published By: Oracle APAC ZO OD Prime Volume HCM ABM Leads June 2017     Published Date: Jul 11, 2017
Customers hate waiting for engineers to show up. The hours drift by. Clocks tick slower. They may have taken the day off work, but feel unable to start anything productive in case the doorbell rings. Fury builds. They call the contact centre – they’re told to keep waiting. It’s unacceptable. And in the 21st Century totally unnecessary. Solutions exist to provide customers with an accurate forecast of when field service agents will arrive and how long the job will take.
Tags : 
scheduling accuracy, jobs completed per day, customer satisfaction, skills, habits, driving style, qualifications
    
Oracle APAC ZO OD Prime Volume HCM ABM Leads June 2017
Published By: Oracle APAC ZO OD Prime Volume SCM ABM Leads June 2017     Published Date: Jul 11, 2017
Customers hate waiting for engineers to show up. The hours drift by. Clocks tick slower. They may have taken the day off work, but feel unable to start anything productive in case the doorbell rings. Fury builds. They call the contact centre – they’re told to keep waiting. It’s unacceptable. And in the 21st Century totally unnecessary. Solutions exist to provide customers with an accurate forecast of when field service agents will arrive and how long the job will take.
Tags : 
scheduling accuracy, jobs completed per day, customer satisfaction, skills, habits, driving style, qualifications
    
Oracle APAC ZO OD Prime Volume SCM ABM Leads June 2017
Published By: IBM     Published Date: Jul 06, 2017
Effectively using and managing information has become critical to driving growth in areas such as pursuing new business opportunities, attracting and retaining customers, and streamlining operations. In the era of big data, you must accommodate a rapidly increasing volume, variety and velocity of data while extracting actionable business insight from that data, faster than ever before. These needs create a daunting array of workload challenges and place tremendous demands on your underlying IT infrastructure and database systems. In many cases, these systems are no longer up to the task—so it’s time to make a decision. Do you use more staff to keep up with the fixes, patches, add-ons and continual tuning required to make your existing systems meet performance goals, or move to a new database solution so you can assign your staff to new, innovative projects that move your business forward?
Tags : 
database, growth, big data, it infrastructure, information management
    
IBM
Published By: IBM     Published Date: Jun 26, 2017
What is holding you back from moving off paper processes or realizing better customer centricity ? Learn how to differentiate your company with IBM case and capture solutions with this informative infographic and empower your employees to deliver a strong customer experience.
Tags : 
ibm, customer centricity, customer experience, differentiation, employee satisfaction
    
IBM
Published By: OnBase by Hyland     Published Date: Jun 26, 2017
Whether we’re talking about a life partner, a business partner or an enterprise information platform, you don’t want to start any kind of relationship without all relevant information – or worse yet, go in blind. Selecting a case management solution provider is no different. Download this white paper to discover key considerations and questions to ask when evaluating case management vendors and software solutions.
Tags : 
case, management, software, solution, dynamic, onbase, hyland, knowledge
    
OnBase by Hyland
Published By: Juniper Networks     Published Date: Jun 22, 2017
This study was conducted with independent global research firm Wakefield Research between November 24 through December 14th, 2015. The data was based on an online study of 20 content questions, plus screeners and demographics of 2704 respondents, in 8 markets: US, China, Australia, Japan, India, UK, Germany, and France. All respondents were restricted to the following industries: service provider organizations, healthcare, retail, and financial services. In this case, the definition of service provider includes companies offering web content services, cable, internet service providers, or telecom. Juniper Networks challenges the status quo with products, solutions and services that transform the economics of networking. Our team co-innovates with customers and partners to deliver automated, scalable and secure networks with agility, performance and value. Visit www.juniper.net for more information.
Tags : 
security solutions, ransomware, security technologies, protection technologies, risk assessment, it security, server protection
    
Juniper Networks
Published By: IBM     Published Date: Jun 21, 2017
NoSQL databases and Apache Spark are a potent combination for rapid integration, transformation and analysis of all kinds of business data. With its data syncing and analytics capabilities, IBM Cloudant offers unique advantages as a NoSQL database for many Spark use cases. IT decision-makers, data scientists and developers need to know how and when to apply these technologies most effectively. IBM can offer a host of resources and tools to help your organization gain value from Cloudant and Spark quickly, and with minimal up-front investment.
Tags : 
ibm, ibm cloudant, apache spark, nosql, database
    
