HIT Consultant Insightful coverage of healthcare innovation
 

apt

Results 1601 - 1625 of 1634Sort Results By: Published Date | Title | Company Name
Published By: Group M_IBM Q418     Published Date: Oct 26, 2018
Over the past few years, business leaders have been the primary drivers of technology change, including making decisions to adopt new applications in the cloud, mandate a cloud-first strategy, offer new capabilities with an API-first strategy, and provide new applications to end users on mobile first. There are significant benefits to these cloud decisions because they decrease time to value, lower costs, and make it easier for organizations to experiment and innovate. But there are consequences as well, chiefly in the complexity of learning how to integrate applications and exchange data across a decentralized architecture that is largely driven by autonomous development decisions. This IDC White Paper answers the following questions about the need for hybrid integration: How are changes in business strategy and technology adoption requiring changes in how organizations approach integration? What are the major events that trigger integration adaptation? How are the roles involve
Tags : 
    
Group M_IBM Q418
Published By: Tricentis     Published Date: Jan 08, 2018
If you’re in the software development business, there’s no doubt you’ve heard of, dipped your toe into or even experienced the joys and pains of agile methodology. The Agile Method promotes adaptive planning, early delivery and continuous improvement, and encourages rapid and flexible response to change. It’s quickly becoming the gold standard for software development. And, as the agile world has heated up, so has the pressure on testers to produce timely releases without sacrificing quality. With the fast pace of Agile, there is rarely time to test everything, so requirements must be prioritized and testing automation is deployed where possible. With this guide you’ll learn the importance of agile testing and the different types of testing, agile methodology, and our predictions on where the agile movement is headed.
Tags : 
    
Tricentis
Published By: MineralTree     Published Date: Jan 23, 2018
Automated invoice capture, approval workflows and data storage together with search and reporting features save Moda Operandi staff hours that are ordinarily wasted, especially during an audit.
Tags : 
    
MineralTree
Published By: Tenable     Published Date: Mar 07, 2018
"Learn how you can accelerate development and strengthen security – without disrupting your operations. Organizations that effectively meld DevOps and InfoSec can shift security from an afterthought to an integrated, automated, and proactive practice. By reading this paper from IDG, you’ll learn three reasons why DevOps is a game-changer for security and steps you can take foster a more collaborative and proactive approach to securing your enterprise. Topics covered include: - Adapting security testing tools and processes to the developer - Automating security into the CI/CD toolchain - The impact of secure DevOps on your bottom line - Increasing security awareness and commitment across teams This paper provides high-level guidance for DevOps and InfoSec professionals seeking collaborative, efficient approaches for strengthening application and information security."
Tags : 
secure devops, container security, docker, infosec
    
Tenable
Published By: Tenable     Published Date: Mar 07, 2018
"Answers to five questions that are top-of-mind for infosec leaders today. The challenge of secure DevOps is top of mind for many infosec and IT leaders. To help you understand the latest trends, Tenable reached out to Christina Richmond, Program Director for IDC’s Security Services Research Group, for her answers to the following five questions: 1. How do organizations ensure that the security team adapts seamlessly to development processes and tools to create a cohesive program? 2. What are some common mistakes you see companies make when attempting to integrate their DevOps and security processes? 3. How can security leaders assist organizations with making the transition to secure DevOps? 4. In the world of agile methodologies and DevOps, how do security teams need to evolve to be more effective in managing cyber risk? 5. What are some examples of secure DevOps principles among cloud native technologies? Written for infosec leaders responsible for integrating security int
Tags : 
secure devops, idc, analyst report, container security
    
Tenable
Published By: Cloudian     Published Date: Feb 15, 2018
We are critically aware of the growth in stored data volumes putting pressure on IT budgets and services delivery. Burgeoning volumes of unstructured data commonly drive this ongoing trend. However, growth in database data can be expected as well as enterprises capture and analyze data from the myriad of wireless devices that are now being connected to the Internet. As a result, stored data growth will accelerate. Object-based storage systems are now available that demonstrate these characteristics. While they have a diverse set of use cases, we see several vendors now positioning them as on-premises targets for backups. In addition, integration of object-based data protection storage with cloud storage resources is seen by these vendors as a key enabler of performance at scale, cost savings, and administrative efficiency.
Tags : 
    
Cloudian
Published By: Cloudian     Published Date: Feb 21, 2018
We are critically aware of the growth in stored data volumes putting pressure on IT budgets and services delivery. Burgeoning volumes of unstructured data commonly drive this ongoing trend. However, growth in database data can be expected as well as enterprises capture and analyze data from the myriad of wireless devices that are now being connected to the Internet. As a result, stored data growth will accelerate. Object-based storage systems are now available that demonstrate these characteristics. While they have a diverse set of use cases, we see several vendors now positioning them as on-premises targets for backups. In addition, integration of object-based data protection storage with cloud storage resources is seen by these vendors as a key enabler of performance at scale, cost savings, and administrative efficiency.
Tags : 
    
Cloudian
Published By: Workday France     Published Date: Mar 08, 2018
Vice Président et analyste principal chez Forrester, Paul Hamerman s'intéresse tout particulièrement aux applications de gestion des ressources humaines et financières, ainsi qu'aux tendances et orientations de l'ensemble du marché des applications d'entreprise. Paul répond à 5 questions clés que doivent nécessairement se poser les entreprises au moment de rechercher des solutions de planification RH et financière adaptées au monde économique moderne.
Tags : 
    
Workday France
Published By: Workday France     Published Date: Mar 08, 2018
Une nouvelle réalité économique: La fonction ressources humaines connaît actuellement une mutation profonde et nécessaire. La mondialisation, l'instabilité économique, l'évolution des technologies et la concurrence pour le recrutement des talents constituent de nouveaux challenges pour les dirigeants et les directions des ressources humaines (DRH). A l'évidence, les anciennes pratiques ne sont plus adaptées à cette nouvelle économie mondialisée. Les RH doivent se réinventer. C'est une occasion unique pour les DRH de ré-imaginer le rôle de la fonction RH et de créer une valeur ajoutée durable pour leurs entreprises, leurs collaborateurs et leurs communautés. Dans un contexte économique tourmenté, l'adoption des technologies Cloud, notamment les applications SaaS (Software as a Service), est une tendance de fond. Cette démarche permet de réduire les coûts, d'accélérer la mutation des entreprises et de créer plus de valeur.
Tags : 
    
Workday France
Published By: Oracle     Published Date: Sep 12, 2019
The following guide looks at 6 characteristics that define today’s most compelling commerce environments, and how the right mix of adaptive, intelligent solutions can optimize performance and ultimately be your most intelligent associate, 24 hours a day, 7 days a week, anywhere in the world. Amp Up the Power of Commerce with AI and Analytics Bring the Customer Journey Full Circle Tap into Heightened Data Security and Privacy in the Cloud
Tags : 
    
Oracle
Published By: Trimble     Published Date: Oct 28, 2019
It’s long been suspected that depression is a condition linked to untreated hearing loss. Recently, a number of studies have not only supported that conclusion — there’s evidence to strongly suggest a causal relationship. This white paper, sponsored by Hamilton® CapTel®, explores these studies, the data they captured, and most importantly, how hearing healthcare professionals are uniquely positioned to help.
Tags : 
    
Trimble
Published By: Trimble     Published Date: Oct 28, 2019
As healthcare costs have continued to rise, value-based approaches are being adopted across the board. Hearing healthcare is no exception — especially considering the statistics around increased overall healthcare costs for people with untreated hearing loss. This white paper, sponsored by Hamilton® CapTel®, examines the evolving approach to outcomes-centric healthcare , the studies that support this shift, and how hearing healthcare professionals can adopt a value-based mindset.
Tags : 
    