IBM
Published By: Teradata     Published Date: May 02, 2017
even West Media (SWM) is Australia’s leading multiple platform media company with a market-leading presence in broadcast television, magazine and newspaper publishing, and online. To support its unprecedented broadcast of the Rio de Janeiro 2016 Olympic Games, SWM integrated the world’s first production implementation of the Teradata Database running on Amazon Web Services (AWS) into its existing data ecosystem. This enabled the delivery of critical insights during the event and helped directly drive audience engagement with SWM’s digital products, resulting in the creation of a powerful audience asset that that now informs their broadcasting, marketing, and advertising plans. Find out how with in this case study.
Tags : 
data management, data system, business development, software integration, resource planning, enterprise management, data collection
    
Teradata
Published By: SAS     Published Date: Apr 25, 2017
If you’re in the data world, you know it’s full of discord. Multiple data sources, inconsistent standards and definitions, inaccurate reports and a lack of governance are enough to derail any organization. What’s an enterprise architect to do? With the right data governance and master data management (MDM) solution, you can set and enforce policies and establish a consistent view of your data without micromanaging it. You can eliminate duplicate and inconsistent data. You can combine traditional data and new big data sources – like streaming data from the IoT – into one harmonious view. Read this e-book for expert advice and case studies that will show you new ways to manage your big data – and make sure everyone’s on the same page.
Tags : 
    
SAS
Published By: IBM     Published Date: Apr 14, 2017
Any organization wishing to process big data from newly identified data sources, needs to first determine the characteristics of the data and then define the requirements that need to be met to be able to ingest, profile, clean,transform and integrate this data to ready it for analysis. Having done that, it may well be the case that existing tools may not cater for the data variety, data volume and data velocity that these new data sources bring. If this occurs then clearly new technology will need to be considered to meet the needs of the business going forward.
Tags : 
data integration, big data, data sources, business needs, technological advancements, scaling data
    
IBM
Published By: DocuSign     Published Date: Apr 12, 2017
The world of HR today is changing. The talent pool is becoming more global and tech-savvy, and candidates expect an online and mobile experience. Many are leveraging DocuSign to improve compliance and free up time for other critical HR functions. Download this case study sampler to learn more about how other companies have increased efficiency by utilizing DocuSign’s eSignature platform in the HR industry.
Tags : 
    
DocuSign
Published By: CA Technologies     Published Date: Apr 06, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders.1 There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : 
cyber security, cyber attack, it security, threat analytics, risk mitigation, data security
    
CA Technologies
Published By: Datastax     Published Date: Apr 04, 2017
Graph databases are changing how we use data. But first, an example – you're (probably) a human working on a project and looking at graph databases as a potential solution. While we're a company that has a graph database that hopefully solves your problem. Now we could store that data in a boring relational database, but how do we do more than that? For instance, using that data, when combined with other data points, to find other people like you and recommend our solution to them? This is where a graph can come in handy. The friendly graph data model makes it easy to use patterns of relationships within large data sets. By leveraging those relationships we can analyze, or create better real-time experiences. Why Graph explores why this graph database 'thing' is really a thing, how they compare to other database systems, and the use cases they best support.
Tags : 
graph, database, datastax
    
Datastax
Published By: CrowdTwist     Published Date: Apr 03, 2017
So, you’ve made the decision to launch a new loyalty program or optimize an existing initiative. Congratulations! That’s a decision that will help your company build customer relationships and gather useful customer insight and data to use for remarketing efforts. It’s also one that shouldn’t be made lightly. To ensure that you don’t skipover any important steps to make your business case, it’s crucial that you fully prepare your company to hit the ground running. This e-book highlights 10 essential strategies you should implement to help you prepare for a loyalty program rollout and become organizationally ready for the launch.
Tags : 
prepare, company, loyalty, optimize
    
CrowdTwist
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.