Trimble
Published By: Bluecore     Published Date: Dec 10, 2018
Bluecore helped evo: Move from batch and blast to 1:1 email marketing Replace one-size-fits-all promotional emails with automated emails that feature targeted content and send based on customers taking certain actions or changes to products. Scale the email program and results without scaling the team Introduce 15 high performing email campaigns and expand the email program reach to support a growing business without adding new headcount. Add new value for shoppers and the marketing team Launch a series of emails that proactively notify customers about changes to products with which they’ve engaged, including price and stock changes, while simultaneously adding a new opportunity to capture email addresses.
Tags : 
    
Bluecore
Published By: DigiCert     Published Date: Jun 19, 2018
Many security-minded organizations utilize code signing to provide an additional layer of security and authenticity for their software and files. Code signing is carried out using a type of digital certificate known as a code-signing certificate. The process of code signing validates the authenticity of legitimate software by confirming that an application is from the organization who signed it. While code-signing certificates can offer more security, they can also live an unintended secret life providing cover for attack groups, such as the Suckfly APT group. In late 2015, Symantec identified suspicious activity involving a hacking tool used in a malicious way against one of our customers. Normally, this is considered a low-level alert, however, the hacktool had an unusual characteristic not typically seen with this type of file; it was signed with a valid code-signing certificate. Download this whitepaper to find out more about how you can protect your business from such threats.
Tags : 
    
DigiCert
Published By: Box     Published Date: Jun 22, 2018
• There are many opportunities for businesses to introduce the concept of paper-free or less intensive paper processes to their organizations. AIIM 2016 Industry Watch research found that “58% of respondents described their inbound handling of content as ad-hoc”. This is not surprising given paper is still fairly dominant in many businesses due to human desire to keep paper in hand for reading, note taking, and still today, signatures. • In this study we take a look the challenges businesses face in relation to: o Digital Transformation of their business operations o Capturing and managing multi-channel inbound content, including paper o Steps taken to automate the information capture process o Use of analytics to enhance the identification and classification of capture information o A look ahead at the next 5 years to understand where businesses are focusing their efforts and funding
Tags : 
    
Box
Published By: Box     Published Date: Jun 22, 2018
These days, everyone's talking about digital transformation. But exactly how does your company get there? Capture is a great place to start — in fact, it's one of the most critical steps to take as you move your business into the digital age. Whether it’s simply using OCR to make content more easily discoverable, adding and enhancing metadata to drive specific processes, or classifying content from the onset for better information governance, capture adds a ton of value to your existing content assets. This ebook details our key takeaways from AIIM's Industry Watch Report, Improving Business Operations in 2017: Capturing Vital Content. We share how cloud-based capture tools are replacing the longstanding legacy of paper-based processes to streamline and speed up the way you do business. Download the ebook to learn: • How the latest capture innovations can support your digital strategy • 5 business processes that benefit most from advanced capture technologies • The key benefits of c
Tags : 
    
Box
Published By: KPMG     Published Date: Jul 10, 2018
New technology is driving consumer expectations to new heights. Businesses that understand the value of customer experience (CX) excellence stand to capture significant revenue from this trend. Read this report to find out: • what’s really going on inside the mind of the customer • how first-movers are using new technologies to transform customer experience • what the six pillars of customer experience are and how to master them • why internal and external connectedness is an essential component of CX excellence Download the report now
Tags : 
    
KPMG
Published By: SAP     Published Date: Aug 13, 2018
IDC sought to capture the voice of the customer by conducting a web-based survey of over 300 SAP customers in nine countries, soliciting the views of SAP customers that are considering, planning for, or have already implemented the new ERP system — SAP S/4HANA.
Tags : 
    
SAP
Published By: Intel     Published Date: Sep 10, 2018
Today’s tech savvy consumers are continually driving organizations to deliver a modernized shopping experience. To achieve this, retailers are pushing the edge on developing non-traditional ways in delivering sales messages. One of the best ways to engage shoppers with an in-store digital presence is through modern adaptive signages. Modern signages enable two-way interaction between customers and businesses, tapping onto cutting-edge technologies such as sensors and analytics to respond to customer behavior—helping retailers customize content on the fly. Find out how Giada Technology leveraged on Intel® processors to power up their cloud terminals to pre-process signage, sensor, and mobile data to efficiently exchange information with the cloud. Retailers are better positioned to present contextual promotions to the shoppers, delivering benefits of lesser wait-time and increased customer satisfaction.
Tags : 
    
Intel
Published By: Uberall     Published Date: Oct 08, 2018
Retail is struggling. Stuck in the past, it relies on old methods to draw customers to stores, and oftentimes is afraid of new technologies — even though it’s clear how to get the fundamental, proven levers right first.
Tags : 
digital, customer, fundamental, technologies
    
Uberall
Published By: Lenovo - APAC     Published Date: Sep 27, 2019
this year, healthcare IT budgets are forecasted to outpace other industries
Tags : 
    
Lenovo - APAC
Published By: Cisco Umbrella EMEA     Published Date: Feb 08, 2019
The cloud — at one point it was a revolution in the workplace. But the cloud is no longer a trend or a movement. It’s now so integrated into IT and infrastructures that, for many companies, it’s simply another part of the business. The availability of mobile devices and cloud services has redefined not only the way we work, but where we work. Critical infrastructures, applications, and massive amounts of sensitive data are now stored in the cloud, leaving companies at risk of damage if cloud accounts are compromised. With the cloud fast becoming the new normal, network security solutions need to adapt. Download this ebook to learn how Cisco Cloud Security helps you securely adopt and use the cloud, and better manage security for the way the world works today.
Tags : 
    
Cisco Umbrella EMEA
Published By: Pattern     Published Date: Jan 09, 2019
As an eCommerce professional you're always looking for ways to sell more online. With Amazon capturing roughly 49.1 percent of all online retail spend in the United States it is the perfect platform to boost sales and awareness of your products. But with the number of sellers and products added to Amazon every day, how can your product rank number one in an Amazon search? Our Ultimate Guide to Amazon SEO will give you the tips and tricks you need to make the most out of your Amazon product listings and get to the top of Amazon's search results.
Tags : 
    
Pattern
Published By: Lenovo UK     Published Date: Oct 15, 2018
Met één laptop die elke minuut wordt gestolen, hoe breng je de veiligheidsdreiging in evenwicht met de stijgende behoefte aan mobiliteit van medewerkers en verbeterde productiviteit? Met ThinkPad, aangedreven door Intel® Core ™ i7 vPro ™ -processors, profiteert u van Lenovo's 360-benadering van beveiliging. Plus de duurzaamheid om uw gebruikers in elke fase van hun werkdag in beweging te houden en productief te houden. Meer informatie in onze infographic. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, het Intel logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, het Intel Inside logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside en Intel Optane zijn handelsmerken van Intel Corporation of zijn dochterondernemingen in de Verenigde Staten en/of andere landen.
Tags : 
    
Lenovo UK
Published By: Lenovo UK     Published Date: Oct 15, 2018
Mit einem Laptop, der jede Minute gestohlen wird, wie balancieren Sie die Sicherheitsbedrohung gegen den steigenden Bedarf an Mobilität und Produktivität der Mitarbeiter? Mit ThinkPad mit Intel® Core ™ i7 vPro ™ -Prozessoren profitieren Sie vom Lenovo 360-Sicherheitskonzept. Plus die Haltbarkeit, um Ihre Benutzer in jeder Phase ihres Arbeitstages beweglich und produktiv zu halten. Erfahren Sie mehr in unserer Infografik. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, das Intel-Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, das „Intel Inside“-Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, Xeon Inside und Intel Optane sind Marken der Intel Corporation oder ihrer Tochtergesellschaften in den USA und/oder anderen Ländern.
Tags : 
lenovo, intel, thinkpad, thinkpad x1, x1 extreme, laptop, sicherheit, produktivität, mobilität, lenovo x1, workforce mobility
    
Lenovo UK
Start   Previous    52 53 54 55 56 57 58 59 60 61 62 63 64 65 66    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.